Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "public-trust" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Lavabit To Release Code As Open Source, As It Creates Dark Mail Alliance To Create Even More Secure Email | Techdirt - 0 views

  • This whole morning, while all these stories of the NSA hacking directly into Google and Yahoo's network have been popping up, I've been at the Inbox Love conference, all about the future of email. The "keynote" that just concluded, was Ladar Levison from Lavabit (with an assist from Mike Janke from Silent Circle), talking about the just announced Dark Mail Alliance, between Lavabit and Silent Circle -- the other "security" focused communications company who shut down its email offering after Lavabit was forced to shut down. Levison joked that they went with "Dark Mail" because "Black Mail" might have negative connotations. Perhaps just as interesting, Levison is going to be releasing the Lavabit source code (and doing a Kickstarter project to support this), with the hope that many others can set up their own secure email using Lavabit's code, combined with the new Dark Mail Alliance secure technology which will be available next year. As noted, the Alliance is working on trying to create truly secure and surveillance-proof email. Of course, nothing is ever 100% surveillance proof -- and both members of the alliance have previously claimed that it was almost impossible to do surveillance-proof email. However, they're claiming they've had a "breakthrough" that will help.
  • The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders—inbox, sent mail, and drafts. But where it differs is that it will automatically deploy peer-to-peer encryption, so that users of the Dark Mail technology will be able to communicate securely. The encryption, based on a Silent Circle instant messaging protocol called SCIMP, will apply to both content and metadata of the message and attachments. And the secret keys generated to encrypt the communications will be ephemeral, meaning they are deleted after each exchange of messages. For the NSA and similar surveillance agencies across the world, it will sound like a nightmare. The technology will thwart attempts to sift emails directly from Internet cables as part of so-called “upstream” collection programs and limit the ability to collect messages directly from Internet companies through court orders. Covertly monitoring encrypted Dark Mail emails would likely have to be done by deploying Trojan spyware on a targeted user. If every email provider in the world adopted this technology for all their users, it would render dragnet interception of email messages and email metadata virtually impossible.
  • Importantly, they're not asking everyone to just trust them to be secure -- even though both companies have the right pedigree to deserve some level of trust. Instead, they're going to release the source code for public scrutiny and audits, and they're hoping that other email providers will join the alliance. At the conference, Levison recounted much of what's happened over the last few months (with quite a bit of humor), joking about how he tried to be "nice" in giving the feds Lavabit's private keys printed out, by noting that he included line numbers to help (leaving unsaid that this would make OCR'ing the keys even more difficult). He also admitted that giving them the paper version was really just a way to buy time to shut down Lavabit.
  • ...1 more annotation...
  • Janke came up on stage to talk about the importance of changing the 40-year-old architecture of email, because it's just not designed for secure communications. The hope is that as many other email providers as possible will join the Alliance and that this new setup becomes the de facto standard for end-to-end secure email, which is where Levison's open sourcing of his code gets more interesting. In theory, if it all works out, it could be a lot easier for lots of companies to set up their own "dark mail" email providers. Either way, I would imagine that this development can't make the NSA all that happy.
  •  
    Oh, Goody!
Paul Merrell

Poll: Distrust in media hits new high - Political Hotsheet - CBS News - 0 views

  • U.S. distrust of the mass media is at an all-time high, according to a new poll from Gallup, which indicates that six in ten Americans have little or no trust in mass media to report the news fully, accurately, and fairly. The survey, conducted from Sept. 6-9, shows that faith in the media is down in recent years, with 40 percent of Americans saying they have a great deal of or some faith in the media to comprehensively and fairly report the news, and 60 percent expressing the opposite perspective.
Paul Merrell

Hillary Clinton Goes to Militaristic, Hawkish Think Tank, Gives Militaristic, Hawkish Speech - 0 views

  • Leading Democratic presidential candidate Hillary Clinton this morning delivered a foreign policy speech at the Brookings Institution in Washington. By itself, the choice of the venue was revealing. Brookings served as Ground Zero for centrist think tank advocacy of the Iraq War, which Clinton (along with potential rival Joe Biden) notoriously and vehemently advocated. Brookings’ two leading “scholar”-stars — Kenneth Pollack and Michael O’Hanlon — spent all of 2002 and 2003 insisting that invading Iraq was wise and just, and spent the years after that assuring Americans that the “victorious” war and subsequent occupation were going really well (in April 2003, O’Hanlon debated with himself over whether the strategy that led to the “victory” in his beloved war should be deemed “brilliant” or just extremely “clever,” while in June 2003, Pollack assured New York Times readers that Saddam’s WMD would be found).
  • Since then, O’Hanlon in particular has advocated for increased military force in more countries than one can count. That’s not surprising: Brookings is funded in part by one of the Democratic Party’s favorite billionaires, Haim Saban, who is a dual citizen of the U.S. and Israel and once said of himself: “I’m a one-issue guy, and my issue is Israel.” Pollack advocated for the attack on Iraq while he was “Director of Research of the Saban Center for Middle East Policy.” Saban became the Democratic Party’s largest fundraiser — even paying $7 million for the new DNC building — and is now a very substantial funder of Hillary Clinton’s campaign. In exchange, she’s written a personal letter to him publicly “expressing her strong and unequivocal support for Israel in the face of the Boycott, Divestment and Sanction movement.” So the hawkish Brookings is the prism through which Hillary Clinton’s foreign policy worldview can be best understood. The think tank is filled with former advisers to both Bill and Hillary Clinton, and would certainly provide numerous top-level foreign policy officials in any Hillary Clinton administration. As she put it today at the start: “There are a lot of long-time friends and colleagues who perch here at Brookings.” And she proceeded to deliver exactly the speech one would expect, reminding everyone of just how militaristic and hawkish she is.
  • Clinton proclaimed that she “too [is] deeply concerned about Iranian aggression and the need to confront it. It’s a ruthless, brutal regime that has the blood of Americans, many others and including its own people on its hands.” Even worse, she said, “Its political rallies resound with cries of ‘Death to America.’ Its leaders talk about wiping Israel off the face of the map, most recently just yesterday, and foment terror against it. There is absolutely no reason to trust Iran.” She repeated that claim several times for emphasis: “They vow to destroy Israel. And that’s worth saying again. They vow to destroy Israel.” She vowed that in dealing with Iran, she will be tougher and more aggressive than Reagan was with the Soviet Union: “You remember President Reagan’s line about the Soviets: Trust but verify? My approach will be distrust and verify.” She also explicitly threatened Iran with war if they fail to comply: “I will not hesitate to take military action if Iran attempts to obtain a nuclear weapon, and I will set up my successor to be able to credibly make the same pledge.” She even depicted the Iran Deal as making a future war with Iran easier and more powerful:
  • ...4 more annotations...
  • Should it become necessary in the future having exhausted peaceful alternatives to turn to military force, we will have preserved and in some cases enhanced our capacity to act. And because we have proven our commitment to diplomacy first, the world will more likely join us. As for Israel itself, Clinton eagerly promised to shower it with a long, expensive, and dangerous list of gifts. Here’s just a part of what that country can expect from the second President Clinton: I will deepen America’s unshakeable commitment to Israel’s security, including our long standing tradition of guaranteeing Israel’s qualitative military edge. I’ll increase support for Israeli rocket and missile defenses and for intelligence sharing. I’ll sell Israel the most sophisticated fire aircraft ever developed. The F-35. We’ll work together to develop and implement better tunnel detection technology to prevent arms smuggling and kidnapping as well as the strongest possible missile defense system for Northern Israel, which has been subjected to Hezbollah’s attacks for years.
  • She promised she “will sustain a robust military presence in the [Persian Gulf] region, especially our air and naval forces.” She vowed to “increase security cooperation with our Gulf allies” — by which she means the despotic regimes in Saudi Arabia, United Arab Emirates and Qatar, among others. She swore she will crack down even further on Hezbollah: “It’s time to eliminate the false distinction that some still make between the supposed political and military wings. If you’re part of Hezbollah, you’re part of a terrorist organization, plain and simple.” Then she took the ultimate pledge: “I would not support this agreement for one second if I thought it put Israel in greater danger.” So even if the deal would benefit the U.S., she would not support it “for one second” if it “put Israel in greater danger.” That’s an unusually blunt vow to subordinate the interests of the U.S. to that foreign nation.
  • But when it comes to gifts to Israel, that’s not all! Echoing the vow of several GOP candidates to call Netanyahu right away after being elected, Clinton promised: “I would invite the Israeli prime minister to the White House during my first month in office to talk about all of these issues and to set us on a course of close, frequent consultation right from the start, because we both rely on each other for support as partners, allies and friends.” She then addressed “the people of Israel,” telling them: “Let me say, you’ll never have to question whether we’re with you. The United States will always be with you.” For good measure, she heaped praise on “my friend Chuck Schumer,” who has led the battle to defeat the Iran Deal, gushing about what an “excellent leader in the Senate” he will make. What’s a little warmongering among friends? Just as was true in her book, she implicitly criticized Obama — who boasts that he has bombed seven predominantly Muslim countries — of being insufficiently militaristic, imperialistic, and violent. She said she wanted more involvement in Syria from the start (though did not call for the U.S. to accept any of its refugees). In a clear rebuke to the current president, she decreed that any criticisms U.S. officials may utter of Israel should be done only in private (“in private and behind, you know, closed doors”), not in public, lest “it open[] the door to everybody else to delegitimize Israel to, you know, pile on in ways that are not good for the — the strength and stability, not just of Israel.” About Russia, she said, “I think we have not done enough” and put herself “in the category of people who wanted us to do more in response to the annexation of Crimea and the continuing destabilization of Ukraine.”
  • Two words that did not come out of Clinton’s mouth during the entire event: “Palestinians” (do they exist?) and “Libya” (that glorious war she supported that was going to be the inspiring template for future “humanitarian interventions” before it predictably destroyed that whole country).
  •  
    Glenn Greenwald tags Hillary pandering to the Chicken Hawk Party
Paul Merrell

US military denied treatment to soldiers exposed to chemical weapons in Iraq (+video) - CSMonitor.com - 0 views

  • The New York Times's C.J. Chivers has dropped a bombshell of a scoop that details 17 US troops and seven Iraqi policemen who were exposed to old chemical weapons in Iraq, some of whom were declined appropriate medical care and service awards on the grounds of secrecy.If Mr. Chivers' reporting holds up – and there's little reason to doubt his deeply-reported piece – this is a scandal that eclipses long waits and poor funding at VA hospitals in the US. Sure, far fewer people were affected by exposure to mustard agents or sarin in Iraq, but these allegations represent enormous callousness and a direct breach of trust with soldiers.
  • Jarrod L. Taylor, a former Army sergeant on hand for the destruction of mustard shells that burned two soldiers in his infantry company, joked of “wounds that never happened” from “that stuff that didn’t exist.” The public, he said, was misled for a decade. “I love it when I hear, ‘Oh there weren’t any chemical weapons in Iraq,’” he said. “There were plenty.” That chemical weapons from before the first Gulf War remained in Iraq was an operating assumption at the time the US invaded the country in 2003 and was established fact by the end of that year. But, while the US made the search for evidence of ongoing chemical, nuclear, and biological weapons programs a priority (it failed to find any), disposing of whatever they did find apparently was not.
  • The American government withheld word about its discoveries even from troops it sent into harm’s way and from military doctors. The government’s secrecy, victims and participants said, prevented troops in some of the war’s most dangerous jobs from receiving proper medical care and official recognition of their wounds. “I felt more like a guinea pig than a wounded soldier,” said a former Army sergeant who suffered mustard burns in 2007 and was denied hospital treatment and medical evacuation to the United States despite requests from his commander. Congress, too, was only partly informed, while troops and officers were instructed to be silent or give deceptive accounts of what they had found. “ 'Nothing of significance’ is what I was ordered to say,” said Jarrod Lampier, a recently retired Army major who was present for the largest chemical weapons discovery of the war: more than 2,400 nerve-agent rockets unearthed in 2006 at a former Republican Guard compound.
  • ...3 more annotations...
  • That's the central issue in Chivers' piece, which is hard to read in full without mounting anger. But the following four graphs contain the nut of the scandal here, as I see it (emphasis mine): 
  • In the first year of the US-led war, the military didn't have the manpower to secure all of the hundreds of conventional weapons bunkers that littered the country. The shells, RPGs, and rifles that were looted from these bunkers were put to use by the then-growing Iraqi insurgency to attack both foreign soldiers and the new government in Baghdad.Chivers' story details how as late as 2008, US soldiers were involved in the secret destruction of chemical weapons in ways that violate the protocols set out in the United Nations's Convention on Chemical Weapons. The lax US approach appears to have led to the exposure of the soldiers – and it left behind an unknown quantity of old chemical weapons, some possibly in the hands of anti-government insurgents like the so-called Islamic State. The US knew it was leaving old chemical weapons behind when soldiers withdrew from the country at the end of 2011. Neither the Bush nor the Obama administrations had ever made their destruction a priority. 
  • Much of the reaction to the story has missed the central point, distracted by partisan finger pointing. Fox News predictably frames the story as "There were chemical weapons in Iraq after all." No. This is not news – and the possible existence of old sarin and mustard agent shells inside the country was not the reason that the Bush administration presented for going to war. Folks on the left have focused on the fact that these old chemical weapons were US "designed." That isn't really news either (nor that the US was notably silent about Saddam Hussein's use of chemical weapons during the Iran-Iraq war).The story is an enormous breach of trust between the US and its own soldiers. It starts with the officers and the members of the Bush administration involved, whose names the story doesn't give.
Paul Merrell

Never trust a corporation to do a library's job - The Message - Medium - 0 views

  • Google wrote its mission statement in 1999, a year after launch, setting the course for the company’s next decade:“Google’s mission is to organize the world’s information and make it universally accessible and useful.”For years, Google’s mission included the preservation of the past.
  • In the last five years, starting around 2010, the shifting priorities of Google’s management left these archival projects in limbo, or abandoned entirely.After a series of redesigns, Google Groups is effectively dead for research purposes. The archives, while still online, have no means of searching by date.Google News Archives are dead, killed off in 2011, now directing searchers to just use Google.Google Books is still online, but curtailed their scanning efforts in recent years, likely discouraged by a decade of legal wrangling still in appeal. The official blog stopped updating in 2012 and the Twitter account’s been dormant since February 2013.
  • Even Google Search, their flagship product, stopped focusing on the history of the web. In 2011, Google removed the Timeline view letting users filter search results by date, while a series of major changes to their search ranking algorithm increasingly favored freshness over older pages from established sources. (To the detriment of some.)
  • ...2 more annotations...
  • Two months ago, Larry Page said the company’s outgrown its 14-year-old mission statement. Its ambitions have grown, and its priorities have shifted.Google in 2015 is focused on the present and future. Its social and mobile efforts, experiments with robotics and artificial intelligence, self-driving vehicles and fiberoptics.As it turns out, organizing the world’s information isn’t always profitable. Projects that preserve the past for the public good aren’t really a big profit center. Old Google knew that, but didn’t seem to care.
  • The desire to preserve the past died along with 20% time, Google Labs, and the spirit of haphazard experimentation.Google may have dropped the ball on the past, but fortunately, someone was there to pick it up.
  •  
    So here's my plan. In the same legislation that abolishes the NSA, grant its funding and deed the NSA's enormous data center in Utah to the Internet Archives.  Require that the NSA's internet archives be turned over to Internet Archive in good working order. Put thousands of librarians and digital archaeologists to work preserving and making the history of the online global populattion accessible to all. Also require that the remainder of the NSA be used as combustibles for the first annual NSA Bonfire Ball. BYOB. 
Paul Merrell

ISIL, Turkey: The Dream of Restoring the Glories of Sublime Ottoman State , by Israa Al-Fass - 0 views

  • The ISIL’s funding father is Erdogan’s personal friend The name of the Saudi businessman Yassin al-Qadi has been linked to organizations classified as terrorist internationally. In particular, the foreign press and the Turkish opposition media describe him as “al-Qaeda’s funding father”. After the events of September 11/2001, al-Qadi- along with other figures- has been included in the world’s list of terrorists, and his name was stereotyped as a terrorist man. This made several countries ban him from entering into their territories, Turkey was one of them. Earlier, the Turkish media documented a photo scandal: Erdogan’s meetings with Yassin al-Qadi as well as long meetings with his son Bilal Recep Tayyip Erdogan. The scandal that was leaked by Turkish security elements came in the context of the case of corruption of which the son of the former Turkish Prime Minister has been accused. Based upon this, a large number of elements of the security corps were arrested being accused of plotting a coup against the government.
  • Nevertheless, the French journalist Thierry Meyssan describes Yassin al-Qadi as a personal friend of both Dick Cheney (former U.S. Vice President) and Recep Tayyip Erdogan. According to him, al-Qadi visited Turkey four times during 2012, and “his plane used to land at the second airport of Istanbul, and was being welcomed by the Prime Minister personally, without going through the smart gate, and after cutting the security cameras’ power supply”. The Turkish Gmehoriet Newspaper intended to publish details about the investigations conducted by the Turkish judiciary on the same case, and mentioned that Recep Tayyip Erdogan introduced Yassine al-Qadi as a Saudi businessman visiting Turkey to invest and denied that he is a terrorist. It quoted him as saying: “I trust Mr. Al-Qadi just as I trust myself. He is an almsgiver”.
  • The Turkish newspaper, after publishing Erdogan’s utterances before the Turkish judiciary, revealed that the Turkish police monitored 12 visits made by the Saudi man to Turkey. Seven out of these visits have been made with the help of Erdogan, the period when he was banned from entering Turkey, because his name was added as one of the world wanted terrorists in the list of the American FBI. The newspaper commented saying: “When the Turkish police was looking for al-Qadi, he was holding meetings with the Prime Minister”. Also, it published a photograph that showed separately the aforesaid man, Erdogan, and the Turkish intelligence chief Hakan Fidan, when they were going to a meeting that gathered them. The newspaper noted that Fidan himself met with al-Qadi 5 times when Al-Qadi has been banned from entering the Turkish territory.
  • ...7 more annotations...
  • Yet, the interesting thing is the leaked recordings published by the newspaper that disclose that Yassin al-Qadi used to give orders to the Erdogan’s office. He used to call to inform them that he had decided today to meet with Erdogan, and that the latter should not engage in any other obligations. The newspaper reported details about the dates of the meetings between the two men, what implies that the meetings were being attended by Fidan and by the Egyptian businessman Osama Qutob; the son of Muhammad Qutob the brother of the Brotherhood leader Sayyid Qutob who holds the Turkish citizenship and is living with his father in Turkey at present. This also mean that the meetings were taking place sometimes at the home of the Turkish businessman Mustafa Latif Topas in Istanbul, attended by Erdogan’s son and Moaz the son of al-Qadi. The recordings verify that Qutob was in charge of delivering the messages from the insurgents in the battlefield in Syria to Erdogan, what signifies that the meetings of these figures exceeded the issues of investment, and perhaps they exploited the title of a charity practice!
  • Those returning from Turkey refer to the public sympathy in the pro-government Turkish street with the ISIL. Social networking websites publish photos of Islamic libraries in Istanbul selling “T-shirts” and goods with the ISIL logo on them. Perhaps this news is no longer shocking after what the German (ARD) Television has revealed regarding the opening of an office for the ISIL in al-Fateh Street in Istanbul, being ran by Turks. Through it, the process of supporting and supplying the Takfiri organization in Iraq and Syria with funds and fighters takes place.
  • The German channel itself revealed in a video report aired by it that the ISIL has training camps on the Turkish territory: 1- The GAZIANTEP Camp: a training camp for the ISIL fighters According to the report published by the website of “Today’s Zaman”, an English-language newspaper in Turkey, the Governor of the Gaziantep (Erdal Ata) rushed to hold a press conference to deny what has been revealed by the German television. However, he spoke about the arrest of 19 elements that belong to the ISIL in the city, among those who came from European countries before committing them to trial.
  • Additionally, the Lebanese journalist Hassan Hamade, in an earlier interview with Al-Manar, drew attention to the existence of three training camps in Turkey for the fighters of extremist organizations [3]. 2- The ORFA Camp, southeastern Turkey: a camp out of which the gunmen came when they attacked the Kasab city that its residents are predominantly Armenian.
  • 3- The OSMANIYA camp in Adana, southern Turkey: It is directly near the major bases of the U.S. Air Force in the Turkish territory. Yet, what is interesting is that the Osmaniya camp is a stone’s throw away from the gas pipelines points of intersection coming from Iraq and Central Asia that empty the freight in the Turkish port of Ceyhan on the Mediterranean Sea. 4- The KARMAN camp, it is also in Adana but is much closer to Istanbul. Moreover, a document published by the French journalist Thierry Meyssan, earlier, revealed that Turkey facilitated the infiltration of 5,000 fighters, who belong to al-Qaeda, to the Syrian territory after receiving training in Libya.
  • Perhaps the report of the American TV Network clarifies the argument of the Turkish journalist Orhan Kama Genghis: “The strongholds of the ISIL are located close to the Turkish border, and this did not happen coincidentally”. The Turkish journalist Kadri Gursel talks about the fact that the Turkish border territories have turned into an easy pathway facilitating the arrival and departure of the militants, where there are no formal procedures (visas, etc…) that could bother them, referring to the cooperation of the Turkish intelligence agency with the militants. Above and beyond, the Turkish opposition Republican People’s Party MP Muharram Ingee said that the ISIL leader “Mazen Abu Mohammed” received treatment in one of the Turkish government hospitals in the city of Hatay on April 2014, publishing a photo of the terrorist man in the hospital.
  • Reviewing these data provide an early answer to the question of the Saudi writer, Nawaf Qadimi, who is known for his support for the Muslim Brotherhood, where the phenomenon of the ISIL leads us to evoke history. The Seljuks drew the policies to expand their influence and their tools were the advocates of takfir and the recruiting of fighters in the name of religion. Here is Erdogan in actual fact walking in the footsteps of the ancestors and painting policies, and the tools are the texts of takfir for which he is recruiting fighters in the name of religion itself! That is how history is enabling us to understand our present...
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washington Post - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

The FBI Has a New Plan to Spy on High School Students Across the Country | Alternet - 0 views

  • Under new guidelines, the FBI is instructing high schools across the country to report students who criticize government policies and “western corruption” as potential future terrorists, warning that “anarchist extremists” are in the same category as ISIS and young people who are poor, immigrants or travel to “suspicious” countries are more likely to commit horrific violence.Based on the widely unpopular British “anti-terror” mass surveillance program, the FBI’s "Preventing Violent Extremism in Schools" guidelines, released in January, are almost certainly designed to single out and target Muslim-American communities. However, in its caution to avoid the appearance of discrimination, the agency identifies risk factors that are so broad and vague that virtually any young person could be deemed dangerous and worthy of surveillance, especially if she is socio-economically marginalized or politically outspoken.
  • This overwhelming threat is then used to justify a massive surveillance apparatus, wherein educators and pupils function as extensions of the FBI by watching and informing on each other.The FBI’s justification for such surveillance is based on McCarthy-era theories of radicalization, in which authorities monitor thoughts and behaviors that they claim to lead to acts of violent subversion, even if those people being watched have not committed any wrongdoing. This model has been widely discredited as a violence prevention method, including by the U.S. government, but it is now being imported to schools nationwide as official federal policy.
  • Under the category of domestic terrorists, the educational materials warn of the threat posed by “anarchist extremists.” The FBI states, “Anarchist extremists believe that society should have no government, laws, or police, and they are loosely organized, with no central leadership… Violent anarchist extremists usually target symbols of capitalism they believe to be the cause of all problems in society—such as large corporations, government organizations, and police agencies.”Similarly, “Animal Rights Extremists and Environmental Extremists” are placed alongside “white supremacy extremists”, ISIS and Al Qaeda as terrorists out to recruit high school students. The materials also instruct students to watch out for  extremist propaganda messages that communicate criticisms of "corrupt western nations" and express "government mistrust.”If you "see suspicious behavior that might lead to violent extremism," the resource states, consider reporting it to "someone you trust," including local law enforcement officials like police officers and FBI agents.
  • ...3 more annotations...
  • “The whole concept of CVE is based on the conveyor belt theory – the idea that ‘extreme ideas’ lead to violence,” Michael German, a fellow with the Brennan Center for Justice’s Liberty and National Security Program, told AlterNet. “These programs fall back on the older ‘stages of radicalization’ models, where the identified indicators are the expression of political grievances and religious practices.”The lineage of this model can be traced to the first red scare in America, as well as J. Edgar Hoover’s crackdown on civil rights and anti-war activists. In the post-9/11 era, the conveyor-belt theory has led to the mass surveillance of Muslims communities by law enforcement outfits ranging from the FBI to the New York Police Department.U.S. government agencies continue to embrace this model despite the fact that it has been thoroughly debunked by years of scholarly research, Britain’s M15 spy agency and an academic study directly supported by the Department of Homeland Security.
  • “The document aims to encourage schools to monitor their students more carefully for signs of radicalization but its definition of radicalization is vague,” said Arun Kundnani, author of The Muslims are Coming! Islamophobia, extremism, and the domestic War on Terror and an adjunct professor at New York University. “Drawing on the junk science of radicalization models, the document dangerously blurs the distinction between legitimate ideological expression and violent criminal actions.”
  • As Hugh Handeyside, staff attorney for the ACLU’s national security project, told AlterNet, “Broadening the definition of violent extremism to include a range of belief-driven violence underscores that the FBI is diving head-first into community spying. Framing this conduct as ‘concerning behavior’ doesn’t conceal the fact that the FBI is policing students’ thoughts and trying to predict the future based on those thoughts.”
Paul Merrell

The Citadel Is Breached: Congress Taps the Fed for Infrastructure Funding | WEB OF DEBT BLOG - 0 views

  • In a landmark infrastructure bill passed in December, Congress finally penetrated the Fed’s “independence” by tapping its reserves and bank dividends for infrastructure funding. The bill was a start. But some experts, including Congressional candidate Tim Canova, say Congress should go further and authorize funds to be issued for infrastructure directly. For at least a decade, think tanks, commissions and other stakeholders have fought to get Congress to address the staggering backlog of maintenance, upkeep and improvements required to bring the nation’s infrastructure into the 21st century. Countries with less in the way of assets have overtaken the US in innovation and efficiency, while our dysfunctional Congress has battled endlessly over the fiscal cliff, tax reform, entitlement reform, and deficit reduction. Both houses and both political parties agree that something must be done, but they have been unable to agree on where to find the funds. Republicans aren’t willing to raise taxes on the rich, and Democrats aren’t willing to cut social services for the poor.
  • In December 2015, however, a compromise was finally reached. On December 4, the last day the Department of Transportation was authorized to cut checks for highway and transit projects, President Obama signed a 1,300-page $305-billion transportation infrastructure bill that renewed existing highway and transit programs. According to America’s civil engineers, the sum was not nearly enough for all the work that needs to be done. But the bill was nevertheless considered a landmark achievement, because Congress has not been able to agree on how to fund a long-term highway and transit bill since 2005. That was one of its landmark achievements. Less publicized was where Congress would get the money: largely from the Federal Reserve and Wall Street megabanks. The deal was summarized in a December 1st Bloomberg article titled “Highway Bill Compromise Would Take Money from US Banks”: The highway measure would be financed in part by a one-time use of Federal Reserve surplus funds and by a reduction in the 6 percent dividend that national banks receive from the Fed. . . . Banks with $10 billion or less in assets would be exempt from the cut. The Fed’s surplus capital comes from the 12 reserve banks. The highway bill would allow for a one-time draw of $19 billion from the surplus, which totaled $29.3 billion as of Nov. 25. . . . Banks vigorously fought the dividend cut, which was estimated to generate about $17 billion over 10 years for the highway trust fund.
Paul Merrell

Brazil: The Provisional Banana Scoundrel Republic - 0 views

  • Every political junkie on the planet has to be glued to the ongoing Brazilian House of Cards, consistently offering an unparalleled feast of cheap thrills.The latest cliffhanger was the leak of a conversation between one of the key operators involved in the oil giant Petrobras corruption scandal and a senator and short-lived Minister of Planning in the usurper interim government currently replacing President Dilma Rousseff while she is undergoing an impeachment trial by the Senate.  Call the leak a short autopsy of what from the beginning should have been defined as golpeachment; a mix of coup (“golpe”, in Portuguese) and impeachment, which took place in a one/two sequential vote in the Brazilian Congress and Senate, as a notorious congregation of crooks investigated for myriad offenses and crimes seized power in Brasilia in a full-fledged Buffon’s Opera. I call their scam Provisional Banana Scoundrel Republic (PBSR).  
  • The leak/autopsy duly unveiled how the PBSR cancer progressed.  One of the key plotters outlines the coup; stresses how it should protect Brazilian plutocracy/kleptocracy from unintended consequences of the ongoing, two-year-old Car Wash corruption investigation; and how the Left – from President Rousseff to Lula and the Workers’ Party – should be criminalized for good. 
  • The rest would be history, including the demolition of recently acquired social and workers’ rights via the imposition of a neoliberal restoration; total reversion in foreign policy, with geopolitical and geoeconomic relations back to a colonized mindset; and the reestablishment of a conservative, neoliberal, rentier hegemonic class lording over a socially-oriented, democratic society. That fits in with the current Brazilian Congress and Senate dominated by “BBB” interests. “BBB” stands for Beef (the powerful agribusiness lobby); Bullet (the weapons and private security complex); and Bible (evangelical fanatics), all supported by corporate media. Many of these unsavory characters are connected and/or represent the toxic Brazilian rural aristocracy – which are in fact heirs to nobility titles handed over to slave owners. It was going all so swell after only a few days – even with the former head of the lower house, notorious crook Eduardo Cunha, temporarily sidelined; Cunha – the ringleader of a campaign financing scam inside Congress – de facto had become the Prime Minister of the puppet former Vice-President and current, interim President Michel Temer. 
  • ...3 more annotations...
  • The key variable from now on is how the PBSR gang will maneuver – possibly illegally — to cling to power. The Public Ministry and the Federal police are totally politicized. Increasingly there are no mediation powers. The PBSR gang will take no prisoners. The Public Ministry will go after Lula while the attorney general will try to block any chance of Rousseff being reinstated. Meanwhile, the social democrats turned neoliberal enforcers – key associates of the PBSR — will keep advancing their own agenda; hardcore privatizations; handing over the exploration of the pre-salt oil deposits to US Big Oil; and dutifully prostrating as Washington vassals. One just needs to examine the extreme interest by the US Department of Justice on all things related to the Car Wash investigation to infer how Washington is deeply involved in smashing leading Brazilian corporations.   
  • Washington has not had the balls to do it directly – relying on minions such as the State Department spokesman and the interim ambassador to the OAS. But the message is unmistakable; golpeachment is legal, and Washington trusts Brazilian “democratic institutions”. Compare it to the Russian Foreign Ministry, which alerted to “foreign interference” in Brazilian affairs. The new Brazilian Foreign Minister – a sore loser (twice) in presidential elections won by the Workers’ Party – took no time to launch his glorious Vassal of Washington/US Big Capital policy. He already issued a veiled “threat” to Cuba, Venezuela, Nicaragua, Bolivia, Ecuador and El Salvador. Mercosur will be sidelined to the benefit of the Pacific Alliance – where Mexico, Peru and Colombia are under Washington’s wings. Unasur will be ditched.
  • And then there’s the stale ice cream in the scoundrel’s tart; the “B” in BRICS is now dormant. This means the role of Brazil in the BRICS bank will be seriously compromised. Granted, the BRICS were never a homogenous group and have been riddled with conflicting interests. For instance, India’s nuclear-sharing agreement with the US effectively ties it up with Washington. The next BRICS summit is in India, in October. Brazil risks the ignominy of being represented by the PBSR gang.  Meanwhile, make no mistake; as much as the Car Wash investigation was revealed to be a totally politicized drive – where fighting corruption was just a convenient cover – the PBSR gang and their allies will do everything to get rid of the 2018 direct presidential elections. So here’s the sorry Brazilian road map up to 2018; total political, economic, social and juridical chaos. 
  •  
    Pepe Escobar, himself a Brazilian expatriate journailist, riffs on the Brazilian coup-gone-sour-by-discllosure-of-plans. If you have a browser extension to do translations, read the article linked from the "U.S. Department of Justice" text. It seems that the U.S. played a part in setting the coup in motion. Surprise, surprise. A very fun read. 
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Paul Merrell

Lawmakers vow to constrain NSA from collecting U.S. phone records - latimes.com - 0 views

  • The drive to end the bulk collection of phone records by the National Security Agency is gaining strength, as Senate Democrats said Sunday that Congress will change the law to ban the practice if President Obama does not do it first. “It’s time to have real reform, not a veneer of reform,” said Sen. Mark Udall (D-Colo.), a longtime critic of the NSA. “We have got to rebuild the American people’s trust in our intelligence community so we can be safe,” he said on ABC’s "This Week." “But we don’t do that by bulk data collection that violates the privacy of Americans. That’s unconstitutional, and has shown to not be effective.” Last week, a federal judge said the routine collection of the dialing records is probably unconstitutional, and a panel appointed by President Obama recommended a major change. “We believe the government shouldn’t hold this data any longer,” Michael Morrell, a former acting director of the CIA and a panel member, said on CBS’ "Face the Nation." He said the phone records could be held by the phone companies or by another private group. Then, the government would “need a court order every time they wanted to query that data,” he said. Despite the need for reforms, Morrell said the original purpose of the program still makes sense. He said it is crucial the NSA and the FBI can move quickly if there is reason to believe that a “terrorist overseas is talking to someone in the United States.”
  • But the government does not need to collect and store all of these dialing records, he said, so long as they are held in private hands. Senate Judiciary Committee Chairman Patrick J. Leahy (D-Vt.) said he will press ahead in January to pass a bill that forbids the NSA from collecting phone records. He is sponsoring the USA Freedom Act with former House Judiciary Committee Chairman F. James Sensenbrenner (R-Wis.) to close what they now see as a loophole in the law.
  •  
    Wrong approach, in my opinion. None of the NSA reform measures so far take aim at the problem's roots. Those are unwarranted government secrecy, lack of reviewability by the courts at the request of the affected public, and no clear definition of digital privacy rights. Make something illegal for the NSA to do and DoD will just transfer those responsibilities to another of its agencies or farm it out to one of the other 5 Eyes nations to perform for them.   
Paul Merrell

CIA misled on interrogation program, Senate report says - The Washington Post - 0 views

  • A report by the Senate Intelligence Committee concludes that the CIA misled the government and the public about aspects of its brutal interrogation program for years — concealing details about the severity of its methods, overstating the significance of plots and prisoners, and taking credit for critical pieces of intelligence that detainees had in fact surrendered before they were subjected to harsh techniques. The report, built around detailed chronologies of dozens of CIA detainees, documents a long-standing pattern of unsubstantiated claims as agency officials sought permission to use — and later tried to defend — excruciating interrogation methods that yielded little, if any, significant intelligence, according to U.S. officials who have reviewed the document.
  • “The CIA described [its program] repeatedly both to the Department of Justice and eventually to Congress as getting unique, otherwise unobtainable intelligence that helped disrupt terrorist plots and save thousands of lives,” said one U.S. official briefed on the report. “Was that actually true? The answer is no.”
  • Several officials who have read the document said some of its most troubling sections deal not with detainee abuse but with discrepancies between the statements of senior CIA officials in Washington and the details revealed in the written communications of lower-level employees directly involved.Officials said millions of records make clear that the CIA’s ability to obtain the most valuable intelligence against al-Qaeda — including tips that led to the killing of Osama bin Laden in 2011 — had little, if anything, to do with “enhanced interrogation techniques.”The report is divided into three volumes — one that traces the chronology of interrogation operations, another that assesses intelligence officials’ claims and a third that contains case studies on virtually every prisoner held in CIA custody since the program began in 2001. Officials said the report was stripped of certain details, including the locations of CIA prisons and the names of agency employees who did not hold ­supervisor-level positions.One official said that almost all of the critical threat-related information from Abu Zubaida was obtained during the period when he was questioned by Soufan at a hospital in Pakistan, well before he was interrogated by the CIA and waterboarded 83 times.Information obtained by Soufan, however, was passed up through the ranks of the U.S. intelligence community, the Justice Department and Congress as though it were part of what CIA interrogators had obtained, according to the committee report.
  • ...5 more annotations...
  • The Senate Intelligence Committee is expected to vote Thursday to send an executive summary of the report to Obama for declassification. U.S. officials said it could be months before that section, which contains roughly 20 conclusions and spans about 400 pages, is released to the public. The report’s release also could resurrect a long-standing feud between the CIA and the FBI, where many officials were dismayed by the agency’s use of methods that Obama and others later labeled torture. CIA veterans have expressed concern that the report reflects FBI biases. One of its principal authors is a former FBI analyst,
  • “The CIA conflated what was gotten when, which led them to misrepresent the effectiveness of the program,” said a second U.S. official who has reviewed the report. The official described the persistence of such misstatements as among “the most damaging” of the committee’s conclusions.Detainees’ credentials also were exaggerated, officials said. Agency officials described Abu Zubaida as a senior al-Qaeda operative — and, therefore, someone who warranted coercive techniques — although experts later determined that he was essentially a facilitator who helped guide recruits to al-Qaeda training camps.The CIA also oversold the role of Abd al-Rahim al-Nashiri in the 2000 bombing of the USS Cole in Yemen, which killed 17 U.S. sailors. CIA officials claimed he was the “mastermind.” The committee described a similar sequence in the interrogation of Hassan Ghul, an al-Qaeda operative who provided a critical lead in the search for bin Laden: the fact that the al-Qaeda leader’s most trusted courier used the moniker “al-Kuwaiti.” But Ghul disclosed that detail while being interrogated by Kurdish authorities in northern Iraq who posed questions scripted by CIA analysts. The information from that period was subsequently conflated with lesser intelligence gathered from Ghul at a secret CIA prison in Romania, officials said. Ghul was later turned over to authorities in Pakistan, where he was subsequently released. He was killed by a CIA drone strike in 2012.
  • Sen. Dianne Feinstein (D-Calif.), chairman of the Senate Intelligence Committee, has previously indicated that harsh CIA interrogation measures were of little value in the bin Laden hunt. “The CIA detainee who provided the most significant information about the courier provided the information prior to being subjected to coercive interrogation techniques,” Feinstein said in a 2013 statement, responding in part to scenes in the movie “Zero Dark Thirty” that depict a detainee’s slip under duress as a breakthrough moment.
  • As with Abu Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating. On Sept. 22, 2003, he was flown from Kabul to a CIA black site in Romania. In 2006, he was taken to the U.S. military prison at Guantanamo Bay, Cuba. His attorneys contend that he suffered head trauma while in CIA custody. Last year, the Senate Intelligence Committee asked Baluchi’s attorneys for information about his medical condition, but military prosecutors opposed the request. A U.S. official said the request was not based solely on the committee’s investigation of the CIA program.
  • Officials said a former CIA interrogator named Charlie Wise was forced to retire in 2003 after being suspected of abusing Abu Zubaida using a broomstick as a ballast while he was forced to kneel in a stress position. Wise was also implicated in the abuse at Salt Pit. He died of a heart attack shortly after retiring from the CIA, former U.S. intelligence officials said.
Paul Merrell

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • ...2 more annotations...
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
Paul Merrell

Edward Snowden, a year on: reformers frustrated as NSA preserves its power | World news | theguardian.com - 1 views

  • For two weeks in May, it looked as though privacy advocates had scored a tenuous victory against the widespread surveillance practices exposed by Edward Snowden a year ago. Then came a resurgent intelligence community, armed with pens, and dry, legislative language.During several protracted sessions in secure rooms in the Capitol, intelligence veterans, often backed by the congressional leadership, sparred with House aides to abridge privacy and transparency provisions contained in the first bill rolling back National Security Agency spying powers in more than three decades. The revisions took place in secret after two congressional committees had passed the bill. The NSA and its allies took creative advantage of a twilight legislative period permitting technical or cosmetic language changes.The episode shows the lengths to which the architects and advocates of bulk surveillance have gone to preserve their authorities in the time since the Guardian, 12 months ago today, began disclosing the scope of NSA data collection. That resistance to change, aided by the power and trust enjoyed by the NSA on Capitol Hill, helps explain why most NSA powers remain intact a year after the largest leak in the agency's histo
  • But exactly one year on, the NSA’s greatest wound so far has been its PR difficulties. The agency, under public pressure, has divested itself of exactly one activity, the bulk collection of US phone data. Yet while the NSA will not itself continue to gather the data directly, the major post-Snowden legislative fix grants the agency wide berth in accessing and searching large volumes of phone records, and even wider latitude in collecting other kinds of data.There are no other mandated reforms.
  • Some NSA critics look to the courts for a fuller tally of their victories in the wake of the Snowden disclosures. Judges have begun to permit defendants to see evidence gathered against them that had its origins in NSA email or call intercepts, which could disrupt prosecutions or invalidate convictions. At least one such defendant, in Colorado, is seeking the exclusion of such evidence, arguing that its use in court is illegal.Still other cases challenging the surveillance efforts have gotten beyond the government’s longtime insistence that accusers cannot prove they were spied upon, as the Snowden trove demonstrated a dragnet that presumptively touched every American’s phone records. This week, an Idaho federal judge implored the supreme court to settle the question of the bulk surveillance's constitutionality."The litigation now is about the merits. It’s about the lawfulness of the surveillance program," said Jameel Jaffer, the ACLU’s deputy legal director.
  • ...4 more annotations...
  • The Freedom Act ultimately sped to passage in the House on May 22 by a bipartisan 303-121 vote. NSA advocates who had blasted its earlier version as hazardous to national security dropped their objections – largely because they had no more reason.Accordingly, the compromise language caused civil libertarians and technology groups not just to abandon the Freedom Act that they had long championed, but to question whether it actually banned bulk data collection. The government could acquire call-records data up to two degrees of separation from any "reasonable articulable suspicion" of wrongdoing, potentially representing hundreds or thousands of people on a single judicial order." That was not all.
  • "As the bill stands today, it could still permit the collection of email records from everyone who uses a particular email service," warned a Google legislative action alert after the bill passed the House. In a recent statement, cloud-storage firm Tresorit lamented that "there still has been no real progress in achieving truly effective security for consumer and corporate information."No one familiar with the negotiations alleges the NSA or its allies broke the law by amending the bill during the technical-fix period. But it is unusual for substantive changes to be introduced secretly after a bill has cleared committee and before its open debate by the full Senate or House."It is not out of order, but major changes in substance are rare, and appropriately so," said Norman Ornstein, an expert on congressional procedure at the American Enterprise Institute.Steve Aftergood, an intelligence policy analyst at the Federation of American Scientists, said the rewrites to the bill were an "invitation to cynicism."
  • "There does seem to be a sort of gamesmanship to it. Why go through all the troubling of crafting legislation, enlisting support and co-sponsorship, and adopting compromises if the bill is just going to be rewritten behind closed doors anyway?" Aftergood said.
  • Civil libertarians and activists now hope to strengthen the bill in the Senate. Its chief sponsor, Patrick Leahy of Vermont, vowed to take it up this month, and to push for "meaningful reforms" he said he was "disappointed" the House excluded. Obama administration officials will testify in the Senate intelligence committee about the bill on Thursday afternoon, the first anniversary of the Guardian's disclosure of bulk domestic phone records collection. That same day, Reddit, Imgur and other large websites will stage an online "Reset The Net" protest of NSA bulk surveillance.But the way the bill "morphed behind the scenes," as Lofgren put it, points to the obstacles such efforts face. It also points to a continuing opportunity for the NSA to say that Congress has actually blessed widespread data collection – a claim made after the Snowden leaks, despite most members of Congress and the public not knowing that NSA and the Fisa court secretly reinterpreted the Patriot Act in order to collect all US phone records.
  •  
    Good Guardian article on how the American Freedom Act as reported out of House committees was gutted in secret meetings between key representatives and NSA (and other Executive Branch) officials. The House of Representatives kisses the feet of Dark Government. 
Paul Merrell

David Davis' devastating attack on our loss of privacy | Mail Online - 0 views

  • The last time the main parties got together in a closed room, did a deal and told the country there was a need to act urgently, we were on the edge of abandoning 300 years of press freedom.This time our privacy is under threat. In the name of security, the Government is fast-tracking legislation through Parliament that will allow it to collect huge quantities of our personal data. We would do well to remember the advice of Ben Franklin: ‘Those who would give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety.’
  • The Government has engineered a ‘theatrical emergency’ – in this case terrorism and hidden paedophile rings – to ram the Data Retention and Investigatory Powers Bill through Parliament without proper debate. It is an insult to the supremacy of Parliament, to democracy and to the trust of the public.It was April 8 when the European Court of Justice struck down the Data Retention Directive for being incompatible with human rights. The Home Office has had time to put an alternative in place, so the excuses for why the legislation is being  fast-tracked are laughable.
  • It is a sad state of affairs when European courts are a greater defender of our ancient rights than Parliament and Her Majesty’s Government. Even the German Supreme Court overturned its far less invasive data collection laws for violating the privacy rights of German citizens. How far we have slipped, this birthplace of democracy, that our own judicial safeguards stand by while our hard-fought rights are stripped from us by a Government that has lost its sense of proportion in its fear of making a mistake.
  • ...3 more annotations...
  • Even the statistics already released are cause for concern.  The 2013 report of the Interception of Communications Commissioner revealed that 514,608 requests were made for data. By comparison, the most requests issued by the FBI in a year is 56,507. How can it be our intelligence agencies made nine times the number of requests for communications data than their US counterparts?
  • After the ‘dodgy dossier’ on weapons of mass destruction, the deceit on rendition and torture, and the debacle over the snooper’s charter, it is hard to be confident.Our Government has claimed that intercepted communications data was the critical evidence in 95 per cent of all serious crime cases. This would seem to go against the experience of the Metropolitan Police, which in evidence to a joint committee stated that ‘communications data is used sparingly, because it is costly and resource intensive, and because of the need to… consider the impact of collateral intrusion on innocent people’.
  • What this Government is chasing is not public security, it is protection from blame if anything goes wrong. Those are not the same thing.One person’s loss of freedom is everybody’s loss of freedom, one person’s loss of privacy is everybody’s loss of privacy. We must stand up for our rights and not succumb to the politics of fear. Otherwise we give those who hate our civilisation an easy victory, without a shot being fired.
  •  
    A UK M.P. critiques the full court press in the House of Commons for new legislation attempting to work around the EU Court of Justice ruling on electronic communication data retention laws.  Very nice essay.
Paul Merrell

Washington's Blog - Business, Investing, Economy, Politics, World News, Energy, Environment, Science, Technology Washington's Blog - 0 views

  • A poll released today shows that Americans across the political spectrum hate the Patriot Act and NSA spying. The bipartisan polling team – made up of Global Strategy Group and G Public Strategies – found (edited for readability): By nearly a 2:1 margin (60% modify, 34% preserve), Americans believe the Patriot Act should not be reauthorized in its current form. With broad, bipartisan support across all ages, ideologies and political parties, voters are rejecting the argument that the Patriot Act should be preserved with no changes because of potential terrorist threats. Millennials (65% modify) and Independent men (75% modify), in particular, are driving the push for modification to limit government surveillance. By more than 4:1 (82% concerned, 18% not concerned), voters find it concerning that the United States government is collecting and storing the personal information of Americans, including 31% who are extremely concerned and 25% who are very concerned.
  • Over three quarters of voters found four different examples of government spying personally concerning to them. The government accessing personal communications, information or records without a judge’s permission (83%) and using that information for things other than stopping terrorist attacks (83%) were the two most concerning examples to voters. Specific arguments made in favor of adding more protections for Americans around privacy, also proved to be convincing to voters. 84% of voters said it was a convincing argument that local police and the FBI should have a warrant to search phone and email records, further confirming that Americans believe that individual privacy rights should be more strongly protected. Additionally, 81% of voters were convinced more protections were needed on account of companies providing loopholes in their services to make surveillance easier for the government.
  • This jibes with previous polls showing that Americans: Value privacy over anti-terror protections Don’t believe the NSA And are now more afraid of our own government than terrorists
Paul Merrell

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
« First ‹ Previous 61 - 80 of 117 Next › Last »
Showing 20 items per page