Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Police" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

Former Agent of Swedish Security Police Dictated Amnesty Sweden's Stance against Julian Assange | Global Research - Centre for Research on Globalization - 0 views

  • In December 2010 a close collaboration between Sweden and the CIA and FBI was exposed in the international media: an intelligence collaboration between Sweden and US agencies that was kept secret from the Swedish public, and even from the Swedish Parliament. [1] The Telegraph credited WikiLeaks for exposing the deal. [2] The revelations caused far more commotion internationally than in Sweden and, in any event, no government officials were ever held accountable for it. The Washington Post reported, quoting a Swedish Parliamentary investigation: “Although the Parliamentary investigator concluded that the Swedish security police deserved ‘extremely grave criticism’ for losing control of the operation and for being ‘remarkably submissive to the American officials,’ no Swedish officials have been charged or disciplined.” [3]
  • This article explores to what extent intelligence collaboration between Swedish and US security agencies might have relevance to, or direct intervention in, the political case of Sweden vs Assange. [4]
Gary Edwards

Executive Doomsday Order: Obama Authorizes Gov to Seize Farms, Food, Processing Plants, Energy Resources, Transportation, Skilled Laborers During National Emergency - 1 views

  •  
    Good summary of the most recent and entirely un-Constitutional act of definace and tyranny.  Keep in mind that Obama does not have the authority to suspend or alter any natural rights, especially those specifically protected by the Constitution from any and all branches of the federal government.  Nor does Congress have the authority to grant that power.  There is only one way to alter the Constitution, and that is through an onerous amendment process requiring the approval of 2/3 rds the States. Recall also that in 1798, the passage of the Alien & Sedition Act similarly sought to compromise the Constitution and reatly expand the authority of the Feds.  Thomas Jefferson, author of the Declaration of Independence, and James Madison, author of the Constitution, fought and defeated the A&S Act by going directly to the State Legislatures to force their US Senators to repeal the A&S Act.  This worked extremely well; but that was before the 17th Amendment separated US Senators from their State Legislatures. Still, i think the approach holds.  I suggest we petition the State Legislatures to declare these Executive Orders and Martial Law Congressional authorizations Un-Constitutional; taking the arguments directly to the Supreme Court.  Immediately. excerpt: As of March 16, 2012, your land, your food, your water and your abilities as a laborer are now a wholly owned subsidiary of the United States government at any time they choose to initiate the provisions of this order, which according to the order itself, can be during an emergency or a non-emergency. While some reports indicate that the general impact of this new executive order is negligible, when considered with the broader implications including the  introduction and passage of laws allowing for the indefinite detention of American citizens without charge or trial, restricting the general assembly of individuals to protest, the establishment of an internet 'kill switch' contingency plan and jamming
Gary Edwards

» EXCLUSIVE: Snowden Level Documents Reveal Stealth DHS Spy Grid Alex Jones' Infowars: There's a war on for your mind! - 0 views

  • “The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”
  •  
    It just keeps getting better ............... excerpt: "The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions. Labeled by their intersection location such as "1st&University" and "2nd& Seneca," the multiple network devices are easily detected in Seattle's downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return. "How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?" asked Seattle newspaper The Stranger. According to reports from Kiro 7 News, the mesh network devices can capture a mobile user's IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited. So far Seattle police have been tight-lipped about the network's roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement. According to The Stranger's investigation, Seattle police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy. Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagr
Paul Merrell

Meet the Private Companies Helping Cops Spy on Protesters | Politics News | Rolling Stone - 0 views

  • Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent
  •  
    Rolling Stone tackles some of the companies selling mass surveillance technology to police departments. Note that there has been a welcome increasing trend of more and more journalists not waiting for Snowden-leaked info to be published by others and doing their own digging on the U.S. surveillance establishment. 
Paul Merrell

Chomsky to RT: All superpowers feel exceptional, inflate security myth for 'frightened population' - RT Op-Edge - 0 views

  • The United States has always adopted the principle of American exceptionalism, this goes back to the early colonists, but it’s not a uniquely American position. Every great power, at least every one I know of, has taken the same position. So France was unique in its civilizing mission, which was announced proudly as the Minister of War was calling for the extermination of the people of Algeria. Russia under Stalin was uniquely exceptional and magnificent while it was carrying out all kinds of crimes. Hitler pronounced German exceptionalism when he took over Czechoslovakia, it was done to end ethnic cleansing and put people under the broader German high culture and German technology. In fact I can’t think of an exception. Every great power that I know of has claimed to be exceptional, the United States among them: exceptional in its right to use force and violence. RT: Doesn’t the US take it a step further with exceptionalism? NC: Only because the US is more powerful. If you go back a hundred years British and French exceptionalism was far more powerful. The US had the same doctrine but what really mattered for the world was the major imperial powers. And in Russia’s domains it was Russia that was exceptional. Try to find an exception. So the exceptionalism is kind of interesting in that it seems to be without exception. Everybody accepts it, and of course it’s ludicrous in each case.
  •  
    The renowned libertarian socialist historian Noam Chomsky speaks to "American exceptionalism" ("of course it's ludicrous"). Claims of American exceptionalism fall particularly flat in my mind because the U.S. is "the melting pot of humanity." Descended from all breeds of immigrants, how could we be exceptional except in our diversity. But our diversity does not seem to be exceptional. Ask the Afro-American or Latino young man who has just been stopped by the police for driving while black or driving while Latino how they feel about America's respect for diversity. American exceptionalism is nothing but another propaganda theme used to justify unlawful activities. E.g., "we are the world's only superpower; therefore, we must act as the world's police force." But notice in that particular application of the theme, there are neither international law granting our military the power to invade other nations or international norms that make our unilateral invasions of other nations lawful under any circumstance other than responding defensively to another nation's military attack on our own nation. Of course there has been no such attack since the War of 1812 (at the outset of World War II, Hawaii was a mere possession, not a state).
Paul Merrell

Data-sharing among US law agencies amounts to 'organised chaos' - report | World news | theguardian.com - 0 views

  • The sharing of crucial intelligence about counter-terrorism between the FBI, the Department of Homeland Security and local police departments takes place through a patchwork process that amounts to “organized chaos”, according to a new report. The report, released Tuesday by the Brennan Center for Justice, a public-policy institute at New York University law school that has a track record of being skeptical of government surveillance, found inconsistent rules, inadequate oversight, apparent wastefulness and insufficient regard for civil liberties nationwide. “This poorly organized system not only wastes time and resources; it also risks masking reliable intelligence that could be crucial to an investigation,” the report says, warning that a “din of data” is overwhelming law enforcement.
  • The Brennan Center report examined 16 major police departments across the US, along with 19 affiliated “fusion centers” – controversial data-sharing pools between federal, state and local agencies – and 14 of the FBI’s joint terrorism task force partnerships with police.
  • Despite efforts by the Department of Homeland Security, most of the fusion centers operate with “minimal oversight, or no oversight whatsoever”, the report found. Out of 19 centers reviewed, only five require independent audits of retained data.
  • ...3 more annotations...
  • Fusion centers have been the subject of criticism from both civil libertarians and powerful elected officials. A 2012 investigation by the bipartisan Senate permanent subcommittee on investigations of more than 80,000 fusion center documents could not find any contribution the centers had made to “disrupt[ing] an active terrorist plot”. DHS disputes the results of that investigation, as do several legislators on committees overseeing the department. Senator Tom Coburn, an Oklahoman who serves as the top Republican on the Senate government reform and homeland security committee, has emerged as a leading legislative critic of fusion centers and joint terrorism task forces, for many of the same reasons detailed in the Brennan Center report. After a government inquiry indicated many federal data-sharing efforts were duplicative, Coburn issued a statement in April calling them “a vital component of national security”, but adding, “that is not an excuse to waste taxpayer funds”.
  • And all that information is on top of the fruits of the NSA’s vast data collection efforts, which are not entirely off limits to federal law enforcement. The controversial bulk collection of Americans’ phone data has been repeatedly described by the NSA as a tool to aid the FBI in detecting domestic terrorism activity. NSA deputy director John C Inglis recently stated that the FBI cannot search directly through the NSA’s data troves, but the agency shares telephone metadata with the bureau following searches through its databases based on “reasonable articulable suspicion” of connections to specific terrorist organizations.
  • The Brennan Center report did not specifically analyze law enforcement tower dumps, but Price called the reports of them alarming. “This is another indication of the vast trove of information that state and local police are collecting about law abiding Americans,” Price said. “To date, that information does not appear to be particularly useful in preventing terror attacks.”
  •  
    The ongoing federalization of state and local law enforcement continues unabated. Today's "fusion centers" have antecedents in the regional "intelligence centers" begun under the guise of Reagan's War on Drugs™, but shifted into a much higher gear under the guise of Bush II's War on Terror™.
Paul Merrell

Cost of Medical Bills for Baby Hit by SWAT Grenade? Over $800,000. County's Refusal to Pay? Priceless | - 0 views

  • Remember back in May when a gang of uniformed thugs from the  Habersham County SWAT team threw a flash-bang grenade right on top of a sleeping baby? Well, stellar group that they are, they’ve refused to pay the over $800,000 in medical bills for the child that they permanently disfigured and nearly killed. That’s right. They aren’t paying the bills and are leaving the family to try and cover the costs for the toddler’s care. Our militarized police forces are claiming too many innocent victims, and they aren’t being held accountable.
  • The family’s attorneys, from the Davis Bozeman Law Firm in Decatur, Georgia, released a statement this morning: The family of Bounkham “Baby Bou Bou” Phonesavanh, the child severely injured on May 28, 2014 by a flash bang grenade thrown in his play pen during a botched police raid while his family was staying in Georgia, received a copy of the notice sent to their son’s doctor’s office that Habersham County reneges on their public promise to pay for the medical expenses of this working class family’s child. “Bounkham “Baby Bou Bou” Phonesavanh has to date incurred an estimated $800,000 worth of expenses due to his injuries. Shortly after severely burning “Baby Bou Bou” with a flash bang grenade the Habersham County Sheriff’s Department vowed to pay for the child’s medical expenses.  Last week the family discovered through medical providers that the county will not pay any medical bills.  The county stated that it would be “illegal” to pay. Recently, Alecia Phonesavanh shared her son’s injuries are so severe that doctors predict several more surgeries throughout his life to repair the hole in his chest and major facial injuries.
  • he Habersham County Attorney responded on behalf of the county Board of Commissioners with this vague explanation. “The question before the board was whether it is legally permitted to pay these expenses. After consideration of this question following advice of counsel, the board of commissioners has concluded that it would be in violation of the law for it to do so.”
  • ...2 more annotations...
  • It’s important to remember a few things regarding this case. 1.) There is no question or denial that the SWAT team threw a grenade right on top of a sleeping baby. 2.) No drugs were found on the premises. 3.) The person they were looking for was not present at the time of the no-knock raid. It’s bad enough that it happened.  But to cripple the family financially with nearly a million dollars in medical expenses on top of that? This isn’t even about the shoddy police work, the bad intel, or the poor decision to throw a grenade (that was designed to be rolled) into a room full of children. Nor is it about the slimy sheriff of Habersham County, who, if you recall, defended the actions of his SWAT team.
  • This is about a complete lack of accountability. A refusal to take responsibility for a horrible mistake that crosses into criminal negligence, at the very least. What an absolutely repulsive group of individuals. They blew a hole through the face and chest cavity of a 19 month old child, permanently disfigured him,  put him through an unfathomable amount of agony with treatments and repeated surgeries, and now, the family, which was already struggling financially after losing their home in a fire, is stuck with the bill, which will continue to climb, since Bou Bou is looking at several more operations.
Paul Merrell

Obama Orders Review Of Transfers Of Military Surplus To Local Police : The Two-Way : NPR - 0 views

  • President Obama has ordered a review of federal programs that supply local law enforcement agencies with military weapons and equipment after concerns over how the police handled unrest in Ferguson, Mo., in the aftermath of the shooting death of Michael Brown. A senior Obama administration official says the president "whether state and local law enforcement are provided with the necessary training and guidance; and whether the federal government is sufficiently auditing the use of equipment obtained through federal programs and funding." The official also says the review would include input from the Domestic Policy Council, the National Security Council, the Office of Management and Budget, as well as the departments of Defense, Justice, Homeland Security and Treasury.
  • "There is a big difference between our military and our local law enforcement, and we don't want those lines blurred," the president told reporters at the White House. "That would be contrary to our traditions."
  • In June, the American Civil Liberties Union issued a report that warned of the excessive militarization of American law enforcement. As we reported at the time, the report highlighted, among other things, the growing use of SWAT teams for such seemingly mundane tasks as serving drug warrants.
Paul Merrell

Palestinians in Israel clash with police over Gaza assault | Maan News Agency - 0 views

  • NAZERETH, Israel (AFP) -- Palestinian citizens of Israel clashed with police in the northern city of Nazareth on Monday, police said, at the end of a protest against Israel's deadly military strikes in the Gaza Strip.The clashes came as Nazareth and cities in the West Bank observed a general strike to mourn the victims of the Gaza conflict between Israel and Hamas -- the bloodiest since 2009 -- that has cost more than 500 Palestinian lives in two weeks.police spokeswoman Luba Samri said about 200 Palestinian citizens of Israel in Nazareth clashed with security forces, who responded with a water cannon and stun grenades, arresting 16 people after the 3,000-strong demonstration in Israel's largest Palestinian city.
  • Israeli forces kill Palestinian in protest near Bethlehem
Paul Merrell

Pentagon: Military arms transfers to police not 'program run amok' - Stripes - 0 views

  • The Defense Department is pushing back against criticism that it’s helping militarize local police forces by supplying them with surplus gear. “We don’t push equipment on anybody … It is made available to law enforcement agencies if they want it and if they qualify for it,” Pentagon Press Secretary Rear Adm. John Kirby said Tuesday. “There’s a lot of due diligence here. This isn’t some program run amok.”
  •  
    If this "isn't some program run amok" then it's a program whose leadership has run amok. 
Paul Merrell

Afghanistan's U.S.-Funded Torturers and Murderers | Foreign Policy - 0 views

  • The United States continues to fund and support a network of abusive Afghan strongmen in the name of security. It's time to stop.
  • n October 2013, police in Kandahar — the Afghan province that is the birthplace of the Taliban and home to some of the fiercest fighting in the war — picked up “Tariq” for alleged ties to the insurgents. Whether those allegations were true will remain unknown. Tariq, whose name has been changed for security purposes, died in custody days later from wounds inflicted on his skull with an electrical drill. His case is not unique. Over the past two years, dozens of Kandahari residents have been tortured to death by the province’s police — one of a range of forces in Afghanistan that the United States supports and equips. As the Obama administration continues its ongoing troop withdrawal, one area of support remains steadfast: material, training, and billions of dollars in financial assistance to Afghanistan’s security infrastructure. Local officials and their U.S. mentors have tasked these forces — which include police units, intelligence services, and the paramilitary Afghan Local police (ALP), among others — with rooting out the Taliban insurgency. But these groups, who are often led by or linked to former warlords, have also exhibited a pattern of violence for which Afghan victims have obtained no official redress. Human Rights Watch (HRW) has documented systematic, gross human rights violations by some of these forces that has included numerous cases of torture, extrajudicial executions of civilians, and forced disappearance of detainees. The findings raise concerns about Afghan government and U.S. efforts to arm, train, vet, and hold accountable the country’s security apparatus — run by a network of strongmen, many of whom attained official authority as allies of the United States in the fight against the Taliban.
Paul Merrell

New police radars can 'see' inside homes - 0 views

  • At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant.
  • The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
  • Agents' use of the radars was largely unknown until December, when a federal appeals court in Denver said officers had used one before they entered a house to arrest a man wanted for violating his parole. The judges expressed alarm that agents had used the new technology without a search warrant, warning that "the government's warrantless use of such a powerful tool to search inside homes poses grave Fourth Amendment questions."By then, however, the technology was hardly new. Federal contract records show the Marshals Service began buying the radars in 2012, and has so far spent at least $180,000 on them.Justice Department spokesman Patrick Rodenbush said officials are reviewing the court's decision. He said the Marshals Service "routinely pursues and arrests violent offenders based on pre-established probable cause in arrest warrants" for serious crimes.
  • ...2 more annotations...
  • Other radar devices have far more advanced capabilities, including three-dimensional displays of where people are located inside a building, according to marketing materials from their manufacturers. One is capable of being mounted on a drone. And the Justice Department has funded research to develop systems that can map the interiors of buildings and locate the people within them.The radars were first designed for use in Iraq and Afghanistan. They represent the latest example of battlefield technology finding its way home to civilian policing and bringing complex legal questions with it.
  • At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant.The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
Paul Merrell

Hamid Karzai International Airport - Wikipedia, the free encyclopedia - 0 views

  • Hamid Karzai International Airport (Persian: میدان هوائی بین المللی حامدکرزی‎‎, Pashto: د حامدکرزی نړيوال هوائي ډګر‎, IATA: KBL, ICAO: OAKB), also known as Kabul International Airport (real name Kabul Khwaja Rawash International Airport), is located 5 kilometers (3.1 mi) from the city center of Kabul in Afghanistan. It serves as one of the nation's main international airports and as one of the largest military bases, capable of housing over one hundred aircraft. It was given the new name in October 2014 in honor of former President Hamid Karzai. The decision was made by the National Assembly of Afghanistan and the Cabinet of President Ashraf Ghani.[2] The airport has been expanded and modernized in the last decade. A new international terminal (which has free wi-fi) was added and the older terminal is now used for domestic flights. A number of military bases were also built around the airport, which are used by the United States Armed Forces and NATO's International Security Assistance Force (ISAF). The military of Afghanistan also has a base there, while the Afghan National Police provide security inside the passenger terminals. As of March 2015 the most frequently serviced destination from the airport was Dubai-International with no less than five passenger airlines flying the route, some with multiple daily flights.
  • Hamid Karzai International Airport (Persian: میدان هوائی بین المللی حامدکرزی‎‎, Pashto: د حامدکرزی نړيوال هوائي ډګر‎, IATA: KBL, ICAO: OAKB), also known as Kabul International Airport (real name Kabul Khwaja Rawash International Airport), is located 5 kilometers (3.1 mi) from the city center of Kabul in Afghanistan. It serves as one of the nation's main international airports and as one of the largest military bases, capable of housing over one hundred aircraft. It was given the new name in October 2014 in honor of former President Hamid Karzai. The decision was made by the National Assembly of Afghanistan and the Cabinet of President Ashraf Ghani.[2] The airport has been expanded and modernized in the last decade. A new international terminal (which has free wi-fi) was added and the older terminal is now used for domestic flights. A number of military bases were also built around the airport, which are used by the United States Armed Forces and NATO's International Security Assistance Force (ISAF). The military of Afghanistan also has a base there, while the Afghan National Police provide security inside the passenger terminals. As of March 2015 the most frequently serviced destination from the airport was Dubai-International with no less than five passenger airlines flying the route, some with multiple daily flights.
  • 3 Airlines and destinations 3.1 Passenger 3.2 Cargo
  •  
    Interesting factoid to remember: "As of March 2015 the most frequently serviced destination from the airport was Dubai-International with no less than five passenger airlines flying the route, some with multiple daily flights." Also two cargo routes, according to the fine print. Dubai is the largest city in United Arab Emirates. Any reason that route should get flown so much other than Dubai being a travel hub?
Paul Merrell

Afghan forces withdraw from district in Uruzgan | The Long War Journal - 0 views

  • In addition to withdrawing from districts in Helmand province in mid-February, the Afghan Army has begun to leave areas in Uruzgan. On March 1, troops abandoned areas of the district of Shahidi Hassas in the neighboring Uruzgan province. A provincial spokesman indicated that troops will likely leave other districts in order to create a “a reserve battalion.” From Reuters: Provincial government spokesman Dost Mohammad Nayab said about 100 troops and police had been pulled from checkpoints in two areas in Shahidi Hassas district and sent to the neighbouring district of Deh Rawud. The Afghan Taliban, seeking to topple the Western-backed government in Kabul and reimpose Islamic rule 15 years after they were ousted from power, said the move, which came after heavy fighting late Monday, had left the area around the village of Yakhdan under their control. The decision to leave the posts follows months of heavy fighting with the Taliban, who have put government forces under heavy pressure across southern Afghanistan. “We want to create a reserve battalion in Deh Rawud, and we may ask our soldiers and policemen from other districts also to leave their checkpoints,” Nayab said. Nayab said the withdrawal was prompted by a shortage of troops and police, worn down by combat losses and desertions. He said troop numbers in the province were about 1,000 short of their assigned strength while police were hundreds short.
  •  
    Only the latest in a series of Afghan government withdrawals from previously-held districts. The map graphic ncluded with the article tells the story of the Afghan government's implosion. 
Paul Merrell

'Ban Donald Trump' petition passes half a million as Republican hopeful calls for death penalty for all cop killers | People | News | The Independent - 0 views

  • Donald Trump has claimed he will sign an executive order mandating the death penalty for all convicted cop killers, as a petition to deny him entry to the UK becomes the most signed on parliament’s website. It follows a week of controversial rhetoric from the Republican presidential hopeful. On Monday, the billionaire claimed as president he would order a “complete shutdown” of all Muslim immigration to the US, sparking a week-long row that has dominated media coverage and seen Trump recover in the polls, having fallen behind Ted Cruz in an earlier Monmouth poll.
  • Accepting the endorsement of the New England Police Benevolent Association, a local Police union representing more than 4,000 officials, Trump issued his latest legally-murky commandment on Thursday night.
  • "One of the first things I do, in terms of executive order if I win, will be to sign a strong, strong statement that will go out to the country -- out to the world -- that anybody killing a policeman, policewoman, a police officer -- anybody killing a police officer, the death penalty. It's going to happen, OK?"
  •  
    As though the President had the lawful power to issue such an Executive Order. Naivete about presidential powers or over-the-top electioneering or both?
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Just Security - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Israeli police raid E J'lem hospital three days in a row, injure patients with rubber bullets - 0 views

  • Amid weeks of violence in Jerusalem, Israeli police and special forces raided an East Jerusalem hospital for a third day in a row on Thursday and fired tear gas, sound grenades and rubber bullets into the medical compound, injuring three patients. Israeli police first burst into Makassed hospital in the Mount of Olives neighborhood on Tuesday with a court order to confiscate the medical records of a 16-year old patient who was treated on October 13th for injuries from a gunshot wound. “They were not trying to confirm that he was shot—because they have him [the patient] in custody and so they know he was shot and they can confirm the bullet wound, but they wanted to see who was with him, who came in with him to the hospital,” said Dr. Rafiq Hussein, the director of Makassed hospital, who questioned why police undertook a militarized operation inside of his facility. “They were after not a dangerous person, or a wanted person, only a file,” he noted.
Paul Merrell

The NYPD's X-Ray Vans - The Atlantic - 0 views

  • In New York City, the police now maintain an unknown number of military-grade vans outfitted with X-ray radiation, enabling cops to look through the walls of buildings or the sides of trucks. The technology was used in Afghanistan before being loosed on U.S. streets. Each X-ray van costs an estimated $729,000 to $825,000.The NYPD will not reveal when, where, or how often they are used.
  • Here are some specific questions that New York City refuses to answer:How is the NYPD ensuring that innocent New Yorkers are not subject to harmful X-ray radiation? How long is the NYPD keeping the images that it takes and who can look at them? Is the NYPD obtaining judicial authorization prior to taking images, and if so, what type of authorization? Is the technology funded by taxpayer money, and has the use of the vans justified the price tag? Those specifics are taken from a New York Civil Liberties Union court filing. The legal organization is seeking to assist a lawsuit filed by Pro Publica journalist Michael Grabell, who has been fighting New York City for answers about X-ray vans for 3 years.“ProPublica filed the request as part of its investigation into the proliferation of security equipment, including airport body scanners, that expose people to ionizing radiation, which can mutate DNA and increase the risk of cancer,” he explained. (For fear of a terrorist “dirty bomb,” America’s security apparatus is exposing its population to radiation as a matter of course.)
  • A state court has already ruled that the NYPD has to turn over policies, procedures, and training manuals that shape uses of X-rays; reports on past deployments; information on the costs of the X-ray devices and the number of vans purchased; and information on the health and safety effects of the technology. But New York City is fighting on appeal to suppress that information and more, as if it is some kind of spy agency rather than a municipal police department operating on domestic soil, ostensibly at the pleasure of city residents.Its insistence on extreme secrecy is part of an alarming trend. The people of New York City are effectively being denied the ability to decide how they want to be policed.
  • ...3 more annotations...
  • For all we know, the NYPD might be bombarding apartment houses with radiation while people are inside or peering inside vehicles on the street as unwitting passersby are exposed to radiation. The city’s position—that New Yorkers have no right to know if that is happening or not—is so absurd that one can hardly believe they’re taking it. These are properly political questions. And it’s unlikely a target would ever notice. “Once equipped, the van—which looks like a standard delivery van—takes less than 15 seconds to scan a vehicle,” Fox News reported after looking at X-ray vans owned by the federal government. “It can be operated remotely from more than 1,500 feet and can be equipped with optional technology to identify radioactivity as well.”
  • And since the technology can see through clothing, it is easy to imagine a misbehaving NYPD officer abusing it if there are not sufficient safeguards in place. Trusting the NYPD to choose prudent, sufficient safeguards under cover of secrecy is folly. This is the same department that spent 6 years conducting surveillance on innocent Muslims Americans in a program so unfocused that it produced zero leads—and that has brutalized New York City protestors on numerous occasions. Time and again it’s shown that outside oversight is needed.Lest readers outside New York City presume that their walls still stand between them and their local law enforcement agency, that isn’t necessarily the case. Back in January, in an article that got remarkably little attention, USA Today reported the following:
  • At least 50 U.S. law enforcementagencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance. Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
  •  
    About the technology from the patent holder's web site: http://as-e.com/resource-center/technology/z-backscatter/ Example photos of the Z Backspatter Vans and examples of X-Ray photos taken with it. https://goo.gl/MO1TVi  Forty percent higher radiation than airport security scanners. with a range of over a thousand feet. 12-seconds to conduct a scan.  
Paul Merrell

Revealed: how the FBI coordinated the crackdown on Occupy | Naomi Wolf | Comment is free | guardian.co.uk - 0 views

  • New documents prove what was once dismissed as paranoid fantasy: totally integrated corporate-state repression of dissent
  • It was more sophisticated than we had imagined: new documents show that the violent crackdown on Occupy last fall – so mystifying at the time – was not just coordinated at the level of the FBI, the Department of Homeland Security, and local police. The crackdown, which involved, as you may recall, violent arrests, group disruption, canister missiles to the skulls of protesters, people held in handcuffs so tight they were injured, people held in bondage till they were forced to wet or soil themselves –was coordinated with the big banks themselves. The Partnership for Civil Justice Fund, in a groundbreaking scoop that should once more shame major US media outlets (why are nonprofits now some of the only entities in America left breaking major civil liberties news?), filed this request. The document – reproduced here in an easily searchable format – shows a terrifying network of coordinated DHS, FBI, police, regional fusion center, and private-sector activity so completely merged into one another that the monstrous whole is, in fact, one entity: in some cases, bearing a single name, the Domestic Security Alliance Council. And it reveals this merged entity to have one centrally planned, locally executed mission. The documents, in short, show the cops and DHS working for and with banks to target, arrest, and politically disable peaceful American citizens.
  • As Mara Verheyden-Hilliard, executive director of the PCJF, put it, the documents show that from the start, the FBI – though it acknowledges Occupy movement as being, in fact, a peaceful organization – nonetheless designated OWS repeatedly as a "terrorist threat"
  • ...1 more annotation...
  • Verheyden-Hilliard points out the close partnering of banks, the New York Stock Exchange and at least one local Federal Reserve with the FBI and DHS, and calls it "police-statism":"This production [of documents], which we believe is just the tip of the iceberg, is a window into the nationwide scope of the FBI's surveillance, monitoring, and reporting on peaceful protestors organizing with the Occupy movement … These documents also show these federal agencies functioning as a de facto intelligence arm of Wall Street and Corporate America."
« First ‹ Previous 81 - 100 of 440 Next › Last »
Showing 20 items per page