Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "got" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Al Qaeda: The Database | Global Research - 0 views

  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World.
  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.” “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat.
  • ...5 more annotations...
  • “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world. “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World. *       *       * Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
Paul Merrell

Comcast is turning your Xfinity router into a public Wi-Fi hotspot - Dwight Silverman's TechBlog - 0 views

  • Some time on Tuesday afternoon, about 50,000 Comcast Internet customers in Houston will become part of a massive public Wi-Fi hotspot network, a number that will swell to 150,000 by the end of June. Comcast will begin activating a feature in its Arris Touchstone Telephony Wireless Gateway Modems that sets up a public Wi-Fi hotspot alongside a residential Internet customer’s private home network. Other Comcast customers will be able to log in to the hotspots for free using a computer, smartphone or other mobile device. And once they log into one, they’ll be automatically logged in to others when their devices “see” them. Comcast says the hotspot – which appears as “xfinitywifi” to those searching for a Wi-Fi connection – is completely separate from the home network. Someone accessing the Net through the hotspot can’t get to the computers, printers, mobile devices, streaming boxes and more sitting on the host network. Comcast officials also say that people using the Internet via the hotspot won’t slow down Internet access on the home network. Additional capacity is allotted to handle the bandwidth. You can read more about Comcast’s reason for doing this in my report on HoustonChronicle.com.
  • What’s interesting about this move is that, by default, the feature is being turned on without its subscribers’ prior consent. It’s an opt-out system – you have to take action to not participate. Comcast spokesman Michael Bybee said on Monday that notices about the hotspot feature were mailed to customers a few weeks ago, and email notifications will go out after it’s turned on. But it’s a good bet that this will take many Comcast customers by surprise. If you have one of these routers and don’t want to host a public Wi-Fi hotspot, here’s how to turn it off.
  • The additional capacity for public hotspot users is provided through a separate channel on the modem called a “service flow,” according to Comcast. But the speed of the connection reflects the tier of the subscriber hosting the hotspot. For example, if you connect to a hotspot hosted by a home user with a 25-Mbps connection, it will be slower than if you connect to a host system on the 50-Mbps tier.
  •  
    I didn't see this one coming. I've got a Comcast account and their Arris Gateway modem. In our area, several coffeehouses, etc., that already offered free wireless connections are now broadcasting Comcast Xfinity wireless. So I'm guessing that this is a planned rollout nationwide. 
Paul Merrell

Israel Won't Stop Spying on the U.S. - 0 views

  • Whatever happened to honor among thieves? When the National Security Agency was caught eavesdropping on German Chancellor Angela Merkel’s cell phone, it was considered a rude way to treat a friend. Now U.S. intelligence officials are saying—albeit very quietly, behind closed doors on Capitol Hill—that our Israeli “friends” have gone too far with their spying operations here. According to classified briefings on legislation that would lower visa restrictions on Israeli citizens, Jerusalem’s efforts to steal U.S. secrets under the cover of trade missions and joint defense technology contracts have “crossed red lines.”  Israel’s espionage activities in America are unrivaled and unseemly, counterspies have told members of the House Judiciary and Foreign Affairs committees, going far beyond activities by other close allies, such as Germany, France, the U.K. and Japan. A congressional staffer familiar with a briefing last January called the testimony “very sobering…alarming…even terrifying.” Another staffer called it “damaging.”  The Jewish state’s primary target: America’s industrial and technical secrets. 
  • “No other country close to the United States continues to cross the line on espionage like the Israelis do,” said a former congressional staffer who attended another classified briefing in late 2013, one of several in recent months given by officials from the Department of Homeland Security (DHS), the State Department, the FBI and the National Counterintelligence Directorate. 
  • “I don’t think anyone was surprised by these revelations,” the former aide said. “But when you step back and hear…that there are no other countries taking advantage of our security relationship the way the Israelis are for espionage purposes, it is quite shocking. I mean, it shouldn’t be lost on anyone that after all the hand-wringing over [Jonathan] Pollard, it’s still going on.” Israel and pro-Israel groups in America have long lobbied U.S. administrations to free Pollard, a former U.S. naval intelligence analyst serving a life sentence since 1987 for stealing tens of thousands of secrets for Israel. (U.S. counterintelligence officials suspect that Israel traded some of the Cold War-era information to Moscow in exchange for the emigration of Russian Jews.) After denying for over a decade that Pollard was its paid agent, Israel apologized and promised not to spy on U.S. soil again. Since then, more Israeli spies have been arrested and convicted by U.S. courts. 
  • ...4 more annotations...
  • I.C. Smith, a former top FBI counterintelligence specialist during the Pollard affair, tells Newsweek, “In the early 1980s, dealing with the Israelis was, for those assigned that area, extremely frustrating. The Israelis were supremely confident that they had the clout, especially on the Hill, to basically get [away] with just about anything. This was the time of the Criteria Country List—later changed to the National Security Threat List—and I found it incredible that Taiwan and Vietnam, for instance, were on [it], when neither country had conducted activities that remotely approached the Pollard case, and neither had a history of, or a comparable capability to conduct, such activities.” While all this was going on, Israel was lobbying hard to be put on the short list of countries (38 today) whose citizens don’t need visas to visit here.  Until recently, the major sticking point was the Jewish state’s discriminatory and sometimes harsh treatment of Arab-Americans and U.S. Palestinians seeking to enter Israel. It has also failed to meet other requirements for the program, such as promptly and regularly reporting lost and stolen passports, officials say—a problem all the more pressing since Iranians were found to have boarded the missing Malaysia Airlines flight with stolen passports. 
  • “But this is the first time congressional aides have indicated that intelligence and national security concerns also are considerations in weighing Israel’s admission into the visa waiver program,” Jonathan Broder, the foreign and defense editor for CQ Roll Call, a Capitol Hill news site, wrote last month. He quoted a senior House aide as saying, “The U.S. intelligence community is concerned that adding Israel to the visa waiver program would make it easier for Israeli spies to enter the country.” The Israelis “thought they could just snap their fingers” and get friends in Congress to legislate visa changes, a Hill aide said, instead of going through the required hoops with DHS.
  • Congressional aides snorted at the announcement. “The Israelis haven’t done s**t to get themselves into the visa waiver program,” the former congressional aide said, echoing the views of two other House staffers working on the issue. “I mean, if the Israelis got themselves into this visa waiver program and if we were able to address this [intelligence community] concern—great, they’re a close ally, there are strong economic and cultural links between the two countries, it would be wonderful if more Israelis could come over here without visas. I’m sure it would spur investment and tourist dollars in our economy and so on and so forth. But what I find really funny is they haven’t done s**t to get into the program. They think that their friends in Congress can get them in, and that’s not the case. Congress can lower one or two of the barriers, but they can’t just legislate the Israelis in.” The path to visa waivers runs through DHS and can take years to navigate.
  • Israel is not even close to meeting those standards, a congressional aide said. “You’ve got to have machine-readable passports in place—the e-passports with a data chip in them. The Israelis have only just started to issue them to diplomats and senior officials and so forth, and that probably won’t be rolled out to the rest of their population for another 10 years.” But U.S. counterspies will get the final word. And since Israel is as likely to stop spying here as it is to give up matzo for Passover, the visa barriers are likely to stay up. As Paul Pillar, the CIA’s former national intelligence officer for the Near East and South Asia, told Newsweek, old habits are hard to break: Zionists were dispatching spies to America before there even was an Israel, to gather money and materials for the cause and later the fledgling state. Key components for Israel’s nuclear bombs were clandestinely obtained here. “They’ve found creative and inventive ways,” Pillar said, to get what they want. “If we give them free rein to send people over here, how are we going to stop that?” the former congressional aide asked. “They’re incredibly aggressive. They’re aggressive in all aspects of their relationship with the United States. Why would their intelligence relationship with us be any different?”
Paul Merrell

Donetsk People's Republic asks Moscow to consider its accession into Russia - RT News - 0 views

  • Donetsk People's Republic has proclaimed itself a sovereign state and has asked Moscow to consider its accession into Russia, the Republic’s council said.
  • In Lugansk Region 96.2 percent of voters supported the region’s self-rule, according to the final figures announced by the local election commission. The Kremlin’s press service has issued a statement, saying: “Moscow respects the will of the people in Donetsk and Lugansk and hopes that the practical realization of the outcome of the referendums will be carried out in a civilized manner.” It stressed the necessity of a “dialogue between representatives of Kiev, Donetsk and Lugansk.” At the same time, both the EU and US dismissed the ballots in eastern Ukraine as illegal. In the two weeks prior to the referendum, Kiev intensified the military operation in southeastern Ukraine. May 9 became one of the bloodiest days in the weeks of the operation. It has been confirmed that nine people were killed and another 49 injured during the armed assault of Kiev’s army on Mariupol’s Police HQ. Driven by reports of shooting, residents, then mostly celebrating WWII Victory Day, flocked to the scene. The Kiev fighters opened fire on civilians.
  •  
    Two more regions in the industrial heart of Ukraine vote for independence and request to accede to the Russian Federation. The Kremlin statement seems to be saying in effect, "now we've got more leverage in negotiating with the U.S. for establishment of a Ukraine republic with semi-autonomous regions." Putin has already suggested that Russia would invade the Southeast Ukraine if the Kiev coup government continues its violence in that region. The big question, though, is whether Obama will order NATO to invade the Ukraine to "protect" it from Vladimir Putin. This is more and more developing into a situation of "I hope one side blinks before a NATO/Russian war begins." The U.S. War Party wants NATO bases in the Ukraine to establish a barrier to a growing unified European/Asian market and angling to wean Europe from Asian natural gas (in favor of future U.S. natural gas produced by fracking techniques. Ukraine is a Pipelinestan superhighway for transport of central Asian natural gas to European markets. 
Paul Merrell

The Pentagon's slush fund is arming a War Zone on Main Street. Let's end the local-cop addiction to backyard battle | Sadhbh Walshe | Comment is free | theguardian.com - 0 views

  • What many other communities across America have learned since is that we're living in what the writer Radley Balko calls the age of the "warrior cop". And when warrior cops want a straight-outta-Baghdad toy, it's increasingly and unnecessarily simple for them to use a federally enabled slush-fund to wreak havoc – particularly against minorities, and even at a pumpkin festival. It's also pretty simple to start accounting for all the high-tech violence."Before another small town's police force gets a $700,000 gift from the Defense Department that it can't maintain or manage," Rep Hank Johnson of Georgia told me this week, "we need to press pause and revisit the merits of a militarized America."
  • The ACLU released a devastating report this week examining more than 800 incidents of Swat team deployments conducted by 20 law enforcement agencies between 2010 and 2013. It's a small sample of the estimated 45,000 deployments that occur in the US each year (up from 1,400% from the '80s), but the report reveals a picture of law enforcement as flash-bang assault unit, with hardly an actual suspect in harm's way: pandemonium in a baby's crib; a grandfather of 12 killed by a discharged gun; Swat officers gunning down a mother as she died, child in her arms. According to the ACLU study, 79% of the incidents surveyed involved a Swat team searching a person's home, and more than 62% of the cases involved searches for drugs. That's not what Swat teams were made for.America is winding down wars abroad – depending on what the hell happens in Iraq, of course – but we are fueling an addiction to armed conflict here at home.As Balko notes in his book, The Rise of the Warrior Cop, "America's cops have increasingly come to resemble ground troops."
  • But the federal government has been enabling even more localized branches of law enforcement to get its hands on heavy-duty artillery for the last 20 years, when the Reagan administration formalized the Pentagon's so-called 1033 Program. It sends "excess" military equipment to local police departments, and combined with the Homeland Security operation that provides grants to purchase such equipment, we've got a veritable firearms sale funnelling from Washington on down to the local station house. And when local law enforcement is making hundreds of thousands of dollars off seized drug money – sometimes illegally – you've got the makings of a War Zone on Main Street.Rep Johnson has plans to introduce a bill that would reform the 1033 Program, which donated at least $500bn per year in military gear to virtually every police department in the country. "We not only lack serious oversight and accountability," Johnson wrote me in an email on Tuesday, "but we need some parameters put in place for what is appropriate." His legislation would put limitations on the transfer of certain kinds of military-grade equipment, and require the Pentagon to account for transfers of all such equipment in an annual report to Congress.
  • ...1 more annotation...
  • The ACLU also made several recommendations in its report – state laws to restrain Swat teams, plus transparency and strict oversight – that all make sense, as do training sessions for more of our trigger-happy "rescue" officers. But this was perhaps the most endemic part of that report:Overall, 42% of people impacted by a Swat deployment to execute a search warrant were black and 12% were Latino. This means that of the people impacted by deployments for warrants, at least 54% were minorities.Whether this is by accident or design, the racial reality of America's militarized law enforcement offers yet another compelling reason why the dangerous trend of warrior-style policing needs to be re-examined – and then reversed.When the first Swat team was deployed in the late '60s, its target was a single remaining cell of the Black Panthers. Nearly half a century later, all the nation's a theater, and we are merely the pumpkin eaters – with half a million bucks worth of smashing, exploding, high-artillery gear for the taking.
Gary Edwards

The Thorium Powered Car - EPautos - 0 views

  • An internal combustion can burn gas and CNG (or propane). All that was necessary to allow the switch from one fuel to another was some additional plumbing and calibration of the car’s ECU (the computer that makes air-fuel ratio adjustments and so on). So, no worries about running empty – and no waiting for hours to refuel. Three, CNG was (is) cheap and burns very cleanly and is massively abundant right here in the U.S.  At a stroke, the three major charges leveled against the pure-gasoline-burning car are vacated. The CNG car hardly pollutes and it greatly reduces and potentially eliminates dependence on “foreign” oil. Also, the cost of the CNG car itself was within reason because no uber-elaborate technology was necessary (unlike electric cars and hybrid electric cars). Just some modifications to an existing car. Sure, there were some issues to be sorted out – the big one being making it easy (and safe) for the average person to refill the CNG tanks. But the technology of the car itself worked – and was economic.
  • So why wasn’t it developed? Perhaps precisely because it did work – and was economic. People could drive big – and powerful cars. At a reasonable cost. Well, they could have.
  • Here’s another, more recent one: The thorium-turbine powered car. Heat energy from the thorium – a weakly radioactive element (named after the Norse god Thor) that is estimated to be 3-4 times more naturally abundant than uranium and which contains 20 million times the energy as an equivalent lump of coal – is used to generate steam, which is then used to power a small turbine, which provides the motive force. The beauty of the system is that – like a nuclear submarine – the fuel lasts almost forever. Well, longer than you will last, probably. How’s 100 years sound? No more stopping for “gas”… ever. This alone would make current IC cars seem as wasteful of time (and energy) as current IC cars make electric cars look wasteful of time and energy. But wait, there’s more.
  • ...2 more annotations...
  • Well, less. No emissions at all. Because nothing’s being burned, there’s no exhaust. Water to steam, expansion and contraction – and back again. Closed (and clean) loop. The Algoreans ought to be ecstatic. Yet there is dead silence. You can hear the crickets chirping. Is it because thorium is radioactive? The word is third rail to scientifically illiterate homo Americanus – who fears it in the same way a savage fears the voices coming out of the Talk Box (radio). The mere mention of the word is sufficient to incite a panic. It’s why the nuclear power grid is dead in the water; or rather, as old as a Betamax copy of Saturday Night Fever. But it’s not even the same thing. Thorium is mildly radioactive. Dr. Charles Stevens, CEO of Laser Power Systems – which is developing the technology, or at least, trying to – says: “The radiation can be shielded by a single sheet of aluminum foil.” 
  • Bear in mind that gasoline is a highly volatile, highly explosive liquid fuel. But most of us do not sweat having 15 or so gallons of the stuff sloshing around in our cars, because we’re used to it. Because we know the gas tank is well-protected and not likely to burst into flames. It could happen, sure. But the individual risk is very small – just as the individual risk posed by a thorium-turbine car’s low-level radioactivity is small. Well, would be. If such cars were to be produced. But, it doesn’t look like they will be. Stevens told Mashable that “the automakers don’t want to buy them” – so his company is focusing on other applications of the technology, including an air conditioner-size unit that could power an entire restaurant or hotel, eliminating the need for grid electricity. This ought to please the Algoreans, too – since the electric grid is powered mostly by coal and oil-fired utility plants. But, again, crickets. It kind of makes you wonder, doesn’t it?
  •  
    "Why is it that alternative technologies that clearly do not work -  which are so gimped by functional and economic problems as to be not-viable on the market absent huge subsidies and even then, it's hard to give them away - continue to receive seemingly endless financial and political support … while technologies that actually might work better than current internal combustion engine technology can't seem to get any traction at all? Electric cars are hopeless. For more than a century now, generations of engineers have tried - and, so far, failed - to develop a battery that will endow an electric car with the range and reasonable recharge times necessary for everyday-driver viability… at a cost (not subsidized) that would make such a car a better choice, economically speaking, than an otherwise comparable gasoline (or diesel) powered car. Billions of dollars, probably, have been thrown at the electric car and - so far - no major technological improvement over a 1906 Baker Landolet. Meanwhile, whatever happened to the natural gas-burning car? Back in the mid-'90s, both Ford and GM built - and actually sold - natural-gas (CNG) fueled cars. Several things about them were interesting. One, they were big cars. Ford sold a CNG version of its six-passenger/full-size Crown Vic; GM sold a CNG version of the Vic's primary competition - the Chevy Caprice. Part of the reason for going with the big car as the platform was the need for a big trunk to house the CNG tank (and still have some trunk space left for people's things). But the take-home point was that you got a nice big family car - with a V8 engine - rather than a scrunched up subcompact. Two, they were practical. No range issue, because you had plenty (150-plus) on the CNG and the distance you could drive was not affected by the outside temperature or greatly reduced if you ran accessories like the AC and headlights, as it is in electric cars. And besides, when the C
Paul Merrell

Netanyahu: Jerusalem won't be divided again | The Times of Israel - 0 views

  • ime Minister Benjamin Netanyahu on Monday vowed that Jerusalem would never be split in any peace deal with the Palestinians, and said construction throughout the capital would continue, despite international criticism.
  •  
    In a desperate but successful eleventh-hour media campaign, Benyamin Netanyahu during the recent Israeli election campaign peeled off enough votes from other ringt-wing political parties to keep his Likud Party in power and to continue Netanyahu as Israel's prime minister. He accomplished that by promiosing that there would never be an indepndent state of Palestine and by a racist false claim that  Palestinians with Israeli ciitzenship were transporting voters to the polls by the busload to gain more seats in the Parliament. But those statements got Netanyahu in very hot water with European government leaders and the Obama Administration because Netanyahu had publicly repudiated the 2-state solution that has been the supposed object of U.S. diplomacy since the Carter Administration. Netanyahu promptly walked back his statements.  But now he has done it again because East Jerusalem is part of the Palestinian territory that Israel seized during its 1967 Six Day War, and has illegally retianed it since. Under the 4th Geneva Convention, Israel was required to promptly relinquish the occupied territory upon the cessation of hostilities but still retains it today. Netanyahu's latest statement is sure to set off fireworks again in European governments and in the Obama Administration. Watch for further sanctions from Europe and more pressure from the Obama Administration. See also similar statements by Netanyahu at http://www.timesofisrael.com/netanyahu-jerusalem-only-ever-the-capital-of-the-jewish-people/  
Paul Merrell

Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not Fair-Minded | Just Security - 0 views

  • Earlier today, FBI Director James Comey implied that a broad coalition of technology companies, trade associations, civil society groups, and security experts were either uninformed or were not “fair-minded” in a letter they sent to the President yesterday urging him to reject any legislative proposals that would undermine the adoption of strong encryption by US companies. The letter was signed by dozens of organizations and companies in the latest part of the debate over whether the government should be given built-in access to encrypted data (see, for example, here, here, here, and here for previous iterations). The comments were made at the Third Annual Cybersecurity Law Institute held at Georgetown University Law Center. The transcript of his encryption-related discussion is below (emphasis added).
  • Increasingly, communications at rest sitting on a device or in motion are encrypted. The device is encrypted or the communication is encrypted and therefore unavailable to us even with a court order. So I make a showing of probable cause to a judge in a criminal case or in an intelligence case to the Foreign Intelligence Surveillance Court judge that the content of a particular defense or a particular communication stream should be collected to our statutory authority, and the judge approves, increasingly we are finding ourselves unable to read what we find or we’re unable to open a device. And that is a serious concern. I am actually — I think encryption is a good thing. I think there are tremendous societal benefits to encryption. That’s one of the reasons the FBI tells people not only lock your cars, but you should encrypt things that are important to you to make it harder for thieves to take them.
  • A group of tech companies and some prominent folks wrote a letter to the President yesterday that I frankly found depressing. Because their letter contains no acknowledgment that there are societal costs to universal encryption. Look, I recognize the challenges facing our tech companies. Competitive challenges, regulatory challenges overseas, all kinds of challenges. I recognize the benefits of encryption, but I think fair-minded people also have to recognize the costs associated with that. And I read this letter and I think, “Either these folks don’t see what I see or they’re not fair-minded.” And either one of those things is depressing to me. So I’ve just got to continue to have the conversation. I don’t know the answer, but I don’t think a democracy should drift to a place where suddenly law enforcement people say, “Well, actually we — the Fourth Amendment is an awesome thing, but we actually can’t access any information.”
  • ...2 more annotations...
  • But we have a collision going on in this country that’s getting closer and closer to an actual head-on, which is our important interest in privacy — which I am passionate about — and our important interest in public safety. The logic of universal encryption is inexorable that our authority under the Fourth Amendment — an amendment that I think is critical to ordered liberty — with the right predication and the right oversight to obtain information is going to become increasingly irrelevant. As all of our lives become digital, the logic of encryption is that all of our lives will be covered by strong encryption, therefore all of our lives — I know there are no criminals here, but including the lives of criminals and terrorists and spies — will be in a place that is utterly unavailable to court ordered process. And that, I think, to a democracy should be very, very concerning. I think we need to have a conversation about it. Again, how do we strike the right balance? Privacy matters tremendously. Public safety, I think, matters tremendously to everybody. I think fair-minded people have to recognize that there are tremendous benefits to a society from encryption. There are tremendous costs to a society from universal strong encryption. And how do we think about that?
  • We’ve got to have a conversation long before the logic of strong encryption takes us to that place. And smart people, reasonable people will disagree mightily. Technical people will say it’s too hard. My reaction to that is: Really? Too hard? Too hard for the people we have in this country to figure something out? I’m not that pessimistic. I think we ought to have a conversation.
  •  
    Considering that I'm over 10 times as likely to die from a police shoooting as I am from a terrorist attack, how about we begin this conversation, Mr. Comey, by you providing formal notice to everyone who's had the telephone metadata gathered or searched all dates on which such gatherings and searches were conducted so citizens can file suit for violation of their privacy rights? Note that the Second U.S. Circuit Court of Appeals held last week that the FBI exceeded statutory authority in gathering and searching that information. Because the gathering and searching was not authorized, that would bring the gathering and searching under the protections of the Privacy Act, including the FBI duty to account for the disclosures  and to pay at least the statutory minimum $1,500 in damges per incident.  Then I would like to have an itemization of all of the commercial software and hardware products that your agency and or your buddies at NSA built backdoors into.  Then your resignation for millions of violations of the Privacy Act would be deeply appreciated. Please feel free to delegate the above mentioned tasks to your successor. 
Paul Merrell

Losing public opinion on BDS, activists turn to 'lawfare' - 0 views

  •      Champions of proposed Senate Bill SB1761, which passed both houses of the Illinois General Assembly May 18th, say it’s designed to fight anti-Semitic activism and protects Israel from the existential threat posed by the Boycott, Divestment, & Sanctions movement (BDS). Opponents of the bill say it places the economic welfare of Israel before U.S. interests, tacitly endorses the full annexation of the West Bank into Israel, and violates our country’s First Amendment rights. The bill’s opponents are right. But a potential threat of this legislation, edging closer to the criminalization of advocating for Palestinian rights and against occupation, threatens our core First Amendment rights and has been relatively absent from the discourse surrounding this bill.
  • And that’s not just here in the United States. Israeli lawmakers sought to criminalize public support of boycotts against Israel back in 2010 through their “Law for Prevention of Damage to the State of Israel through Boycott.” When I spoke with a staffer for Illinois State Rep. Sara Feigenholtz, one of the bill’s primary sponsors, inquiring if SB1761 was modeled after the 1977 amendments to the Export Administration Act (regarding the Arab League boycott of Israel), I was informed “These ‘antiboycott’ laws are the 1977 amendments to the Export Administration Act (EAA) and the Ribicoff Amendment to the 1976 Tax Reform Act (TRA). I hope this helps.…SB1761 falls in line with these federal laws”
  • Referencing EAA is another indication of the move toward weakening our First Amendment rights, as that amendment was meant to criminalize people who adhered to the Arab League’s boycott of Israel. Melissa Redmiles writes of the 70’s legislation in International Boycott Reports, 2003 and 2004 (pdf), from the IRS.gov website: “Those U.S persons who agree to participate in such boycotts are subject to criminal and civil penalties.” SB1761 seems to be the latest manifestation of a trend toward enacting a kind of trickle-down suppression. From the Center For Constitutional Rights website for Palestine Solidarity Legal Support: “These bills must be opposed in order to protect the right to engage in boycotts that reflect collective action to address a human rights issue, which the US Supreme Court has declared is protected speech… These bills would make it state policy to discourage support of human rights boycotts against Israel… and have the potential to stifle expressions of political beliefs…”
  • ...3 more annotations...
  • SB1761 requires all five public retirement benefits systems of the Illinois Pension Code to divest “all direct holdings” from any company which engages in boycotting Israel. This is designed to financially punish companies which participate in BDS; presumably European companies. But it will also burden an already severely crippled,“worst in nation”, Illinois pension system. Illinois Governor Bruce Rauner was quoted by Jewish United Fund News (JUF) earlier this month as saying, “I made a pledge that Illinois would become the first state in America to divest its public pension funds from any company in the world that boycotts Israel.” Rauner includes U.S. companies in his threat of divestment when he says “any company in the world.”
  • Relatedly from SB1761 itself: “It is not the intent [of this bill]… to cause divestiture from any company based in the United States of America.” Not intended? This soft language clearly leaves the door open to require Illinois public retirement systems’ divestiture from U.S. companies that participate in BDS. So, while politicians endorsing this bill can point to this statement of “intent” as some kind of safeguard for American companies, this same sentence simultaneously functions as a veiled threat to those companies.
  • SB1761 characterizes the motivations of the BDS movement as “intending to penalize… Israel.” Similarly, JUF News this month quoted JUF President Steven B. Nasatir saying, “At the core of the BDS movement is a quest to delegitimize Israel as a Jewish state.” That’s like stating that the intent of the Civil Rights Montgomery bus boycott was to “penalize white people.
  •  
    As though ACLU didn't already have enough lawsuits going. But this takes the cake. Although anti-BDS legislation has been introduced several times in Congress but never got off the ground because of the First Amendment barrier. Similar measures pending in Europe too.  The good news here is that Israel's right-wing government is getting desperate. The BDS movement is mushrooming globally and routinely is achieving success in convincing companies (and recording artists, etc.) to pull out of Israel. More so in Europe, but BDS is off to a great start in the U.S. Kerry warned Netanyahu before the latter blew up the last round of negotations with the Palestinians that BDS would soon make it politically impossible for the U.S. to continue providing cover for Israel on the U.N. Security Council. There's a big shift of public opinion in the U.S. about Israel's abuse of Palestinians well under way. It won't be long before introducing Israel Lobby measures in Congress will stop happening. 
Paul Merrell

The Island - 0 views

  • Barack Obama’s determined, if unbelievably secretive, bid to fast-track agreement on the Trans-Pacific Partnership (TPP) ‘not tomorrow, as they say, but yesterday’ is clearly driven by the bitter knowledge that America got well and truly pipped-at-the-post when China launched the Asian Infrastructure Investment Bank (AIIB). "Evidence of the relative power of the Chinese and American economies," wrote Pepe Escobar in Asia Times, "was the world’s reaction to China’s launch of the badly needed AIIB to provide development funds for Asia and beyond.   The level of funding necessary for such development has long been denied by the US-dominated World Bank and IMF."   More galling to the self-annointed ‘Indispensable Nation’ was that even its staunch allies, UK and Israel, unhesitatingly got on board AIIB – despite, as Escobar reveals, "the bullying of the US to stop them leaving the US and its cat’s paw in East Asia, Japan, out in the cold." More amazingly, added Escobar, the US actually thought it could write the rules of trade for China and East Asia!
  • Consider for instance, Obama’s speech on May 8, 2015 at a Nike factory in Oregon: "We have to make sure America writes the rules of the global economy and we should do it today while our economy is in a position of global strength. If we don’t write the rules for trade around the world, guess what, China will. And they’ll write those rules in a way that gives Chinese workers and Chinese businesses the upper hand." What is one to conclude from such an unabashed ‘confession’ except that the imperial mind-set is still very much alive and kicking in the 21st Century? The TPP or Trans-Pacific Partnership is being put together in absolute secrecy, so what little has become public knowledge is thanks to Wikileaks. What needs to be remembered is that the US already trades heavily with the other 11 nations included in the TPP talks. Economist and leading commentator Paul Krugman’s blunt assessment: "This not a trade agreement. It’s about intellectual property and dispute resolution; the big beneficiaries are likely to be pharma companies and firms that want to sue governments."
  • And that, precisely, happens to be the bone of contention between Obama and Democratic Senator Elizabeth Warren, who has been particularly critical of the so-called ‘Investor State Dispute Settlement’ provisions in the TPP which, she charged publicly, would empower corporations to use international courts to sue the US government and other state institutions of signatory governments that enact regulations and ‘protections’ which impact on the profits of corporations. The Obama administration, for its part, argues that the deal is instead about trade and increasing American exports abroad. It has set up a web page on the US Trade Representative’s (USTR) site listing the benefits of exports from each of America’s fifty states resulting from the TPP. But an obscure government document put out by that very same USTR office adequately makes Senator Warren’s case for her! That document happens to be the USTR’s annual report on "foreign trade barriers" around the world, going country by country to list complaints the US government has about their laws with respect to commerce.
Paul Merrell

White House: Al Qaeda in Iraq now 'transnational threat' | TheHill - 0 views

  • Al Qaeda's violent resurgence in Iraq and expansion into Syria now represents a "transnational threat network" that could possibly reach from the Mideast to the United States, according to the White House. The teaming of al Qaeda's Iraqi cell and affiliated Islamic militant groups in Syria into the new Islamic State of Iraq and al-Sham (ISIS) has developed into "a major emerging threat to Iraqi stability . . . and to us," a senior administration official told reporters on Wednesday. "It is a fact now that al Qaeda has a presence in Western Iraq" extending into Syria, "that Iraqi forces are unable to target," the official said. That growing presence "that has accelerated in the past six to eight months" has been accompanied by waves of bombings and attacks that threaten to throw Iraq into a full-blown civil war. 
  • Keeping ISIS from destabilizing the Iraqi government and expanding into other areas in the region is a "major focus" of this week's visit by Iraqi Prime Minister Nouri al Maliki to Washington. The Iraqi delegation met with Vice President Joe Biden Wednesday morning, and will meet with congressional leaders later in the day. Top defense lawmakers are already sounding the alarm on ISIS growth in the region and the threat posed by the al Qaeda faction to Iraq, Syria and ultimately the United States. "As the situation in both countries grows worse . . . we are deeply concerned that Al-Qaeda could use its new safe haven in Iraq and Syria to launch attacks against U.S. interests and those of our friends and allies," Sen. John McCain (R-Ariz.) along with Senate Armed Services Committee chief Carl Levin (D-Mich.), ranking member Jim Inhofe (R-Okla.) wrote in a letter to President Obama. Senate Foreign Relations heads Sens. Robert Menendez (D-NJ) and Bob Corker (R-Tenn.) also co-signed the letter, sent to the White House on Tuesday. 
  • "We urge you to press [al-Maliki] to formulate a comprehensive political and security strategy that can stabilize the country, enable Iraq to realize its vast potential, and help to safeguard our nation’s enduring national security interests in Iraq," they wrote. One area lawmakers are pressing the White House and Iraqi government on is increased U.S. assistance for counterterrorism operations in the country, backed by supplies of American military weapons and intelligence. 
  • ...2 more annotations...
  • Iraqi officials reportedly reached out to U.S. intelligence officials to see if American drones could begin conducting airstrikes against ISIS targets in Western Iraq. When asked whether the White House was considering expediting those weapon sales to Iraq, the official replied: "I will leave it up to the Iraqis to make that case." That said, the administration "is working closely with Congress" to facilitate the kind of military and intelligence aid being sought by al-Maliki from the United States. Counterterrorism support is evaluated "country by country and in Iraq that is [especially] complicated," the official said, noting the long-standing tribal and sectarian ties woven into the country's makeup. 
  • That said, the White House official ruled out the possibility of putting U.S. boots back on the ground in Iraq, in the form of military trainers, as part of any counterterrorism strategy. The White House and Pentagon failed to reach a bilateral security deal with Baghdad that would allow a handful of American troops to remain in the country after the U.S. pullout in 2011. That lack of a deal prevented Washington from fielding a postwar force in Iraq after the final withdrawal in December of that year. White House critics claim Obama's inability to lock in a postwar deal with Iraq opened the door for al Qaeda's return to power in the country. 
  •  
    Let's see if I've got this straight. Our previous wars in Iraq and Afghanistan resulted in massive recruitment by "terrorists" who now threat our shores once again. Therefore, we should launch a third war in Iraq or at least raining Hellfire missiles on Iraq from drones. This logic seems to ignore the immutable fact that it is U.S. violence in the region that converts peaceful Arab citizens into "terrorists." The message is clear: end our military involvement in the Mideast and northern Africa. But that message seems to fall on deaf ears in Washington, D.C. That is because this is not about terrorists at all. It is about control of Pipelinestan and profits in the military-industrial complex.   
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadata - The Washington Post - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

EXCLUSIVE: Edward Snowden Explains Why Apple Should Continue To Fight the Government on Encryption - 0 views

  • As the Obama administration campaign to stop the commercialization of strong encryption heats up, National Security Agency whistleblower Edward Snowden is firing back on behalf of the companies like Apple and Google that are finding themselves under attack. “Technologists and companies working to protect ordinary citizens should be applauded, not sued or prosecuted,” Snowden wrote in an email through his lawyer. Snowden was asked by The Intercept to respond to the contentious suggestion — made Thursday on a blog that frequently promotes the interests of the national security establishment — that companies like Apple and Google might in certain cases be found legally liable for providing material aid to a terrorist organization because they provide encryption services to their users.
  • In his email, Snowden explained how law enforcement officials who are demanding that U.S. companies build some sort of window into unbreakable end-to-end encryption — he calls that an “insecurity mandate” — haven’t thought things through. “The central problem with insecurity mandates has never been addressed by its proponents: if one government can demand access to private communications, all governments can,” Snowden wrote. “No matter how good the reason, if the U.S. sets the precedent that Apple has to compromise the security of a customer in response to a piece of government paper, what can they do when the government is China and the customer is the Dalai Lama?”
  • Weakened encryption would only drive people away from the American technology industry, Snowden wrote. “Putting the most important driver of our economy in a position where they have to deal with the devil or lose access to international markets is public policy that makes us less competitive and less safe.”
  • ...1 more annotation...
  • FBI Director James Comey and others have repeatedly stated that law enforcement is “going dark” when it comes to the ability to track bad actors’ communications because of end-to-end encrypted messages, which can only be deciphered by the sender and the receiver. They have never provided evidence for that, however, and have put forth no technologically realistic alternative. Meanwhile, Apple and Google are currently rolling out user-friendly end-to-end encryption for their customers, many of whom have demanded greater privacy protections — especially following Snowden’s disclosures.
Paul Merrell

Spy Tech Company 'Hacking Team' Gets Hacked | Motherboard - 0 views

  • Sometimes even the cops get robbed. The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, appears to have been seriously hacked. Hackers have made 500 GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download. Hacking Team’s spokesperson Eric Rabe did not immediately respond to Motherboard’s calls and email asking for verification that the hacked information is legitimate. Without confirmation from the company itself, it’s difficult to know what percentage of the files are real—however, based on the sheer size of the breach and the information in the files, the hack appears to be authentic. What’s more, the unknown hackers announced their feat through Hacking Team’s own Twitter account.
  • he hackers composed the tweets as if they were written by Hacking Team. “Since we have nothing to hide, we're publishing all our e-mails, files, and source code,” the hackers wrote in a tweet, which included the link to around 500 Gb of files. The hackers also started tweeting a few samples of internal emails from the company. One of the screenshots shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed numerous cases of abuse from Hacking Team’s clients. Hacking Team has never revealed a list of its clients, and has always and repeatedly denied selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.
  • It’s unclear exactly how much the hackers got their hands on, but judging from the size of the files, it’s certainly a large collection of internal files. A source who asked to speak anonymously due to the sensitivity of the issue, told me that based on the file names and folders in the leak, the hackers who hit Hacking Team "got everything." A few hours after the initial hack, a list of alleged Hacking Team customers was posted on Pastebin. The list includes past and current customers. Among the most notable, there are a few that were previously unknown, such as the FBI, Chile, Australia, Spain, and Iraq, among others.
  • ...1 more annotation...
  • The breach on Hacking Team comes almost a year after another surveillance tech company, the competing FinFisher, was hacked in a similar way, with a hacker leaking 40 Gb of internal files. FinFisher, like Hacking Team, sells surveillance software to law enforcement agencies across the world. Their software, once surreptitiously installed on a target’s cell phone or computer, can be used to monitor the target’s communications, such as phone calls, text messages, Skype calls, or emails. Operators can also turn on the target’s webcam and exfiltrate files from the infected device.
Paul Merrell

Hacking Team Asks Customers to Stop Using Its Software After Hack | Motherboard - 0 views

  • But the hack hasn’t just ruined the day for Hacking Team’s employees. The company, which sells surveillance software to government customers all over the world, from Morocco and Ethiopia to the US Drug Enforcement Agency and the FBI, has told all its customers to shut down all operations and suspend all use of the company’s spyware, Motherboard has learned. “They’re in full on emergency mode,” a source who has inside knowledge of Hacking Team’s operations told Motherboard.
  • Hacking Team notified all its customers on Monday morning with a “blast email,” requesting them to shut down all deployments of its Remote Control System software, also known as Galileo, according to multiple sources. The company also doesn’t have access to its email system as of Monday afternoon, a source said. On Sunday night, an unnamed hacker, who claimed to be the same person who breached Hacking Team’s competitor FinFisher last year, hijacked its Twitter account and posted links to 400GB of internal data. Hacking Team woke up to a massive breach of its systems.
  • A source told Motherboard that the hackers appears to have gotten “everything,” likely more than what the hacker has posted online, perhaps more than one terabyte of data. “The hacker seems to have downloaded everything that there was in the company’s servers,” the source, who could only speak on condition of anonymity, told Motherboard. “There’s pretty much everything here.” It’s unclear how the hackers got their hands on the stash, but judging from the leaked files, they broke into the computers of Hacking Team’s two systems administrators, Christian Pozzi and Mauro Romeo, who had access to all the company’s files, according to the source. “I did not expect a breach to be this big, but I’m not surprised they got hacked because they don’t take security seriously,” the source told me. “You can see in the files how much they royally fucked up.”
  • ...2 more annotations...
  • For example, the source noted, none of the sensitive files in the data dump, from employees passports to list of customers, appear to be encrypted. “How can you give all the keys to your infrastructure to a 20-something who just joined the company?” he added, referring to Pozzi, whose LinkedIn shows he’s been at Hacking Team for just over a year. “Nobody noticed that someone stole a terabyte of data? You gotta be a fuckwad,” the source said. “It means nobody was taking care of security.”
  • The future of the company, at this point, it’s uncertain. Employees fear this might be the beginning of the end, according to sources. One current employee, for example, started working on his resume, a source told Motherboard. It’s also unclear how customers will react to this, but a source said that it’s likely that customers from countries such as the US will pull the plug on their contracts. Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team’s “crisis procedure,” it could have killed their operations remotely. The company, in fact, has “a backdoor” into every customer’s software, giving it ability to suspend it or shut it down—something that even customers aren’t told about. To make matters worse, every copy of Hacking Team’s Galileo software is watermarked, according to the source, which means Hacking Team, and now everyone with access to this data dump, can find out who operates it and who they’re targeting with it.
Paul Merrell

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
Gary Edwards

Gold Forecaster - Gold is back as money! The BIS 382 tonne Gold Swap - Good or Bad for Gold and Why? - GoldSeek.com - 0 views

  •  
    What is significant about this or these transactions is that gold is being used in international settlements after so many decades of being sidelined in the monetary system!   The transaction itself confirms that gold is being used in international settlements, which is a dynamic confirmation of gold's return to the monetary system.   A "Swap" might be the first desperate step in such a transaction with the swapping bank hoping to repay the foreign exchange, but should it fail, the B.I.S . would have to decide either to keep the gold on its books or to sell it.   Again, keeping it on its books is part confirmation that gold is active again on the monetary system, a big boost by itself! Gold is back and alive in the monetary system!   What appears to have really happened is that one nation or more needed foreign exchange to counter some shortfall in its accounts and raised these funds as a short-term liquidity measure, believing that it would be able to return the currency and receive its gold back.   The gold would then be returned at the conclusion of the swap period in return for the currencies swapped.   If it fails to return these funds to the BIS, then the BIS could discreetly place the gold with another central bank, should it not want to keep the gold.   If it did so, the BIS would simply report its disposal of the gold, the originating central bank would report the drop in its gold reserves and the gold buying bank would report its increase in the reserves.     This puts the transaction into an entirely different category.   It seems that one or more of the developed world's central bank's credit is not good enough for other governmental institutions.   If word got out as to which this country is, then the financial markets would go into quite a spin, shaking the global financial system to its core.   No wonder the B.I.S. is keeping such a low profile!
Gary Edwards

The Weekend Interview with Robert Mundell: On Currency, Where Do We Go From Here? - WSJ.com - 0 views

  •  
    Mr. Mundell has a knack for boiling things down to simple terms. He grew up on a four-acre farm in Ontario, went on to earn a Ph.D. from the Massachusetts Institute of Technology, and would ultimately challenge the renowned Milton Friedman at the University of Chicago during the late 1960s. Both economists were strong proponents of free markets, but Mr. Mundell disagreed with Mr. Friedman's advocacy of floating exchange rates. The sound of a buzzer indicates lunch has arrived. Mr. Mundell suggests that we continue our discussion at the table and politely invites his assistant Ivy Ng, who has been taking careful notes, to join us. "We've been talking about the possibility of global monetary reform," I continue, deciding to switch gears. "Let's talk a bit about domestic monetary policy. What do you think the Federal Reserve should be doing right now?" It's a seamless transition for Mr. Mundell. "The Fed is making a big mistake by ignoring movements in the price of the dollar, movements in the price of gold, in favor of inflation-targeting, which is a bad idea. The Fed has always had the wrong view about the dollar exchange rate; they think the exchange rate doesn't matter. They don't say that publicly, but that is their view." "Well," I counter, not particularly savoring the role of devil's advocate, "I suppose Fed officials would argue that their mandate is to try to achieve stable prices and maximum levels of employment." Mr. Mundell looks annoyed. "Well, it's stupid. It's just stupid." He tries to walk it back somewhat. "I don't mean Fed officials are stupid; it's just this idea they have that exchange-rate effects will eventually be taken into account through the inflation-targeting approach. In the long run, it's not incorrect-it takes about a year. But why ignore the instant barometer that something is happening? The exchange rate is the immediate reaction to pending inflation. Look what happened a couple weeks ago: The Fed started to say, we've got to pr
Gary Edwards

Predatory lending with a smiley face; How tax payer subsidized "loan modification" programs will sink home owners even further into debt | Salon News - 0 views

  •  
    They say California is a harbinger of the future. If so, we should all be thinking about possible safe havens. The article begins with a description of loan modification seminars attended by the same mortgage brokers whose predatory lending practices got us into this fix. At the seminars, these predators learn how to make even more money off of the exact same clients they pushed off the ledge. It's all about fees and high pressure churning techniques. With one very big difference: Obama is banking on tax payer funded "loan modifications" to help struggling homeowners. The ugly truth is that mortgage brokers are the real winners. Just like mortgage brokers, loan mod companies are under no obligation to act in borrowers' financial interests, short- or long-term. Under California's model contract, which brokers are encouraged to emulate in their dealings with borrowers, almost any change to a mortgage is an acceptable result, whether or not it saves a borrower money. And while the client has to accept the proposed deal in order for the company to get paid in full, the sales forces at these firms are veterans of pressure pitches to people in tough financial situations. Both Carlson and a spokesman for Mortgage Bailout Assistance indicate that their clients almost invariably take the offers they are given. The proverbial fox is helping the hens hold on to their coops, and not just in California. Seventeen states now have laws on the books effectively banning "foreclosure consultants," but most make an exception for mortgage brokers. As consumer complaints about fraudulent loan mod operations proliferate across the country, other government officials, including New York's City Council, are now following California's lead and exploring the creation of an official registry of mod brokers.
« First ‹ Previous 81 - 100 of 431 Next › Last »
Showing 20 items per page