Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "motives" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

John Kerry admits: some US surveillance has gone too far | World news | theguardian.com - 0 views

  • John Kerry, the US secretary of state, conceded on Thursday that some of the country's surveillance activities had gone too far, saying that certain practices had occurred "on autopilot" without the knowledge of senior officials in the Obama administration.In the most stark comments yet by a senior administration official, Kerry promised that a previously announced review of surveillance practices would be thorough and that some activities would end altogether."The president and I have learned of some things that have been happening in many ways on an automatic pilot, because the technology is there and the ability is there," he told a conference in London via video link."In some cases, some of these actions have reached too far and we are going to try to make sure it doesn't happen in the future."
  • In recent days, the Obama administration has put some distance between it and the National Security Agency (NSA). Kerry's comments are a reflection in particular of a concern about the diplomatic fallout from the revelation that the US monitored the cellphone of the German chancellor, Angela Merkel.The tactic has irritated senior intelligence officials. On Thursday evening, the director of the NSA, General Keith Alexander, blamed US diplomats for requests to place foreign leaders under surveillance.During a pointed exchange with a former US ambassador to Romania, James Carew Rosapepe, Alexander said: "We, the intelligence agencies, don't come up with the requirements. The policy-makers come up with the requirements."He added: "One of those groups would have been, let me think, hold on, oh: ambassadors."
  • Alexander said that the NSA collected information when it was asked by policy officials to discover the "leadership intentions" of foreign countries. "If you want to know leadership intentions, these are the issues," he said at a discussion hosted by the Baltimore Council on Foreign Relations.Earlier in Washington, the debate continued about whether further legal constraints should be placed on the NSA. The Senate intelligence committee approved a bill that placed largely cosmetic restrictions on the National Security Agency's domestic surveillance programme.The bill, sponsored by committee chairwoman Dianne Feinstein, a California Democrat, allows the NSA continue to collect phone metadata of millions of Americans for renewable 90-day periods, but orders it to be more transparent about the practice.
  • ...4 more annotations...
  • The bill, which is competing with more restrictive measures from other committees, now moves forward to a full Senate vote. The stage is now set for a showdown with the USA Freedom Act, a bipartisan bill that would prohibit bulk collection of Americans' telephone records.Senator Mark Udall, a Democratic member of the Senate intelligence committee and a supporter of NSA reform, said it did not go far enough."The NSA's invasive surveillance of Americans' private information does not respect our constitutional values and needs fundamental reform, not incidental changes," he said.
  • In a separate development on Thursday, a group of technology giants called for substantial reforms to the US government's surveillance programmes. The companies were furious about revelations this week – the latest to emerge from documents leaked by the former NSA contractor Edward Snowden – that the agency had intercepted the cables that link the worldwide data centres belonging to Google and Yahoo.It was also reported that Obama had ordered the NSA to stop eavesdropping on the headquarters of the International Monetary Fund (IMF) and World Bank. Reuters cited a US official as saying the president had ordered the halt in the past few weeks.The NSA's surveillance of the IMF and World Bank has not previously been disclosed.
  • In response to Reuters inquiries, a senior Obama administration official said, "The United States is not conducting electronic surveillance targeting the headquarters of the World Bank or IMF in Washington." The Obama administration official, who spoke on condition of anonymity, did not address whether the NSA had eavesdropped on the two entities in the past.Kerry, in his comments to a conference organised by the Open Government Partnership, acknowledged that trust needed to be restored. "There is an effort to try to gather information, yes, in same cases inappropriately, and the president is now doing a thorough review, in order that nobody will have a sense of abuse," he said.Despte the cracks between the administration and the spy community, Kerry was careful to defended the motives of US intelligence agencies, insisting no "innocent people" were being abused and saying surveillance by several countries had prevented many terrorist plots.
  • A German MP said he met Snowden in Moscow on Thursday, and said the NSA whistelblower was prepared in principle to help Germany investigate allegations of surveillance by US intelligence.Hans-Christian Stroebele, a lawmaker with Germany's opposition Greens and a prominent critic of the NSA's alleged actions, told ARD television that Snowden "made clear he knows a great deal."He said Snowden would be prepared to travel to Germany and testify, "but the circumstances would have to be cleared up".
  •  
    Looks like maybe Snowden is now a hero in Germany and may be allowed to travel there. Meanwhile, the Obama Administration rats continue to desert the sinking NSA ship, but Diane Feinstein fights on to preserve mass surveillance. 
Paul Merrell

Is NSA spying really about blackmail? | This Can't Be Happening! - 0 views

  • A revealing page-one article in today’s New York Times (“Tap on Merkel Provides Peek a Vast Spy Net”) reports on how the NSA’s global spying program, dating back at least to early in the Bush/Cheney administration, was vacuuming up the phone conversations (and no doubt later the internet communications) of not just leaders like German Chancellor Angela Merkel, but opposition leader Merkel before her party took power in Germany. As the Times puts it, the phone monitoring, which actually dates back to the Cold War Era before 1990, “is hardly limited to the 35 leaders of countries like Germany, and also includes their top aides and the heads of opposing parties.” That’s pretty far-reaching, and the paper says that it has learned, primarily courtesy of revelations from the documents released by fugitive whistleblower Edward Snowden, that the spying went even beyond that, to target up-and-coming potential leaders of so-called “friendly states.”
  • What the Times does not ask in its entire report on this spying program on leaders and potential leaders is whether there could be another motive for this extraordinary spying campaign on leaders: blackmail.
  • How else to explain the remarkably tepid response from the leaders who are the victims of this spying by the NSA on their private communications? How else to explain Europe’s unwillingness to grant sanctuary to Snowden, who after all has allowed them to know about the perfidy of the US? How else to explain Europe’s supine acquiescence to the US in its criminal wars against Iraq and Afghanistan, and its unquestioning support of Israel?
  •  
    The author goes on to raise the question whether NSA surveillance is also being used to blackmail U.S. leaders. This is a question that has been on my mind too. Certainly, J. Edgar Hoover used the apparatus of the FBI to assemble dossiers on U.S. leaders; that was the key to his power, the knowledge that he had the ability to end the political careers of elected officials. Hoover and the FBI also played a key role in the COINTELPRO abusive surveillance, disruption, and sabotage efforts aimed at peace, environmental, and black activists and leaders, along with the NSA and CIA, that was thoroughly aired in the 1976 Church Committee hearings. See https://en.wikipedia.org/wiki/COINTELPRO  
Paul Merrell

Tomgram: Pepe Escobar, The Tao of Containing China | TomDispatch - 0 views

  • Sun Tzu, the ancient author of The Art of War, must be throwing a rice wine party in his heavenly tomb in the wake of the shirtsleeves California love-in between President Obama and President Xi Jinping. "Know your enemy" was, it seems, the theme of the meeting. Beijing was very much aware of -- and had furiously protested -- Washington’s deep plunge into China’s computer networks over the past 15 years via a secretive NSA unit, the Office of Tailored Access Operations (with the apt acronym TAO). Yet Xi merrily allowed Obama to pontificate on hacking and cyber-theft as if China were alone on such a stage. Enter -- with perfect timing -- Edward Snowden, the spy who came in from Hawaii and who has been holed up in Hong Kong since May 20th. And cut to the wickedly straight-faced, no-commentary-needed take on Obama’s hacker army by Xinhua, the Chinese Communist Party’s official press service. With America’s dark-side-of-the-moon surveillance programs like Prism suddenly in the global spotlight, the Chinese, long blistered by Washington’s charges about hacking American corporate and military websites, were polite enough. They didn’t even bother to mention that Prism was just another node in the Pentagon’s Joint Vision 2020 dream of “full spectrum dominance.” By revealing the existence of Prism (and other related surveillance programs), Snowden handed Beijing a roast duck banquet of a motive for sticking with cyber-surveillance. Especially after Snowden, a few days later, doubled down by unveiling what Xi, of course, already knew -- that the National Security Agency had for years been relentlessly hacking both Hong Kong and mainland Chinese computer networks.
  • But the ultimate shark fin’s soup on China’s recent banquet card was an editorial in the Communist Party-controlled Global Times.  “Snowden,” it acknowledged, “is a ‘card’ that China never expected,” adding that “China is neither adept at nor used to playing it.” Its recommendation: use the recent leaks “as evidence to negotiate with the U.S.” It also offered a warning that “public opinion will turn against China’s central government and the Hong Kong SAR [Special Administrative Region] government if they choose to send [Snowden] back.” With a set of cyber-campaigns -- from cyber-enabled economic theft and espionage to the possibility of future state-sanctioned cyber-attacks -- evolving in the shadows, it’s hard to spin the sunny “new type of great power relationship” President Xi suggested for the U.S. and China at the recent summit. It’s the (State) Economy, Stupid The unfolding Snowden cyber-saga effectively drowned out the Obama administration’s interest in learning more about Xi’s immensely ambitious plans for reconfiguring the Chinese economy -- and how to capture a piece of that future economic pie for American business. Essential to those plans is an astonishing investment of $6.4 trillion by China’s leadership in a drive to “urbanize” the economy yet further by 2020.
  •  
    Lengthy political analysis by the sterling Pepe Escobar on China/U.S. relations and Chinese President Xi Jinping's goals for the future of China during his period of national leadership. He leads with the impact of the NSA scandal, but goes on to paint a far more detailed picture of China's role in international policy, economic progress, and economic plans being executed. This is a must-read for China-watchers. As always, Pepe provides a lively read.
Paul Merrell

As Europe erupts over US spying, NSA chief says government must stop media | Glenn Greenwald | Comment is free | theguardian.com - 0 views

  • is there any doubt at all that the US government repeatedly tried to mislead the world when insisting that this system of suspicionless surveillance was motivated by an attempt to protect Americans from The Terrorists™? Our reporting has revealed spying on conferences designed to negotiate economic agreements, the Organization of American States, oil companies, ministries that oversee mines and energy resources, the democratically elected leaders of allied states, and entire populations in those states.Can even President Obama and his most devoted loyalists continue to maintain, with a straight face, that this is all about Terrorism? That is what this superb new Foreign Affairs essay by Henry Farrell and Martha Finnemore means when it argues that the Manning and Snowden leaks are putting an end to the ability of the US to use hypocrisy as a key weapon in its soft power.Speaking of an inability to maintain claims with a straight face, how are American and British officials, in light of their conduct in all of this, going to maintain the pretense that they are defenders of press freedoms and are in a position to lecture and condemn others for violations? In what might be the most explicit hostility to such freedoms yet – as well as the most unmistakable evidence of rampant panic – the NSA's director, General Keith Alexander, actually demanded Thursday that the reporting being done by newspapers around the world on this secret surveillance system be halted (Techdirt has the full video here):
  • The head of the embattled National Security Agency, Gen Keith Alexander, is accusing journalists of "selling" his agency's documents and is calling for an end to the steady stream of public disclosures of secrets snatched by former contractor Edward Snowden."I think it's wrong that that newspaper reporters have all these documents, the 50,000 – whatever they have and are selling them and giving them out as if these – you know it just doesn't make sense," Alexander said in an interview with the Defense Department's "Armed With Science" blog."We ought to come up with a way of stopping it. I don't know how to do that. That's more of the courts and the policy-makers but, from my perspective, it's wrong to allow this to go on," the NSA director declared. [My italics]There are 25,000 employees of the NSA (and many tens of thousands more who work for private contracts assigned to the agency). Maybe one of them can tell The General about this thing called "the first amendment".I'd love to know what ways, specifically, General Alexander has in mind for empowering the US government to "come up with a way of stopping" the journalism on this story. Whatever ways those might be, they are deeply hostile to the US constitution – obviously. What kind of person wants the government to forcibly shut down reporting by the press?Whatever kind of person that is, he is not someone to be trusted in instituting and developing a massive bulk-spying system that operates in the dark. For that matter, nobody is.
  •  
    Alexander's call for censorship starts at about 21:00 of the video at http://www.politico.com/blogs/under-the-radar/2013/10/nsa-chief-stop-reporters-selling-spy-documents-175896.html Dear General Alexander: "... we cannot defend freedom abroad by deserting it at home." E- Edward R. Murrow, See It Now (9 March 1954), http://tinyurl.com/kzlpm4a
Paul Merrell

Gowdy wants Clinton to answer 'all questions' on Benghazi - Jennifer Shutt - POLITICO - 0 views

  • The chairman of the House Benghazi Committee said on Sunday former Secretary of State Hillary Clinton’s scheduled Oct. 22 committee testimony on the 2012 terrorist attack in Libya will take as long as necessary for all of the committee’s questions to be answered. “If she is going to insist on only coming once, I’m going to insist that all questions are asked and answered, so she’s going to be there for a while,” Rep. Trey Gowdy (R-S.C.) said on “Fox News Sunday.” Story Continued Below The questions, he said, will include why Clinton set up a private email account to use at the State Department and why some classified documents were on her private server. “I don’t have any yoga emails, but the greater steps you take to delete something or clean something — that is a higher level of concealment,” Gowdy said, referring to comments that Clinton deleted private emails related to yoga classes and her daughter Chelsea’s wedding.
  • Gowdy insisted the committee’s investigation is to determine how four Americans died at the U.S. diplomatic compound in Libya and is not politically motivated. “We are trying to run this in the way serious investigations are run,” he said. “We are going to follow the facts wherever they go — and if that impacts people’s perception of her fitness to be commander and chief, so be it.”
  •  
    But will she plead the 5th Amendment? And will the Committee even attempt to learn and disclose what the State Dept. and CIA were up to in Libya when the attack occurred? Don't hold your breath for that one. This hearing is about bruising Hillary's prospects in Auction 2016, not about exposing the CIA ratline of weapons shipments from Libya to "jihadi" mercenaries in Syria.  Fun and games on Capitol Hill. 
Paul Merrell

Minsk -2: A Rotting Corpse | nsnbc international - 0 views

  • The Minsk-2 ceasefire agreement is dead but no one wants to bury the rotting corpse. Since it was signed in February of this year the Donbas governments and Russia have bent over backward to comply with the terms of that agreement hoping against hope that the Kiev junta would do the same. They hoped in vain.
  • Poroshenko and his fascist allies instead have refused to change the constitution to accommodate the concerns of the Donbas republics, have tried to suppress the Communist Party and other parties in opposition, have refused to withdraw heavy weaponry from the line of contact, have maintained increasingly heavy artillery attacks on the civilian populations and areas and cut off routes for essential foodstuffs, medical aid and technical equipment. Rather than enjoying a ceasefire, the peoples of the Donbas are under a state of siege. Poroshenko openly calls for a military solution to the crisis and has increased the draft in the west. The NATO alliance continues to pour in its forces disguised as “advisers” and “mercenaries” and puts additional pressure on Russia with multiple military exercises from the Baltic to Bulgaria, where more tanks have been recently dispatched to “send Russia a message.” The reality of the situation was stated on the 18th of August when President Putin stated, “It was the Donbas militias that suggested withdrawing all military equipment with calibre under 100mm. Unfortunately, the opposite side didn’t do that. On the contrary, according to the available data, it is concentrating its units there, including those reinforced with military hardware.” He continued to pay lip service to the Minsk-2 agreement, stating, “As for the Minsk-2 agreement, I believe there is no alternative for resolving the situation and that peace will prevail in the long run… “ and continued with “Our task is to minimize the losses with which we will come to this peace.”
  • There can be no doubt that the Minsk-2 agreements do provide the framework for a peaceful settlement of the impasse but there is also no doubt that the Kiev and NATO forces have no intention of abiding by its terms and are preparing for another offensive. Putin also stated, “I hope that it will not come to direct large scale clashes.” Yet, the people of the Donbas would be surprised to be told that the thousands of shells raining down on them from the Kiev junta’s artillery in order to provoke those clashes do not count. Bu what is the purpose of this state of siege? Since the Donbas forces have proved their strength and resilience the Kiev regime has little hope of achieving the total destruction of those forces and imposing its will on the Donbas. Kiev and NATO also know that Russia does not want to be drawn into a direct clash with NATO that could lead to a general war. In consequence the Kiev-NATO axis have decided to engage in operations that have direct political repercussions designed to disrupt the Russian-Donbas alliance or to paralyze it and try to enlist new allies. At the same time they have decided to make the war more costly for the Donbas and Russia both in military and economic terms, and to try to bring about a gradual exhaustion of their physical and moral resistance. We see this strategy being played out with the constant increase of economic warfare against Russia, which is clearly the ultimate target, the increasing use of propaganda including the planting in the media of the most absurd stories about Russia and its government, the use, once again of the OSCE observes as intelligence agents for NATO as happened in the Yugoslav war, and, in the political sphere, attempts by the United States and Britain to humiliate Russia with the politically motivated attempt to set up a tribunal regarding the downing of flight MH17.
Paul Merrell

Turkey duped the US, and Isis is reaping the rewards - Comment - Voices - The Independent - 0 views

  • The disastrous miscalculation made by the United States in signing a military agreement with Turkey at the expense of the Kurds becomes daily more apparent. In return for the use of Incirlik Air Base just north of the Syrian border, the US betrayed the Syrian Kurds who have so far been its most effective ally against Islamic State (Isis, also known as Daesh). In return for this deal signed on 22 July, the US got greater military cooperation from Turkey, but it swiftly emerged that Ankara’s real target was the Kurds in Turkey, Syria and Iraq. Action against Isis was almost an afterthought, and it was hit by only three Turkish airstrikes, compared to 300 against the bases of the Kurdistan Workers’ Party (PKK). President Barack Obama has assembled a grand coalition of 60 states, supposedly committed to combating Isis, but the only forces on the ground to win successive victories against the jihadis over the past year are the ruling Syrian-Kurdish Party (PYD) and its People’s Protection Units (YPG). Supported by US air power, the YPG heroically defeated the Isis attempt to capture the border city of Kobani during a four-and-a-half month siege that ended in January, and seized the Isis crossing point into Turkey at Tal Abyad in June.
  • The advance of the Syrian Kurds, who now hold half of the 550-mile Syrian-Kurdish border, was the main external reason why Turkish President Recep Tayyip Erdogan offered the US closer cooperation, including the use of Incirlik, which had previously been denied. The domestic impulse for an offensive by the Turkish state against the Kurds also took place in June when the pro-Kurdish People’s Democratic Party (HDP) won 13 per cent of the vote in the Turkish general election, denying Mr Erdogan’s Justice and Development Party (AKP) a majority for the first time since 2002. By strongly playing the Turkish nationalist and anti-Kurdish card, Mr Erdogan hopes to win back that majority in a second election on 1 November.There are signs of a growing understanding in Washington that the US was duped by the Turks, or at best its negotiators deceived themselves when they agreed their bargain with Ankara. Senior US military officers are anonymously protesting in the US media they did not know that Turkey was pretending to be going after Isis when in practice it was planning an offensive against its 18 million-strong Kurdish minority.
  • But in July, the US plan to create such a moderate force was humiliatingly knocked on the head when Jabhat al-Nusra attacked and kidnapped many of this US-trained force as they entered Syria from Turkey. It now seems certain that Nusra had been tipped off by Turkish intelligence about the movements of the US-backed unit known as “Division 30”. Turkey apparently did this because it does not want the US to have its own surrogate in Syria. According to an investigation by Mitchell Prothero of the McClatchy news organisation, citing many Syrian sources in Turkey, the Turkish motive was to destroy the US-run movement, which was intended to number 15,000 fighters targeting Isis. Its disintegration would leave the US with no alternative but to train Turkish-sponsored rebel groups whose primary aim is to topple Syria’s President Bashar al-Assad. The article quotes a Syrian rebel commander in the Turkish city of Sanliurfa, 30 miles north of the Syrian border, as saying that the Turks “don’t want anything bad to happen to their allies – Nusra and Ahrar al-Sham – along the border, and they know that both the Americans and the Syrian people will eventually recognise that there’s no difference between groups such as Nusra, Ahrar and Daesh.”
  • ...1 more annotation...
  • The US campaign against Isis is failing and the US-Turkish deal will not reverse that failure and may make it more complete. Why did US negotiators allow themselves to be deceived, if that is what happened. No doubt the US air force was over-eager for the use of Incirlik so it would not have to fly its planes from Jordan, Bahrain or carriers in the Gulf.But there is a deeper reason for America’s inability to confront Isis successfully. Ever since 9/11, the US has wanted to combat al-Qaeda-type movements, but without disturbing its close relations with Sunni states such as Turkey, Saudi Arabia, Pakistan and the Gulf monarchies. But it is these same allies that have fostered, tolerated or failed to act against the al-Qaeda clones, which explains their continuing success.
  •  
    Patrick Cockburn lets loose on the Turkish government for betraying the U.S.
Paul Merrell

Israeli Knesset brings back bill to forcibly transfer Palestinian Bedouins | nsnbc international - 0 views

  • The Israeli Knesset (Parliament) announced that on Sunday July 12th, they will bring back a bill to forcibly remove 40,000 Palestinian Bedouins from their homes in the Negev desert in southern Israel.
  • The Israeli government has managed to force the transfer of tens of thousands of Palestinian Bedouins into a reservation near the city dump of Jerusalem, but 40,000 more have refused to be moved from their ancestral homes.
  • The bill had been tabled in 2013 after widespread international condemnation of the forced transfer plan. According to Article 49 of the Fourth Geneva Convention, “Individual or mass forcible transfers, as well as deportations of protected persons from occupied territory to the territory of the Occupying Power or to that of any other country, occupied or not, are prohibited, regardless of their motive.” Israeli authorities had initially approved the plan, known as the ‘Prawer Plan’, in 2011, but delayed it indefinitely after the UN and other international bodies condemned the plan. The Palestinian Bedouin communities of southern Israel have lived in their homes for hundreds of years, but when Israel was created in 1948, the Israeli government refused to recognize their villages. As such, their homes have been destroyed dozens of times by the Israeli government, each time rebuilt by the Bedouin community.
  • ...1 more annotation...
  • The re-introduction of the bill is being carried out by the Israeli minister of agriculture, Uri Ariel of the Habayit Hayehudi party (Jewish Home) party. Palestinian Bedouins have compared the forced displacement plan to the U.S. system of ‘reservations’ for the native American population, by which hundreds of thousands of American Indians were forcibly displaced from their homelands in what has since been termed a genocidal colonial operation by the invading European colonists.
Paul Merrell

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
Paul Merrell

Paul Offers NDAA Amendment to Drive Release of 28 Pages | 28Pages.org - 0 views

  • Following through on intentions he announced earlier this week, Senator Rand Paul today offered an amendment to the pending National Defense Authorization Act (NDAA) that would require the president to declassify 28 pages on foreign government links to the 9/11 hijackers. The language is identical to S.1471, the bill Paul introduced on Monday with Senators Ron Wyden and Kirsten Gillibrand. In a story on Paul’s new move, The Hill’s Julian Hattem said the proposed amendment “heightens the profile of the fight and may increase the stakes for the opponents.”
  • While there are a growing number of vocal champions of the declassification of the 28 pages, those who want the 28 pages kept under wraps have worked quietly and effectively out of public view. As we wrote earlier this year, “It’s likely that among the most powerful of those unseen opponents of 9/11 transparency are two strange bedfellows: The Kingdom of Saudi Arabia—which has fueled the growth of terror, and the U.S. intelligence community—which is charged with thwarting terror.” Paul’s amendment to the must-pass NDAA could force some of those opponents—and, more specifically, their Senate allies—out of the shadows.
  • However, the language may also offer President Obama an opportunity to continue his administration’s refusal to release the 28 pages, as it says he is not required to declassify sources and methods if that release would “result in imminent lawless action or comprise presently on-going national security operations.”
  • ...1 more annotation...
  • In 2003, Bush invoked “sources and methods” when defending his decision to classify the pages, saying “Declassification of that part of a 900-page document would reveal sources and methods that would make it harder for us to win the war on terror. … It would help the enemy if they knew our sources and methods.” Among many who have read the 28 pages, Congressman Walter Jones denies that declassification would harm national security in any way, pointing to other motives for the secrecy. “There’s nothing in it about national security. It’s about the Bush administration and its relationship with the Saudis,” Jones told The New Yorker.
Paul Merrell

Secret documents shine light on GCSB spying in Bangladesh - National - NZ Herald News - 0 views

  • Secret documents reveal New Zealand has shared intelligence collected through covert surveillance with Bangladesh despite that country's security forces being implicated in extrajudicial killings, torture and other human rights abuses. The documents shine light on the major role played by the Government Communications Security Bureau (GCSB) in electronic spying operations conducted in the small South Asian nation. The surveillance has been used to aid the United States as part of its global counter-terrorism campaign, launched after the September 11 attacks in 2001. The New Zealand Herald analysed the documents in collaboration with US news website The Intercept, which obtained them from the NSA whistle-blower Edward Snowden.
  • The Bangladesh spying is revealed in an April 2013 US National Security Agency (NSA) report about its relationship with New Zealand. In a section called "What Partner Provides to NSA", it says "GCSB has been the lead for the intelligence community on the Bangladesh CT [Counter-Terrorism] target since 2004." The GCSB provides "one of the key SIGINT [signals intelligence] sources of [Bangladesh counter-terrorism] reporting to the US intelligence community."
  • The intelligence gathered by the GCSB staff was also being forwarded to foreign intelligence agencies, including Bangladesh's state intelligence agency. In recent years, human rights groups have issued several reports documenting Bangladeshi intelligence and security agencies' disregard for international prohibitions on torture and alleged involvement in politically motivated killings. In 2014, a case was filed in the International Criminal Court accusing the Bangladesh Government of committing crimes against humanity. The GCSB's surveillance operations in Bangladesh are among the most surprising and obscure yet revealed. Bangladesh barely registers in New Zealand foreign policy. The Ministry of Foreign Affairs and Trade website says: "Relations between New Zealand and Bangladesh remain friendly, although interaction is limited." Nonetheless, a New Zealand government source told the Herald that Bangladesh is the main focus of one of the GCSB's four analysis sections, called ICT, and has been for over a decade. ICT, the Transnational Issues section, was set up in April 2002 in the wake of the September 11 attacks to focus on terrorism threats.
  • ...5 more annotations...
  • The 2009 document reveals that there is a special collection site in the Bangladesh capital, Dhaka, for eavesdropping on local communications. New Zealand does not have a high commission or any other official building in Bangladesh in which to hide a covert listening post. The Snowden documents suggest the Dhaka unit may be located inside a US-controlled building with operations overseen by the NSA and the Central Intelligence Agency (CIA).
  • Green Party co-leader Russel Norman said the spy agency was "dragging" New Zealand into human rights abuses, and the Government should stop providing intelligence assistance to Bangladesh. "All three key anti-terrorism government agencies in Bangladesh have been implicated in horrendous human rights abuses, so it is impossible to guarantee that the information passed on did not lead to innocent people being killed or tortured," Dr Norman said. "John Key has always justified the GCSB on the basis that it is there to protect the good guys, but these documents reveal that it is helping the bad guys.
  • The intelligence gathered by the GCSB staff was being forwarded to foreign intelligence agencies. The April 2013 NSA report said the "GCSB's Bangladesh CT [counter terrorism] reporting provided unique intelligence leads that have enabled successful CT operations by Bangladesh State Intelligence Service, CIA and India over the past year". The specific Bangladesh "State Intelligence Service" referred to is not named in the document. Bangladesh has several agencies that focus on gathering intelligence, primarily including the Directorate General of Forces Intelligence (DGFI), the National Security Intelligence agency (NSI), and the police Special Branch. The lead agency that executes the country's counter-terrorism operations is the Rapid Action Battalion, or RAB. Each of these agencies has been accused of involvement in severe human rights abuses over a sustained number of years. In 2008, for instance, Human Rights Watch alleged that the Special Branch headquarters in Dhaka's Maghbazar neighbourhood was used to torture detainees.
  • In 2010, a trade union activist accused the NSI of arresting, torturing, and threatening to kill him. The same activist was found dead in unexplained circumstances two years later, his toes and feet broken, legs and body battered and bruised, and his legs apparently pierced with a sharp object. Bangladesh's intelligence agencies and main police and security forces co-operate closely. Most notably, they work together as part of a notorious centre called the Taskforce for Interrogation Cell, located inside a compound in northern Dhaka that is controlled by the RAB unit. In 2011, Britain's Guardian newspaper reported the interrogation cell was used as a place to extract information and confessions from "enemies of the state". It was described as a "torture centre" used for "deliberate and systematic" mistreatment of detainees. One British man detained there in 2009 on terrorism-related charges was allegedly hooded and strapped to a chair while a drill was driven into his right shoulder and hip.
  • Other torture methods used by Bangladeshi authorities, according to Human Rights Watch, have included "burning with acid, hammering of nails into toes ... electric shocks, beatings on legs with iron rods, beating with batons on backs after sprinkling sand on them, ice torture, finger piercing, and mock executions". In February last year, the US Government suspended its own support for the RAB, citing "gross violation of human rights" committed by the force's members. The same month, a case against the Bangladesh Government was lodged in the International Criminal Court, accusing the country's officials of waging a brutal campaign of "widespread or systematic" torture, killings, and other human rights abuses that amounted to crimes against humanity.
Paul Merrell

DoJ Creates Special Dept to Deal with Growing Domestic Extremism Threat | nsnbc international - 0 views

  • John Carlin, Department of Justice assistant attorney general and head of the national security division, spoke at George Washington University (GWU) about concerns over mounting threats posed by violent extremists within the US which has prompted the creation of a special counsel position to deal with these issues.
  • Carlin told the audience that “the domestic terrorism counsel would not only help oversee the prosecution of cases but also would develop plans to intervene when the threat of violence is imminent.” The DoJ expressed concern over the “staggeringly broad” threat to national security posed by domestic extremists “motivated by anti-government animus, eco-radicalism and racism have created a new urgency for federal and local law enforcement authorities.” Carlin said: “No single ideology governs hate and extremism. Nevertheless, we see commonalities among those who wish to do us harm. This gives us important information as we shape our deterrence and disruption strategies. Across the spectrum of extremist ideologies, two related traits emerge: first, the prevalence of lone offender attacks that do not require a terrorist network; and second, the increasing number of disaffected people inspired to violence who communicate their hate-filled views over the Internet and through social media.’’
  • The deputy attorney general said: “White supremacists represent the most violent. The Charleston shooter, who had a manifesto laying out a racist worldview, is just one example. His actions followed earlier deadly shooting sprees by white supremacists in Kansas, Wisconsin and elsewhere.’’ Along with white supremacists, Carlin said: “Adherents to the sovereign citizen ideology believe they don’t have to answer to any government authority, including courts, taxing entities or law enforcement. And although most sovereign citizens peacefully espouse these views, some sovereign citizen extremists resort to violence.’’ Foundational concerns about domestic terrorism can be found in the 2010 report Rightwing Extremism, wherein domestic extremists, particularly white supremacists, were proposed to be the newest and most dangerous threat to the US since al-Qaeda.
  •  
    To get a glimmer of just how ridiculous this DoJ initiative is, skim http://www.washingtonsblog.com/2014/08/youre-nine-times-likely-killed-police-officer-terrorist.html Talk about misplaced priorities. 
Joseph Skues

Single-Payer Health Insurance - 0 views

  • Yes, it is. And here's why.
  • Justice
  • common defence
  • ...38 more annotations...
  • Welfare,
  • Tranquility,
  • Posterity
  • Blessings of Liberty
  • general Welfare
  • common Defence
  • "health, happiness, or prosperity; well-being" of "We the People".
  • 45,000 deaths annually
  • necessary to prevent system failure
  • are capitalized to emphasize their importance
  • defense" was not capitalized.
  • which would take the profit motive that insurance corporations have to deny coverage & claims out of the system
  • defines our political system, which is a different thing entirely
  • they have never believed in democracy as noted at The Conservative Mind
  • With only 4 decades of testing America simply cannot afford to join this dangerous experiment
  • In comments they show their obvious ignorance
  • Welfare
  • 40 percent higher death risk than privately insured counterparts
  • up from a 25 percent excess death rate found in 1993. ...
  • David Frum, a "conservative", refused to acknowledge the Harvard University
  • Don't like a result? Ignore it.
  • not implementing single-payer health insurance
  • mass murder.
  • makes our economy less competitive
  • discourages U.S. innovation,
  • twice as much per capita
  • obscene
  • bankrupts
  • leads to the deaths of 100,000 persons/year
  • because the U.S. system isn't as good as that of France.
  • A "public option"
  • doesn't go far enoug
  • The only workable approach is a single-payer health insurance system ... a "Medicare for All" system.
  • scrap a privatized health insurance system that does not work
  • It's pragmatic. See Health Care Dynamics.
  • The California Nurses Association understands
  • t's a useless industry
  • US Healthcare History: Our Very Own Killing Fields
Paul Merrell

Alt Thai News Network ATNN : Thailand: Next Anti-Regime Rally - January 13, 2014 - 0 views

  • In protest of unelected dictator Thaksin Shinawatra and his proxy regime led by his own nepotist-appointed sister Yingluck Shinawatra, anti-regime protesters plan to shut down Thailand's capital of Bangkok starting on Monday, January 13, 2014.  The necessity of continued mass mobilizations is due in part to the current regime's immense foreign backing - including across the West's mass media who continue to claim Thaksin Shinawatra's rule is legitimate despite him being a convicted criminal hiding abroad and openly running the country through a series of nepotist proxies which have included both his brother-in-law and now sister. While unthinkable and unacceptable in any other country, news fronts such as the BBC, New York Times, CNN, Reuters, AP, AFP and others insist that this cartoonish, criminal arrangement is somehow representative of "democracy" in Thailand.  The New York Times, despite defending what is by all measures an absurd abuse of the principles of representative governance, would even report in its article titled, "In Thailand, Power Comes With Help From Skype," that:  For the past year and a half, by the party’s own admission, the most important political decisions in this country of 65 million people have been made from abroad, by a former prime minister who has been in self-imposed exile since 2008 to escape corruption charges. 
  • The country’s most famous fugitive,Thaksin Shinawatra, circles the globe in his private jet, chatting with ministers over his dozen cellphones, texting over various social media platforms and reading government documents e-mailed to him from civil servants, party officials say.  It might be described as rule by Skype. Or governance by instant messenger, a way for Mr. Thaksin to help run the country without having to face the warrant for his arrest in a case that many believe is politically motivated. There is no question that an accused mass murderer and convicted criminal hiding abroad from a 2 year jail sentence, multiple arrest warrants, and a long list of pending court cases, is illegally running Thailand by proxy.  Of course, just as a convicted criminal running America or England via Skype would be a laughable prospect entirely unacceptable by Americans or English, likewise, it is unacceptable in Thailand. The sham elections the regime is planning for February 2, 2014 which have Thaksin Shinawatra's sister and brother-in-law once again at the top of the candidate list, have already been boycotted by all opposition parties, leaving the regime alone posting campaign posters along Thailand's roads, reminiscent of scenes of sham elections carried out in North Korea. 
  • Who is Thaksin Shinawatra and Why do People Detest Him?
  •  
    Long list of crimes and sins committed further down in the article. The Thai protest demonstrations have been massive of late. A group of U.S.-based banksters and other corporate interests have been plucking the Thai economy down to bare skin. 
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Supreme Court 1972 - Google Scholar - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

State Department Delays Release of Iran History « LobeLog - 0 views

  • The U.S. Department of State has blocked the publication of a long-awaited documentary history of U.S. covert action in Iran in the 1950s out of concern that its release could adversely affect ongoing negotiations over Iran’s nuclear program. The controversial Iran history volume, part of the official Foreign Relations of the United States (FRUS) series, had been slated for release last summer. (“History of 1953 CIA Covert Action in Iran to be Published,” Secrecy News, April 16, 2014). But senior State Department officials “decided to delay publication because of ongoing negotiations with Iran,” according to the minutes of a September 8, 2014 meeting of the Advisory Committee on Historical Diplomatic Documentation that were posted on the Department of State website this week. Dr. Stephen P. Randolph, the Historian of the State Department, confirmed yesterday that the status of the Iran volume “remains as it was in September” and that no new publication date has been set. The subject was also discussed at an Advisory Committee meeting this week.
  • The suppression of this history has been a source of frustration for decades, at least since the Department published a notorious 1989 volume on U.S. policy towards Iran that made no mention of CIA covert action. But the latest move is also an indirect affirmation of the enduring significance of the withheld records, which date back even further than the U.S. rupture with Cuba that is now on the mend. It seems that the remaining U.S. records of the 1953 coup in Iran are not only of historical interest but they evidently hold the power to move whole countries and to alter the course of events today. Or so the State Department believes. “The logic, as I understand it, is that the release of the volume could aggravate anti-U.S. sentiment in Iran and thereby diminish the prospects of the nuclear negotiations reaching a settlement,” said Prof. Richard H. Immerman, a historian at Temple University and the chair of the State Department Historical Advisory Committee. “I understand the State Department’s caution, but I don’t agree with the position,” he said. “Not only is the 1953 covert action in Iran an open secret, but it was also a motive for taking hostages in 1979. The longer the U.S. withholds the volume, the longer the issue will fester.”
Paul Merrell

CIA Torture Report: Oversight, But No Remedies Yet - 0 views

  • The release of the executive summary of the Senate Intelligence Committee report on CIA’s post-9/11 interrogation program is, among other things, an epic act of record preservation. Numerous CIA records that might not have been disclosed for decades, or ever, were rescued from oblivion by the Senate report and are now indelibly cited and quoted, even if many of them are not yet released in full. That’s not a small thing, since the history of the CIA interrogation program was not a story that the Agency was motivated or equipped to tell. “The CIA informed the Committee that due to CIA record retention policies, the CIA could not produce all CIA email communications requested by the Committee,” the report noted, explaining that the desired information was sometimes recovered from a reply message when the original email was missing. Agency emails turned out to be a critical source of information, a fact that illuminates the Committee’s sharp response recently to the (now suspended) CIA proposal to the National Archives (NARA) to destroy most Agency emails of non-senior officials.
  • Thus, the gruesome record of the waterboarding of al Qaeda operative Abu Zubaydah “was referenced in emails, but was not documented or otherwise noted in CIA cables.” (This is at odds with NARA’s initial view that “It is unlikely that permanent records will be found in these email accounts that is not filed in other appropriate files.”) The Committee report is also a remarkable demonstration of the congressional oversight function that is all the more impressive because it was performed in adverse, unfavorable conditions. It is striking to see how the CIA sometimes treated the Senate Intelligence Committee, its leadership and its staff with the same disdain and evasiveness that is often perceived by FOIA requesters and other members of the public. Committee questions were ignored, inaccurate information was provided, and the oversight process was gamed.
  • “Internal CIA emails include discussion of how the CIA could ‘get… off the hook on the cheap’ regarding [then-Committee] Chairman [Bob] Graham’s requests for additional information…. In the end, CIA officials simply did not respond to Graham’s requests prior to his departure from the Committee in January 2003,” the report said. “I am deeply disturbed by the implications of the study for the committee’s ability to discharge its oversight responsibility,” wrote Sen. Angus King (I-Maine) in his additional remarks. “Because it appears from the study that the committee was continuously misled as to virtually all aspects of this program, it naturally raises the extremely troubling question as to whether we can trust the representations of the agency in connection with difficult or sensitive issues in the future.” But minority members of the Committee disputed this characterization: “In reality, the overall pattern of engagement with the Congress shows that the CIA attempted to keep the Congress informed of its activities,” they wrote in their extensive dissenting views. Perhaps the most important achievement of the Committee report was to document and memorialize the fact that agents of the US Government practiced torture. Not “harsh measures” or “enhanced techniques,” but torture.
  • ...2 more annotations...
  • Senator Susan Collins (R-Maine), who criticized what she said were methodological flaws in the Committee report, said in her additional views that “Despite these significant flaws, the report’s findings lead me to conclude that some detainees were subject to techniques that constituted torture. This inhumane and brutal treatment never should have occurred.” By the same token, the most important omission from the report is the absence of any discussion of remedies. Now that it is firmly established that “we tortured some folks,” as President Obama awkwardly put it, the question is what to do about it. Confession without atonement is incomplete. Prosecution seems problematic for a number of reasons, including the difficulty of localizing responsibility, when it is entire institutions and not just particular officials that failed. A different approach to the problem would start by considering the individuals who suffered abuse at the hands of the U.S. government, including a number of persons who were detained in error. Congress could now ask how some of them (i.e. those who are still alive) could be compensated in some measure for what was wrongly done to them.
  • Several previous efforts to seek remedies for torture were deflected by use of the state secrets privilege. In light of the detailed findings of the Senate Intelligence Committee report, that sort of evasion should be harder to sustain. Congress could accelerate a resolution of the problem with a focused investigation of what potential remedies are now feasible and appropriate.
Paul Merrell

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
Paul Merrell

Will France Repeat US Mistakes after 9/11? | Consortiumnews - 0 views

  • As three suspects in the Charlie Hebdo massacre die in a shootout with French police, the cycle of violence that has engulfed the Mideast again reaches into the West, but the challenge is to learn from U.S. mistakes after 9/11 and address root causes, not react with another round of mindless violence, says ex-CIA analyst Ray McGovern.
  •  
    I'd like to see a law that requires all candidates for Congress to pass a comprehension test after reading this essay. Comprehension, not agreement. But they should not be allowed to plead ignorance on this message. A must-read.
« First ‹ Previous 101 - 120 of 160 Next › Last »
Showing 20 items per page