Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Intercept" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Syria accuses rebels of planning gas attack near Damascus | News , Middle East | THE DAILY STAR - 0 views

  • Syria is charging in a letter to the United Nations that opposition groups are planning a toxic gas attack in a rebel-held area near Damascus so they can then blame it on government security forces. In a letter dated March 25 and circulated by the U.N. this week, Syria's U.N. envoy, Bashar Ja'afari, said his government had intercepted communications between "terrorists" that showed a man named Abu Nadir was secretly distributing gas masks in the rebel-held Jobar area. "The authorities also intercepted another communication between two other terrorists, one of whom is named Abu Jihad," Ja'afari said. "In that communication, Abu Jihad indicates that toxic gas will be used and asked those who are working with him to supply protective masks." Ja'afari said in the letter addressed to U.N. Secretary-General Ban Ki-moon and the U.N. Security Council that this information "confirms that armed terrorist groups are preparing to use toxic gas in Jobar quarter and other areas, in order to accuse the Syrian government of having committed such an act of terrorism."
  • Syrian President Bashar al-Assad agreed to destroy his chemical weapons following global outrage over the large-scale sarin gas attack in Ghouta in August. The gas attack sparked a U.S. threat of military strikes, which was dropped after Assad's pledge to give up chemical arms. But the Syrian government, locked in a three-year-old war with rebels seeking to overthrow Assad, failed to meet a Feb. 5 deadline to move all of its declared chemical substances and precursors, some 1,300 tonnes, out of the country. Syria has since agreed to a new timetable to remove its chemical weapons by late April. Sigrid Kaag, head of the joint Organization for the Prohibition of Chemical Weapons and United Nations mission overseeing the removal of Syria's chemical weapons, is due to brief the Security Council on Thursday. Kaag told Reuters last month that Syria could ship out its remaining chemical weapons within a month and still meet a mid-year target for their final destruction.
  • In a separate letter to Ban and the Security Council, Syria's Ja'afari also warned that "armed terrorist groups continue to threaten and carry out terrorist attacks against chemical weapons facilities and the chemical substances." The senior Western diplomat said: "I don't think there's any evidence that any of the groups have any interest in attacking the convoys ... we don't see that as a major risk." Syria's three-year civil war has killed more than 150,000 people, a third of them civilians, and caused millions to flee.
Paul Merrell

Al Qaeda: The Database | Global Research - 0 views

  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World.
  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.” “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat.
  • ...5 more annotations...
  • “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world. “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World. *       *       * Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
Paul Merrell

New Intel Doc: Do Not Be 'Led Astray' By 'Commonly Understood Definitions' - The Intercept - 0 views

  • New evidence of the intelligence community’s intentionally deceptive use of the English language was released today in the form of a Defense Intelligence Agency document that instructs analysts to use words that do not mean what they appear to mean. The section of the DIA’s “intelligence law handbook” on the “Collection of Information about United States Persons” opens like this: To begin the journey, it is necessary to stop first and adjust your vocabulary. The terms and words used in DoD 5240.1-R have very specific meanings, and it is often the case that one can be led astray by relying on the generic or commonly understood definitions of a particular word. DoD 5240.1-R — entitled “Procedures Governing the Activities of DOD Intelligence Components that Affect United States Persons” – is the Department of Defense document that implements Executive Order 12333, the unilateral presidential directive first signed by President Reagan that authorizes government agencies to covertly sweep up vast amounts of private data from overseas communications. The plainspoken employee handbook was one several documents about Executive Order 12333 the ACLU obtained through a Freedom of Information Act lawsuit and released today. See also today’s Intercept story: “The Ghost of Ronald Reagan Authorizes Most NSA Spying”
  • Here is the handbook explaining how not to be led astray: For example, “collection of information” is defined in the Dictionary of the United States Army Terms (AR 310- 25) as: “The process of gathering information for all available sources and agencies. ” But, for the purposes of DoD 5240 .1-R, information is “collected” – only when it has been received for use by an employee of a DoD intelligence component in the course of his official duties… (and) an employee takes some affirmative action that demonstrates an intent to use or retain the information. So, we see that “collection of information” for DoD 5240.1-R purposes is more than “gathering” – it could be described as “gathering, plus … “. For the purposes of DoD 5240.1-R, “collection” is officially gathering or receiving information, plus an affirmative act in the direction of use or retention of that information.
  • For good measure, there’s this footnote: In addition, data acquired by electronic means is “collected” only when it is processed into intelligible form…;What constitutes an intelligible form may be somewhat problematic. Analysts can even gather information and keep it for up to six months without it counting as having been “collected”, as long as it’s being “held or forwarded to a supervisory authority, solely for the purpose of making a determination about its collectability.” Although the intelligence community’s astonishing abuse of words has been frequently noted, particularly in the context of surveillance, this may be the first time we’ve actually seen an instruction manual.
  • ...1 more annotation...
  • And as it happens, it comes right in the middle of a couple pieces I’m writing about another linguistic perversion, the non-denial denial. (My exegesis of CIA director John Brennan’s latest ran on Friday; more examples from recent history should be out tomorrow.) The intelligence community’s redefinition of terms inspired the ACLU’s Jameel Jaffer and Brett Max Kaufman last year to author a ”lexicon for decoding the true meaning of what NSA officials say” which includes nifty non-intuitive recastings of terms such as surveillance, relevant, targeted, incidental and inadvertent. There’s also a “Guide to the Deceptions, Misinformation, and Word Games Officials Use to Mislead the Public About NSA Surveillance” that Trevor Timm wrote for the Electronic Frontier Foundation, and Mike Masnick’s more tongue in check “NSA-To-English Dictionary” from Techdirt.
Paul Merrell

Glenn Greenwald: how the NSA tampers with US-made internet routers | World news | The Guardian - 0 views

  • The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
  • For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
  • The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products
  • ...3 more annotations...
  • The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: "'If Huawei gets in the middle of US-China relations,' and causes problems, 'it's not worth it'."
  • But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)".Eventually, the implanted device connects back to the NSA. The report continues: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."
  • Warning the world about Chinese surveillance could have been one of the motives behind the US government's claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA's own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
Paul Merrell

David Davis' devastating attack on our loss of privacy | Mail Online - 0 views

  • The last time the main parties got together in a closed room, did a deal and told the country there was a need to act urgently, we were on the edge of abandoning 300 years of press freedom.This time our privacy is under threat. In the name of security, the Government is fast-tracking legislation through Parliament that will allow it to collect huge quantities of our personal data. We would do well to remember the advice of Ben Franklin: ‘Those who would give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety.’
  • The Government has engineered a ‘theatrical emergency’ – in this case terrorism and hidden paedophile rings – to ram the Data Retention and Investigatory Powers Bill through Parliament without proper debate. It is an insult to the supremacy of Parliament, to democracy and to the trust of the public.It was April 8 when the European Court of Justice struck down the Data Retention Directive for being incompatible with human rights. The Home Office has had time to put an alternative in place, so the excuses for why the legislation is being  fast-tracked are laughable.
  • It is a sad state of affairs when European courts are a greater defender of our ancient rights than Parliament and Her Majesty’s Government. Even the German Supreme Court overturned its far less invasive data collection laws for violating the privacy rights of German citizens. How far we have slipped, this birthplace of democracy, that our own judicial safeguards stand by while our hard-fought rights are stripped from us by a Government that has lost its sense of proportion in its fear of making a mistake.
  • ...3 more annotations...
  • Even the statistics already released are cause for concern.  The 2013 report of the Interception of Communications Commissioner revealed that 514,608 requests were made for data. By comparison, the most requests issued by the FBI in a year is 56,507. How can it be our intelligence agencies made nine times the number of requests for communications data than their US counterparts?
  • After the ‘dodgy dossier’ on weapons of mass destruction, the deceit on rendition and torture, and the debacle over the snooper’s charter, it is hard to be confident.Our Government has claimed that intercepted communications data was the critical evidence in 95 per cent of all serious crime cases. This would seem to go against the experience of the Metropolitan Police, which in evidence to a joint committee stated that ‘communications data is used sparingly, because it is costly and resource intensive, and because of the need to… consider the impact of collateral intrusion on innocent people’.
  • What this Government is chasing is not public security, it is protection from blame if anything goes wrong. Those are not the same thing.One person’s loss of freedom is everybody’s loss of freedom, one person’s loss of privacy is everybody’s loss of privacy. We must stand up for our rights and not succumb to the politics of fear. Otherwise we give those who hate our civilisation an easy victory, without a shot being fired.
  •  
    A UK M.P. critiques the full court press in the House of Commons for new legislation attempting to work around the EU Court of Justice ruling on electronic communication data retention laws.  Very nice essay.
Paul Merrell

FINAL - Part II: Evidence Continues to Emerge #MH17 Is a False Flag Operation | No Limit to Our Anger (c) V. M. Molotov - 0 views

  • #15 – Dissecting the Fake Intercept Disseminated by SBU (Ukrainian Security Service) https://www.youtube.com/watch?v=V5E8kDo2n6g Note: Half of the Post Translated; The Remaining Half is Speculative Complete Original of the Post (in Russian) Can Be Found at Eugene-DF LiveJournal In the disseminated Intercept, the place from which the missile was allegedly launched is clearly indicated: the checkpoint at the settlement of Chernukhino. Pay close attention at the Alleged Map of the MH17 Catastrophe.
  • And, so, we have the background. Let’s see how the picture unfolds: The launch is alleged to have been made from Chernukhino. The maximum distance of the launch is 16 kilometres. The aircraft fell between Snezhnoye and Torez. That’s 37 kilometres, which is 20 kilometres more than the maximum possible point at which the plain could have been hit. You know, even a plane with turned-off engines can’t glide like that. But the trouble is that the aircraft was not whole. According to the pattern of the spread of fuselage fragments and bodies, the plane was ruptured practically with the first shot. Here it must be mentioned that the high-explosive/fragmentation warhead of the rocket has a mass of approximately 50 kilograms (by the way, Ukrainians have an outdated modification, which is only 40 kilograms).
  • Overall, that’s not too little; however, it must be understood that it detonates not when it sticks into an airplane, but when it is still at a certain, and fairly significant distance. Moreover, the main strike factor is not the blast wave, but far more significantly – the stream of fragments. These fragments are previously prepared rods (and in the earlier versions – little cubes, if I recall correctly). And yes, for a jet fighter, that, in itself, is more than sufficient. However, here we are dealing with a huge airliner. Yes, one rocket will rip the casing, cause depressurization, and will kill a lot of passengers. But it will not break up the airliner into pieces. Given certain conditions, the pilots may even be able to land it. And, in fact, there have been precedents (to be provided in future posts). For example – the very same An-28, which is alleged to have been the first victim of a BUK system; even though it was done for, but the crew was able to successfully catapult out. Which, in some way, symbolizes. An An-28, by the way, is far smaller than a Boeing.
  • ...15 more annotations...
  • In other words, the rocket caught up to the plane no closer than 25 kilometres away from Chernukhino. Which is absolutely impossible for a BUK system. By the way, we can’t overlook the fact that, at maximum distances, BUK can be used only provided there is support from an external radar installation for location and guiding purposes. In other words, even if a rockets flies far, BUK’s mobile radar does not cover its entire distance.
  • And that is what is so strange here: SBU literally offers evidence that proves that that the Militia had no part in the shooting down of the Boeing! The fact that they blame themselves in the recording is quite understandable. Unlike the fascists, they have a conscience, which takes its toll until you are sure it was not you who did it. Ok. But somebody did, in fact, shoot down the plane? Of course it was shot down. And here we have another question: what if this recording is a falsification through and through? Then it had to have been prepared somehow? And then disseminated? That’s when smoke starts to clear, and mirrors – to break. That’s the problem with tricks.
  • #14 – An Industry Outlet Confirms Carlos (@spainbuca) as ATC at Borispol Airport in Kiev Original: EturboNews (ETN Global Travel Industry News) – July 17, 2014 ETN received information from an air traffic controller in Kiev on Malaysia Airlines flight MH17. This Kiev air traffic controller is a citizen of Spain and was working in the Ukraine. He was taken off duty as a civil air-traffic controller along with other foreigners immediately after a Malaysia Airlines passenger aircraft was shot down over the Eastern Ukraine killing 295 passengers and crew on board. The air traffic controller suggested in a private evaluation and basing it on military sources in Kiev, that the Ukrainian military was behind this shoot down. Radar records were immediately confiscated after it became clear a passenger jet was shot down. Military air traffic controllers in internal communication acknowledged the military was involved, and some military chatter said they did not know where the order to shoot down the plane originated from.
  • Obviously it happened after a series of errors, since the very same plane was escorted by two Ukrainian fighter jets until 3 minutes before it disappeared from radar. Radar screen shots also show an unexplained change of course of the Malaysian Boeing. The change of course took the aircraft directly over the Eastern Ukraine conflict region.
  • #7 – Eyewitness States Two Planes Following MH17, One Of the Craft Shot Down Boeing Video: Father of Eyewitness Tells of the Crash of Boeing MH17 Over Ukraine https://www.youtube.com/watch?v=rPcbFJSGk7E Transcript of the Video Narrator: Who shot it down? Today it was shot down, on [July] 17th. Narrator: Continuing. The village of Grabovo. How was it? What did you son tell you? Father of Eyewitness: Well, they were sitting there, on a hill. And, from behind the clouds … two airplanes were flying … one of the came out from behind the clouds.
  • #12 – Analysis from an Aerodynamics/Physics Standpoint – Ukrainian Army Responsible RESUME OF ANALYSIS: What all this means is that if a BUK rocket was launched from the territory controlled by the Militia, the Boeing would have fallen much further to the south-east – i.e. will into the Russian territory. Otherwise, there would have been not time to detect the aircraft, perform electronic capture and launch the rocket. If this was a BUK, and not a jet fighter, then it is most likely that the launch was made from the territory controlled by the Ukrainian army, and the rocket was sent “chasing after” the airplane.
  • #10 – Eyewitness Recounts a Fighter Jet and 3 Explosions When MH17 Was Shot Down Audio Recording Link: Cassad Net Transcript of the Eyewitness Phone CallI
  • I saw, personally, that there were 3 explosions. The first, the second and the third. So, after the first explosions I went up on the roof and saw that a plane was falling – it was already almost at the ground. There was an explosion, a black cloud, and two parachutists were descending – one was descending on his parachute on the wing. The second was flying down very fast – like a stone. And that is what I saw. However, at that very same moment, a jet fighter was departing in the direction of Debaltsevo. It was over Rassypnoye and was flying toward Debaltsevo. How I understood it.
  • #8 – Ukrainian Military Reports to Poroshenko That Rebels Have Not Captured any BUKs According to Vitaliy Yarema, in an interview to Ukrainskaya Pravda, military officials reported to President Poroshenko immediately after the shooting down of Malaysian Airlines Boeing 777, Flight MH17, that the rebels have not captured any BUK systems from the Ukrainian Armed Forces. This is further confirmed in a statement by the Ukrainian Ministry of Defence, published on June 30, 2014. Further Information: “Militias do not have Ukrainian Buk missile system – Ukraine general prosecutor“ KIEV, July 18. /ITAR-TASS/. Militias in the self-proclaimed Donetsk and Luhansk people’s republics do not have Ukrainian air defense missile systems Buk and S-300 at their disposal, Ukrainian Prosecutor-General Vitaly Yarema told Ukrainian Pravda newspaper on Friday.
  • “After the passenger airliner was downed, the military reported to the president that terrorists do not have our air defense missile systems Buk and S-300,” the general prosecutor said. “These weapons were not seized,” he added. Ukrainian Interior Minister Anton Gerashchenko said on July 17 that the Malaysia Airlines Boeing 777 airliner had been downed by an air defense missile system Buk.
  • According to other rumors, the black box for this crashed Malaysian Airlines flight was taken by Donetsk separatists. A spokesperson for the rebel group said this black box would be sent to the Interstate Aviation Committee headquartered in Moscow. The First Deputy Prime Minister of the self-proclaimed People’s Republic of Donetsk, Andrew Purgin, stated that the flight recorders of the crashed aircraft will be transferred to Moscow for examination. Sources say the Rebel group leadership hopes this would confirm the Ukrainian military actually shot down this aircraft. This was reported by the news agency Interfax-Ukraine. ETN statement: The information in this article is independently confirmed and based on the statement of one airline controller and other tweets received.
  • Narrator: Military planes emerged? Father of Eyewitness: Well, he does not understand. Then, with one shot, they shot down the second. And that’s it. The second plane, he says – with one shot. There was one shot and that’s it. Narrator: And the one that was shot down was the civilian one? … Father of Eyewitness: And two … one fell down, he says, and the second too … I did not bring my phone here, so I can’t call him. [in the background] Ah, he saw a jet fighter … Of course … Narrator: The village of Grabovo, in the Shakhtersk district. One the approaches to Grabovo, it fell. Keep looking for remains. Everything is burning. Aluminum has melted. All the casing.
  • #4 – Possible Alternative Video of MH17, Right Wing on Fire (via Vaughan Fomularo) UPDATE: Dann Peroni (@roamer43) The video “#4 – Possible Alternative Video of MH17, Right Wing on Fire (via Vaughan Fomularo)” shows a clear blue sky, while in all other videos showing the crash site the sky is overcast! Video: Malaysian Airlines plane being shot down LIVE! (July 17 2014) https://www.youtube.com/watch?v=FKIlueJg4cA
  • #2 – Comparing the Form of the Wing in the Video with the Wings of Boeing @gbazov clearly the wings of the plane in the video are not the ones of a Malaysian Boeing 777 pic.twitter.com/oH9L4WjFqF — Crimea&East (@IndependentKrym) July 18, 2014
  • #1 – Video Purporting to be that of MH17 is Actually the Video of An-26 Shot Down Earlier #FLASH #IMPORTANT – THIS —> https://t.co/e0FiVFdAM2 IS NOT #MH17, it’s most likely the An-26 (sound, elevation, form of the wing). PLZ RT. — Gleb Bazov (@gbazov) July 18, 2014
Paul Merrell

Researcher who joked about hacking a jet plane barred from United flight | Ars Technica - 0 views

  • A researcher who specializes in the security of commercial airplanes was barred from a United Airlines flight Saturday, three days after he tweeted a poorly advised joke mid-flight about hacking a key communications system of the plane he was in. Chris Roberts was detained by FBI agents on Wednesday as he was deplaning his United flight, which had just flown from Denver to Syracuse, New York. While on board the flight, he tweeted a joke about taking control of the plane's engine-indicating and crew-alerting system, which provides flight crews with information in real-time about an aircraft's functions, including temperatures of various equipment, fuel flow and quantity, and oil pressure. In the tweet, Roberts jested: "Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? 'PASS OXYGEN ON' Anyone ? :)" FBI agents questioned Roberts for four hours and confiscated his iPad, MacBook Pro, and storage devices.
  •  
    Bruce Schneier's take on this: "But to me, the fascinating part of this story is that a computer was monitoring the Twitter feed and understood the obscure references, alerted a person who figured out who wrote them, researched what flight he was on, and sent an FBI team to the Syracuse airport within a couple of hours. There's some serious surveillance going on. Now, it is possible that Roberts was being specifically monitored. He is already known as a security researcher who is working on avionics hacking. But still..." Some serious surveillance, indeed. And does the FBI have its own social media monitoring program or is this the result of a tip from the NSA, which assuredly does have a social media surveillance capability?  Consider the short time between the post and interception by FBI agents at the airport and all of the steps it takes to accomplish that feat. I come up with a system that is directly harvesting tweets as they are transmitted, not a web crawler. A huge amount of automation to identify the tweet as a potential threat and get it to someone with the vocabulary to understand the message. And another round of automation to get the import of the post to an FBI dispatcher who sends the agents to the airport armed with the information needed to question the tweeter for four hours on an esoteric subject. That's astounding to me.  
Paul Merrell

Anonymous Fearmongering About the Patriot Act from the White House and NYT - The Intercept - 0 views

  • Several of the most extremist provisions of the 2001 Patriot Act are going to expire on June 1 unless Congress reauthorizes them in some form. Obama officials such as Director of National Intelligence James Clapper and new Attorney General Loretta Lynch have been engaged in rank fear-mongering to coerce renewal, warning that we’ll all be “less safe” if these provisions are allowed to “sunset” as originally intended, while invoking classic Cheneyite rhetoric by saying Patriot Act opponents will bear the blame for the next attack. In an interview yesterday with the Intercept, ACLU Deputy Legal Director Jameel Jaffer explained why those scare tactics are outright frivolous. Enter the New York Times. An article this morning by Julie Hirschfeld Davis, in the first paragraph, cites anonymous Obama officials warning that “failing to [strike a deal by the deadline] would suspend crucial domestic surveillance authority at a time of mounting terrorism threats.” Behold the next two paragraphs:
  • “What you’re doing, essentially, is you’re playing national security Russian roulette,” one senior administration official said of allowing the powers to lapse. That prospect appears increasingly likely with the measure, the USA Freedom Act, stalled and lawmakers in their home states and districts during a congressional recess. “We’re in uncharted waters,” another senior member of the administration said at a briefing organized by the White House, where three officials spoke with reporters about the consequences of inaction by Congress. “We have not had to confront addressing the terrorist threat without these authorities, and it’s going to be fraught with unnecessary risk.”
  • Those two paragraphs, courtesy of the Obama White House and the Paper of Record, have it all: the principal weapons that have poisoned post-9/11 political discourse in the U.S.
  •  
    Greenwald takes on the politics of fear.
Paul Merrell

Citizenfour's Laura Poitras suing US government over 'harassment' | Film | The Guardian - 0 views

  • The Oscar-winning documentary film-maker Laura Poitras is suing the US government demanding to know why she has repeatedly been subjected to “Kafkaesque harassment” at airports across the world. Poitras, 51, said she had been held at borders more than 50 times between 2006 and 2012, often for hours at a time. At various times she alleges being told by officials that she was on a “no fly” list, having her electronic equipment confiscated and not returned for 41 days, and being threatened with handcuffs for taking notes. The latter incident took place when she was working on a film about the WikiLeaks founder Julian Assange. Poitras said she was launching the legal action, which demands the release of all documentation held on her tracking, targeting and questioning by agencies over the six year period, following the failure of a 2013 freedom of information request.
  • “I’m filing this lawsuit because the government uses the US border to bypass the rule of law,” said the film-maker in a statement, The Intercept reported. “This simply should not be tolerated in a democracy. I am also filing this suit in support of the countless other less high-profile people who have also been subjected to years of Kafkaesque harassment at the borders. We have a right to know how this system works and why we are targeted.” Poitras has previously said she was placed on the Department of Homeland Security’s watch list in 2006 after returning home to the US following work on My Country, My Country. She says airport security told her officials had assigned her the highest “threat rating” possible, even though she had never been charged with a crime. She was repeatedly stopped until 2012, when the journalist Glenn Greenwald wrote an article about her experiences.
  • Poitras’s reporting on the NSA whistleblower Edward Snowden, along with work by Greenwald, Ewen MacAskill and Barton Gellman contributed to the Pulitzer prize for public service won jointly by the Washington Post and the Guardian in 2014. Her film on Snowden, Citizenfour, won the 2015 Oscar for best documentary. The director is being represented by lawyers from digital-rights advocacy group the Electronic Frontier Foundation. “The well-documented difficulties Ms Poitras experienced while traveling strongly suggest that she was improperly targeted by federal agencies as a result of her journalistic activities,” senior counsel David Sobel told the Intercept. “Those agencies are now attempting to conceal information that would shed light on tactics that appear to have been illegal. We are confident that the court will not condone the government’s attempt to hide its misconduct under a veil of ‘national security.’”
Paul Merrell

TSA Warns of Possible ISIS Attack on U.S. Soil - The Intercept - 0 views

  • The Transportation Security Administration has issued a classified warning about a potential attack by the Islamic State over the weekend against a target in the United States. The Intercept reviewed a notice of the classified alert, which was sent out Friday afternoon by TSA’s Transportation Security Operations Center. A source, who reviewed the classified intelligence warning, described the threat as very general, with no specifics about location or type of attack — just the timing. The alert covers a 48-hour period that began late Friday afternoon. The essence of the warning, according to a source, is that “ISIS plans an attack on U.S. soil.”
  • In response, the TSA deployed its Visible Intermodal Prevention and Response teams, or VIPR for short, to various locations. The VIPR teams have expanded in recent years, moving beyond airports to train stations and other busy transportation sites. The warning appears significant in that it demonstrates that the U.S. intelligence community is now taking seriously the potential of ISIS to attack targets on U.S. soil, something the group has not yet done. ISIS has made broad threats against the United States in the past, but up to now, ISIS attacks on U.S. targets have been limited to Americans in Iraq and Syria. A spokesperson for the National Security Council referred questions to the Department of Homeland Security, which did not immediately respond to a request for comment.
  •  
    Given that ISIL is controlled by the CIA and State Department, what are we to make of this other than practicing the politics of fear?
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global Research - Centre for Research on Globalization - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Paul Merrell

NSA giving 'a lot of thought' to privacy rights of overseas citizens - top lawyer | World news | theguardian.com - 0 views

  • The top lawyer for the US intelligence community and the National Security Agency said on Wednesday that the spy agencies are giving new consideration to the privacy rights of non-Americans in the wake of a diplomatic row over the surveillance of foreign leaders. Speaking at a conference on national security law sponsored by the American Bar Association on Thursday, the general counsel for the office of the director of national intelligence, Robert Litt, said intelligence chiefs were giving "a lot of thought" to the issue. His comments came a day after General Keith Alexander, the NSA director, stated that the spy agency is open to scaling back some of its operations on foreign leaders, following an unfolding diplomatic crisis sparked by revelations that the NSA spied on German chancellor Angela Merkel. 
  • US law provides greater legal protection to those defined as "US persons", which includes American citizens and foreigners living in the US. "On the issue of US person versus non-US person, that’s an issue we’re giving a lot of thought to now,” said Litt. “It’s not surprising that the law gives more protections to US citizens or persons who are in this country,” Litt added. “That doesn’t mean that we have no protection for non-US persons, and the principal protection we have is the requirement that the collection, retention and dissemination of information has to be for a valid foreign intelligence purpose.” Litt said the intelligence agencies were “giving some thought to whether there are ways that we can both introduce a little more rigor into that requirement and perhaps a little more transparency into how we enforce that requirement.” Litt and NSA general counsel Rajesh De would not answer a question from the Guardian about the legal basis for a different, unfolding NSA controversy: the new allegation that the NSA intercepts data transiting between the foreign data centers of Google and Yahoo, two longtime NSA partners, published in the Washington Post.
  • But De took issue with a suggestion that the Post story prompted that the NSA interception would at times rely on a seminal executive order that defines basic powers and operations of the intelligence agencies, known as Executive Order 12333, rather than the relatively restrictive Foreign Intelligence Surveillance Act, or Fisa. “The implication, the insinuation, the suggestion or the outright statement that an agency like NSA would use authority under Executive Order 12333 to evade, skirt or go around Fisa is simply inaccurate,” De said. On Tuesday, the director of national intelligence, James Clapper, testified to the House intelligence panel that they considered US corporations to be “US persons,” meaning their communications and associated data enjoyed legal privileges associated with citizenship. But neither Litt nor De would explain whether that category protected communications data transiting between the data centers of US companies.
  • ...2 more annotations...
  • Both Litt and De spoke hours before the Senate intelligence committee was due to begin a second day of considering chairwoman Dianne Feinstein’s proposal to increase transparency around the NSA’s surveillance activities. A Tuesday afternoon markup session of the bill – whose text is not yet public – went uncompleted. Feinstein, previously an unequivocal supporter of the NSA, unexpectedly criticized the agency’s surveillance on foreign leaders, a relatively traditional surveillance function. Feinstein on Monday declared herself “totally opposed” to the collection and suggested her oversight committee was not “fully informed” of the practice. A similar rift has emerged between NSA and the White House over how much President Obama knew about the spying, which US officials have said does not currently take place and will not resume. Litt appeared to concede that Obama himself may not have known about spying on Merkel, but contended that the White House and Senate intelligence committee had all the information necessary to understand it was taking place.
  • “I completely disagree with the proposition that the fact that the president and the chairman of the Senate intelligence committee didn’t know every single one of these selectors the NSA was tasking means there is ineffective oversight,” Litt said. “What the president knew and what the Senate intelligence committee knows: they know what our intelligence priorities are. Those are set annually through the interagency process. That says, here’s the kind of information we need to collect. And that gets sent out to the intelligence community and then the intelligence community, through a process that works down through the ranks, figures out what’s the best way to select that. “It’s very easy in hindsight to say, well, this particular selector was sensitive and so the president should have been told that,” Litt continued. “That’s always true in hindsight. Virtually everything we do, if it comes out, is going to be embarrassing.”
  •  
    So if they're not relying on either FISA or EO 12333, are they simply ignoring any legal restraints on the Agency? It's interesting that the NSA house of cards only crumbled with the announcement of spying on 35 foreign national leaders. Personally, I'd vote for putting the leader of every nation in a glass house, butt naked, and able to communicate with others only through a loudspeaker/broadcast system audible to everyone in the world. Secrecy in government is the problem, not a solution. 
Paul Merrell

Apple, Facebook and Google call for 'substantial' reform of NSA surveillance | Technology | theguardian.com - 0 views

  • Tech giants including Apple, Facebook and Google called for substantial reforms to the US government's surveillance programmes Thursday in a letter to the Senate judiciary committee.In the wake of more revelations about the lengths to which the National Security Agency has gone to intercept data, the companies have called for more transparency and "substantial enhancements to privacy protections and appropriate oversight and accountability mechanisms for those programs."The letter, also signed by AOL, Microsoft and Yahoo, follows the release of more documents obtained by former NSA contractor Edward Snowden that reveal the US authorities were secretly tapping in to the tech firm's main communications links.The letter "applauds" the USA Freedom Act, a bill sponsored by Democrat senator Patrick Leahy and Republican congressman James Sensenbrenner that would end the bulk collection of data from millions of Americans and set up a privacy advocate to monitor the Fisa court, which oversees the NSA's US activities.
  • In a recent report the Information Technology and Innovation Foundation (ITIF) said the US tech firms could end up losing out on tens of billions of dollars in the cloud-based computing space in the wake of Snowden's revelations. Cloud computing is a rapidly growing area and revelations that the US authorities have been scooping up the personal data of millions of users, particularly outside the US, could cost them business."On the low end, US cloud computing providers might lose $21.5bn over the next three years," ITIF concluded. On the high end the report put the figure at $35bn.
Paul Merrell

NSA's Mideast spying 'intense' amid regional upheaval, say experts - Alarabiya.net English | Front Page - 0 views

  • Leaked documents disclosed earlier this week revealed that the U.S. National Security Agency intercepted 125 billion phone calls and SMS messages in January 2013, many of them originating in the Middle East. The NSA’s attention on the Middle East and the surrounding region is far more “intense than anything comparable in Europe,” according to Matthew Aid, a Washington, DC-based intelligence historian and expert. Strained relations between the United States and Saudi Arabia over resolving the Syrian conflict could be a possible reason for the NSA’s particularly large targeting of Saudi Arabia - over 7.8 billion times in one month – said Aid. Saudi-U.S. tension may have also resulted in Obama’s administration being “quite curious” over the kingdom’s thoughts on Syria, as the countries have consistently disagreed on the issue.
  • Aid, who in 2009 published a history on the NSA entitled “The Secret Sentry: The Untold History of the National Security Agency,” said that most of the former NSA contractor Edward Snowden’s leaks have not focused on the agency’s surveillance in the Middle East. “We’re waiting for that shoe to drop, but it hasn’t,” Aid told Al Arabiya News, stating that leaks by Snowden’s associates have been largely focused “on those countries which will generate immediate reaction in the press and from the governments in question.” Saudi Arabia and Iraq witnessed 7.8 billion wiretapping incidents from the NSA each, while Egypt and Jordan saw 1.8 billion and 1.6 billion respectively, according to Cryptome, a digital library that publishes leaked documents. Additionally, over 1.7 billion wiretapping incidents were recorded in Iran.
  • Commenting on the leaked data, Wesley Wark, a Canada-based global intelligence expert and professor at the University of Ottawa, said that a great majority of the NSA’s vast collection of intercepted data in the region would go unheard.
  • ...2 more annotations...
  • However, the likelihood of the NSA continuing to covertly mine such vast amounts of a possibly valueless data is low, according to Wark. He suspects that the NSA is beginning to confront a “moment of change,” due to internal political pressure in the United States, international outrage, and a possible conclusion drawn from all this that “building haystacks is not the way to find needles.”
  • Aid notes that leaks published on Cryptome do not contain any information on many countries in the Arab region, including Syria, Kuwait, Bahrain, and Qatar. “We’re missing some important parts of the puzzle,” he said. According to Aid, Snowden’s leaks show to a fuller extent the level of U.S. spying in the region. “There’s a lot more to be said [concerning the NSA’s clandestine operations in the Middle East] contained in the Snowden papers, it just hasn’t come out,” he said.
Paul Merrell

NSA Issues Non-Denial Denial Of Infiltrating Google & Yahoo's Networks | Techdirt - 0 views

  • While NSA boss Keith Alexander issued a misleading denial of this morning's report of how the NSA has infiltrated Yahoo and Google's networks by hacking into their private network connections between datacenters, the NSA has now come out with its official statement which is yet another typical non-denial denial. They deny things that weren't quite said while refusing to address the actual point:
  • Note what is missing from all of this. They do not deny hacking into the data center connection lines outside of the US. They do not deny getting access to all that data, especially on non-US persons. As for the claim that they're protecting the privacy of US persons, previous statements from Robert Litt, the general counsel for the Office of the Director of National Intelligence, have already made it clear that if they collect info on Americans, they're going to use this loophole to search them: "If we're validly targeting foreigners and we happen to collect communications of Americans, we don't have to close our eyes to that," Litt said. "I'm not aware of other situations where once we have lawfully collected information, we have to go back and get a warrant to look at the information we've already collected."
  • So, for all the claims that this kind of information will be "minimized," it certainly looks like they've already admitted they don't do that. Meanwhile, that Guardian article that has the NSA's response also has responses from the 3 other players in this drama. There's the UK's GCHQ, who apparently has partnered with the NSA in breaking into Google and Yahoo. It didn't want to say a damn thing: "We are aware of the story but we don't have any comment."
  • ...2 more annotations...
  • Google, however, was reasonably furious about this story. In a statement, Google's chief legal officer, David Drummond, said the company was "outraged" by the latest revelations. "We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide," he said. "We do not provide any government, including the US government, with access to our systems. We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform."
  • Yahoo's response, unfortunately, was a lot more restrained and not particularly on point. "We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency." Yeah, but the story is how the NSA got around your security. Yahoo should be a lot angrier about this. One hopes that once the technical people talk to management, the company will realize just how bad this situation is. Hopefully, this means that Google and Yahoo will stop just focusing on getting more "transparency" out of the government concerning NSA surveillance, and will start taking a much more active role. This includes: (1) pushing back hard against government surveillance, including going to court to stop it and (2) building much more secure systems that cannot be easily compromised by the NSA.
Paul Merrell

France Targeted by NSA Spies and Parliament Passes Surveillance Law - 0 views

  • On Wednesday, France woke up to find that the National Security Agency had been snooping on the phones of its last three presidents. Top-secret documents provided by WikiLeaks to two media outlets, Mediapart and Libération, showed that the NSA had access to confidential conversations of France’s highest ranking officials, including the country’s current president, François Hollande; the prime minister in 2012, Jean-Marc Ayrault; and former presidents Nicolas Sarkozy and Jacques Chirac. Yet also today, the lower house of France’s legislature, the National Assembly, passed a sweeping surveillance law. The law provides a new framework for the country’s intelligence agencies to expand their surveillance activities. Opponents of the law were quick to mock the government for vigorously protesting being surveilled by one of the country’s closest allies while passing a law that gives its own intelligence services vast powers with what its opponents regard as little oversight. But for those who support the new law, the new revelations of NSA spying showed the urgent need to update the tools available to France’s spies.
  • The response from the French government today was firm but predictable. Senior intelligence officials will travel to the U.S. to meet their counterparts in Washington, while the U.S. ambassador in Paris was summoned to the Elysee Palace. A similar scenario played out in 2013, when Le Monde published Snowden documents that revealed some of the extent of American surveillance in France. Prime Minister Manuel Valls said today that he wants a “code of conduct” to guide the relationship between France and the U.S. on intelligence activities — but the government demanded the exact same thing almost two years ago. When The Intercept published NSA documents in March indicating the Five Eyes — the NSA’s core allies — were Intercepting large swaths of internet traffic in France’s Pacific islands, an official protest from France was nowhere to be heard. Even when it appeared that France’s closest ally, Germany, was using its surveillance capabilities to spy, on behalf of the NSA, on France’s foreign affairs ministry and some of the country’s most strategic companies, French authorities remained silent.
  • Until the law was passed, France’s intelligence services operated almost without any laws to regulate them. Although the new law delivers a much-needed framework, its safeguards are regarded by many critics as insufficient. The powers of the oversight body in charge of the intelligence agencies have been slightly strengthened and it will be possible, if a citizen suspects she is being surveilled, to take her case before the Conseil d’Etat, France’s highest court. But other parts of the law have drawn controversy, including the way it defines the purposes the government can invoke to surveil French residents. The categories extend well beyond terrorism. Many opponents of the law think these guidelines are so broad that they could enable political surveillance. But the key point of disagreement is what the government calls “black boxes.” The law allows the use of government equipment inside Internet Service Providers and large web companies to analyze streams of metadata and find “terrorist” patterns and behaviors.
  • ...1 more annotation...
  • The country’s intelligence community got everything it wanted — almost. An amendment that would remove any oversight of surveillance of foreigners, targeting chief executives and foreign spies, had been demanded by France’s top spy, Bernard Bajolet, the director general of external security, during a hearing at the National Assembly a few weeks ago, but the government opposed it and managed to get rid of it before the final vote. Yet, the government added a last minute amendment that tears to pieces the meager whistleblower protection the bill was supposed to set up. The end result is that most of what France’s intelligence services have been doing in the dark is now authorized by law.
Paul Merrell

GCHQ spied on Amnesty International, tribunal tells group in email | UK news | The Guardian - 0 views

  • The government’s electronic eavesdropping agency GCHQ spied illegally on Amnesty International, according to the tribunal responsible for handling complaints against the intelligence services. Confirmation that surveillance took place emerged late on Wednesday, when the human rights group revealed that the Investigatory Powers Tribunal (IPT) sent it an email correcting an earlier judgment. The extraordinary revision of a key detail in the ruling given on 22 June may alarm many supporters of Amnesty, who will want to know why it has been targeted.
  • In the original judgment, the IPT said that communications by the Egyptian Initiative for Personal Rights and the South African non-profit Legal Resources Centre had been illegally retained and examined. In the email sent on Wednesday, the tribunal made it clear that it was Amnesty and not the Egyptian organisation that had been spied on – as well as the Legal Resources Centre in South Africa. The breach of surveillance powers, under the Regulation of Investigatory Powers Act, related to retaining databases for longer than was permitted. Amnesty had been one of the claimants in the case, but in the original judgment the IPT made “no determination” on the organisation’s complaint – implying that either their emails and phone calls were not intercepted or that they were intercepted but by legal means.
Paul Merrell

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
Paul Merrell

Eurasian emporium or nuclear war?: Pepe Escobar | Asia Times - 0 views

  • A high-level European diplomatic source has confirmed to Asia Times that German chancellor Angela Merkel’s government has vigorously approached Beijing in an effort to disrupt its multi-front strategic partnership with Russia. Beijing won’t necessarily listen to this political gesture from Berlin, as China is tuning the strings on its pan-Eurasian New Silk Road project, which implies close trade/commerce/business ties with both Germany and Russia. The German gambit reveals yet more pressure by hawkish sectors of the U.S. government who are intent on targeting and encircling Russia. For all the talk about Merkel’s outrage over the U.S. National Security Agency’s tapping shenanigans, the chancellor walks Washington’s walk.  Real “outrage” means nothing unless she unilaterally ends sanctions on Russia. In the absence of such a response by Merkel, we’re in the realm of good guy-bad guy negotiating tactics.
  • The bottom line is that Washington cannot possibly tolerate a close Germany-Russia trade/political relationship, as it directly threatens its hegemony in the Empire of Chaos. Thus, the whole Ukraine tragedy has absolutely nothing to do with human rights or the sanctity of borders. NATO ripped Kosovo away from Yugoslavia-Serbia without even bothering to hold a vote, such as the one that took place in Crimea.
  • In parallel, another fascinating gambit is developing. Some sectors of U.S. Think Tankland – with their cozy CIA ties – are now hedging their bets about Cold War 2.0, out of fear that they have misjudged what really happens on the geopolitical chessboard. I’ve just returned from Moscow, and there’s a feeling the Federal Security Bureau and Russian military intelligence are increasingly fed up with the endless stream of Washington/NATO provocations – from the Baltics to Central Asia, from Poland to Romania, from Azerbaijan to Turkey. This is an extensive but still only partial summary of what’s seen all across Russia as an existential threat: Washington/NATO’s intent to block Russia’s Eurasian trade and development; destroy its defense perimeter; and entice it into a shooting war. A shooting war is not exactly a brilliant idea. Russia’s S-500 anti-missile missiles and anti-aircraft missiles can intercept any existing ICBM, cruise missile or aircraft. S-500s travel at 15,480 miles an hour; reach an altitude of 115 miles; travel horizontally 2,174 miles; and can intercept up to ten incoming missiles. They simply cannot be stopped by any American anti-missile system.
  • ...5 more annotations...
  • Some on the U.S. side say  the  S-500 system is being rolled out in a crash program, as an American intel source told Asia Times. There’s been no Russian confirmation. Officially, Moscow says the system is slated to be rolled out in 2017. End result, now or later: it will seal Russian airspace. It’s easy to draw the necessary conclusions. That makes the Obama administration’s “policy” of promoting war hysteria, coupled with unleashing a sanction, ruble and oil war against Russia, the work of a bunch of sub-zoology specimens. Some adults in the EU have already seen the writing on the (nuclear) wall. NATO’s conventional defenses are a joke. Any military buildup – as it’s happening now – is also a joke, as it could be demolished by the 5,000 tactical nuclear weapons Moscow would be able to use.
  • Of course it takes time to turn the current Cold War 2.0 mindset around, but there are indications the Masters of the Universe are listening – as this essay shows. Call it the first (public) break in the ice. Let’s assume Russia decided to mobilize five million troops, and switch to military production. The “West” would back down to an entente cordiale in a flash. And let’s assume Moscow decided to confiscate what remains of dodgy oligarch wealth. Vladimir Putin’s approval rate – which is not exactly shabby as it stands – would soar to at least 98%. Putin has been quite restrained so far. And still his childishly hysterical demonization persists. It’s a non-stop escalation scenario. Color revolutions. The Maidan coup. Sanctions; “evil” Hitler/Putin; Ukraine to enter NATO; NATO bases all over. And yet reality – as in the Crimean counter coup, and the battlefield victories by the armies of the People’s Republics of Donetsk and Lugansk – has derailed the most elaborate U.S. State Department/NATO plans. On top of it Merkel and France’s Francois Hollande were forced into an entente cordiale with Russia – on Minsk 2 – because they knew that would be the only way to stop Washington from further weaponizing Kiev.
  • Putin is essentially committed to a very complex preservation/flowering process of Russia’s history and culture, with overtones of pan-Slavism and Eurasianism. Comparing him to Hitler does not even qualify as a kindergarten prank. Yet don’t expect Washington neo-cons to understand Russian history or culture. Most of them would not even survive a Q&A on their beloved heroes Leo Strauss and Carl Schmitt. Moreover, their anti-intellectualism and exceptionalist arrogance creates only a privileged space for undiluted bullying. A U.S. academic, one of my sources, sent a letter to Nancy Pelosi copied to a notorious neo-con, the husband of Victoria, the Queen of Nulandistan. Here’s the neo-con’s response, via his Brookings Institution email: “Why don’t you go (expletive deleted)  yourself?” Yet another graphic case of husband and wife deserving each other.
  • At least there seem to be sound IQs in the Beltway driven to combat the neo-con cell inside the State Department, the neo-con infested editorial pages of the Wall Street Journal and the Washington Post, an array of think tanks, and of course NATO, whose current military leader, Gen. Breedlove/Breedhate, is working hard on his post-mod impersonation of Dr. Strangelove. Russian “aggression” is a myth. Moscow’s strategy, so far, has been pure self-defense. Moscow in a flash will strongly advance a strategic cooperation with the West if the West understands Russia’s security interests. If those are violated – as in provoking the bear – the bear will respond. A minimum understanding of history reveals that the bear knows one or two things about enduring suffering. It simply won’t collapse – or melt away.
  • Meanwhile, another myth has also been debunked: That sanctions would badly hurt Russia’s exports and trade surpluses. Of course there was hurt, but bearable. Russia enjoys a wealth of raw materials and massive internal production capability – enough to meet the bulk of internal demand. So we’re back to the EU, Russia and China, and everyone in between, all joining the greatest trade emporium in history across the whole of Eurasia. That’s what Putin proposed in Germany a few years ago, and that’s what the Chinese are already doing. And what do the neo-cons propose? A nuclear war on European soil.
  •  
    Merkel is in a poor position to break up Russia-China relations, having blown up the South Stream Pipeline project and playing the U.S. lapdog role on sanctions against Russia, which drove Russia into China's arms. China has been happily switching from Gulf Coast oil supply lines to Russian, given that the U.S. is busily blowing up the Middle East. Moreover, neither Merkel nor the Saudis bring anything to the China de-dollarization play while Russia does.   Follow the link from "This" to see what has Pepe Escobar so freaked out. The U.S. War Party is going nuts with their Cold War 2.0. 
Paul Merrell

Lobbyists for Spies Appointed To Oversee Spying - The Intercept - 0 views

  • Who’s keeping watch of the National Security Agency? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders. A wave of recent appointments has placed intelligence industry insiders into key Congressional roles overseeing intelligence gathering. The influx of insiders is particularly alarming because lawmakers in Washington are set to take up a series of sensitive surveillance and intelligence issues this year, from reform of the Patriot Act to far-reaching “information sharing” legislation.
  • Who’s keeping watch of the National Security Agency? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders. A wave of recent appointments has placed intelligence industry insiders into key Congressional roles overseeing intelligence gathering. The influx of insiders is particularly alarming because lawmakers in Washington are set to take up a series of sensitive surveillance and intelligence issues this year, from reform of the Patriot Act to far-reaching “information sharing” legislation. After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a “two-tiered” system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members, even those who have asked for specific information relating to pending legislation.
  • The Intercept reviewed the new gatekeepers in Congress, the leading staffers on the committees overseeing intelligence and surveillance matters, and found a large number of lobbyists and consultants passing through the revolving door between the intelligence community and the watchdogs who purportedly oversee the intelligence community. We reached out to each of them earlier this week and have yet to hear back:
« First ‹ Previous 121 - 140 of 373 Next › Last »
Showing 20 items per page