Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "UK-government" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Brazilian president Rousseff: US surveillance a 'breach of international law' | World news | The Guardian - 0 views

  • Brazil's president, Dilma Rousseff, has launched a blistering attack on US espionage at the UN general assembly, accusing the NSA of violating international law by its indiscriminate collection of personal information of Brazilian citizens and economic espionage targeted on the country's strategic industries.Rousseff's angry speech was a direct challenge to President Barack Obama, who was waiting in the wings to deliver his own address to the UN general assembly, and represented the most serious diplomatic fallout to date from the revelations by former NSA contractor Edward Snowden.
  • Washington's efforts to smooth over Brazilian outrage over NSA espionage have so far been rebuffed by Rousseff, who has proposed that Brazil build its own internet infrastructure."Friendly governments and societies that seek to build a true strategic partnership, as in our case, cannot allow recurring illegal actions to take place as if they were normal. They are unacceptable," she said."The arguments that the illegal interception of information and data aims at protecting nations against terrorism cannot be sustained. Brazil, Mr President, knows how to protect itself. We reject, fight and do not harbour terrorist groups," Rousseff said."As many other Latin Americans, I fought against authoritarianism and censorship and I cannot but defend, in an uncompromising fashion, the right to privacy of individuals and the sovereignty of my country," the Brazilian president said. She was imprisoned and tortured for her role in a guerilla movement opposed to Brazil's military dictatorship in the 1970s."In the absence of the right to privacy, there can be no true freedom of expression and opinion, and therefore no effective democracy. In the absence of the respect for sovereignty, there is no basis for the relationship among nations."
  •  
    We should never lose sight of the fact that every time the NSA intercepts a message from a foreign nation, it violates the civil and criminal laws of that nation. The NSA and its staff are serial criminals, not patriots. The Balkanization of the Internet into a non-net of local area networks to protect nations' citizen rights from NSA voyeurs is all too predictable. This will be their legacy unless we can stop them.
Paul Merrell

NSA spied on Indian embassy and UN mission, Edward Snowden files reveal | World news | theguardian.com - 0 views

  • The US National Security Agency may have accessed computers within the Indian embassy in Washington and mission at the United Nations in New York as part of a huge clandestine effort to mine electronic data held by its south Asian ally.Documents released by the US whistleblower Edward Snowden also reveal the extent and aggressive nature of other NSA datamining exercises targeting India as recently as March of this year.The latest revelations – published in the Hindu newspaper – came as Manmohan Singh, the Indian prime minister, flew to Europe on his way to the US, where he will meet President Barack Obama.The NSA operation targeting India used two datamining tools, Boundless Informant and Prism, a system allowing the agency easy access to the personal information of non-US nationals from the databases of some of the world's biggest tech companies, including Apple, Google, Microsoft and Yahoo.
  • The largest amount of intelligence was gathered from Iran, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America's closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn.
  • According to one document obtained by the Hindu, the US agency used the Prism programme to gather information on India's domestic politics and the country's strategic and commercial interests, specifically categories designated as nuclear, space and politics.
  • ...3 more annotations...
  • A further NSA document obtained by the Hindu suggests the agency selected the office of India's mission at the UN in New York and the country's Washington embassy as "location targets" where records of Internet traffic, emails, telephone and office conversations – and even official documents stored digitally – could potentially be accessed after programs had been clandestinely inserted into computers.In March 2013, the NSA collected 6.3bn pieces of information from internet networks in India and 6.2bn pieces of information from the country's telephone networks during the same period, the Hindu said.After the Guardian reported in June that Pm program allowed the NSA "to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders", both US and Indian officials claimed no content was being taken from the country's networks and that the programs were intended to aid "counter-terrorism".
  • A home ministry official told the newspaper the government had been "rattled" to discover the extent of the the programme's interest in India. "It's not just violation of our sovereignty, it's a complete intrusion into our decision-making process," the official said.
  • The Hindu argued that "the targeting of India's politics and space programme by the NSA busts the myth of close strategic partnership between India and US", pointing out that the other countries targeted in the same way as India "are generally seen as adversarial" by Washington.
  •  
    An important bit of proof that NSA digital surveillance involves far more than counter-terrorism. 
Paul Merrell

BBC News - Google and Facebook can be legally intercepted, says UK spy boss - 0 views

  • UK intelligence service GCHQ can legally snoop on British use of Google, Facebook and web-based email without specific warrants because the firms are based abroad, the government has said. Classed as "external communications", such activity can be covered by a broad warrant and intercepted without extra clearance, spy boss Charles Farr said. The policy was revealed as part of a legal battle with campaign group Privacy International (PI). PI labelled the policy "patronising".
  • Charles Farr, director general of the Office for Security and Counter-Terrorism, told PI that Facebook, Twitter, YouTube and web searches on Google - as well as webmail services such as Hotmail and Yahoo - were classified as "external communications", which meant they could be intercepted without the need for additional legal clearance. Internal communications between citizens can only be intercepted when a targeted warrant is issued. Warrants must be signed by a minister and can only be issued when there is suspicion of illegal activity. But when someone searches for something on Google or posts on Facebook they are sending information overseas - constituting an act of external communication that could be collected under a broader warrant which does not need to be signed by a minister, explained Mr Farr in a 48-page written statement.
  • However, he said data collected in this way "cannot be read, looked at or listened to" except in strictly limited circumstances. Mr Farr said there was a "significant distinction" between intercepting material and a person actually reading, looking at or listening it.
  •  
    Well, that should ratchet up the controversy scale in the UK a bit. :-) 
Paul Merrell

Britain's Trident nuclear program at stake in Scottish independence vote - The Washington Post - 0 views

  • For decades, Britain’s contribution to the threat of global Armageddon has found a home on the tranquil shores of Gare Loch, where soaring green mountains plunge into murky gray waters plied by sporty kayakers, weekend yachtsmen — and nuclear-armed submarines.
  • But if Scotland votes “yes” in an independence referendum next month, the submarines could ­become nuclear-armed nomads, without a port to call home. Washington’s closest and most important ally could, in turn, be left without the ultimate deterrent, even as Europe’s borders are being rattled anew by a resurgent Russia. Former NATO secretary general George Robertson, a Scotsman, said in a speech in Washington earlier this year that a vote for independence would be “cataclysmic” for Western security, and that ejecting the nuclear submarines from Scotland would amount to “disarming the remainder of the United Kingdom.” The pro-independence campaign promptly accused Robertson of hyperbolic scaremongering. But the possibility that Britain could become the only permanent member of the U.N. Security Council without a nuclear deterrent underscores just how much is at stake far beyond these silent bays and verdant ridgelines when Scotland’s 5 million residents go to the polls Sept. 18.
  • Leaders of Scotland’s secessionist movement say their independent nation would be a nuclear-free zone within four years of breaking off from Great Britain. The vow is a popular one among the movement’s left-leaning voters, and the campaign has distributed fliers with instructions for “how to disarm a nuclear bomb” that begin and end with voting for independence. At the moment, that argument is losing out to those who advocate sticking with the United Kingdom — and with nuclear weapons. Polls show an approximate 10-point advantage for the unionist camp.
  • ...2 more annotations...
  • But with a substantial share of voters undecided, U.K. officials remain nervous that Scotland could bolt — and that the nuclear program could be a casualty. The possibility provides an uncomfortable backdrop for the NATO summit that Britain will host in Wales on Sept. 4 and 5.
  • Building suitable bases to house the missiles and dock the subs in England would take at least a decade, experts say, and cost billions of dollars that the government doesn’t have. O’Brien said it’s likely that Britain would decide to scrap its nuclear program rather than make painful cuts elsewhere.
  •  
    Interesting. Can't say that I'd shed any tears over British disarmament, or global disarmament for that matter.   But note that the article says UK has 255 warheads, with 160 of them deployed on Trident missiles. That makes it 95 warheads unaccounted for by the article. In storage somewhere, or deployable by aircraft?  According to Wikipedia, the Panavia Tornado fighter-bombers in the UK air force are cable of delivering air-dropped nuclear weapons. . 
Paul Merrell

Back Door Access? Tech Giants Deny Knowledge of PRISM Spy Operation - 0 views

  • As the dust settles on yesterday evening's revelation that the U.S. government has been mining data from most of Silicon Valley's largest companies in a program called "PRISM," one question stands out: How did the NSA get access? Apple, Google, Yahoo! and Microsoft, the largest companies involved in PRISM, the existence of which was revealed last night in a simultaneous Washington Post and Guardian scoop, have categorically denied knowledge of or participation in the program in a series of statements, while acknowledging that they do provide targeted access to the government when required to do so by law, generally according to court orders.
  • So what gives? Does the government have backdoor access so secret that not even their targets are aware? Are the tech companies lying? Or are they forbidden—as Verizon allegedly is with its NSA arrangement—from acknowledging its existence to an absurd extent?
Paul Merrell

It Can Happen Here: The Confiscation Scheme Planned for US and UK Depositors | WEB OF DEBT BLOG - 0 views

  • Confiscating the customer deposits in Cyprus banks, it seems, was not a one-off, desperate idea of a few Eurozone “troika” officials scrambling to salvage their balance sheets. A joint paper by the US Federal Deposit Insurance Corporation and the Bank of England dated December 10, 2012, shows that these plans have been long in the making; that they originated with the G20 Financial Stability Board in Basel, Switzerland (discussed earlier here); and that the result will be to deliver clear title to the banks of depositor funds.  
  • Although few depositors realize it, legally the bank owns the depositor’s funds as soon as they are put in the bank. Our money becomes the bank’s, and we become unsecured creditors holding IOUs or promises to pay. (See here and here.) But until now the bank has been obligated to pay the money back on demand in the form of cash. Under the FDIC-BOE plan, our IOUs will be converted into “bank equity.”  The bank will get the money and we will get stock in the bank. With any luck we may be able to sell the stock to someone else, but when and at what price? Most people keep a deposit account so they can have ready cash to pay the bills.
  • No exception is indicated for “insured deposits” in the U.S., meaning those under $250,000, the deposits we thought were protected by FDIC insurance. This can hardly be an oversight, since it is the FDIC that is issuing the directive. The FDIC is an insurance company funded by premiums paid by private banks.  The directive is called a “resolution process,” defined elsewhere as a plan that “would be triggered in the event of the failure of an insurer . . . .”
  • ...7 more annotations...
  • The 15-page FDIC-BOE document is called “Resolving Globally Active, Systemically Important, Financial Institutions.”  It begins by explaining that the 2008 banking crisis has made it clear that some other way besides taxpayer bailouts is needed to maintain “financial stability.” Evidently anticipating that the next financial collapse will be on a grander scale than either the taxpayers or Congress is willing to underwrite, the authors state: An efficient path for returning the sound operations of the G-SIFI to the private sector would be provided by exchanging or converting a sufficient amount of the unsecured debt from the original creditors of the failed company [meaning the depositors] into equity [or stock]. In the U.S., the new equity would become capital in one or more newly formed operating entities. In the U.K., the same approach could be used, or the equity could be used to recapitalize the failing financial company itself—thus, the highest layer of surviving bailed-in creditors would become the owners of the resolved firm. In either country, the new equity holders would take on the corresponding risk of being shareholders in a financial institution.
  • If our IOUs are converted to bank stock, they will no longer be subject to insurance protection but will be “at risk” and vulnerable to being wiped out, just as the Lehman Brothers shareholders were in 2008.  That this dire scenario could actually materialize was underscored by Yves Smith in a March 19th post titled When You Weren’t Looking, Democrat Bank Stooges Launch Bills to Permit Bailouts, Deregulate Derivatives.  She writes: In the US, depositors have actually been put in a worse position than Cyprus deposit-holders, at least if they are at the big banks that play in the derivatives casino. The regulators have turned a blind eye as banks use their depositaries to fund derivatives exposures. And as bad as that is, the depositors, unlike their Cypriot confreres, aren’t even senior creditors. Remember Lehman? When the investment bank failed, unsecured creditors (and remember, depositors are unsecured creditors) got eight cents on the dollar. One big reason was that derivatives counterparties require collateral for any exposures, meaning they are secured creditors. The 2005 bankruptcy reforms made derivatives counterparties senior to unsecured lenders.
  • Smith writes: Lehman had only two itty bitty banking subsidiaries, and to my knowledge, was not gathering retail deposits. But as readers may recall, Bank of America moved most of its derivatives from its Merrill Lynch operation [to] its depositary in late 2011. Its “depositary” is the arm of the bank that takes deposits; and at B of A, that means lots and lots of deposits. The deposits are now subject to being wiped out by a major derivatives loss. How bad could that be? Smith quotes Bloomberg: . . . Bank of America’s holding company . . . held almost $75 trillion of derivatives at the end of June . . . . That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show.
  • $75 trillion and $79 trillion in derivatives! These two mega-banks alone hold more in notional derivatives each than the entire global GDP (at $70 trillion).
  • Smith goes on: . . . Remember the effect of the 2005 bankruptcy law revisions: derivatives counterparties are first in line, they get to grab assets first and leave everyone else to scramble for crumbs. . . . Lehman failed over a weekend after JP Morgan grabbed collateral. But it’s even worse than that. During the savings & loan crisis, the FDIC did not have enough in deposit insurance receipts to pay for the Resolution Trust Corporation wind-down vehicle. It had to get more funding from Congress. This move paves the way for another TARP-style shakedown of taxpayers, this time to save depositors. Perhaps, but Congress has already been burned and is liable to balk a second time. Section 716 of the Dodd-Frank Act specifically prohibits public support for speculative derivatives activities.
  • An FDIC confiscation of deposits to recapitalize the banks is far different from a simple tax on taxpayers to pay government expenses. The government’s debt is at least arguably the people’s debt, since the government is there to provide services for the people. But when the banks get into trouble with their derivative schemes, they are not serving depositors, who are not getting a cut of the profits. Taking depositor funds is simply theft. What should be done is to raise FDIC insurance premiums and make the banks pay to keep their depositors whole, but premiums are already high; and the FDIC, like other government regulatory agencies, is subject to regulatory capture.  Deposit insurance has failed, and so has the private banking system that has depended on it for the trust that makes banking work.
  • The Cyprus haircut on depositors was called a “wealth tax” and was written off by commentators as “deserved,” because much of the money in Cypriot accounts belongs to foreign oligarchs, tax dodgers and money launderers. But if that template is applied in the US, it will be a tax on the poor and middle class. Wealthy Americans don’t keep most of their money in bank accounts.  They keep it in the stock market, in real estate, in over-the-counter derivatives, in gold and silver, and so forth. Are you safe, then, if your money is in gold and silver? Apparently not – if it’s stored in a safety deposit box in the bank.  Homeland Security has reportedly told banks that it has authority to seize the contents of safety deposit boxes without a warrant when it’s a matter of “national security,” which a major bank crisis no doubt will be.
  •  
    Time to get your money out of the bank and into gold or silver, kept somewhere other than in a bank safety deposit box. 
Paul Merrell

Are all telephone calls recorded and accessible to the US government? | Glenn Greenwald | Comment is free | guardian.co.uk - 0 views

  • On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could:BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It's not a voice mail. It's just a conversation. There's no way they actually can find out what happened, right, unless she tells them?
  • "All of that stuff" - meaning every telephone conversation Americans have with one another on US soil, with or without a search warrant - "is being captured as we speak". On Thursday night, Clemente again appeared on CNN, this time with host Carol Costello, and she asked him about those remarks. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored:
  • CLEMENTE: "No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It's not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.BURNETT: "So they can actually get that? People are saying, look, that is incredible.CLEMENTE: "No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not."
  • ...1 more annotation...
  • Let's repeat that last part: "no digital communication is secure", by which he means not that any communication is susceptible to government interception as it happens (although that is true), but far beyond that: all digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.
Paul Merrell

Snowden obtained nearly 2 million classified files in NSA leak - Pentagon report - RT USA - 0 views

  • Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.
  • “This is straight from the government’s playbook,” Wizner said. “Remember, the government told the Supreme Court that publication of the Pentagon Papers would cause grave danger to national security. That was not true then, and this report is not true now. Overblown claims of national security rarely stand the test of time.” Sources came forward in August, two months after the press began reporting Snowden’s leaks, to admit that authorities were unsure exactly how many documents Snowden obtained. Two anonymous officials told NBC News at the time that the NSA was using poor compartmentalization techniques - meaning that Snowden, an IT systems administrator, was able to freely comb through agency networks containing a wide range of data. NSA Director Keith Alexander said in August that the government knew what Snowden had taken, while the NBC sources in fact said the NSA was “overwhelmed” with trying to find out the details. Alexander said in an October speech that the documents were “being put out in a way that does the maximum damage to NSA and our nation.” He also told the audience that Snowden had far fewer documents to reporters than this week’s Pentagon report described. “I wish there was a way to prevent it,” he told a Baltimore, Maryland crowd. “Snowden has shared somewhere between 50,000 and 200,000 documents with reporters. These will continue to come out.”
  •  
    The seizure of all devices containing data by UK officials from David Miranda, Glenn Greenwald's partner, under dubious authority of an anti-terrorism statute, tends to show that NSA and GCHA in fact do not know how many -- or which -- documents Snowden acquired. I am extremely dubious of this 1.7 million documents claim. IIRC, Greenwald said at some point that he had been given about 50K documents.  
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The Intercept - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

EU votes to support suspending U.S. data sharing agreements, including passenger flight data | ZDNet - 0 views

  • The European Parliament on Thursday adopted a joint, cross-party resolution to begin investigations into widespread surveillance of Europeans by the U.S. National Security Agency (NSA). Read this EU to vote to suspend U.S. data sharing agreements, passenger records amid NSA spying scandal Read more In the vote, 483 voted for the resolution, 98 against, and 65 abstained on a vote that called on the U.S. to suspend and review any laws and surveillance programs that "violate the fundamental right of EU citizens to privacy and data protection," as well as Europe's "sovereignty and jurisdiction." The vote also gave backing to the suspension of data sharing deals between the two continents, should the European Commission take action against its U.S. ally.
  • The U.S. government faces continued criticism and pressure from its international allies following news that its intelligence agencies spied on foreign nationals under its so-called PRISM program. The U.K. government was also embroiled in the NSA spying saga, after its signals intelligence intercepting station GCHQ tapped submarine fiber optic cables under its own secret program, code named Tempora. Reuters reported on Wednesday that the Commission is examining whether the U.K. broke EU law, which could lead to fines imposed by the highest court in Europe.
  • Should the Commission decide it necessary to suspend the data sharing agreement of passenger details — including personal and sensitive individual data — it could ultimately lead to the grounding of flights between the EU and the U.S. Dutch MEP Sophie in 't Veld said in a statement after the vote: "We must consider now if the PNR and SWIFT agreements are still tenable in the circumstances." Critics say PNR data has never helped catch a suspected criminal or terrorist before. SWIFT data sharing, which provides U.S. authorities with secure banking details in a bid to crack down on terrorist financing, could also be suspended. A spokesperson for the D66 delegation in Brussels confirmed by email that the English version of the joint motion is "the right one and is leading," despite claims that there were "translation error[s]" between the different versions of the joint resolution.
  • ...3 more annotations...
  • Members of the European Parliament (MEPs) in a plenary session in Strasbourg voted in favor of a section of the resolution that called on the Commission to "give consideration to all the instruments at their disposal in discussions and negotiations with the U.S. [...] including the possible suspension of the passenger name record (PNR) and terrorist finance tracking program (TFTP) agreements."
  • An EU source familiar with proceedings confirmed that the Commission now has the authority from the Parliament to suspend PNR and TFTP, but it falls at the Commission's discretion. Resolutions passed by the Parliament are not legally binding, but give backing to the Commission should the executive body wish to enact measures against a foreign power or entity. A Commission spokesperson confirmed that there are "no deadlines" on deciding whether it will follow up on the Parliament's resolution.
  • The Parliament's Civil Liberties, Justice and Home Affairs committee was given the authority by Thursday's vote to set up an inquiry to gather evidence from both U.S. and EU sources to assess the impact of the surveillance activities on EU citizens' fundamental right to privacy and data protection.
Paul Merrell

NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say - The Washington Post - 0 views

  • The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.
  • According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data centers of the Silicon Valley giants.
  • The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process. The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies.
  • ...1 more annotation...
  • In a statement, Google’s chief legal officer, David Drummond, said the company has “long been concerned about the possibility of this kind of snooping” and has not provided the government with access to its systems.“We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform,” he said.
  •  
    It says later in this 3-page article that Google's data centers back up their content to each other in case one goes down. So no question that U.S. citizens' data is collected, I think. See also closely related article, Why the NSA Wanted More Access, http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/30/prism-already-gave-the-nsa-access-to-tech-giants-heres-why-it-wanted-more/ ("Scooping up data is deep in the NSA's DNA, and it may simply have been unable to help itself."). See also http://apps.washingtonpost.com/g/page/world/how-the-nsas-muscular-program-collects-too-much-data-from-yahoo-and-google/543/ (excerpts from documents discussed in the main article). 
Gary Edwards

Seymour M. Hersh · The Red Line and the Rat Line · LRB 6 April 2014 - 0 views

  • In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the ‘red line’ he had set in 2012 on the use of chemical weapons.[*]​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad’s offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous.
  •  
    Sy Hersh walks us through his investigation into the reasons behind Obama's last-minute decision to postpone missile (and as it turns out, B52) strikes on Syria. His trail leads through the Benghazi incident and the CIA's running of weapons from Libya to jihadists in Syria (the "rat line") through Turkey engineering a false flag gas attack in Syria to draw Obama into attacking Syria for crossing his "red line" against Syrian use of chemical weapons. Note that Hersh's account of the "red line" events largely fits with the earlier accounts by Yossef Bodansky.  http://oilprice.com/Geopolitics/Middle-East/Syrian-Chemical-Attack-More-Evidence-Only-Leads-to-More-Questions.html http://www.worldtribune.com/2013/09/09/new-granular-evidence-points-to-saudi-involvement-in-syrias-chemical-weapons-terror-attack/ http://www.globalresearch.ca/did-the-white-house-help-plan-the-syrian-chemical-attack Note however that Hersh's account omits Bodansky's evidence that the U.S. State Department and CIA were part of the planning for the false flag attack.
  • ...1 more comment...
  •  
    Note also the previous account by Wayne Madsen of events leading Obama to postpone his atack on Syria. http://www.strategic-culture.org/news/2013/09/04/american-generals-stand-between-war-and-peace.html "Obama is faced with another grim reality. Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that «smoking gun» proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal «Iran-contra»-like scandal. The proof is said to be highly «[un]impeachable»." This is another "red line" / "rat line" tie, suggesting that the reason the Benghazi investigation has not produced an even larger scandal is that it would expose the War Party's efforts to supply captured Libyan arms to jihadists in Syria.  On the Iran/Contra parallel, note that bills to approve supply of weapons to Syrian "rebels" were then stalled in Congress, evidencing Congressional intent that it rather than the President would authorize arming the "rebel" forces. The fact that CIA and the State Dept. were already covertly doing so completes the Iran/Contra scandal analogy.
  •  
    See also Hersh's article in December 2013, establishing that the White House had "cooked" the alleged evidence offered in support of Obama's claim that Syria had been responsible for the attack. It also establishes Obama's prior knowledge that the "rebel" forces had sarin weapons. http://www.lrb.co.uk/v35/n24/seymour-m-hersh/whose-sarin
  •  
    "The Red Line and the Rat Line: Seymour M. Hersh on Obama, Erdoğan and the Syrian rebels excerpt/intro: In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the 'red line' he had set in 2012 on the use of chemical weapons.​* Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad's offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous. Obama's change of mind had its origins at Porton Down, the defence laboratory in Wiltshire. British intelligence had obtained a sample of the sarin used in the 21 August attack and analysis demonstrated that the gas used didn't match the batches known to exist in the Syrian army's chemical weapons arsenal. The message that the case against Syria wouldn't hold up was quickly relayed to the US joint chiefs of staff. The British report heightened doubts inside the Pentagon; the joint chiefs were already preparing to warn Obama that his plans for a far-reaching bomb and missile attack on Syria's infrastructure could lead to a wider war in the Middle East. As a consequence the American officers delivered a last-minute caution to the president, which, in their view, eventually led to his cancelling the attack."
Paul Merrell

Britain takes axe to spending in new austerity drive - Yahoo News - 0 views

  • British finance minister George Osborne unveiled fresh austerity measures Wednesday to slash debt, evoking the plight of crisis-hit Greece in the first purely Conservative budget for almost two decades. Chancellor of the Exchequer Osborne drastically cut welfare spending to honour campaign promises to forge ahead with austerity, which saw his centre-right Conservative party sweep to an unexpected majority in a May general election and return David Cameron as prime minister.Speaking to lawmakers in his post-election budget statement to parliament, Osborne said welfare spending would be slashed by an accumulated total of £12 billion ($18.4 billion, 16.6 billion euros) by the end of parliament in five years' time. At the same time, the government will introduce a "national living wage" that could reach £9.0 an hour by 2020 that will apply to workers only aged 25 and over. That compares with the current national minimum wage of £6.50 an hour for those aged 21 and over, which will continue to exist alongside the "living wage."
  • n all, the government plans to save £37 billion over the next five years: £12 billion from welfare cuts, £5 billion from tax changes and reducing evasion, and the rest largely from cuts to government departments, Osborne said.
  • Osborne confirmed there would be no change to income tax thresholds or value added taxation (VAT) for at least five years.Corporation tax, levied on business profits, will be reduced from 20 percent to 19 percent in 2017 and 18 percent by 2020.
Paul Merrell

Proposed buffer zone leads al Qaeda to withdraw fighters from northern Aleppo province | The Long War Journal - 0 views

  • The Al Nusrah Front, al Qaeda’s official branch in Syria, has released a statement saying its fighters have been ordered to withdraw from their frontline positions north of Aleppo. Al Nusrah’s jihadists had been fighting against the Islamic State in the area. The move comes in response to Turkey’s attempt to establish a buffer zone for forces fighting Abu Bakr al Baghdadi’s organization. The statement, which was released via Twitter on August 9, does not indicate that Al Nusrah is siding with the Islamic State in the multi-sided conflict. The group makes it clear that it will continue to fight Baghdadi’s men elsewhere. Instead, Turkey’s cooperation with the US-led coalition, which has targeted veteran al Qaeda leaders in northern Syria, has forced Al Nusrah to change tactics. The al Qaeda arm says it is relinquishing control of its territory in the northern part of the Aleppo province. Other rebel groups will step into the void. Al Nusrah criticizes the proposed buffer zone in its statement, saying it is intended to serve Turkey’s national security interests and is not part of a real effort to aid the mujahdeen’s cause. The Turkish government fears a Kurdish state on its southern border, according to Al Nusrah, and that is the real impetus behind its decision. The Kurds are one of the Islamic State’s main opponents and have gained territory at the expense of Baghdadi’s jihadists in recent months.
  • There is an even simpler explanation for Al Nusrah’s rejection of Turkey’s buffer zone: the US has been striking select al Qaeda operatives in Al Nusrah’s ranks. The Pentagon announced earlier this month that it had begun flying drones out of the Incirlik Air Base in Turkey. Some of the air missions are reportedly backing up US-trained rebel forces on the ground. Those very same fighters have battled Al Nusrah, which has killed or captured a number of the “moderate” rebels.
  • Separately, the US has also repeatedly targeted senior al Qaeda leaders in Al Nusrah’s ranks. Labeled the “Khorasan Group,” this cadre of al Qaeda veterans has been plotting attacks in the West.
  • ...2 more annotations...
  • In September 2014, Francis Ricciardone, the former US ambassador to Turkey, accused the Turks of working with Al Nusrah. “We ultimately had no choice but to agree to disagree,” Ricciardone said of his discussion with Turkish officials. “The Turks frankly worked with groups for a period, including Al Nusrah, whom we finally designated as we’re not willing to work with.” Since early on the rebellion against the Assad regime, Turkey has permitted large numbers of foreign jihadists to travel into Syria. At various points, this benefitted not only Al Nusrah, but also al Qaeda’s rivals in the Islamic State, which Turkey now opposes. For instance, in October 2013, The Wall Street Journal reported on meetings between US officials, Turkish authorities and others. “Turkish officials said the threat posed by [Al Nusrah], the anti-Assad group, could be dealt with later,” according to US officials and Syrian opposition leaders who spoke with the newspaper. Officials also told the publication that the US government’s decision to designate Al Nusrah as a terrorist group in December 2012 was intended “in part to send a message to Ankara about the need to more tightly control the arms flow.” Eventually, in 2014, Turkey also designated Al Nusrah as a terrorist organization. Turkish authorities have also reportedly launched sporadic raids on al Qaeda-affiliated sites inside their country.
  • Still, al Qaeda has found Turkey to be a hospitable environment in the past. According to the US Treasury Department, al Qaeda has funneled cash and fighters through Turkish soil to Al Nusrah.
Paul Merrell

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - The Intercept - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
Paul Merrell

Hold the front page: Spain's anti-Google lobbyists lobby for Google News return * The Register - 0 views

  • Anti-Google lobby group the AEDE, which represents publishers in Spain, has asked the country's government to prevent the ad giant from shuttering its news-scraping service. The volte-face comes after Mountain View threatened on Thursday to kill Google News in Spain, because it argued that a clumsy, new intellectual property law was bad for business. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_business/front&sz=300x250%7C300x600&tile=3&c=33VI4CoKwQrMoAADx4lg4AAANB&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_business/front&sz=300x250%7C300x600&tile=3&c=33VI4CoKwQrMoAADx4lg4AAANB&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""> </a> That legislation, expected to be implemented in the new year, will tackle any website that links to pirated content. The law would allow the AEDE (Association of Editors of Spanish Dailies) to charge content aggregators like Google and Yahoo! for any snippets of news that they publish. Additionally, authorities will be granted powers to fine websites up to €600,000 for linking to pirated content.
  • Google News boss Richard Gingras griped about the tax on the multi-billion-dollar corporation in a blog post on 11 December, in which he said: [S]adly, as a result of a new Spanish law, we’ll shortly have to close Google News in Spain. Let me explain why. This new legislation requires every Spanish publication to charge services like Google News for showing even the smallest snippet from their publications, whether they want to or not. As Google News itself makes no money (we do not show any advertising on the site) this new approach is simply not sustainable. So it’s with real sadness that on 16 December (before the new law comes into effect in January) we’ll remove Spanish publishers from Google News, and close Google News in Spain. Now, the AEDE has asked the Spanish government to try to prevent Google's exit. “AEDE requires the intervention of Spanish and community authorities, and competition authorities, to effectively protect the rights of citizens and companies,” it said.
  • A spokeswoman at the lobby group told The Spain Report that the AEDE had not asked "Google to take a step backwards, we’ve always been open to negotiations with Google”. She reportedly added: “Google has not taken a neutral stance". “Of course they are free to close their business, but one thing is the closure of Google News and quite another the positioning in the general index.” Publishers in Spain are no doubt panicking about the prospect of their web traffic plummeting if Google does pull the plug on its news service next week.
  • ...1 more annotation...
  • Belgium and most recently Germany have failed to bring in a law that protects intellectual works, while taxing Google for its news-scraping tactics. It would seem that it's now the turn of Spanish publishers to have a bad news day.
  •  
    As expected.
Paul Merrell

Dozens of Turkish police detained for alleged spying on government | Reuters - 0 views

  • (Reuters) - Dozens of Turkish police including high-ranking officers were detained on Tuesday, accused of spying and illegal wire-tapping of Prime Minister Tayyip Erdogan and his inner circle in what the chief prosecutor said was a concocted probe of an alleged terrorist group. The former Istanbul anti-terror police chief, himself among those detained and led away in handcuffs, said the incident was entirely political, coming just a few weeks ahead of a presidential election in which Erdogan is standing.The operation follows a stream of purges targeting the police, judiciary and state institutions this year which government critics have condemned as a symptom of Erdogan's tightening grip.
  • olice conducted raids in 22 provinces, and officers involved in a separate government corruption probe which emerged in December and led to the departure of four ministers were among those detained, Turkish media reported.The officers were accused of making up an investigation into an alleged terrorist group named 'selam-tevhid' as a pretence to tap the phones of Erdogan, ministers and the head of the national intelligence agency."The order was given for the capture and detention of 76 police officers who were investigating the group named selam-tevhid but whose actual aims were spying," Istanbul chief prosecutor Hadi Salihoglu said in a written statement.He said the 'selam-tevhid' case, targeting 251 people, had been dismissed due to a lack of evidence after a three-year investigation during which 2,280 people were wire-tapped.Fifty-two of the 76 officers have so far been detained, and Turkish media published photos of former anti-terror police chiefs being led away in handcuffs by their colleagues.
  • The order was also given for the arrest of another 39 suspects, of whom 15 have so far been detained, over the wiretapping of around 250 people, including deputies, judges, journalists and senior bureaucrats, allegedly on the grounds of being members of an illegal group, the statement said.
  •  
    Election season in Turkey.
Paul Merrell

REPORT: Greece is getting ready to default - Business Insider - 0 views

  • Greece is getting ready to default on at least some of its debt payments, according to the Financial Times. The country has entered a pretty dire fiscal situation. It desperately needs to unlock bailout funds from its creditors, but progress negotiating that cash is shaky at best. If Athens doesn't get its next €7.2 billion ($7.58 billion) bailout tranche by the April 24 Eurogroup meeting of European finance ministers, default becomes a lot more likely, and it seems as if the government is already preparing for the worst. Here's the FT: Greece is preparing to take the dramatic step of declaring a debt default unless it can reach a deal with its international creditors by the end of April, according to people briefed on the radical leftist government’s thinking. The government, which is rapidly running out of funds to pay public sector salaries and state pensions, has decided to withhold €2.5bn of payments due to the International Monetary Fund in May and June if no agreement is struck, they said. "We have come to the end of the road ... If the Europeans won't release bailout cash, there is no alternative [to a default]," one government official said.
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

GCHQ handed new smartphone-hacking legal powers - RT UK - 0 views

  • Spy agencies in Britain will be given the explicit right to hack into smartphones and computers as part of a new law being introduced by the Conservative government. Security services MI5, MI6 and GCHQ can already access electronic devices by exploiting software security vulnerabilities, but the legal foundation for the practice is under scrutiny.New powers laid out in the Investigatory Powers Bill, due to be introduced in Parliament next month, will give spies a solid legal basis for hacking into computer systems, according to the Times.The revelation has sparked criticism from human rights group Liberty, which accuses the government of giving spy agencies “unlimited potential” to act against citizens.The bill, which was announced in the Queens’ Speech following the general election, is likely to include the new Snooper’s Charter, according to privacy campaigners at the Open Rights Group.
  • British spies will be able to hack into a person’s “property” through backdoors in the software. Once inside, intelligence agents can install software that allows them operate microphones to eavesdrop on conversations and even control the camera to take photographs of targets.The government admitted in February that MI5, MI6 and GCHQ were hacking into computers, servers, routers and mobile phones using the Intelligence Services Act 1994, which does not give explicit authorization for such practices.Independent reviewer of terrorism legislation Dave Anderson QC recommended in June that new legislation be introduced to clarify give intrusive hacking a firm legal basis.Anderson said that hacking presents a “dizzying array of possibilities to the security and intelligence agencies.”While some methods are appropriate, “many are of the view that there are others which are so intrusive that they would require exceptional safeguards for their use to be legal … A debate is clearly needed,” he said.
  • The investigatory powers bill will give agents explicit powers to interfere with “property” once they have obtained a warrant from the home secretary.Digital evidence expert Peter Sommer said the powers circumvented encryption technology.“Increasingly, [intelligence agents] can’t read communications sent over the internet because of encryption, so their ability to get information from interception is rapidly diminishing. The best way around this is to get inside someone’s computer. This is an increasingly important avenue for them,” he told the Times.
« First ‹ Previous 181 - 200 of 392 Next › Last »
Showing 20 items per page