Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "national-socialism" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Clapper admits secret NSA surveillance program to access user data | World news | guardian.co.uk - 0 views

  • The US has admitted using a secret system to mine the systems of the biggest technology companies to spy on millions of people's online activity, overshadowing attempts by Barack Obama to force China to abandon its cyber-espionage program. As concern mounted over the sweeping nature of US surveillance, the director of national intelligence, James Clapper, confirmed revelations by the Guardian that the National Security Agency uses companies such as Google, Facebook and Apple to obtain information that includes the content of emails and online files.
Paul Merrell

HKS Research Administration Office - 0 views

  • The Financial Legacy of Iraq and Afghanistan: How Wartime Spending Decisions Will Constrain Future National Security Budgets Bilmes, Linda J. "The Financial Legacy of Iraq and Afghanistan: How Wartime Spending Decisions Will Constrain Future National Security Budgets." HKS Faculty Research Working Paper Series RWP13-006, March 2013.
  • Abstract The Iraq and Afghanistan conflicts, taken together, will be the most expensive wars in US history – totaling somewhere between $4 to $6 trillion. This includes long-term medical care and disability compensation for service members, veterans and families, military replenishment and social and economic costs. The largest portion of that bill is yet to be paid. Since 2001, the US has expanded the quality, quantity, availability and eligibility of benefits for military personnel and veterans. This has led to unprecedented growth in the Department of Veterans Affairs and the Department of Defense budgets. These benefits will increase further over the next 40 years. Additional funds are committed to replacing large quantities of basic equipment used in the wars and to support ongoing diplomatic presence and military assistance in the Iraq and Afghanistan region. The large sums borrowed to finance operations in Iraq and Afghanistan will also impose substantial long-term debt servicing costs. As a consequence of these wartime spending choices, the United States will face constraints in funding investments in personnel and diplomacy, research and development and new military initiatives. The legacy of decisions taken during the Iraq and Afghanistan wars will dominate future federal budgets for decades to come. Attachment pdf  
Paul Merrell

Web's Reach Binds N.S.A. and Silicon Valley Leaders - NYTimes.com - 0 views

  • When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency. Mr. Kelly’s move to the spy agency, which has not previously been reported, underscores the increasingly deep connections between Silicon Valley and the agency and the degree to which they are now in the same business. Both hunt for ways to collect, analyze and exploit large pools of data about millions of Americans. The only difference is that the N.S.A. does it for intelligence, and Silicon Valley does it to make money.
  • Yet technology experts and former intelligence officials say the convergence between Silicon Valley and the N.S.A. and the rise of data mining — both as an industry and as a crucial intelligence tool — have created a more complex reality. Silicon Valley has what the spy agency wants: vast amounts of private data and the most sophisticated software available to analyze it. The agency in turn is one of Silicon Valley’s largest customers for what is known as data analytics, one of the valley’s fastest-growing markets. To get their hands on the latest software technology to manipulate and take advantage of large volumes of data, United States intelligence agencies invest in Silicon Valley start-ups, award classified contracts and recruit technology experts like Mr. Kelly. “We are all in these Big Data business models,” said Ray Wang, a technology analyst and chief executive of Constellation Research, based in San Francisco. “There are a lot of connections now because the data scientists and the folks who are building these systems have a lot of common interests.” Although Silicon Valley has sold equipment to the N.S.A. and other intelligence agencies for a generation, the interests of the two began to converge in new ways in the last few years as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data — at the same time that the value of the data for use in consumer marketing began to rise. “These worlds overlap,” said Philipp S. Krüger, chief executive of Explorist, an Internet start-up in New York. The sums the N.S.A. spends in Silicon Valley are classified, as is the agency’s total budget, which independent analysts say is $8 billion to $10 billion a year.
  • Despite the companies’ assertions that they cooperate with the agency only when legally compelled, current and former industry officials say the companies sometimes secretly put together teams of in-house experts to find ways to cooperate more completely with the N.S.A. and to make their customers’ information more accessible to the agency. The companies do so, the officials say, because they want to control the process themselves. They are also under subtle but powerful pressure from the N.S.A. to make access easier.
  • ...1 more annotation...
  • Skype, the Internet-based calling service, began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials, according to people briefed on the program who asked not to be named to avoid trouble with the intelligence agencies. Project Chess, which has never been previously disclosed, was small, limited to fewer than a dozen people inside Skype, and was developed as the company had sometimes contentious talks with the government over legal issues, said one of the people briefed on the project. The project began about five years ago, before most of the company was sold by its parent, eBay, to outside investors in 2009. Microsoft acquired Skype in an $8.5 billion deal that was completed in October 2011. A Skype executive denied last year in a blog post that recent changes in the way Skype operated were made at the behest of Microsoft to make snooping easier for law enforcement. It appears, however, that Skype figured out how to cooperate with the intelligence community before Microsoft took over the company, according to documents leaked by Edward J. Snowden, a former contractor for the N.S.A. One of the documents about the Prism program made public by Mr. Snowden says Skype joined Prism on Feb. 6, 2011. Microsoft executives are no longer willing to affirm statements, made by Skype several years ago, that Skype calls could not be wiretapped. Frank X. Shaw, a Microsoft spokesman, declined to comment.
Paul Merrell

What the Third Circuit Said in Hassan v. City of New York | Just Security - 0 views

  • In Hassan v. City of New York, the Third Circuit yesterday emphatically overturned a New Jersey district court, which had dismissed a challenge to the New York City Police Department’s Muslim surveillance program. The decision is important not only for the New Jersey plaintiffs who brought the case, but also for its analysis of several legal issues that have dogged efforts to obtain judicial review of surveillance programs.
  • The threshold issue in Hassan was whether the plaintiffs had alleged injury sufficient to establish standing to bring claims that the NYPD’s surveillance of Muslim communities in New Jersey violated the equal protection clause of the Fourteenth Amendment as well as the free exercise and establishment clauses of the First Amendment. The Third Circuit ruled that the fundamental injury alleged by the plaintiffs — unequal treatment on the basis of religion — was sufficient to keep them in court. The court rejected as “too cramped,” the City’s contention that discrimination is only actionable when it results in deprivation of “a tangible benefit like college admission or Social Security.”
  • One of the most remarkable aspects of the lower court’s dismissal of Hassan was its acceptance of the City’s argument that any injury to the plaintiffs was not fairly traceable to the police. Rather, defendants argued, it was the fault of the Associated Press, which published a Pulitzer Prize-winning investigation of the NYPD’s surveillance of Muslim communities in New York and New Jersey. The court described this position — variants of which have been articulated in the wake of Snowden’s disclosures as well — as “What you don’t know can’t hurt you. And, if you do know, don’t shoot us. Shoot the messenger.” The Third Circuit wasn’t buying it. The primary injury alleged was discrimination, which was caused by the City, not than the press.
  • ...5 more annotations...
  • Next up was the lower court’s dismissal of the case on the grounds that the plaintiffs had failed to state a claim. The plaintiffs had alleged that the NYPD’s surveillance program was facially discriminatory because it targeted Muslims. In response, the City had demanded information about “when, by whom, and how the policy was enacted and where it was written down.” But the court found the plaintiffs had met their burden, alleging specifics about the program “including when it was conceived (January 2002), where the City implemented it (in the New York Metropolitan area with a focus on New Jersey), and why it has been employed because of the belief ‘that Muslim religious identity … is a permissible proxy for criminality.’” In other words, the plaintiffs had sufficiently alleged a facially discriminatory policy even when they couldn’t identify a piece of paper on which it was memorialized. For civil rights lawyers concerned that cases like Iqbal and Twombly are closing off avenues for civil rights litigation, the Third Circuit holding provides some comfort. A key issue in the case was the NYPD’s intent in monitoring Muslims. The City had successfully argued below that it “could not have monitored New Jersey for Muslim terrorist activities without monitoring the Muslim community itself.” Its motive, the City argued, was counterterrorism, not treating Muslims differently. The problem with this argument, the Third Circuit explained, was that the City was mixing up “intent” and “motive.” The intent inquiry focuses on whether a person acts intentionally rather than accidentally, while the motive inquiry focuses on why a person acts. “[E]ven if NYPD officers were subjectively motivated by a legitimate law enforcement purpose … they’ve intentionally discriminated if they wouldn’t have surveilled Plaintiffs had they not been Muslim,” the court concluded.
  • The court then turned to whether, assuming differential treatment, the NYPD program was nevertheless justified on security or public safety grounds. It began its inquiry by examining the appropriate standard of review, concluding that it was appropriate to apply heightened scrutiny to religion-based classifications under the equal protection clause rather than simply to examine whether the City had a rational basis for its actions. Even though religious affiliation, unlike race, is capable of being changed, the Third Circuit agreed with many of its sister courts that it was of such fundamental importance that people should not be required to change their faith.
  • New York City had argued that the surveillance program met the heightened scrutiny standard because it was necessary to meet the threat of terrorism. In support, the City put forward its oft-repeated argument that a “comprehensive understanding of the makeup of the community would help the NYPD figure out where to look — and where not to look — in the event it received information that an Islamist radicalized to violence may be secreting himself in New Jersey.” The court was not convinced that this was a sufficiently close fit with the goal, finding that the City failed to meet its burden of rebutting the presumption of unconstitutionality created by plausible allegation of discrimination. Harking back to the World War II internment of Japanese Americans
  • the Third Circuit cautioned: No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights … Given that “unconditional deference to [the] government[’s] … invocation of ‘emergency’ … has a lamentable place in our history,” the past should not preface yet again bending our constitutional principles merely because an interest in national security is invoked.
  • Lastly, the Third Circuit rejected as “threadbare” the City’s argument that plaintiffs First Amendment free exercise and establishment clause claims failed because they did not allege “overt hostility and prejudice.” As with the equal protection claims, it was not necessary for plaintiffs to demonstrate animus. *     *     * In conclusion, the court reminded us that the targeting of Muslims, which has been a leitmotif of US security policy, was not new. We have been down similar roads before. Jewish-Americans during the Red Scare, African Americans during the Civil Rights Movement, and Japanese-Americans during World War II are examples that readily spring to mind. We are left to wonder why we cannot see with foresight what we see so clearly with hindsight — that “[l]oyalty is a matter of the heart and mind[,] not race, creed, or color.”
Paul Merrell

Aleksej Gubarev, of Russia's Webzilla, says hacking charges false | McClatchy DC - 0 views

  • A Russian venture capitalist and tech expert whose name and company are mentioned in the now-notorious document alleging connections between the Donald Trump campaign and Russian hackers says no intelligence officers have ever contacted him about the accusations, which he says are false.A report compiled by a former Western intelligence official as opposition research against Trump was made public Tuesday when BuzzFeed posted its 35 pages. The document included unsubstantiated claims of collusion between the Trump campaign team and the Kremlin.
  • It also alleged that global tech firm XBT Holding, with operations in Dallas, was instrumental in the hack of leaked Democratic Party emails that embarrassed Hillary Clinton and fellow Democrats.XBT, owner of Dallas-based enterprise-hosting company Webzilla, is run by a successful Russian tech startup expert, Aleksej Gubarev. In a phone interview from Cyprus, where he said he’d lived since 2002, Gubarev said he was surprised to see his name in the report.“I don’t know why I was there,” Gubarev said, adding that perhaps a competitor sought to discredit him. “I still don’t understand the true reason for this report.”The salacious innuendoes in the periodic reports about Trump’s personal life dominated social media headlines. The mention of Webzilla and Gubarev was among the more specific allegations: that XBT and affiliates “had been using botnets and porn traffic to transmit viruses, plant bugs, steal data and conduct ‘altering operations’ against the Democratic Party leadership.” Gubarev said he operated 75,000 servers across the globe and got real-time information if there had been hacking or illicit activity tied to his businesses. There is no evidence of that, he said, adding that no one has contacted him.“I have a physical office in Dallas. Nobody contacted me,” said Gubarev, adding that 40 percent of his business is handled over the servers it runs in Dallas and the United States accounts for about 27 percent of his global business.
  • McClatchy has reported that Sen. John McCain, R-Ariz., gave the bulk of the report to FBI Director James Comey on Dec. 9. The final pages of the report are dated Dec. 11. McClatchy had the report earlier but couldn’t verify any of its allegations. A federal law enforcement source told McClatchy that the document was being examined as part of a broader FBI inquiry into Russia’s influence on the U.S. election but wouldn’t characterize its credibility. A source familiar with the former Western intelligence expert who compiled the dossier told McClatchy that the ex-spy has extensive experience in tracking activities in the Kremlin.The report alleges that Gubarev and another hacking expert were recruited under duress by the FSB, the Russian intelligence-agency successor to the KGB. Gubarev said he had not been threatened or blackmailed, nor had his mother, who lives in Russia.
  • ...2 more annotations...
  • XBT offers an array of tech services, from dedicated hosting of servers and cloud-based storage to developing apps for mobile phones and offering virtual private servers. His company advertises specialized services to software developers, advertisers, gaming companies and electronic-commerce enterprises. It also operates data centers in Russia, Asia, Europe and Dallas.
  • If law enforcement wants to talk with him, Gubarev said, his door is open.“I’m ready for any investigation. I’m ready to cooperate with everybody, he said.
Paul Merrell

New Political Earthquake in Brazil: Is It Now Time for Media Outlets to Call This a "Coup"? - 0 views

  • Brazil today awoke to stunning news of secret, genuinely shocking conversations involving a key minister in Brazil’s newly installed government, which shine a bright light on the actual motives and participants driving the impeachment of the country’s democratically elected president, Dilma Rousseff. The transcripts were published by the country’s largest newspaper, Folha de São Paulo, and reveal secret conversations that took place in March, just weeks before the impeachment vote in the lower house was held. They show explicit plotting between the new planning minister (then-senator), Romero Jucá, and former oil executive Sergio Machado — both of whom are formal targets of the “Car Wash” corruption investigation — as they agree that removing Dilma is the only means for ending the corruption investigation. The conversations also include discussions of the important role played in Dilma’s removal by the most powerful national institutions, including — most importantly — Brazil’s military leaders. The transcripts are filled with profoundly incriminating statements about the real goals of impeachment and who was behind it. The crux of this plot is what Jucá calls “a national pact” — involving all of Brazil’s most powerful institutions — to leave Michel Temer in place as president (notwithstanding his multiple corruption scandals) and to kill the corruption investigation once Dilma is removed. In the words of Folha, Jucá made clear that impeachment will “end the pressure from the media and other sectors to continue the Car Wash investigation.” Jucá is the leader of Temer’s PMDB party and one of the “interim president’s” three closest confidants.
  • It is unclear who is responsible for recording and leaking the 75-minute conversation, but Folha reports that the files are currently in the hand of the prosecutor general. The next few hours and days will likely see new revelations that will shed additional light on the implications and meaning of these transcripts. The transcripts contain two extraordinary revelations that should lead all media outlets to seriously consider whether they should call what took place in Brazil a “coup”: a term Dilma and her supporters have used for months. When discussing the plot to remove Dilma as a means of ending the Car Wash investigation, Jucá said the Brazilian military is supporting the plot: “I am talking to the generals, the military commanders. They are fine with this, they said they will guarantee it.” He also said the military is “monitoring the Landless Workers Movement” (Movimento dos Trabalhadores Rurais Sem Terra, or MST), the social movement of rural workers that supports PT’s efforts of land reform and inequality reduction and has led the protests against impeachment.
  • The second blockbuster revelation — perhaps even more significant — is Jucá’s statement that he spoke with and secured the involvement of numerous justices on Brazil’s Supreme Court, the institution that impeachment defenders have repeatedly pointed to as vesting the process with legitimacy in order to deny that Dilma’s removal is a coup. Jucá claimed that “there are only a small number” of Court justices to whom he had not obtained access (the only justice he said he ultimately could not get to is Teori Zavascki, who was appointed by Dilma and who — notably — Jucá viewed as incorruptible in obtaining his help to kill the investigation (a central irony of impeachment is that Dilma has protected the Car Wash investigation from interference by those who want to impeach her)). The transcripts also show him saying that “the press wants to take her [Dilma] out,” so “this shit will never stop” — meaning the corruption investigations — until she’s gone. The transcripts provide proof for virtually every suspicion and accusation impeachment opponents have long expressed about those plotting to remove Dilma from office. For months, supporters of Brazil’s democracy have made two arguments about the attempt to remove the country’s democratically elected president: (1) the core purpose of Dilma’s impeachment is not to stop corruption or punish lawbreaking, but rather the exact opposite: to protect the actual thieves by empowering them with Dilma’s exit, thus enabling them to kill the Car Wash investigation; and (2) the impeachment advocates (led by the country’s oligarchical media) have zero interest in clean government, but only in seizing power that they could never obtain democratically, in order to impose a right-wing, oligarch-serving agenda that the Brazilian population would never accept.
  •  
    Gutsy. Glenn Greenwald and his partner live in Brazil. 
Paul Merrell

Leaked Draft of Trump's Religious Freedom Order Reveals Sweeping Plans to Legalize Discrimination | The Nation - 0 views

  • leaked copy of a draft executive order titled “Establishing a Government-Wide Initiative to Respect Religious Freedom,” obtained by The Investigative Fund and The Nation, reveals sweeping plans by the Trump administration to legalize discrimination.
  • The four-page draft order, a copy of which is currently circulating among federal staff and advocacy organizations, construes religious organizations so broadly that it covers “any organization, including closely held for-profit corporations,” and protects “religious freedom” in every walk of life: “when providing social services, education, or healthcare; earning a living, seeking a job, or employing others; receiving government grants or contracts; or otherwise participating in the marketplace, the public square, or interfacing with Federal, State or local governments.” The draft order seeks to create wholesale exemptions for people and organizations who claim religious or moral objections to same-sex marriage, premarital sex, abortion, and trans identity, and it seeks to curtail women’s access to contraception and abortion through the Affordable Care Act. The White House did not respond to requests for comment
  • Language in the draft document specifically protects the tax-exempt status of any organization that “believes, speaks, or acts (or declines to act) in accordance with the belief that marriage is or should be recognized as the union of one man and one woman, sexual relations are properly reserved for such a marriage, male and female and their equivalents refer to an individual’s immutable biological sex as objectively determined by anatomy, physiology, or genetics at or before birth, and that human life begins at conception and merits protection at all stages of life.”
  •  
    Let's not forget that it was the Obama Administration that threw First Amendment jurisprudence into disarray by arguing in the Hobby Lobby case that 501(c)(3) corporations owned by churches should not be required to obey the First Amendment. Now we see the result.
Paul Merrell

"Destroying" the Johnson Amendment is a poor idea, Mr. President « Hot Air - 0 views

  • The National Prayer Breakfast appearance by the President drew the usual rounds of pans and praise this week. (Just as a side note, it’s not really the best forum for stand up comedy and Schwarzenegger jokes.) One item which cropped up and drew a lot of media fire was President Trump’s renewed pledge to do away with the Johnson Amendment. As you will recall, that’s the 1954 law which restricts churches and other tax exempt, non-profit organizations from certain political activities. (NPR actually has a pretty good rundown of it here.) Most specifically in this case – and what most of the debate centers on – is the restriction on preachers who wish to tell their flocks who to vote for from the pulpit. Doing so theoretically places their tax exempt status in jeopardy. That’s the part that the President seems to want to see discarded. (WaPo)
  • This is one of those areas where I once again fall outside much of the conservative mainstream and my inner libertarian hackles are raised. The Johnson Amendment is a relatively toothless artifact of an earlier era and removing it would have almost zero real world impact for the most part, but it at least represents some lip service to a worthwhile principle in government. The amendment itself is really not the issue here. It’s almost entirely symbolic in terms of its effect on the day to day life of Americans. As a previous report indicated, since 2008 (when churches began seriously challenging the law) there has been only one example of a church being investigated on such charges and none have been punished. It’s extremely difficult to enforce and doing so would be met with huge resistance in some quarters. (No politician or law enforcement officer wants to be enshrined in the front page photo of a preacher being hauled off to jail.) So why support the amendment at all? Because we leave decisions about voting to the individual in the United States and, as with many other social and professional interactions, we protect the individual from undue influence by those who hold power over them. I wrote about this exact subject last summer when Trump was first talking about it. Here’s the key portion of the argument.
  • Preaching politics from the pulpit and using that platform to encourage the election of any candidate from either party is simply wrong. We give churches tax exempt status for a variety of reasons, but one of them is that they are outside of the political and governmental body of the nation. Further, a preacher telling you to vote for Candidate A over Candidate B isn’t just appealing to your intelligence and general sensibilities. They are speaking with the authority of the Almighty and providing you with guidance as to the maintenance of your immortal soul. This provides them with a position of vastly undue influence over your choices. It’s a parallel to the reason we don’t allow doctors to engage in sexual relations with their patients… they simply hold too much influence over them from positions of assumed trust.
  •  
    Let's not forget that corporations are artificial beings; the notion that they have constitutional rights is anathema to our constitution.
Gary Edwards

Obama Stimulus Dollars Funded Soros Empire | The Soros Files - 1 views

  •  
    excerpt: Newly recently released tax documents reveal how billionaire "philanthropist" George Soros expanded his U.S.-based empire by using funds from the American Recovery and Reinvestment Act of 2009, also known as the Obama stimulus. Soros and Obama worked hand-in-glove through the stimulus, which has been called the largest single partisan wealth transfer in American history. In 2010, tax records show that Soros, a convicted inside trader with extensive knowledge of the American financial system and government policies under Obama, deployed grantees from his Open Society Foundations1 to lobby for and acquire federal contracts for job training, green energy, and community redevelopment programs.  By gaining control over those resources, Soros advanced his agenda for "green economics," open borders, and increased government handouts. In short, he grew his empire, which includes much of the "progressive" movement in the U.S., as the federal government and Obama's political constituencies grew in power and influence. This report analyzes George Soros's grants to organizations in 2010.  The records show massive coordination of non-profit networks in the states and nationally.  Four powerful organizations and coalitions - The STAR Coalition, The Gamaliel Foundation, the Apollo Alliance, and Green for All - are given detailed scrutiny in this regard, with the involvement of Van Jones getting special mention. Jones is the former Obama "Green Jobs Czar" fired after information about his communist past surfaced through the work of anti-communist blogger Trevor Loudon and then-Fox News personality Glenn Beck.  The lobbying power of such efforts ensured that stimulus funds flowed from taxpayers into union coffers and into the hands of other activists who had been instrumental in putting President Obama into office. This report, "Obama Stimulus Dollars Funded Soros Empire," includes an analysis of how Soros-funded organizations and networks
Gary Edwards

Gang of 545 and The Basic Flaw by Charley Reese - 2 views

  •  
    Enough said.  Beautifully done Charlie! intro: Politicians are the only people in the world who create problems and then campaign against them. Have you ever wondered why, if both the Democrats and the Republicans are against deficits, we have deficits? Have you ever wondered why, if all the politicians are against inflation and high taxes, we have inflation and high taxes? You and I don't propose a federal budget. The president does. You and I don't have the Constitutional authority to vote on appropriations. The House of Representatives does. You and I don't write the tax code. Congress does. You and I don't set fiscal policy. Congress does. You and I don't control monetary policy. The Federal Reserve Bank does. One hundred senators, 435 congressmen, one president and nine Supreme Court justices - 545 human beings out of the 235 million - are directly, legally, morally and individually responsible for the domestic problems that plague this country.
  •  
    Bay Area Patriot Group post
Joe La Fleur

Liberals, Progressives and Socialists - Walter E. Williams - Page 1 - 1 views

  •  
    The Williams article does no more than to sing to the choir and certainly is no scholarly work. First he stuffs the Nazis into his own "socialist" bag, ignoring the fact that the "socialist" label in the party name was only window dressing for what was in reality a mix of fascism and capitalism, not socialism. Then he declares that "communists" in the Soviet Union were responsible for mass murders, blinking past the fact that the Soviet Union was communist in name only. It was a fascist state during the entire period when the mass murders there took place and wound up an oligarchy before it died. "Communist China" likewise was never a communist state. It began as a socialist state ruled by an oligarchy, became near-fascist under Chairman Mao, and returned to being an oligarchy after his death, but this time sprouting capitalist wings. (Nixon removing the U.S. trade barriers with China had a lot to do with this.) Having stuffed everything in sight into his "socialist" bag, deserving or not, and labeling *all* socialists as government mass murders, Williams takes the insurmountable mental leap to paint groups like the "NAACP, the National Council of La Raza, Green for All, the Sierra Club and the Children's Defense Fund" as mass murderers, apparently should their views ever become dominant in the U.S. (Williams provides no connective tissue for his illogic there.) Then to top it all off, the web site's editor slaps a title on the essay lumping liberals and progressives in with the socialists, so apparently liberals and progressives are potential mass murderers too, which is unmistakably his innuendo. Williams seems to have a problem with organizations working *through our legal system* to expand civil liberties and to raise ethnic minorities out of poverty. Love 'em or hate 'em, those are not groups of mass murderers. Williams has the right to dislike those organizations. He also has the right to make absurd arguments, which he has fully exercised. But he wa
Gary Edwards

An interview with Lt. Gen. Ion Pacepa, the highest ranking Soviet bloc intel officer to ever defect | TheBlaze.com - 0 views

  • In a gripping interview with Blaze Books in connection with his most-recent title, “Disinformation“, the highest-ranking Soviet bloc intelligence officer to ever defect, Lt. Gen. Ion Pacepa provided his insights on a wide array of topics, from Putin’s Russia to the disinformation campaign to rebrand Pope Pius XII to “Hitler’s Pope” to the links between Leftism and anti-Semitism to the Boston bombing, and all things in-between.
  • Playing devil’s advocate here, some might argue that since the Soviet Union was defeated, Americans shouldn’t care about a book on Soviet disinformation tactics. What would you say to these people? Pacepa: The very idea that the Soviet Union was defeated is disinformation in itself. The Soviet Union changed its name and dropped its façade of Marxism, but it remained the same samoderzhaviye, the historical Russian form of autocracy in which a tsar is running the country with the help of his political police. During the Soviet Union, the KGB was a state within the state. Now the KGB is the state. Over 6,000 former KGB officers are running Russia’s federal and local governments. The Soviet Union had one KGB officer for every 428 citizens. In 2004, Russia had one FSB officer for every 297 citizens.
  • How would you describe today’s Russia? Russia today is the first intelligence dictatorship in history. It is a brand new form of totalitarianism, which we are not yet familiar with. Now the KGB, rechristened FSB, is openly running Russia. On Sept. 11, 2002, hordes of former KGB officers gathered in Moscow at the Lubyanka—the headquarters of the old and new KGB. They had not congregated to sympathize with America’s national tragedy of the previous year, but to celebrate the 125th birthday of Feliks Dzerzhinsky—the man who created the most criminal institution in contemporary history. One of my former bosses, KGB chairman Vladimir Semichastny, groused to a crowd: “I think a goal was set to destroy the KGB, to make it toothless.”[1] A few days later, Moscow’s mayor, Yury Lushkov, one of Russia’s most influential politicians, reversed himself by saying he now wanted to restore Dzerzhinsky’s statue to its place on Lubyanka Square. It will not be easy to break Russia’s five-century-old tradition of being a police state. Nevertheless, man would not have learned to walk on the moon had he not first studied what the moon was really made of and where it lay in the universe. This is one reason we wrote “Disinformation.” Let’s hope a new generation of Russians will learn the truth, and will give that immense country a new national identity.
  • ...1 more annotation...
  • Pacepa: That Marxism and its earthly Socialism are immense disinformation operations, and that all they have left behind is former Marxist countries that ended up looking like trailer camps hit by a hurricane, and leaders roasting in Dante’s Inferno. That all Marxists who have ever risen to lead a country have ended up in hell—all, from Trotsky to Stalin, Tito to Enver Hoxha to Mátyás Rakosi, Sékou Touré, Nyeree and Hugo Chavez. That all had their days of temporary glory, but that all ended in eternal disgrace. Some, like Khrushchev and Ceausescu, were even found unworthy of having their final resting place marked by any gravestone. A few remnants, like Fidel and Raul Castro, are still hanging on, but they certainly have a place in hell reserved and waiting for them. Perhaps our book may also help President Obama abandon his craving for Marx’s utopian ideology, “to each according to his need,” which is transforming the United States into a decaying socialist country in all but name.
Paul Merrell

US Regime-Change Operation in Ukraine Exposed in Leaked Diplomatic Phone Call | Global Research - 0 views

  • A leaked phone conversation between Victoria Nuland, assistant secretary of state for European and Eurasian affairs, and Geoffrey Pyatt, the US ambassador to Ukraine, has exposed the anti-democratic and colonialist character of the Obama administration’s intervention in the former Soviet republic. The discussion between the two officials includes a detailed review of which right-wing opposition figures Washington is working to install in office, and how it is using the United Nations to rubber-stamp the operation. While Germany and other European powers have worked closely with the Obama administration in promoting the violent protests against President Viktor Yanukovych, the leaked phone call reveals tensions between the imperialist powers. At one point Nuland tells Pyatt, “Fuck the EU.”
  • Nuland continues: “Yats [Yatsenyuk] is the guy that who’s got the economic experience, the governing experience.” Pyatt later warns Nuland that “Klitschko has been the top dog” within the opposition, and that she will need to “move fast on all this stuff” and speak with the UDAR leader as part of their “personality management” of the opposition leadership. The utter criminality of Washington’s drive to install a pliant regime in Kiev sharply emerges in Nuland and Pyatt’s discussion of Oleh Tyahnybok, the leader of the neo-fascist All-Ukrainian Union (Svoboda) party. Nuland describes Tyahnybok as one of the “big three” within the opposition leadership. The State Department operative goes on to tell Pyatt that “what [Yatsenyuk] needs [after he is installed in office] is Klitsch and Tyahnybok on the outside—he needs to be talking to them four times a week.” These remarks confirm that there is no confusion whatsoever within the Obama administration that it is working in partnership with fascist movements in Ukraine.
  • Tyahnybok is the leader of the Svoboda party, which was initially called the Social-National Party of Ukraine and featured a neo-Nazi logo. In 2004, Tyahnybok praised right-wing Ukrainian partisans in World War II, who, he declared, “did not fear, but took up their automatic rifles, going into the woods to fight Muscovites, Germans, Jewry and other filth.” He added that Ukraine still had to be liberated from a “Moscow-Jewish mafia.” In 2005, Tyahnybok signed an open letter to Ukrainian leaders demanding a halt to the “criminal activities” of “organised Jewry,” which, he declared, was attempting to commit “genocide” against the Ukrainian people. This is one of the “big three” figures with whom the Obama administration is working to install a client regime in Ukraine. Yesterday, Nuland met with several opposition figures, among them Oleh Tyahnybok. No details of the discussion have been made public, but Ambassador Pyatt released via Twitter a photo of a smiling Nuland posing next to the pro-Nazi leader and his colleagues.
  •  
    There was far more in that telephone conversation than an F-bomb leveled at the E.U., not that you would learn this from mainstream media.
Paul Merrell

The FBI's Own Hostage Crisis - Newsweek - 0 views

  • By  Jeff Stein 0 Share Last Thursday, an urgent call went out from CIA headquarters to the spy agency's director, John Brennan, who was giving a speech to a graduating class at The Farm, the CIA's training facility near Williamsburg, Va. Brennan was warned that the Associated Press and The Washington Post were about to publish the results of a long investigation revealing that Robert Levinson, a retired FBI agent who had gone missing while "on private business" in Iran six years ago, had actually been working for the CIA. A handful of national security reporters in D.C. had known of Levinson's CIA connection for years but agreed to sit on it, accepting the CIA's rationale that publishing the information could endanger the life of Levinson, who was ostensibly pursuing an investigation of cigarette smuggling for a private client when he went missing on Iran's Kish Island in March 2007. Levinson was thought to be in Iranian hands. On Thursday morning, the entreaties of lower ranking CIA officials to the AP and Washington Post not to publish the story were rebuffed. Other high-ranking Obama administration officials, including White House chief of staff Denis McDonough and deputy national security advisor Ben Rhodes, as well as FBI Deputy Director Mark Giuliano, made the same argument to the reporters and their editors. By the time Brennan got his warning from headquarters, however, it was too late to for him to make an appeal. The story, by the AP's Matt Apuzzo and Adam Goldman, who had recently left AP to join The Washington Post, was online.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Circle Bastiat - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Private firms selling mass surveillance systems around world, documents show | World news | The Guardian - 0 views

  • Private firms are selling spying tools and mass surveillance technologies to developing countries with promises that "off the shelf" equipment will allow them to snoop on millions of emails, text messages and phone calls, according to a cache of documents published on Monday.The papers show how firms, including dozens from Britain, tout the capabilities at private trade fairs aimed at offering nations in Africa, Asia and the Middle East the kind of powerful capabilities that are usually associated with government agencies such as GCHQ and its US counterpart, the National Security Agency.The market has raised concerns among human rights groups and ministers, who are poised to announce new rules about the sale of such equipment from Britain.
  • The documents are included in an online database compiled by the research watchdog Privacy International, which has spent four years gathering 1,203 brochures and sales pitches used at conventions in Dubai, Prague, Brasilia, Washington, Kuala Lumpur, Paris and London. Analysts posed as potential buyers to gain access to the private fairs.The database, called the Surveillance Industry Index, shows how firms from the UK, Israel, Germany, France and the US offer governments a range of systems that allow them to secretly hack into internet cables carrying email and phone traffic.The index has details from 338 companies, including 77 from the UK, offering a total of 97 different technologies.
  • The documents include a brochure from a company called Advanced Middle East Systems (AMES), based in Dubai. It has been offering a device called Cerebro – a DIY system similar to the Tempora programme run by GCHQ – that taps information from fibre-optic cables carrying internet traffic.AMES describes Cerebro as a "core technology designed to monitor and analyse in real time communications … including SMS (texting), GSM (mobile calls), billing data, emails, conversations, webmail, chat sessions and social networks."The company brochure makes clear this is done by attaching probes to internet cables. "No co-operation with the providers is required," it adds."Cerebro is designed to store several billions of records – metadata and/or communication contents. At any time the investigators can follow the live activity of their target with advanced targeting criteria (email addresses, phone numbers, key words)," says the brochure.
  • ...2 more annotations...
  • Another firm selling similar equipment is VASTech, based in South Africa, which has a system called Zebra. Potential buyers are told it has been designed to help "government security agencies face huge challenges in their combat against crime and terrorism".VASTech says Zebra offers "access to high volumes of information generated via telecommunication services for the purposes of analysis and investigation".It has been designed to "intercept all content and metadata of voice, SMS, email and fax communications on the connected network, creating a rich repository of information".
  • It is now possible, from a single laptop computer, to locate where a mobile phone is calling from anywhere in the world, with an accuracy of between 200 metres and a mile. This is not done by attaching probes, and it is not limited to the area where the laptop is working from. The "cross border" system means it is now theoretically possible to locate a mobile phone call from a town abroad from a laptop in London.
Paul Merrell

New EU rules to curb transfer of data to US after Edward Snowden revelations | World news | theguardian.com - 0 views

  • New European rules aimed at curbing questionable transfers of data from EU countries to the US are being finalised in Brussels in the first concrete reaction to the Edward Snowden disclosures on US and British mass surveillance of digital communications.Regulations on European data protection standards are expected to pass the European parliament committee stage on Monday after the various political groupings agreed on a new compromise draft following two years of gridlock on the issue.The draft would make it harder for the big US internet servers and social media providers to transfer European data to third countries, subject them to EU law rather than secret American court orders, and authorise swingeing fines possibly running into the billions for the first time for not complying with the new rules.
  • "As parliamentarians, as politicians, as governments we have lost control over our intelligence services. We have to get it back again," said Jan Philipp Albrecht, the German Greens MEP who is steering the data protection regulation through the parliament.Data privacy in the EU is currently under the authority of national governments with standards varying enormously across the 28 countries, complicating efforts to arrive at satisfactory data transfer agreements with the US. The current rules are easily sidestepped by the big Silicon Valley companies, Brussels argues.The new rules, if agreed, would ban the transfer of data unless based on EU law or under a new transatlantic pact with the Americans complying with EU law."Without any concrete agreement there would be no data processing by telecommunications and internet companies allowed," says a summary of the proposed new regime.
  • Such bans were foreseen in initial wording two years ago but were dropped under the pressure of intense lobbying from Washington. The proposed ban has been revived directly as a result of the uproar over operations by the US's National Security Agency (NSA).Viviane Reding, the EU's commissioner for justice and the leading advocate in Brussels of a new system securing individuals' rights to privacy and data protection, argues that the new rulebook will rebalance the power relationship between the US and Europe on the issue, supplying leverage to force the American authorities and tech firms to reform."The recent data scandals prove that sensitivity has been growing on the US side of how important data protection really is for Europeans," she told a German foreign policy journal. "All those US companies that do dominate the tech market and the internet want to have access to our goldmine, the internal market with over 500 million potential customers. If they want to access it, they will have to apply our rules. The leverage that we will have in the near future is thus the EU's data protection regulation. It will make crystal clear that non-European companies, when offering goods and services to European consumers, will have to apply the EU data protection law in full. There will be no legal loopholes any more."But the proposed rules remain riddled with loopholes for intelligence services to exploit, MEPs admit.
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
« First ‹ Previous 181 - 200 of 316 Next › Last »
Showing 20 items per page