Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "NSA-targets-Americans" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

N.S.A. Report Outlined Goals for More Power - NYTimes.com - 0 views

  • Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document.
  • In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.” Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A. to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the document concluded. Using sweeping language, the paper also outlined some of the agency’s other ambitions. They included defeating the cybersecurity practices of adversaries in order to acquire the data the agency needs from “anyone, anytime, anywhere.” The agency also said it would try to decrypt or bypass codes that keep communications secret by influencing “the global commercial encryption market through commercial relationships,” human spies and intelligence partners in other countries. It also talked of the need to “revolutionize” analysis of its vast collections of data to “radically increase operational impact.”
  • The N.S.A. document, titled “Sigint Strategy 2012-2016,” does not make clear what legal or policy changes the agency might seek. The N.S.A.’s powers are determined variously by Congress, executive orders and the nation’s secret intelligence court, and its operations are governed by layers of regulations. While asserting that the agency’s “culture of compliance” would not be compromised, N.S.A. officials argued that they needed more flexibility, according to the paper. Senior intelligence officials, responding to questions about the document, said that the N.S.A. believed that legal impediments limited its ability to conduct surveillance of terrorism suspects inside the United States. Despite an overhaul of national security law in 2008, the officials said, if a terrorism suspect who is under surveillance overseas enters the United States, the agency has to stop monitoring him until it obtains a warrant from the Foreign Intelligence Surveillance Court. “N.S.A.’s Sigint strategy is designed to guide investments in future capabilities and close gaps in current capabilities,” the agency said in a statement. “In an ever-changing technology and telecommunications environment, N.S.A. tries to get in front of issues to better fulfill the foreign-intelligence requirements of the U.S. government.”
  • ...4 more annotations...
  • Critics, including some congressional leaders, say that the role of N.S.A. surveillance in thwarting terrorist attacks — often cited by the agency to justify expanded powers — has been exaggerated. In response to the controversy about its activities after Mr. Snowden’s disclosures, agency officials claimed that the N.S.A.’s sweeping domestic surveillance programs had helped in 54 “terrorist-related activities.” But under growing scrutiny, congressional staff members and other critics say that the use of such figures by defenders of the agency has drastically overstated the value of the domestic surveillance programs in counterterrorism. Agency leaders believe that the N.S.A. has never enjoyed such a target-rich environment as it does now because of the global explosion of digital information — and they want to make certain that they can dominate “the Sigint battle space” in the future, the document said. To be “optimally effective,” the paper said, “legal, policy and process authorities must be as adaptive and dynamic as the technological and operational advances we seek to exploit.” Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks.
  • Yet the paper also shows how the agency believes it can influence and shape trends in high-tech industries in other ways to suit its needs. One of the agency’s goals is to “continue to invest in the industrial base and drive the state of the art for high performance computing to maintain pre-eminent cryptanalytic capability for the nation.” The paper added that the N.S.A. must seek to “identify new access, collection and exploitation methods by leveraging global business trends in data and communications services.” And it wants to find ways to combine all of its technical tools to enhance its surveillance powers. The N.S.A. will seek to integrate its “capabilities to reach previously inaccessible targets in support of exploitation, cyberdefense and cyberoperations,” the paper stated. The agency also intends to improve its access to encrypted communications used by individuals, businesses and foreign governments, the strategy document said. The N.S.A. has already had some success in defeating encryption, The New York Times has reported, but the document makes it clear that countering “ubiquitous, strong, commercial network encryption” is a top priority. The agency plans to fight back against the rise of encryption through relationships with companies that develop encryption tools and through espionage operations. In other countries, the document said, the N.S.A. must also “counter indigenous cryptographic programs by targeting their industrial bases with all available Sigint and Humint” — human intelligence, meaning spies.
  • Above all, the strategy paper suggests the N.S.A.’s vast view of its mission: nothing less than to “dramatically increase mastery of the global network.” Other N.S.A. documents offer hints of how the agency is trying to do just that. One program, code-named Treasure Map, provides what a secret N.S.A. PowerPoint presentation describes as “a near real-time, interactive map of the global Internet.” According to the undated PowerPoint presentation, disclosed by Mr. Snowden, Treasure Map gives the N.S.A. “a 300,000 foot view of the Internet.”  Relying on Internet routing data, commercial and Sigint information, Treasure Map is a sophisticated tool, one that the PowerPoint presentation describes as a “massive Internet mapping, analysis and exploration engine.” It collects Wi-Fi network and geolocation data, and between 30 million and 50 million unique Internet provider addresses — code that can reveal the location and owner of a computer, mobile device or router — are represented each day on Treasure Map, according to the document. It boasts that the program can map “any device, anywhere, all the time.”  The documents include addresses labeled as based in the “U.S.,” and because so much Internet traffic flows through the United States, it would be difficult to map much of the world without capturing such addresses.
  • The program takes advantage of the capabilities of other secret N.S.A. programs. To support Treasure Map, for example, the document states that another program, called Packaged Goods, tracks the “traceroutes” through which data flows around the Internet. Through Packaged Goods, the N.S.A. has gained access to “13 covered servers in unwitting data centers around the globe,” according to the PowerPoint. The document identifies a list of countries where the data centers are located, including Germany, Poland, Denmark, South Africa and Taiwan as well as Russia, China and Singapore.
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Gary Edwards

E-mail's Big Privacy Problem: Q&A With Silent Circle Co-Founder Phil Zimmermann - Forbes - 1 views

  • Customers of Silent Circle’s encrypted mail service got an unfortunate surprise on Friday: all their messages had been deleted. The management  of Silent Circle, an encryption firm that specializes in smartphone communication, abruptly shut down their e-mail service yesterday, saying they were pre-empting the U.S. government from forcing them to hand over customer data. While they were confident they could protect text messages, voice calls and video calls, e-mail had always been less secure because it relied on standard Internet protocols. Yesterday’s catalyst was a competitor, Lavabit, whose founder announced he was shutting his email-hosting company down due to an apparent government investigation, and told Forbes on Friday: “If you knew what I knew about e-mail, you might not use it.” Edward Snowden had been a Lavabit user.
  • Phil Zimmermann, the inventor of popular email encryption service Pretty Good Privacy (PGP) and co-founder of Silent Circle, told us even he was using e-mail less and less, and relying more heavily on mobile messaging services in the quest for privacy. He also explained the gnawing problem of Silent Circle’s e-mail service and why the company was now planning to put servers in Switzerland. Read the full Q&A with Zimmermann below, and you can read Kashmir Hill’s interview with Lavabit’s founder here.
  •  
    Good interview with Phil Zimmerman, the inventor of PGP, and founder of Silent Circle eMail Service.  Which is being shut down because of the what the Feds did to LavaBit. What concerns me most about this illegal and systematic invasion of privacy is the massive potential for blackmail and extortion.  Think of what the IRS illegally did to tens of millions of Americans, targeting them because of their religious and political views, and seeking volumes of highly personal information far beyond reasonable requirements.   What happens when the politicians in power start using the IRS and NSA for political purposes - like what we just saw in the 2012 elections? When I was working on the wiki-Word and SurDoc projects, we were very concerned about having our documents and designs hosted or passing through competitor (Microsoft and Google) servers and email systems.  At the time I thought I was just being paranoid.  Now we know differently.  We had every reason to be concerned.
Paul Merrell

NSA spied on the Vatican as cardinals elected Pope Francis | The Raw Story - 0 views

  • US secret services allegedly eavesdropped on cardinals before the conclave in March to elect a new pope, Italian weekly magazine Panorama claimed Wednesday. “The National Security Agency wiretapped the pope,” the magazine said, accusing the United States of listening in to telephone calls to and from the Vatican, including the accommodation housing cardinal Jorge Mario Bergoglio before he was elected Pope Francis. The allegations follow a report on surveillance website Cryptome which said the United States intercepted 46 million telephone calls in Italy in December 2012 and early January 2013. Among those, “there are apparently also calls from and to the Vatican,” Panorama said. “It is feared that the great American ear continued to tap prelates’ conversations up to the eve of the conclave,” it said, adding that there were “suspicions that the conversations of the future pope may have been monitored”. Bergoglio “had been a person of interest to the American secret services since 2005, according to Wikileaks,” it said.
  • The bugged conversations were divided into four categories: “leadership intentions”, “threats to financial systems”, “foreign policy objectives” and “human rights,” it claimed. Vatican spokesman Federico Lombardi said “we have heard nothing of this and are not worried about it.” If true, the US spying would be an embarrassing blow to an institution famous for its secrecy. The goings-on of the conclave are particularly clock-and-dagger, with a system installed in the Sistine chapel where the cardinals meet in order to scramble any mobile phone communications and excommunication for those who spill the beans.
Paul Merrell

U.S. accuses China of cyber spying on American companies | Reuters - 0 views

  • The United States on Monday charged five Chinese military officers and accused them of hacking into American nuclear, metal and solar companies to steal trade secrets, ratcheting up tensions between the two world powers over cyber espionage. China immediately denied the charges, saying in a strongly worded Foreign Ministry statement the U.S. grand jury indictment was "made up" and would damage trust between the two nations.Officials in Washington have argued for years that cyber espionage is a top national security concern. The indictment was the first criminal hacking charge that the United States has filed against specific foreign officials, and follows a steady increase in public criticism and private confrontation, including at a summit last year between U.S. President Barack Obama and Chinese President Xi Jinping.
  • Federal prosecutors said the suspects targeted companies including Alcoa Inc, Allegheny Technologies Inc, United States Steel Corp, Toshiba Corp unit Westinghouse Electric Co, the U.S. subsidiaries of SolarWorld AG, and a steel workers' union.
  • According to the indictment, Chinese state-owned companies "hired" Unit 61398 of the People's Liberation Army "to provide information technology services" including assembling a database of corporate intelligence. The Chinese companies were not named.The Shanghai-based Unit 61398 was identified last year by cybersecurity firm Mandiant as the source of a large number of espionage operations. All five defendants worked with 61398, according to the indictment.
  • ...4 more annotations...
  • U.S. officials have maintained that they do not steal secrets to give an advantage to U.S. companies, but in China, Lewis said, the line between military and business prowess is unclear.Unit 61398 has hundreds of active spies and is just one of dozens of such bodies in China, said Jen Weedon, an analyst at Mandiant, now owned by global network security company FireEye Inc. She said the group is not among the most sophisticated.
  • Washington announced the charges as new claims emerged last week about the scope of overseas spying by the United States. Documents leaked by Snowden showed the agency intercepted and modified equipment made by Cisco Systems Inc that was headed overseas.Cisco responded by asking Obama to curtail U.S. surveillance programs, underscoring the vulnerability of multinationals to a whipsaw of competing government interests.
  • Skeptics said U.S. authorities would not be able to arrest those indicted because Beijing would not hand them over. Still, the move would prevent the individuals from traveling to the United States or other countries that have an extradition agreement with the United States.
  • In an indictment filed in the Western District of Pennsylvania, prosecutors said the officers hacked into computers starting in 2006, often by infecting machines with tainted "spear phishing" emails to employees that purport to be from colleagues.Prosecutors alleged that one hacker, for example, stole cost and pricing information in 2012 from an Oregon-based solar panel production unit of SolarWorld. The company was losing market share at the time to Chinese competitors who were systematically pricing exports below production costs, according to the indictment.Another officer is accused of stealing technical and design specifications about pipes for nuclear plants from Westinghouse Electric as the company was negotiating with a Chinese company to build four power plants in China, prosecutors said.
  •  
    Yesterday I watched the DoJ press conference announcing charges. This article does not capture its spirit. AG Ben Holder faced stiff questions directed by attending reporters. One of the first questions went something like this: "Is it true that the U.S. has extradition treaty with China and these defendants will never be actually prosecuted, and if so, what's the real reason for the charges?" Others raised the hypocrisy of the U.S. move in light of what the NSA has been doing. Holder ducked the tough questions  The press conference was a farce and too many of the reporters realized it. Recall that Obama was days away from traveling to China with the announced purpose of chastising its leader for waging cyberesionage against the U.S. when the first Edward Snowden pulled the moral high ground from beneath Obama's feet. This stunt looks more like it was designed to lesson the government pain by promoting Obama's "everyone does it" meme.   Also not mentioned in this article, at the press confernence the five defendants were identified as generals in the Chinese Army. Might we see China respond by charging a few former and present NSA generals with cyber-espionage? Fun and games on the Beltway. 
Paul Merrell

Obama Issues Threats To Russia And NATO -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • The Obama regime has issued simultaneous threats to the enemy it is making out of Russia and to its European NATO allies on which Washington is relying to support sanctions on Russia. This cannot end well. As even Americans living in a controlled media environment are aware, Europeans, South Americans, and Chinese are infuriated that the National Stasi Agency is spying on their communications. NSA’s affront to legality, the US Constitution, and international diplomatic norms is unprecedented. Yet, the spying continues, while Congress sits sucking its thumb and betraying its oath to defend the Constitution of the United States. In Washington mumbo-jumbo from the executive branch about “national security” suffices to negate statutory law and Constitutional requirements. Western Europe, seeing that the White House, Congress and the Federal Courts are impotent and unable to rein-in the Stasi Police State, has decided to create a European communication system that excludes US companies in order to protect the privacy of European citizens and government communications from the Washington Stasi.
  • The Obama regime, desperate that no individual and no country escape its spy net, denounced Western Europe’s intention to protect the privacy of its communications as “a violation of trade laws.” Obama’s US Trade Representative, who has been negotiating secret “trade agreements” in Europe and Asia that give US corporations immunity to the laws of all countries that sign the agreements, has threatened WTO penalties if Europe’s communications network excludes the US companies that serve as spies for NSA. Washington in all its arrogance has told its most necessary allies that if you don’t let us spy on you, we will use WTO to penalize you. So there you have it. The rest of the world now has the best possible reason to exit the WTO and to avoid the Trans-Pacific and Trans-Atlantic “trade agreements.” The agreements are not about trade. The purpose of these “trade agreements” is to establish the hegemony of Washington and US corporations over other countries. In an arrogant demonstration of Washington’s power over Europe, the US Trade Representative warned Washington’s NATO allies: “US Trade Representative will be carefully monitoring the development of any such proposals” to create a separate European communication network. http://rt.com/news/us-europe-nsa-snowden-549/ Washington is relying on the Chancellor of Germany, the President of France, and the Prime Minister of the UK to place service to Washington above their countries’ communications privacy.
  • It has dawned on the Russian government that being a part of the American dollar system means that Russia is open to being looted by Western banks and corporations or by individuals financed by them, that the ruble is vulnerable to being driven down by speculators in the foreign exchange market and by capital outflows, and that dependence on the American international payments system exposes Russia to arbitrary sanctions imposed by the “exceptional and indispensable country.” Why it took the Russian government so long to realize that the dollar payments system puts countries under Washington’s thumb is puzzling.
  • ...2 more annotations...
  • Now that the Russian government understands that Russia must depart the dollar system in order to protect Russian sovereignty, President Putin has entered into barter/ruble oil deals with China and Iran. However, Washington objects to Russia abandoning the dollar international payment system. Zero Hedge, a more reliable news source than the US print and TV media, reports that Washington has conveyed to both Russia and Iran that a non-dollar oil deal would trigger US sanctions. http://www.zerohedge.com/news/2014-04-04/us-threatens-russia-sanctions-over-petrodollar-busting-deal Washington’s objection to the Russian/Iranian deal made it clear to all governments that Washington uses the dollar-based international payments system as a means of control. Why should countries accept an international payments system that infringes their sovereignty? What would happen if instead of passively accepting the dollar as the means of international payment, countries simply left the dollar system? The value of the dollar would fall and so would Washington’s power. Without the power that the dollar’s role as world reserve currency gives the US to pay its bills by printing money, the US could not maintain its aggressive military posture or its payoffs to foreign governments to do its bidding. Washington would be just another failed empire, whose population can barely make ends meet, while the One Percent who comprise the mega-rich compete with 200-foot yachts and $750,000 fountain pins. The aristocracy and the serfs. That is what America has already become. A throwback to the feudal era. It is only a matter of time before it is universally recognized that the US is a failed state. Let’s pray this recognition occurs before the arrogant inhabitants of Washington blow up the world in pursuit of hegemony over others.
  • Washington’s provocative military moves against Russia are reckless and dangerous. The buildup of NATO air, ground, and naval forces on Russia’s borders in violation of the 1997 NATO-Russian treaty and the Montreux Convention naturally strike the Russian government as suspicious, especially as the buildups are justified on the basis of lies that Russia is about to invade Poland, the Baltic States, and Moldova in addition to Ukraine. These lies are transparent. The Russian Foreign Minister Sergey Lavrov has asked NATO for an explanation, stating: “We are not only expecting answers, but answers that will be based fully on respect for the rules we agreed on.” http://rt.com/news/lavrov-ukraine-nato-convention-069/ Anders Fogh Rasmussen, Washington’s puppet installed as NATO figurehead who is no more in charge of NATO than I am, responded in a way guaranteed to raise Russian anxieties. Rasmussen dismissed the Russian Foreign Minister’s request for explanation as “propaganda and disinformation.” Clearly, what we are experiencing are rising tensions caused by Washington and NATO. These tensions are in addition to the tensions arising from Washington’s coup in Ukraine. These reckless and dangerous actions have destroyed the Russian government’s trust in the West and are moving the world toward war. Little did the protesters in Kiev, called into the streets by Washington’s NGOs, realize that their foolishness was setting the world on a path to armageddon.
Paul Merrell

How Many Americans Does The N.S.A. Spy On? A Lot of Them : The New Yorker - 0 views

  • but reading the new documents, which include a secret FISA court order that amounts to a gift certificate for one year of warrant-free spying, it becomes clear that many more “United States persons” have their communications monitored, and on much vaguer grounds, than the Obama Administration has acknowledged. “What I can say unequivocally is that, if you are a U.S. person, the N.S.A. cannot listen to your telephone calls, and the N.S.A. cannot target your e-mails,” the President said earlier this week. A 2009 memorandum signed by Eric Holder establishes a broader criteria, referring to people “reasonably believed” to be located abroad. That reasonable belief, as it turns out, can be quite shaky. Among the information that the N.S.A. is told to use includes having had a phone or e-mail connection with a person “associated with a foreign power or foreign territory,” or being in the “‘buddy list’ or address book” of such a person. It won’t be lost on anyone that Americans whose families include recent immigrants will be disproportionately vulnerable to such intrusions. (So, incidentally, will journalists.) The defaults in the analysis are telling: a person
  • whose location is unknown, will not be treated as a United States person unless such person can be positively identified as such, or the nature or circumstances of the person’s give rise to a reasonable belief that such person is a United States person. (The extent to which the N.S.A. can spy on a wide range of foreigners is its own, important discussion.) The criteria also show the interaction of various N.S.A. programs: the Administration has defended the collection of telephony metadata by saying that if it ever produces an interesting match, investigators would have to go to court to get a proper warrant to look more closely. But metadata is mentioned in these documents as a basis for picking a target for the surveillance under what appears to be a blanket FISA order—not an individualized one.
  • And what happens when the N.S.A. realizes that it is reading and listening to an American’s communications? It is supposed to stop, at least until it gets a different kind of FISA order—which, based on what it has already heard, may be all the easier. And if it finds something that is interesting in any one of a half-dozen ways, it can analyze the communications further, and hold on to them for five years. Maybe an American’s e-mails contain “significant foreign intelligence information”; or maybe they don’t, but are “reasonably believed” to contain evidence of a crime. There are a lot of crimes on the books, and the N.S.A. is also allowed to count one it thinks might be “about to be committed.” It can also “disseminate” the information to other agencies, and find out more about the American if it seems that the person might have access to secrets, or be a target of foreigners, or just do business with them. This includes communications between someone under indictment and his or her lawyer—the words can’t be used in a prosecution, but can be to gather intelligence. And what the N.S.A. happens to see can also be used in leak investigations. Does this still seem too narrow, not enough to keep us all safe? The documents note that the private data of Americans that the N.S.A. can hold on to “include electronic communications acquired because of limitations on NSA’S ability to filter communications.” In other words, if it fails to fine-tune its targeting, it can keep what it sweeps up anyway. Also, if the N.S.A. decides on its own that there is an “immediate threat,” it can temporarily put all these minimization procedures aside and figure it out later.
  • ...1 more annotation...
  • These documents were classified: they shouldn’t have been. The N.S.A. can look for certain secrets and keep them. But Americans shouldn’t have to listen to the President with an ear for what words like “targeted” really mean. (Even by that standard, the Administration has not been forthright.) We get to know what the rules are—so we, and not just a secret court, can tell when they are being broken.
Paul Merrell

The Latest US and World News - USATODAY.com - 0 views

  • The U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.Federal investigators used the call records to track drug cartels' distribution networks in the USA, allowing agents to detect previously unknown trafficking rings and money handlers. They also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in a wide range of other investigations.The Justice Department revealed in January that the DEA had collected data about calls to "designated foreign countries." But the history and vast scale of that operation have not been disclosed until now.
  • The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified.The DEA program did not intercept the content of Americans' calls, but the records — which numbers were dialed and when — allowed agents to map suspects' communications and link them to troves of other police and intelligence data. At first, the drug agency did so with help from military computers and intelligence analysts
  • The extent of that surveillance alarmed privacy advocates, who questioned its legality. "This was aimed squarely at Americans," said Mark Rumold, an attorney with the Electronic Frontier Foundation. "That's very significant from a constitutional perspective."Holder halted the data collection in September 2013 amid the fallout from Snowden's revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day.Tuesday, Justice Department spokesman Patrick Rodenbush said the DEA "is no longer collecting bulk telephony metadata from U.S. service providers." A DEA spokesman declined to comment.
  • ...6 more annotations...
  • The system they built ultimately allowed the drug agency to stitch together huge collections of data to map trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.
  • The result "produced major international investigations that allowed us to take some big people," Constantine said, though he said he could not identify particular cases.
  • In 1992, in the last months of Bush's administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence operation.Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where the government determined drug traffickers operated, current and former officials said
  • The DEA obtained those records using administrative subpoenas that allow the agency to collect records "relevant or material to" federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were stretching the definition," a former official involved in the process said.Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice Department urging them to comply.
  • A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that "we do comply with all state and federal laws regarding law enforcement subpoenas."Agents said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran.At first, officials said the DEA gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program.
  • At its peak, the operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government recognizes a total of 195 countries.
Paul Merrell

Paul vows to end NSA program if elected | TheHill - 0 views

  • Sen. Rand Paul (R-Ky.) said he would end the National Security Agency's bulk collection of Americans' phone records on his first day in the White House if he is elected. "The president created this vast dragnet by executive order. And as president on day one, I would immediately end this unconstitutional surveillance," he said in a Kentucky speech Tuesday announcing his presidential bid. 
  • Paul has split with most of his party over the issue, even Cruz who has also pushed for reform. Paul has rankled some NSA reform advocates by opposing a bill to end the program because he does not believe it goes far enough to dismantle the authorizing authority.   <A HREF="http://ws-na.amazon-adsystem.com/widgets/q?rt=tf_mfw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Fthehill07-20%2F8001%2Fdffbe72d-f425-4b83-b07e-357ae9d405f6&Operation=NoScript">Amazon.com Widgets</A> He has filed a lawsuit against the government over the program and has promised not to vote to renew sections of the Patriot Act that authorize the program and are up for renewal in June. The Kentucky senator dusted off an old line in the speech Tuesday, saying the phone records of law-abiding Americans should stay private. "Warrantless searches of Americans phone and computer records are un-American and a threat to our civil liberties. I say that your phone records are yours. I say that phone records of law abiding citizens are none of their damn business," he said, later joking "is this where we light up the phones?""I believe we can have liberty and security, and I will not compromise your liberty for a false sense of security," he added later.  
  • President Obama has advocated for ending the government's bulk collection of Americans' phone records as well, but he has resisted ending it unilaterally.  The courts renew the current program every 90 days. Advocates have called on the administration to end it by simply declining to have it renewed.But Obama has resisted taking this route, calling on Congress to act.
Paul Merrell

10 Things Americans Underestimate About Our Massive Surveillance State | Alternet - 0 views

  • Americans may be upset about the latest revelations in the government’s ability to spy on citizens via their online lives, but no one should be surprised. We've underestimated and overlooked many key aspects of the government’s ability to track our lives for years. The bottom line, which resonates most strongly among civil liberties advocates on the left and conservative libertarians on the right, is not just the loss of privacy but also the growing power of the state to target and oppress people who it judges to be critics and enemies. That list doesn’t just include foreign terrorists of the al-Qaeda mold, or even the Chinese government that has  stolen the most advanced U.S. weapon plans; it also includes domestic whistleblowers, protesters and journalists—all of whom have been  targeted by the Obama administration Justice Department.   Let’s go through 10 points about these latest revelations of domestic spying to better understand what Americans have underestimated and overlooked about electronic eavesdropping.
Paul Merrell

Tomgram: Engelhardt, Knowledge Is Crime | TomDispatch - 0 views

  • Seven Free Passes for the National Security State With Cartwright as a possible exception, the members of the national security state, unlike the rest of us, exist in what might be called “post-legal” America.  They know that, no matter how heinous the crime, they will not be brought to justice for it.  The list of potentially serious criminal acts for which no one has had to take responsibility in a court of law is long, and never tabulated in one place.  Consider this, then, an initial run-down on seven of the most obvious crimes and misdemeanors of this era for which no one has been held accountable.
  • *Kidnapping:
  • *The destruction of evidence of a crime:
  • ...7 more annotations...
  • *Torture (and other abuses):
  • *Perjury before Congress:
  • *The killing of detainees in that extralegal system:
  • *Assassination:
  • *The planning of an extralegal prison system:
  • Mind you, the above seven categories don’t even take into account the sort of warrantless surveillance of Americans that should have put someone in a court of law, or the ways in which various warrior corporations overbilled or cheated the government in its war zones, or the ways private contractors “ran wild” in those same zones.  Even relatively low-level crimes by minor figures in the national security state have normally not been criminalized.  Take, for example, the private surveillance of and cyberstalking of “love interests,” or “LOVEINT,” by NSA employees using government surveillance systems.  The NSA claims that at least one employee was “disciplined” for this, but no one was taken to court.  A rare exception: a number of low level military figures in the Abu Ghraib scandal were tried for their abusive actions, convicted, and sent to jail, though no one higher than a colonel was held accountable in court for those infamously systematic and organized acts of torture and abuse. Too Big to Fail, National Security-Style
  • In Washington today, knowledge is the only crime.  That’s a political reality of the twenty-first century.  Get used to it.
Paul Merrell

Why Won't the FBI Tell the Public About its Drone Program? | Electronic Frontier Foundation - 0 views

  • Today we’re publishing—for the first time—the FBI’s drone licenses and supporting records for the last several years. Unfortunately, to say that the FBI has been less than forthcoming with these records would be a gross understatement. Just yesterday, Wired broke the story that the FBI has been using drones to surveil Americans. Wired noted that, during an FBI oversight hearing before the Senate Judiciary Committee, FBI Director Robert Mueller let slip that the FBI flies surveillance drones on American soil. Mueller tried to reassure the senators that FBI’s drone program “is very narrowly focused on particularized cases and particularized leads.” However, there’s no way to check the Director on these statements, given the Bureau’s extreme lack of transparency about its program.
  • EFF received these records as a result of our Freedom of Information lawsuit against the Federal Aviation Administration (FAA) for the licenses the FAA issues to all public entities wishing to fly drones in the national airspace. As detailed in prior posts and on our drone map, we have already received tens of thousands of pages of valuable information about local, state and federal agencies’ drone flights. However, unlike other federal agencies, including the US Air Force, the Bureau has withheld almost all information within its documents—even including the dates the FAA’s Certificates of Authorization (COAs) were issued. As you can see from the two examples linked below—the first from the Air Force and the second from the FBI—the FBI is withholding information, including something as basic as the city and state of the Bureau’s point of contact, that could in no way be expected to risk circumvention of the law (the applicable test under FOIA, 5 U.S.C. § 552 (b)(7)(E)).
  • The FBI has even withheld information from standard documents that all agencies file with the FAA to support their COA applications, many of which come directly from the drone manufacturer. (Compare, for example, the Air Force’s “LOST_LINK_MISSION” or “AIRCRAFT_SYSTEM” documents with the FBI’s versions of the same documents.) One interesting fact is that the Bureau has withheld most of the records under several statutes and regulations related to the arms exports and the International Traffic in Arms Regulations (ITAR) (see statutes and regulations here, here, and here.) This is surprising because, although ITAR does apply explicitly to drones, not even the US Military has claimed these statutes in withholding information from its drone records. Given the FBI’s past abuses and the information recently revealed about how the Bureau exploits specious interpretations of federal law to help out the NSA’s spying program, we have good reason to be concerned about the FBI’s lack of transparency here. We hope Senator Feinstein will follow up on her concerns about the FBI’s apparent lack of “strictures” in place to protect Americans’ privacy in connection to FBI drone use and demand a full accounting of how, when, where and why the Bureau has been using drones to monitor the public. Download the zip files of the documents here, here, and here.
Paul Merrell

Tap on Merkel Provides Peek at Vast Spy Net - NYTimes.com - 0 views

  • In testimony to Congress on Tuesday, the director of national intelligence, James R. Clapper Jr., gave only the roughest sketch of the size of the N.S.A.’s surveillance program, but suggested that the leader of the United States’ most powerful European ally was a single fish in a very big sea. “We’re talking about a huge enterprise here with thousands and thousands of individual requirements,” he said, using a phrase that appeared to mean individual surveillance targets. Mr. Clapper said that the United States spies on foreign leaders and other officials to see “if what they’re saying gels with what’s actually going on,” and how the policies of other countries “impact us across a whole range of issues.”
  • The N.S.A. tries to gather cellular and landline phone numbers — often obtained from American diplomats — for as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords. “They suck up every phone number they can in Germany,” said one former intelligence official. The databases are different from those housing telephone “metadata” — information about phone numbers on each end of a call and the call’s length — to find links between terrorism suspects. “Metadata is only valuable if you are trying to track the activities of a terrorist or a spy,” said the former American intelligence official. By comparison, allied leaders are low-level priorities. In the “National Intelligence Priorities Framework,” a matrix approved by the president and updated regularly, information on members of Al Qaeda and other terrorist groups, the whereabouts of nuclear weapons in Pakistan or North Korea, or the conversations of nuclear scientists in Iran are all front-burner intelligence issues. Ranked just below them are questions about the leadership of adversaries, like Russia, China or Iran, or the state of their economies.
  •  
    "Mr. Clapper said that the United States spies on foreign leaders and other officials to see 'if what they're saying gels with what's actually going on,' and how the policies of other countries 'impact us across a whole range of issues.'" Note that none of the above has anything to do with Terrorism and very little if anything to do with national security.  Also noteworthy later in the article, "'Metadata is [sic] only valuable if you are trying to track the activities of a terrorist or a spy,' said the former American intelligence official."
Paul Merrell

NSA director admits to misleading public on terror plots - Salon.com - 0 views

  • In so many words, NSA director Keith Alexander admitted Wednesday that the Obama administration had issued misleading information about terror plots and their foiling to bolster support for the government’s vast surveillance apparatus.During Wednesday’s hearing, Senate Judiciary Committee Chairman Patrick Leahy pushed Alexander to admit that plot numbers had been fudged in a revealing interchange:“There is no evidence that [bulk] phone records collection helped to thwart dozens or even several terrorist plots,” said Leahy. The Vermont Democrat then asked the NSA chief to admit that only 13 out of a previously cited 54 cases of foiled plots were genuinely the fruits of the government’s vast dragnet surveillance systems:“These weren’t all plots, and they weren’t all foiled,” Leahy said, asking Alexander, “Would you agree with that, yes or no?”“Yes,” replied Alexander.Proof positive of what many of us have long posited: that under the flimsy guise of a targeted War on Terror, the surveillance state has established itself with little regard for an honest relationship with the American public.
Paul Merrell

Edward Snowden : The Greatest Human Rights Challenge Of Our Time - 0 views

  • Six months ago, I stepped out from the shadows of the United States Government's National Security Agency to stand in front of a journalist's camera. I shared with the world evidence proving some governments are building a world-wide surveillance system to secretly track how we live, who we talk to, and what we say. I went in front of that camera with open eyes, knowing that the decision would cost me family and my home, and would risk my life. I was motivated by a belief that the citizens of the world deserve to understand the system in which they live. My greatest fear was that no one would listen to my warning. Never have I been so glad to have been so wrong.
  • There is a huge difference between legal programs, legitimate spying, legitimate law enforcement - where individuals are targeted based on a reasonable, individualized suspicion - and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever. These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about power.
  • Many Brazilian senators agree, and have asked for my assistance with their investigations of suspected crimes against Brazilian citizens. I have expressed my willingness to assist wherever appropriate and lawful, but unfortunately the United States government has worked very hard to limit my ability to do so -- going so far as to force down the Presidential Plane of Evo Morales to prevent me from traveling to Latin America! Until a country grants permanent political asylum, the US government will continue to interfere with my ability to speak. Six months ago, I revealed that the NSA wanted to listen to the whole world. Now, the whole world is listening back, and speaking out, too. And the NSA doesn't like what it's hearing. The culture of indiscriminate worldwide surveillance, exposed to public debates and real investigations on every continent, is collapsing.
  • ...2 more annotations...
  • Only three weeks ago, Brazil led the United Nations Human Rights Committee to recognize for the first time in history that privacy does not stop where the digital network starts, and that the mass surveillance of innocents is a violation of human rights. The tide has turned, and we can finally see a future where we can enjoy security without sacrificing our privacy. Our rights cannot be limited by a secret organization, and American officials should never decide the freedoms of Brazilian citizens. Even the defenders of mass surveillance, those who may not be persuaded that our surveillance technologies have dangerously outpaced democratic controls, now agree that in democracies, surveillance of the public must be debated by the public.
  • My act of conscience began with a statement: "I don't want to live in a world where everything that I say, everything I do, everyone I talk to, every expression of creativity or love or friendship is recorded. That's not something I'm willing to support, it's not something I'm willing to build, and it's not something I'm willing to live under." Days later, I was told my government had made me stateless and wanted to imprison me. The price for my speech was my passport, but I would pay it again: I will not be the one to ignore criminality for the sake of political comfort. I would rather be without a state than without a voice. If Brazil hears only one thing from me, let it be this: when all of us band together against injustices and in defense of privacy and basic human rights, we can defend ourselves from even the most powerful systems.
  •  
    Edward Snowden speaks to the people of Brazil with a message of hope. We'll see how it plays out. But for those of us in the U.S. or one of the other "5 eyes" nations, some words of particular importance: "These programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about power." 
Paul Merrell

Glenn Greenwald: Spying not about terror - Jose DelReal - POLITICO.com - 0 views

  • Journalist Glenn Greenwald is once again rejecting claims that he and National Security Agency leaker Edward Snowden are endangering American efforts to fight terrorism — and he’s using recent reports that the NSA might have spied on German Chancellor Angela Merkel to prove his point.“What we revealed is that this spying system is devoted not to terrorists, but is directed to innocent people around the world,” Greenwald told CNN’s Christiane Amanpour in an interview that aired Monday. “None of this has anything to do with terrorism. Is Angela Merkel a terrorist?”
  • “This is clearly about political power and economic espionage. And the claim that this is all about terrorism is seen around the world as what it is, which is pure deceit,” he added.
  • Greenwald insisted that his reporting and Snowden’s leaks are exposing the unnecessary expansiveness of the NSA spying program. “Every terrorist who is capable of tying their own shoes has long known that the U.S. government and the U.K. government are trying to monitor their communications in every way that they can,” Greenwald said. “That isn’t new. We didn’t reveal anything to terrorists that they didn’t already know.” Amanpour’s full interview with Greenwald will air Monday evening on CNN.
Paul Merrell

Director Of National Intelligence Confirms Smart Devices May Be Used To Spy On Americans - 0 views

  • Director of National Intelligence James Clapper stated to the Senate Armed Services Committee that the Internet of Things (IoT) — so-called “smart” devices, vehicles, and appliances which employ various computer technologies — may be used to spy and keep tabs on people in the future. “In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” Clapper’s prepared testimony claimed. Though his remarks were ostensibly, and not surprisingly, directed toward the fight against ‘terrorism,’ the potential implications for all civilians cannot be ignored — particularly considering the IoT comprises everything from smart cars and fitness tracking devices to televisions and Barbie dolls. Clapper warns the threat from Russia, China, Iran, North Korea, and such non-state actors as ISIL and al-Qaeda. can be expected in the form of cyber attacks, gathering information about individuals, and even psy-ops, which make the IoT vulnerable to malicious intent — and ideal for U.S. intelligence-gathering purposes. “Future cyber operations will almost certainly include an increased emphasis on changing or manipulating data to compromise its integrity (i.e., accuracy and reliability) … Broader adoption of IoT devices and AI [artificial intelligence] — in settings such as public utilities and health care — will only exacerbate these potential effects,” said Clapper.
  • No matter the possible veracity in concerns of National Intelligence, the agency’s desire to thwart terrorism with an exponential increase in surveillance should be disquieting to all civilians wishing to maintain a modicum of privacy. As researchers with the Berkman Center for Internet & Society at Harvard warned in their recent report, Don’t Panic: “The Internet of Things promises a new frontier for networking objects, machines, and environments in ways that we [are] just beginning to understand. When, say, a television has a microphone and a network connection, and is reprogrammable by its vendor, it could be used to listen in to one side of a telephone conversation taking place in its room — no matter how encrypted the telephone service itself might be. These forces are on a trajectory towards a future with more opportunities for surveillance.” In fact, the Nest is a home automation producer of programmable, self-learning, sensor-driven, Wi-Fi-enabled thermostats, smoke detectors, and other security systems. It’s also one of the devices can be used to spy on people in their homes. Clapper’s testimony carefully constructs a potential legal justification for expanding surveillance via, say, your dishwasher, in his assertion that homegrown violent extremists — who have now earned an acronym, HVEs — present the greatest looming threat inside the United States. According to his remarks:
Paul Merrell

Attention fliers: Canada's electronic spy agency is following you - new Snowden leaks - RT News - 0 views

  • Documents released by US whistleblower Edward Snowden show the Communications Security Establishment Canada (CSEC) used airport Wi-Fi to track passengers from around the world. Travelers passing through a major Canadian airport were potentially caught up in a vast electronic surveillance net, which allowed the nation’s electronic spy agency to track the wireless devices of thousands of airline passengers - even for days after they had departed the terminal, a document obtained by CBC News revealed. The document shows the spy agency was then able to track travelers for a week or more as the unwitting passengers, together with their wireless devices, visited other Wi-Fi "hot spots" in locations across Canada, and across the border at American airports.
  • After reviewing details of the leaked information, one of Canada's leading authorities on internet security says the secret operation was almost certainly illegal. "I can't see any circumstance in which this would not be unlawful, under current Canadian law, under our Charter, under CSEC's mandates," Professor Ronald Deibert, an internet security expert at the University of Toronto, told CBC News. It remains unclear from the leaked data how CSEC was able to infiltrate so many wireless devices to see who was using them, both on Canadian territory and beyond.
  • The CSEC is specifically tasked with gathering foreign intelligence by intercepting overseas phone and internet traffic, and is forbidden by law from collecting information on Canadians - or foreigners in Canada - without a court warrant. As CSEC Chief John Forster recently stated: "I can tell you that we do not target Canadians at home or abroad in our foreign intelligence activities, nor do we target anyone in Canada. "In fact, it's prohibited by law. Protecting the privacy of Canadians is our most important principle." However analysts who were privy to the document say that airline passengers in a Canadian airport were clearly on the territory of Canada. CSEC spokesperson Lauri Sullivan told the Star, an online Canadian news outlet, that the “classified document in question is a technical presentation between specialists exploring mathematical models built on everyday scenarios to identify and locate foreign terrorist threats.”
  • ...2 more annotations...
  • Early assessment of the leaked information indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its American partner, the National Security Agency. The technology was to be shared with the so-called 'Five Eyes' surveillance bloc composed of Canada, the United States, Britain, New Zealand and Australia. In the document, CSEC described the new spy technology as "game-changing," saying it could be used for powerful surveillance on "any target that makes occasional forays into other cities/regions." Sources told CBC News the “technologies tested on Canadians in 2012 have since become fully operational.”
  • Ontario's privacy commissioner Ann Cavoukian admitted she is "blown away" by news of the secret operation. "It is really unbelievable that CSEC would engage in that kind of surveillance of Canadians," Cavoukian told the Canadian news agency. "This resembles the activities of a totalitarian state, not a free and open society."
Paul Merrell

US also eavesdrops on Israel, says former Mossad head | The Times of Israel - 0 views

  • day after it was revealed that the US National Security Agency monitored the private conversations of some 35 world leaders, former head of the Mossad Danny Yatom said Friday that the US listens in on its ally Israel as well.
  • “I can tell you with certain knowledge that [America] has been listening in on its allies, including Israel,” Yatom said, and “not necessarily in [Benjamin] Netanyahu’s tenure” as prime minister. “The US doesn’t really care about anyone [but itself] and the Americans are vehemently denying the incidents,” Yatom told the Israeli daily Maariv on Friday. ”It could very well be that these things [monitoring calls] are happening here [in Israel] too. When the Americans think they need to listen in on someone, they’ll do just that.” Yatom explained that there are two issues around which the Americans are likely spying on Israel — negotiations with Palestinians and the Iranian nuclear program.
  •  
    Ah, the finger-pointing at each other begins.
Paul Merrell

Judicial Watch Played Into The Government's Hands -- Americans Are Blinded By Agendas - PaulCraigRoberts.org - 0 views

  • Disinformation succeeds because so many people and interest groups across the political spectrum find that it serves their agendas as well as the agenda of the government. Consider for example the explanation of 9/11 that blamed Muslim terrorists for the attack. This served the interests of the neoconservatives, the private armaments companies, the US military, the private security companies, government security agencies such as the CIA, the left-wing, the right-wing, the Israel Lobby, and the print and TV media. The official explanation gave the neoconservatives the “new Pearl Harbor” that they needed for their program of invasions of Middle Eastern countries. The private armaments companies could look forward to decades of high profits. Wars always bring the military rapid promotions and higher retirement benefits. Private manufacturers of security equipment and spyware enjoy a rising demand for their products and have grown fat from the products sold to the TSA and NSA. Homeland Security has vastly expanded the federal workforce and administrative positions. The left-wing has proof of “blowback” caused by US interference in the internal affairs of other countries. The right-wing has proof that America has enemies against whom defense at all costs is necessary. The Israel Lobby has the US to overthrow the regimes in the way of Israel’s territorial expansion. The media has the story of the century with which to boost ratings and curry the favor of government.
  • In other words, the government’s story cannot stand the light cast by the facts and independent experts, and the government’s false story must be protected by shutting down the truth-telling experts. The government, Sunstein argued, needs to either gain control over these experts or to shut them down. Just as many different collections of interest groups and people have stakes in the Obama regime’s story of the killing of Osama bin Laden by US Navy SEALS in Abbottabad, Pakistan. This story and its selling by an enthusiastic media guaranteed Obama’s reelection. It served the emotions of super patriots desperate for revenge who wear their gullibility on their sleeves. It served the myth of CIA and NSA prowess. It served the reputation of the killing power of US Special Forces teams. It proved that America won even though it lost the wars in Iraq and Afghanistan. All the trillions of dollars spent were worth it. We got revenge on the guy who did 9/11. No one remembered that the US government, unable to find bin Laden for 10 years, had settled on a different “9/11 mastermind,” Khalid Sheikh Mohammed, and had him water-boarded 183 times until he confessed to being responsible for 9/11. If Khalid Sheikh Mohammed “was responsible for the 9/11 operation from A to Z,” why were SEALS sent, illegally, into Pakistan to murder bin Laden? As the FBI says, there is no evidence that bin Laden is responsible for 9/11. That is why bin Laden was not wanted on that charge by the FBI, as the FBI publicly stated.
  • Judicial Watch has been trying to pry the (nonexistent) photos of a dead bin Laden from the government’s hands. For “national security reasons” the US government does not want anyone to see evidence that supports its far-fetched tale of bin Laden’s murder. The photographic evidence of a successful raid are off limits. They are like the alleged videos of the airliner hitting the Pentagon that we are not permitted to see for “national security reasons.” In other words, the photos and videos do not exist and never did. No government, not even the American one, would be so totally stupid as to withhold the evidence for its claims. The government, seeing its unbelievable stories lose believability at home and abroad used Judicial Watch’s lawsuit to boost the credibility of its story. Judicial Watch filed a Freedom of Information Act lawsuit for the photos that the Obama regime alleged to have of the murdered bin Laden but refused to release. Obviously, the government has no such photos and never had any such photos. But the government does not need evidence when it can rely on the gullibility of the American people.
  • ...3 more annotations...
  • How was bin Laden, who was known in 2001 to be suffering from terminal illnesses, including renal failure, and whose death was widely reported in 2001 still alive ten years later to be murdered by SEALs? What sense does it make that the greatest terrorist leader of our time only had two unarmed women to protect him. What sense does it make that the US would murder the terrorist mastermind with all the plots in his head instead of capturing and questioning him? How can anyone be so gullible as to believe such a nonsense tale as told to them by Obama and the presstitute media? Is America really a nation of utter fools? Like the 9/11 story, the story of bin Laden’s murder is losing credibility with the US population. Pakistani National TV shot Obama’s story down with an eyewitness interview that reported that not one single person, dead body, or any piece of evidence left Abbottadad, because the only helicopter that landed blew up when it attempted to leave and there were no survivors. No other helicopters landed. So there was no dead bin Laden to be buried at sea (there are no known witnesses to the alleged burial) and no photographs of a dead bin Laden.
  • As the government had no photos to release, the US government decided to use the opportunity presented by Judicial Watch to bolster its story that photos of bin Laden murdered and dead were once in its possession. The government released to Judicial Watch a document under the Freedom of Information Act that is an order from Special Operations Commander Admiral William McRaven to “destroy immediately” the photos of the dead bin Laden. Judicial Watch took the bait. Instead of realizing that there was no reason whatsoever for the government to destroy the only evidence that might support its claim to have murdered bin Laden, Judicial Watch focused on the illegality of destroying the evidence. Judicial Watch says that “Federal law contains broad prohibitions against the ‘concealment, removal, or mutilation generally’ of government records.” http://www.globalresearch.ca/top-pentagon-leader-ordered-destruction-of-bin-laden-death-photos/5368389 Judicial Watch played into the government’s hands. Judicial Watch president Tom Fitton was maneuvered by the government into defining the scandal as the destruction of evidence, “revealing both contempt for the rule of law and the American people’s right to know.” To the contrary, the real scandal is the massive lie that bin Laden was killed by a SEAL raid and the acceptance of this lie by the American people and Judicial Watch.
  • By damning the government for destroying evidence, Judicial Watch has given credibility to the government’s claim that SEALs murdered Osama bin Laden. The SEAL team credited with bin Laden’s murder was quickly eliminated when the team was loaded onto a 1960s vintage helicopter in Afghanistan. Apparently the team members were asking one another, “Were you on that mission that killed bin Laden?” Of course, no one was, and this information was too dangerous for the Obama regime.
  •  
    Paul Craig Roberts goes on record as a 9-11 Truther and as a deep sceptic of Obama's claim that Seal Team 6 killed Osama bin Laden in 2011. 
« First ‹ Previous 181 - 200 of 246 Next › Last »
Showing 20 items per page