Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "director" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

NSA director admits to misleading public on terror plots - Salon.com - 0 views

  • In so many words, NSA director Keith Alexander admitted Wednesday that the Obama administration had issued misleading information about terror plots and their foiling to bolster support for the government’s vast surveillance apparatus.During Wednesday’s hearing, Senate Judiciary Committee Chairman Patrick Leahy pushed Alexander to admit that plot numbers had been fudged in a revealing interchange:“There is no evidence that [bulk] phone records collection helped to thwart dozens or even several terrorist plots,” said Leahy. The Vermont Democrat then asked the NSA chief to admit that only 13 out of a previously cited 54 cases of foiled plots were genuinely the fruits of the government’s vast dragnet surveillance systems:“These weren’t all plots, and they weren’t all foiled,” Leahy said, asking Alexander, “Would you agree with that, yes or no?”“Yes,” replied Alexander.Proof positive of what many of us have long posited: that under the flimsy guise of a targeted War on Terror, the surveillance state has established itself with little regard for an honest relationship with the American public.
Paul Merrell

2013 mass surveillance disclosures - Wikipedia, the free encyclopedia - 0 views

  • 1 Historical context 1.1 Origins of clandestine surveillance in the United States (1919–78) 1.2 Mass surveillance in a global context (1988-2000) 1.3 9/11 and its implications on mass surveillance (2001–2009) 1.4 Acceleration of media leaks (2010–present) 2 Summary of NSA surveillance 2.1 Purposes 2.2 Targets 2.3 International cooperation 3 2013 Disclosures by category 3.1 Court Orders, Memos and Policy Documents 3.2 Reports 3.3 Collection and Analysis Programs or Hardware 3.4 Relationships with Corporate Partners 3.5 NSA Databases 3.6 Signals Intelligence Directorates (SIDs) 3.7 Technical Directorates 3.8 Names associated with specific targets 3.9 Uncategorized or insufficiently described codenames. 3.10 GCHQ Operations 3.11 NSA Operations 3.12 NSA Relationships with Foreign Intelligence services 3.13 Unrelated to Edward Snowden 4 Media reports 4.1 Chronology 4.2 Disclosures 4.3 Violation of civil liberties and international law 5 Fallout 5.1 Counter-terrorism and national security 5.2 Impact on foreign relations 5.3 Amash/Conyers Amendment 5.4 Public reaction 5.4.1 Petitions 5.4.2 Protests 6 Media related to the disclosures 7 See also 8 References 9 Further reading
  •  
    Wikipedia begins pulling its act together on coverage of the NSA scandal. This article is, at least for the time being, a major NSA scandal research resource. But wait to see how soon NSA sock puppets bowdlerize it. The occasional snapshot downloaded or stored in e.g., Zotero, is advisable.   
  •  
    Wow. Diigo handled the markup just fine in My Library but decided to display the raw HTML here. That's got to be a bug. Click through to Wikipedia and look at the table of contents. That's what buried in the markup above.
Paul Merrell

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Gary Edwards

BOMBSHELL! Jim Garrow Reveals Career As Covert CIA Operative, Says Breitbart And Tom Clancy Murdered By Obama Administration « Now The End Begins - 1 views

  •  
    Links to radio interview. Excerpts below: "As a long-time friend and guest on NTEB Radio, we know Dr. Garrow to be a previous Nobel Peace Prize nominee and executive director of the Bethune Institute's Pink Pagoda Girls school and rescue outreach in China. But on our show tonight, Dr. Garrow made the amazing revelation that he had, in fact, right up until this past Wednesday night at midnight, spent 45 years as a covert CIA operative. Garrow said that as a result of his "litmus test" statement in January, he was outed from the agency by Obama, and forced to accept early retirement. But the revelations didn't stop there. In addition to revealing that Andrew Breitbart had been killed under orders from Obama administration officials, he also said that spy thriller novelist Tom Clancy had also be killed in much the same way, and for the same reasons. Garrow said that Clancy had been spoon fed inside information for years from covert operatives for his novels, and he knew too much. Interestingly, when asked about where he got his ideas for his novels, Clancy had said this before he died: ""I hang my hat on getting as many things right as I can," Mr. Clancy once said in an interview. "I've made up stuff that's turned out to be real - that's the spooky part." NY Times A little too real, as it turns out. Dr. Garrow said the reason no autopsy was performed for the first 5 days is that it 'takes that long for the chemicals he was poisoned with to work their way out of his body'. Lastly, he revealed that Obama's administration was made up of Marxist Muslims who all take their orders from Senior Adviser to the President, Iranian-born Valerie Jarrett. Dr. Garrow said that it is well known to intelligence agencies all over the world that Obama is a foreign plant who was placed on the path to the presidency by ultra-rich Saudi nationals This is why, Garrow said, that all of Obama's education records have been permanently sealed. Garrow p
Paul Merrell

White House to release independent report on NSA spying - CNN.com - 0 views

  • An independent assessment of National Security Agency surveillance ordered by President Barack Obama following classified leaks by Edward Snowden will be released Wednesday, White House spokesman Jay Carney said. The review was submitted last week by an outside panel, but Carney said news reports about its recommendations were "inaccurate" so the White House has decided to release the conclusions now rather than in January as previously planned.
  • Release of the findings would come two days after a federal judge in Washington ruled preliminarily that NSA data collection of telephone metadata was probably unconstitutional on privacy grounds.
  • Company executives met with Obama on Tuesday, and sources told CNN's Jake Tapper that those present got the impression from the President that NSA metadata collection would not stop anytime soon but that more efforts at transparency would be made.
  •  
    "Independent assessment." By a group of people hand-picked by Director of Intelligence James Clapper himself. "Independent" would be making everything public and allowing the affected public to weigh in on what they find. But stand by, the report is due out today. 
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Paul Merrell

Dropbox: Condoleeza Rice appointment won't alter privacy pledge - CNET - 0 views

  •  
    The straw that broke this camel's back. On top of having an absolutely horrible security model, Dropbox elects Condi Rice to its board of directors. I just completed transfer of my files to another service (in the E.U. where U.S. court orders don't reach) and deleted my Dropbox account.  
Paul Merrell

FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Program Avoids Whistleblowers | Techdirt - 0 views

  • While we've been disappointed that Senator Chuck Grassley appears to have a bit of a double standard with his staunch support for whistleblowers when it comes to Ed Snowden, it is true that he has fought for real whistleblower protections for quite some time. Lately, he's been quite concerned that the White House's "Insider Threat Program" (ITP) is really just a cover to crack down on whistleblowers. As we've noted, despite early promises from the Obama administration to support and protect whistleblowers, the administration has led the largest crackdown against whistleblowers, and the ITP suggests that the attack on whistleblowers is a calculated response. The program documentation argues that any leak can be seen as "aiding the enemy" and encourages government employees to snitch on each other if they appear too concerned about government wrong-doing. Despite all his high minded talk of supporting whistleblowers, President Obama has used the Espionage Act against whistleblowers twice as many times as all other Presidents combined. Also, he has never -- not once -- praised someone for blowing the whistle in the federal government.
  • Given all of that, Senator Grassley expressed some concern about this Insider Threat Program and how it distinguished whistleblowers from actual threats. He asked the FBI for copies of its training manual on the program, which it refused to give him. Instead, it said it could better answer any questions at a hearing. However, as Grassley explains, when questioned about this just 10 minutes into the hearing, the FBI abruptly got up and left: Meanwhile, the FBI fiercely resists any efforts at Congressional oversight, especially on whistleblower matters. For example, four months ago I sent a letter to the FBI requesting its training materials on the Insider Threat Program. This program was announced by the Obama Administration in October 2011. It was intended to train federal employees to watch out for insider threats among their colleagues. Public news reports indicated that this program might not do enough to distinguish between true insider threats and legitimate whistleblowers. I relayed these concerns in my letter. I also asked for copies of the training materials. I said I wanted to examine whether they adequately distinguished between insider threats and whistleblowers.
  • In response, an FBI legislative affairs official told my staff that a briefing might be the best way to answer my questions. It was scheduled for last week. Staff for both Chairman Leahy and I attended, and the FBI brought the head of their Insider Threat Program. Yet the FBI didn’t bring the Insider Threat training materials as we had requested. However, the head of the Insider Threat Program told the staff that there was no need to worry about whistleblower communications. He said whistleblowers had to register in order to be protected, and the Insider Threat Program would know to just avoid those people. Now I have never heard of whistleblowers being required to “register” in order to be protected. The idea of such a requirement should be pretty alarming to all Americans. Sometimes confidentiality is the best protection a whistleblower has. Unfortunately, neither my staff nor Chairman Leahy’s staff was able to learn more, because only about ten minutes into the briefing, the FBI abruptly walked out. FBI officials simply refused to discuss any whistleblower implications in its Insider Threat Program and left the room. These are clearly not the actions of an agency that is genuinely open to whistleblowers or whistleblower protection.
  • ...2 more annotations...
  • And yes, it's equally troubling that the FBI insists that as long as someone "registers" as a whistleblower, the FBI will suddenly, magically agree to stop investigating them as a "threat." We already know that's almost certainly bullshit. The stories of Thomas Drake and John Kiriakou are both clear examples of whistleblowers, who then had the DOJ search through basically everything they'd ever done to try to concoct some sort of Espionage Act case against them. In both cases, the eventual charges were totally ridiculous and unrelated to the whistleblowing they had done, but clearly the only reason they had been investigated was because of their status as whistleblowers. Drake was charged with having a classified document, which was just a meeting agenda and was both improperly classified and then declassified soon after. Kiriakou was charged with revealing the name of a CIA operative to a reporter, where the person in question was already widely known to journalists as working for the CIA. Meanwhile, while Grassley still hasn't come out in support of Snowden as a whistleblower, he does seem reasonably concerned that James Clapper's plans to stop the next Snowden will have severe consequences for whistleblowers:
  • Director of National Intelligence James Clapper seems to have talked about such procedures when he appeared before the Senate Armed Services Committee on February 11, 2014. In his testimony, he said: We are going to proliferate deployment of auditing and monitoring capabilities to enhance our insider threat detection. We’re going to need to change our security clearance process to a system of continuous evaluation. . . . What we need is . . . a system of continuous evaluation, where . . . we have a way of monitoring their behavior, both their electronic behavior on the job as well as off the job, to see if there is a potential clearance issue. . . . Director Clapper’s testimony gives me major pause. It sounds as though this type of monitoring would likely capture the activity of whistleblowers communicating with Congress. As Marcy Wheeler notes in her post (linked above, which called my attention to all this), by declaring war on whistleblowers, the administration is almost guaranteeing that many fewer will use "official channels" to blow the whistle. That just makes them targets with the likelihood of getting no results. Instead, all this does is incentivize people to go the Chelsea Manning/Ed Snowden route of going directly to journalists to make sure the stories get out.
Paul Merrell

Obama ordered to divulge legal basis for killing Americans with drones | Ars Technica - 0 views

  • The Obama administration must disclose the legal basis for targeting Americans with drones, a federal appeals court ruled Monday in overturning a lower court decision likened to "Alice in Wonderland." The Second US Circuit Court of Appeals, ruling in a Freedom of Information Act (FOIA) claim by The New York Times and the American Civil Liberties Union (ACLU), said the administration must disclose the legal rationale behind its claims that it may kill enemies who are Americans overseas.
  • The Obama administration must disclose the legal basis for targeting Americans with drones, a federal appeals court ruled Monday in overturning a lower court decision likened to "Alice in Wonderland." The Second US Circuit Court of Appeals, ruling in a Freedom of Information Act (FOIA) claim by The New York Times and the American Civil Liberties Union (ACLU), said the administration must disclose the legal rationale behind its claims that it may kill enemies who are Americans overseas. "This is a resounding rejection of the government's effort to use secrecy and selective disclosure to manipulate public opinion about the targeted killing program," ACLU Legal Director Jameel Jaffer said in an e-mail. The so-called targeted-killing program—in which drones from afar shoot missiles at buildings, cars, and people overseas—began under the George W. Bush administration. The program, which sometimes kills innocent civilians, was broadened under Obama to include the killing of Americans.
  • Government officials from Obama on down have publicly commented on the program, but they claimed the Office of Legal Counsel's memo outlining the legal rationale about it was a national security secret. The appeals court, however, said on Monday that officials' comments about overseas drone attacks means the government has waived its secrecy argument. "After senior Government officials have assured the public that targeted killings are 'lawful' and that OLC advice 'establishes the legal boundaries within which we can operate,'" the appeals court said, "waiver of secrecy and privilege as to the legal analysis in the Memorandum has occurred" (PDF). The Electronic Privacy Information Center (EPIC), which in a friend-of-the court brief urged the three-judge appeals court to rule as it did, said the decision was a boon for citizen FOIA requests. "It's very helpful. We have a number of cases, including one of our oldest FOIA cases, that involves the warrantless wiretapping memos. The basic premise is when OLC writes a legal memo and when that becomes the known basis for a program, that's the law of the executive branch and cannot be withheld," Alan Butler, EPIC's appellate counsel, said in a telephone interview.
  • ...1 more annotation...
  • The appeals court said the memo may be redacted from revealing which government agencies are behind the attacks, although former CIA Director Leon Panetta has essentially acknowledged that agency's role. Last year, a federal judge blocked the disclosure of the memo. Judge Colleen McMahon of New York said she was ensnared in a "paradoxical situation" in which the law forbade her from ordering the memo's release: The Alice-in-Wonderland nature of this pronouncement is not lost on me; but after careful and extensive consideration, I find myself stuck in a paradoxical situation in which I cannot solve a problem because of contradictory constraints and rules—a veritable catch-22. I can find no way around the thicket of laws and precedents that effectively allow the Executive Branch of our government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws while keeping the reasons for their conclusion a secret.
  •  
    Unless the Feds successfully seek en banc review or review by the Supreme Court, we will apparently be able to read the infamous DoJ Office of Legal Counsel explaining the legal arguments why Obama may lawfully order drone strikes on U.S. citizens inside nations with which the U.S. is not at war. Let's keep in mind that DoJ claimed that Obama has the power to do that in the U.S. too. According to the Second Circuit's opinion, the ordered disclosure includes a somewhat lengthy section arguing that 18 U.S.C. 1119 and 956 do not apply to Obama. Section 1119 provides, inter alia: "(b) Offense.- A person who, being a national of the United States, kills or attempts to kill a national of the United States while such national is outside the United States but within the jurisdiction of another country shall be punished as provided under sections 1111, 1112, and 1113." Section 956 provides in part: "(a)(1) Whoever, within the jurisdiction of the United States, conspires with one or more other persons, regardless of where such other person or persons are located, to commit at any place outside the United States an act that would constitute the offense of murder, kidnapping, or maiming if committed in the special maritime and territorial jurisdiction of the United States shall, if any of the conspirators commits an act within the jurisdiction of the United States to effect any object of the conspiracy, be punished as provided in subsection (a)(2). "(2) The punishment for an offense under subsection (a)(1) of this section is- (A) imprisonment for any term of years or for life if the offense is conspiracy to murder or kidnap; and (B) imprisonment for not more than 35 years if the offense is conspiracy to maim." There should also be a section explaining away the Constitution's Due Process Clause (protecting life, liberty, and property) and Right to Trial by Jury, as well as exempting the President from international law establishing human rights and l
Paul Merrell

Confessions of a drone veteran: Why using them is more dangerous than the government is telling you - Salon.com - 0 views

  • The White House sells drones strikes as legal, ethical and targeted to protect our military and innocent civilians from harm. These are questionable claims, made more dubious by the administration’s selectively leaking details of the drone program to assuage the public when reports arise of flawed legal reasoning, mistaken strikes or vastly underestimated civilian deaths.CIA director John O. Brennan also told the American public that drones “can be a wise choice because they dramatically reduce the danger to U.S. personnel, even eliminating the danger altogether.” director Brennan is wrong.I know because I am a veteran of the drone program. I served as an Air Force imagery analyst. What I know of drone warfare is that it has dangerous, sometimes devastating, consequences for too many service members participating in the program.
Paul Merrell

Court gave NSA broad leeway in surveillance, documents show - The Washington Post - 0 views

  • Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information “concerning” all but four countries, according to top-secret documents. The United States has long had broad no-spying arrangements with those four countries — Britain, Canada, Australia and New Zealand — in a group known collectively with the United States as the Five Eyes. But a classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well.
  • The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The NSA is not necessarily targeting all the countries or organizations identified in the certification, the affidavits and an accompanying exhibit; it has only been given authority to do so. Still, the privacy implications are far-reaching, civil liberties advocates say, because of the wide spectrum of people who might be engaged in communication about foreign governments and entities and whose communications might be of interest to the United States.
  • On Friday, the Office of the Director of National Intelligence released a transparency report stating that in 2013 the government targeted nearly 90,000 foreign individuals or organizations for foreign surveillance under the program. Some tech-industry lawyers say the number is relatively low, considering that several billion people use U.S. e-mail services.
  • ...4 more annotations...
  • That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules
  • Still, some lawmakers are concerned that the potential for intrusions on Americans’ privacy has grown under the 2008 law because the government is intercepting not just communications of its targets but communications about its targets as well. The expansiveness of the foreign-powers certification increases that concern.
  • In a 2011 FISA court opinion, a judge using an NSA-provided sample estimated that the agency could be collecting as many as 46,000 wholly domestic e-mails a year that mentioned a particular target’s e-mail address or phone number, in what is referred to as “about” collection. “When Congress passed Section 702 back in 2008, most members of Congress had no idea that the government was collecting Americans’ communications simply because they contained a particular individual’s contact information,” Sen. Ron Wyden (D-Ore.), who has co-sponsored ­legislation to narrow “about” collection authority, said in an e-mail to The Washington Post. “If ‘about the target’ collection were limited to genuine national security threats, there would be very little privacy impact. In fact, this collection is much broader than that, and it is scooping up huge amounts of Americans’ wholly domestic communications.”
  • The only reason the court has oversight of the NSA program is that Congress in 2008 gave the government a new authority to gather intelligence from U.S. companies that own the Internet cables running through the United States, former officials noted. Edgar, the former privacy officer at the Office of the Director of National Intelligence, said ultimately he believes the authority should be narrowed. “There are valid privacy concerns with leaving these collection decisions entirely in the executive branch,” he said. “There shouldn’t be broad collection, using this authority, of foreign government information without any meaningful judicial role that defines the limits of what can be collected.”
Paul Merrell

OPERATION CONDOR: National Security Archive Presents Trove of Declassified Documentation in Historic Trial in Argentina - 0 views

  • Argentine Newspaper, Pagina 12, Highlights Evidence Presented by Archive Southern Cone Project Director Carlos Osorio Documents given to Court Reveal Condor Precedents; Secret Summary of Inaugural Condor Meeting Introduced into Court for First Time National Security Archive Electronic Briefing Book No. 514
  • The National Security Archive today posted key documents on Operation Condor, presented by its Southern Cone analyst, Carlos Osorio, at a historic trial in Buenos Aires of former military officers. During 10 hours on the witness stand recently, Osorio introduced one hundred documents into evidence for the court proceedings. His testimony was profiled on May 3 in a major feature article published in the Buenos Aires daily, Pagina 12. Operation Condor was an infamous secret alliance between South American dictatorships in the mid and late 1970s - a Southern Cone rendition and repression program - formed to track down and eliminate enemies of their military regimes. The Condor trial charges 25 high-ranking officers, originally including former Argentine presidents Jorge Videla (deceased) and Reynaldo Bignone (aged 87), with conspiracy to "kidnap, disappear, torture and kill" 171 opponents of the regimes that dominated the Southern Cone in the 1970s and 1980s. Among the victims were approximately 80 Uruguayans, 50 Argentines, 20 Chileans and a dozen others from Paraguay, Bolivia, Peru and Ecuador who were targeted by Condor operatives.
  • The tribunal requested Osorio’s testimony, which took place over two days on March 6 and 7, 2015, and included presentation of an Excel data base of 900 documents drawn mostly from U.S. government sources and from the Archive of Terror in Paraguay. Of these, Osorio focused on 100 declassified records selected for the tribunal, which was presided over by Judge Oscar Amirante, president of Federal Tribunal N° 1. The National Security Archive obtained the U.S. documents through the Freedom of Information Act (FOIA), primarily from the Central Intelligence Agency, Defense Intelligence Agency and the State Department. Other notable records originated from the Chilean former secret police, DINA. "We have been working on Operation Condor for years," Osorio said, "sifting through archives in many continents and building a body of knowledge and a trove of documents." The Pagina 12 feature entitled "The Evolution of Condor," described Osorio’s presentation of "dozens" of documents to the tribunal, and the contribution the documents made in educating the judges on the genesis and evolution of coordinated repression in the Southern Cone. Osorio’s testimony covered a range of topics including the breadth of Condor operations, U.S. knowledge of those operations and the authenticity of the records being introduced into evidence.
  • ...3 more annotations...
  • The article highlighted one document Osorio presented that revealed the bilateral precedent for what would become a multilateral system of regional repression: a secret accord between the Argentine and Paraguayan military intelligence services to "Collaborate in the struggle against subversion…" and the "… internment [of dissenters]…" " The agreement was dated September 12,1972, and signed by Paraguayan intelligence officer Col. Benito Guanes Serrano. Three years later, Guanes would also be one of the five original signatories of the secret Condor accords. Osorio discovered the document in the Archive of Terror in Paraguay. In September 1975, an assessment by a State Department intelligence analyst concluded that "The national security forces of the southern cone surpass the terrorists in cooperation at the international level…" Six weeks later, in Santiago, Chile, intelligence chiefs from Argentina, Bolivia, Chile, Paraguay and Uruguay signed an "Acta" officially establishing Operation Condor. Osorio introduced that pivotal document - provided to the Archive by a source in Chile - into evidence as well.
  • Two declassified U.S. documents presented to the tribunal underscored the contradictory response of high U.S. officials as they became aware of Condor operations in the summer of 1976. One well-known 13-page memorandum of conversation between Secretary of State Henry Kissinger and Argentine Foreign Minister Admiral Cesar Guzzetti dated June 10, 1976, revealed Kissinger’s endorsement of the regional collaboration to repress the left. After Guzzetti informed Kissinger that the Southern Cone regimes were engaged in "joint efforts" to fight "the terrorist problem," Kissinger essentially supported this approach: "If there are things that have to be done, you should do them quickly. But you should get back quickly to normal procedures," according to the declassified transcript Osorio provided to the court. "We want you to succeed. We do not want to harrass [sic] you," Kissinger concluded. "I will do what I can … "
  • After a CIA briefing to Kissinger’s top aides in late July 1976 on the Condor countries’ plans to send assassination teams around the world to eliminate opponents, the Secretary of State authorized a démarche to General Augusto Pinochet in Chile, General Jorge Videla in Argentina, and other military leaders in the region calling on them to cease and desist. "Government planned and directed assassinations within and outside the territory of Condor members has most serious implication which we must face squarely and rapidly," stated the secret August 13, 1976, cable to U.S. ambassadors in those nations. But the démarche was never delivered to any of the Condor regimes. After the U.S. ambassadors raised objections about presenting the démarche to the generals, on September 16, 1976, Kissinger rescinded it, and ordered "that no further action be taken on this matter." In addition to Osorio, the National Security Archive’s Chile Documentation Project director, Peter Kornbluh, testified in the Operation Condor trial for five hours in December 2014. Archive Advisory Board member, professor of journalism and author John Dinges presented evidence in April 2015. Read the Documents
Paul Merrell

CIA's Ex-No. 2 Says ISIS 'Learned From Snowden' - The Daily Beast - 0 views

  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria.
  • ...3 more annotations...
  • Edward Snowden’s leaks about U.S. intelligence operations “played a role in the rise of ISIS.” That’s the explosive new allegation from the former deputy director of the CIA, Michael Morell, who was among the United States’ most senior intelligence officials when Snowden began providing highly classified documents to journalists in 2013. U.S. intelligence officials have long argued that Snowden’s disclosures provided valuable insights to terrorist groups and nation-state adversaries, including China and Russia, about how the U.S. monitors communications around the world. But in his new memoir, to be published next week, Morell raises the stakes of that debate by directly implicating Snowden in the expansion of ISIS, which broke away from al Qaeda and has conquered large swaths of territory in Iraq and Syria. 
  • “Within weeks of the leaks, terrorist organizations around the world were already starting to modify their actions in light of what Snowden disclosed. Communications sources dried up, tactics were changed,” Morell writes. Among the most damaging leaks, he adds, was one that described a program that collects foreigners’ emails as they move through equipment in the United States.Terrorist groups, including ISIS, have since shifted their communications to more “secure” platforms, are using encryption, or “are avoiding electronic communications altogether.”“ISIS was one of those terrorist groups that learned from Snowden, and it is clear that his actions played a role in the rise of ISIS,” Morell writes.
  • That is not a consensus view within the U.S. intelligence community, where officials have been divided over how much ISIS really learned from the Snowden leaks that it didn’t already know. The group didn’t begin seizing territory in Iraq until a year after the leaks began. And last year, a U.S. intelligence official with access to information about ISIS’s current tactics told The Daily Beast that while the group had “likely learned a lot” from the Snowden leaks, “many of their forces are familiar with the U.S. from their time in AQI, [and] they have adapted well to avoiding detection.”
  •  
    Keep in mind that ISIL is a U.S. creation. And that just about everything that CIA and NSA do violates the laws of the nation in which they act and is antithetical to our form of government.   
Paul Merrell

Anonymous Fearmongering About the Patriot Act from the White House and NYT - The Intercept - 0 views

  • Several of the most extremist provisions of the 2001 Patriot Act are going to expire on June 1 unless Congress reauthorizes them in some form. Obama officials such as Director of National Intelligence James Clapper and new Attorney General Loretta Lynch have been engaged in rank fear-mongering to coerce renewal, warning that we’ll all be “less safe” if these provisions are allowed to “sunset” as originally intended, while invoking classic Cheneyite rhetoric by saying Patriot Act opponents will bear the blame for the next attack. In an interview yesterday with the Intercept, ACLU Deputy Legal Director Jameel Jaffer explained why those scare tactics are outright frivolous. Enter the New York Times. An article this morning by Julie Hirschfeld Davis, in the first paragraph, cites anonymous Obama officials warning that “failing to [strike a deal by the deadline] would suspend crucial domestic surveillance authority at a time of mounting terrorism threats.” Behold the next two paragraphs:
  • “What you’re doing, essentially, is you’re playing national security Russian roulette,” one senior administration official said of allowing the powers to lapse. That prospect appears increasingly likely with the measure, the USA Freedom Act, stalled and lawmakers in their home states and districts during a congressional recess. “We’re in uncharted waters,” another senior member of the administration said at a briefing organized by the White House, where three officials spoke with reporters about the consequences of inaction by Congress. “We have not had to confront addressing the terrorist threat without these authorities, and it’s going to be fraught with unnecessary risk.”
  • Those two paragraphs, courtesy of the Obama White House and the Paper of Record, have it all: the principal weapons that have poisoned post-9/11 political discourse in the U.S.
  •  
    Greenwald takes on the politics of fear.
Paul Merrell

Citizenfour's Laura Poitras suing US government over 'harassment' | Film | The Guardian - 0 views

  • The Oscar-winning documentary film-maker Laura Poitras is suing the US government demanding to know why she has repeatedly been subjected to “Kafkaesque harassment” at airports across the world. Poitras, 51, said she had been held at borders more than 50 times between 2006 and 2012, often for hours at a time. At various times she alleges being told by officials that she was on a “no fly” list, having her electronic equipment confiscated and not returned for 41 days, and being threatened with handcuffs for taking notes. The latter incident took place when she was working on a film about the WikiLeaks founder Julian Assange. Poitras said she was launching the legal action, which demands the release of all documentation held on her tracking, targeting and questioning by agencies over the six year period, following the failure of a 2013 freedom of information request.
  • “I’m filing this lawsuit because the government uses the US border to bypass the rule of law,” said the film-maker in a statement, The Intercept reported. “This simply should not be tolerated in a democracy. I am also filing this suit in support of the countless other less high-profile people who have also been subjected to years of Kafkaesque harassment at the borders. We have a right to know how this system works and why we are targeted.” Poitras has previously said she was placed on the Department of Homeland Security’s watch list in 2006 after returning home to the US following work on My Country, My Country. She says airport security told her officials had assigned her the highest “threat rating” possible, even though she had never been charged with a crime. She was repeatedly stopped until 2012, when the journalist Glenn Greenwald wrote an article about her experiences.
  • Poitras’s reporting on the NSA whistleblower Edward Snowden, along with work by Greenwald, Ewen MacAskill and Barton Gellman contributed to the Pulitzer prize for public service won jointly by the Washington Post and the Guardian in 2014. Her film on Snowden, Citizenfour, won the 2015 Oscar for best documentary. The director is being represented by lawyers from digital-rights advocacy group the Electronic Frontier Foundation. “The well-documented difficulties Ms Poitras experienced while traveling strongly suggest that she was improperly targeted by federal agencies as a result of her journalistic activities,” senior counsel David Sobel told the Intercept. “Those agencies are now attempting to conceal information that would shed light on tactics that appear to have been illegal. We are confident that the court will not condone the government’s attempt to hide its misconduct under a veil of ‘national security.’”
Paul Merrell

PATRIOT Act spying programs on death watch - Seung Min Kim and Kate Tummarello - POLITICO - 0 views

  • With only days left to act and Rand Paul threatening a filibuster, Senate Republicans remain deeply divided over the future of the PATRIOT Act and have no clear path to keep key government spying authorities from expiring at the end of the month. Crucial parts of the PATRIOT Act, including a provision authorizing the government’s controversial bulk collection of American phone records, first revealed by Edward Snowden, are due to lapse May 31. That means Congress has barely a week to figure out a fix before before lawmakers leave town for Memorial Day recess at the end of the next week. Story Continued Below The prospects of a deal look grim: Senate Majority Leader Mitch McConnell on Thursday night proposed just a two-month extension of expiring PATRIOT Act provisions to give the two sides more time to negotiate, but even that was immediately dismissed by critics of the program.
  •  
    A must-read. The major danger is that the the Senate could pass the USA Freedom Act, which has already been passed by the House. Passage of that Act, despite its name, would be bad news for civil liberties.  Now is the time to let your Congress critters know that you want them to fight to the Patriot Act provisions expire on May 31, without any replacement legislation.  Keep in mind that Section 502 does not apply just to telephone metadata. It authorizes the FBI to gather without notice to their victims "any tangible thing", specifically including as examples "library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The breadth of the section is illustrated by telephone metadata not even being mentioned in the section.  NSA going after your medical records souand far fetched? Former NSA technical director William Binney says they're already doing it: "Binney alludes to even more extreme intelligence practices that are not yet public knowledge, including the collection of Americans' medical data, the collection and use of client-attorney conversations, and law enforcement agencies' "direct access," without oversight, to NSA databases." https://consortiumnews.com/2015/03/05/seeing-the-stasi-through-nsa-eyes/ So please, contact your Congress critters right now and tell them to sunset the Patriot Act NOW. This will be decided in the next few days so the sooner you contact them the better. 
Paul Merrell

Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not Fair-Minded | Just Security - 0 views

  • Earlier today, FBI Director James Comey implied that a broad coalition of technology companies, trade associations, civil society groups, and security experts were either uninformed or were not “fair-minded” in a letter they sent to the President yesterday urging him to reject any legislative proposals that would undermine the adoption of strong encryption by US companies. The letter was signed by dozens of organizations and companies in the latest part of the debate over whether the government should be given built-in access to encrypted data (see, for example, here, here, here, and here for previous iterations). The comments were made at the Third Annual Cybersecurity Law Institute held at Georgetown University Law Center. The transcript of his encryption-related discussion is below (emphasis added).
  • Increasingly, communications at rest sitting on a device or in motion are encrypted. The device is encrypted or the communication is encrypted and therefore unavailable to us even with a court order. So I make a showing of probable cause to a judge in a criminal case or in an intelligence case to the Foreign Intelligence Surveillance Court judge that the content of a particular defense or a particular communication stream should be collected to our statutory authority, and the judge approves, increasingly we are finding ourselves unable to read what we find or we’re unable to open a device. And that is a serious concern. I am actually — I think encryption is a good thing. I think there are tremendous societal benefits to encryption. That’s one of the reasons the FBI tells people not only lock your cars, but you should encrypt things that are important to you to make it harder for thieves to take them.
  • A group of tech companies and some prominent folks wrote a letter to the President yesterday that I frankly found depressing. Because their letter contains no acknowledgment that there are societal costs to universal encryption. Look, I recognize the challenges facing our tech companies. Competitive challenges, regulatory challenges overseas, all kinds of challenges. I recognize the benefits of encryption, but I think fair-minded people also have to recognize the costs associated with that. And I read this letter and I think, “Either these folks don’t see what I see or they’re not fair-minded.” And either one of those things is depressing to me. So I’ve just got to continue to have the conversation. I don’t know the answer, but I don’t think a democracy should drift to a place where suddenly law enforcement people say, “Well, actually we — the Fourth Amendment is an awesome thing, but we actually can’t access any information.”
  • ...2 more annotations...
  • But we have a collision going on in this country that’s getting closer and closer to an actual head-on, which is our important interest in privacy — which I am passionate about — and our important interest in public safety. The logic of universal encryption is inexorable that our authority under the Fourth Amendment — an amendment that I think is critical to ordered liberty — with the right predication and the right oversight to obtain information is going to become increasingly irrelevant. As all of our lives become digital, the logic of encryption is that all of our lives will be covered by strong encryption, therefore all of our lives — I know there are no criminals here, but including the lives of criminals and terrorists and spies — will be in a place that is utterly unavailable to court ordered process. And that, I think, to a democracy should be very, very concerning. I think we need to have a conversation about it. Again, how do we strike the right balance? Privacy matters tremendously. Public safety, I think, matters tremendously to everybody. I think fair-minded people have to recognize that there are tremendous benefits to a society from encryption. There are tremendous costs to a society from universal strong encryption. And how do we think about that?
  • We’ve got to have a conversation long before the logic of strong encryption takes us to that place. And smart people, reasonable people will disagree mightily. Technical people will say it’s too hard. My reaction to that is: Really? Too hard? Too hard for the people we have in this country to figure something out? I’m not that pessimistic. I think we ought to have a conversation.
  •  
    Considering that I'm over 10 times as likely to die from a police shoooting as I am from a terrorist attack, how about we begin this conversation, Mr. Comey, by you providing formal notice to everyone who's had the telephone metadata gathered or searched all dates on which such gatherings and searches were conducted so citizens can file suit for violation of their privacy rights? Note that the Second U.S. Circuit Court of Appeals held last week that the FBI exceeded statutory authority in gathering and searching that information. Because the gathering and searching was not authorized, that would bring the gathering and searching under the protections of the Privacy Act, including the FBI duty to account for the disclosures  and to pay at least the statutory minimum $1,500 in damges per incident.  Then I would like to have an itemization of all of the commercial software and hardware products that your agency and or your buddies at NSA built backdoors into.  Then your resignation for millions of violations of the Privacy Act would be deeply appreciated. Please feel free to delegate the above mentioned tasks to your successor. 
Paul Merrell

US Marshals leader resigns amid scrutiny of secret surveillance | TheHill - 0 views

  • The head of the U.S. Marshals Service is stepping down later this year, amid heightened scrutiny on the law enforcement agency.Stacia Hylton has served as the director of the agency since January 2011 and had planned to resign since last winter, the agency said in a statement on Tuesday morning.
  • It has come under new pressure from Congress in recent months, on the heels of separate revelations about its secret use of surveillance devices that scoop up information from people’s cellphones and possible misconduct in hiring and spending money.Sen. Chuck Grassley (R-Iowa), the head of the Senate Judiciary Committee, has been one of the most vocal critics of the apparent misuse of money and employment quid pro quos within the agency, which sits under the umbrella of the Department of Justice. “It’s never good news when the head of an agency needs to step aside in the midst of these kinds of allegations, and it also doesn’t mean the investigations are complete,” he said in a statement on Tuesday, after the announcement from the Marshals Service.“As the Marshals Service moves forward, the next director must be committed to bringing real, positive change to what appears to be a culture corroded by unethical hiring practices, misuse of funds and retaliation against whistleblowers.”Grassley’s committee has begun an investigation into the possible abuse which might continue past Hylton’s tenure, he said.
Paul Merrell

WikiLeaks' Julian Assange warns: Google is not what it seems - 1 views

  • Back in 2011, Julian Assange met up with Eric Schmidt for an interview that he considers the best he’s ever given. That doesn’t change, however, the opinion he now has about Schmidt and the company he represents, Google.In fact, the WikiLeaks leader doesn’t believe in the famous “Don’t Be Evil” mantra that Google has been preaching for years.Assange thinks both Schmidt and Google are at the exact opposite spectrum.“Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation. But Google has always been comfortable with this proximity,” Assange writes in an opinion piece for Newsweek.
  • “Long before company founders Larry Page and Sergey Brin hired Schmidt in 2001, their initial research upon which Google was based had been partly funded by the Defense Advanced Research Projects Agency (DARPA). And even as Schmidt’s Google developed an image as the overly friendly giant of global tech, it was building a close relationship with the intelligence community,” Assange continues.Throughout the lengthy article, Assange goes on to explain how the 2011 meeting came to be and talks about the people the Google executive chairman brought along - Lisa Shields, then vice president of the Council on Foreign Relationship, Jared Cohen, who would later become the director of Google Ideas, and Scott Malcomson, the book’s editor, who would later become the speechwriter and principal advisor to Susan Rice.“At this point, the delegation was one part Google, three parts US foreign-policy establishment, but I was still none the wiser.” Assange goes on to explain the work Cohen was doing for the government prior to his appointment at Google and just how Schmidt himself plays a bigger role than previously thought.In fact, he says that his original image of Schmidt, as a politically unambitious Silicon Valley engineer, “a relic of the good old days of computer science graduate culture on the West Coast,” was wrong.
  • However, Assange concedes that that is not the sort of person who attends Bilderberg conferences, who regularly visits the White House, and who delivers speeches at the Davos Economic Forum.He claims that Schmidt’s emergence as Google’s “foreign minister” did not come out of nowhere, but it was “presaged by years of assimilation within US establishment networks of reputation and influence.” Assange makes further accusations that, well before Prism had even been dreamed of, the NSA was already systematically violating the Foreign Intelligence Surveillance Act under its director at the time, Michael Hayden. He states, however, that during the same period, namely around 2003, Google was accepting NSA money to provide the agency with search tools for its rapidly-growing database of information.Assange continues by saying that in 2008, Google helped launch the NGA spy satellite, the GeoEye-1, into space and that the search giant shares the photographs from the satellite with the US military and intelligence communities. Later on, 2010, after the Chinese government was accused of hacking Google, the company entered into a “formal information-sharing” relationship with the NSA, which would allow the NSA’s experts to evaluate the vulnerabilities in Google’s hardware and software.
  • ...1 more annotation...
  • “Around the same time, Google was becoming involved in a program known as the “Enduring Security Framework” (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies at network speed.’’Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF,” Assange writes.Assange seems to have a lot of backing to his statements, providing links left and right, which people can go check on their own.
  •  
    The "opinion piece for Newsweek" is an excerpt from Assange's new book, When Google met Wikileaks.  The chapter is well worth the read. http://www.newsweek.com/assange-google-not-what-it-seems-279447
« First ‹ Previous 181 - 200 of 688 Next › Last »
Showing 20 items per page