Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "2014" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Notes from the Fight Against Surveillance and Censorship: 2014 in Review | Electronic Frontier Foundation - 0 views

  • 2014 in Review Series Net Neutrality Takes a Wild Ride 8 Stellar Surveillance Scoops Web Encryption Gets Stronger and More Widespread Big Patent Reform Wins in Court, Defeat (For Now) in Congress International Copyright Law More Time in the Spotlight for NSLs The State of Free Expression Online What We Learned About NSA Spying in 2014—And What We're Fighting to Expose in 2015 "Fair Use Is Working!" Email Encryption Grew Tremendously, but Still Needs Work Spies Vs. Spied, Worldwide The Fight in Congress to End the NSA's Mass Spying Open Access Movement Broadens, Moves Forward Stingrays Go Mainstream Three Vulnerabilities That Rocked the Online Security World Mobile Privacy and Security Takes Two Steps Forward, One Step Back It Was a Pivotal Year in TPP Activism but the Biggest Fight Is Still to Come The Government Spent a Lot of Time in Court Defending NSA Spying Last Year Let's Encrypt (the Entire Web)
  •  
    The Electronic Freedom Foundation just dropped an incredible bunch of articles on the world in the form of their "2014 Year In Review" series. These are major contributions that place an awful lot of information in context. I thought I had been keeping a close eye on the same subject matter, but I'm only part way through the articles and am learning time after time that I had missed really important news having to do with digital freedom. I can't recommend these articles enough. So far, they are all must-read.  
Paul Merrell

News Roundup and Notes: September 11, 2014 | Just Security - 0 views

  • In a highly anticipated address last night, President Barack Obama authorized a significant expansion of the U.S. campaign to “degrade and ultimately destroy” the Islamic State in Iraq and Syria, backed by a broad coalition of allies. His four-part strategy against ISIS will involve a “systematic campaign of airstrikes” against the militants “wherever they are,” including Syria; the deployment of an additional 475 advisers to Iraq; and new support for the moderate Syrian opposition. Obama sought to distinguish his campaign from the wars in Iraq and Afghanistan, likening the mission to U.S. strikes against suspected terrorists in Yemen and Somalia [Reuters’ Steve Holland and Roberta Rampton; Washington Post’s Juliet Eilperin and Ed O’Keefe]. Saudi Arabia has agreed to provide a training base for moderate Syrian opposition fighters—which forms part of the president’s strategy—following an American request [New York Times’ Michael R. Gordon and Eric Schmitt].
  • Lauren French [Politico] discusses the mixed reactions to Obama’s speech on the Hill. The Syrian National Coalition, the main Western-supported opposition group, issued a statement yesterday welcoming President Obama’s announcement that the U.S. would conduct airstrikes targeting the Islamic State in Syria [Associated Press]. Australia and Japan also expressed their support for the president’s strategy this morning [Wall Street Journal’s Rob Taylor and Alexander Martin]. However, there has been a “muted response” to Obama’s address from Arab states in the Gulf region [Wall Street Journal’s Rory Jones].
  • Reuters (David Lawder and Patricia Zengerle) reports that U.S. lawmakers are considering a congressional vote on President Obama’s plan, but several Republicans want further information on the strategy to battle global terrorism, while many would prefer a vote wider than one focused solely on funding for the Syrian opposition. And The Daily Beast (Josh Rogin and Tim Mak) writes that Democrats are ready to approve Obama’s request for $5 billion to counter terrorism, despite the lack of details on how the money would be used. The Wall Street Journal (Julian E. Barnes and Siobhan Gorman) focuses on the president’s plan to rely on U.S.-trained local forces to battle the Islamic State, noting America’s “poor track record” of relying on local forces in Iraq and Libya.
  • ...4 more annotations...
  • The New York Times’ Charlie Savage discusses the president’s reliance on existing authorization for his campaign against ISIS, although Obama indicated in his speech that he would “welcome congressional support” for this operation. Eli Lake [The Daily Beast] and Spencer Ackerman [The Guardian] also explore the legality of the administration’s expanded mission against ISIS. Politico (Jake Sherman and John Bresnahan) notes that Obama’s urgent request for authorization to equip and train moderate Syrian rebels “is scrambling delicate plans on Capitol Hill less that two months before the midterm elections.”
  • Peter Baker [New York Times] suggests that Obama’s new course is likely to extend “a legacy of war,” and could leave the president’s successor with “a volatile and incomplete war, much as his predecessor left one for him.” The New York Times editorial board weighs the strengths and weaknesses of the president’s strategy, suggesting that the authorization of strikes in Syria was a decision in which he “had little choice militarily or politically.” The Wall Street Journal editorial board suggests that Obama’s “biggest obstacle … will be his own ambivalence about American military force.” And the Washington Post editorial board calls on Congress to take a supportive view, stating that “[c]ongressional and public debate are especially necessary to help strengthen those parts of Mr. Obama’s strategy that remain open to question.” Edward-Isaac Dovere and Josh Gerstein [Politico] provide an analysis of the “speech Obama didn’t want to give.”
  • In other developments, the U.S. military conducted an airstrike on Tuesday in support of Iraqi Security Forces’ efforts to defend Erbil [Central Command]. The Washington Post (Adam Goldman) reports that a senior intelligence official told Congress yesterday that the Department of Homeland Security is “unaware of any specific credible threat to the U.S. homeland” from the Islamic State.     Al Jazeera has learned that the 45 UN peacekeepers from Fiji held by the Nusra Front rebel group in the Golan Heights have been released. An international watchdog has reported that chlorine gas was used as a chemical weapon in northern Syria earlier this year, in an attack that only the Assad regime could have the ability to conduct [Wall Street Journal’s Naftali Bendavid].
  • Murtaza Hussein [The Intercept] reports on the assassination of one of Syria’s top anti-ISIS rebel leaders, suggesting that the group was one of “Obama’s best hope[s]” and that the U.S. must now consider aligning itself with Iran. A young woman from Colorado pleaded guilty yesterday to conspiring to assist ISIS, after she was arrested attempting to travel to Syria [New York Times’ Emma G. Fitzsimons]. Peter Mass [The Intercept] argues why the American government should not have censored the media from hosting the videos of the beheadings of American journalists James Foley and Steven Sotloff.
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Act Falls Short - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

News Roundup and Notes: August 18, 2014 | Just Security - 0 views

  • Over the weekend, the U.S. military carried out further airstrikes in Iraq, targeting Islamic State militants near the Mosul Dam, involving “a mix of fighter, bomber, attack and remotely piloted aircraft.” The nine strikes on Saturday and 14 strikes on Sunday were carried out under authority “to support humanitarian efforts in Iraq,” to protect U.S. personnel and facilities, and to support Iraqi and Kurdish defense forces [U.S. Central Command]. President Obama notified Congress of the latest American involvement yesterday, stating that “[t]he failure of the Mosul Dam could threaten the lives of large numbers of civilians, endanger U.S. personnel and facilities, including the U.S. Embassy in Baghdad.” Obama said the operations will be “limited in their scope and duration.” The significantly expanded air campaign, including the first reported use of U.S. bombers, has strengthened the Kurdish forces’ ground offensive to reclaim the strategic dam from Islamic State control [Wall Street Journal’s Matt Bradley et al.; Washington Post’s Liz Sly et al.]. Iraqi state television reported early today that Iraqi and Kurdish forces are now in control of the dam [Reuters], although there are reports of continued heavy fighting around the Mosul Dam [Al Jazeera]. Joe Parkinson [Wall Street Journal] covers how the U.S. has gained a “controversial new ally” in the Kurdistan Workers’ Party (PKK), as a number of PKK fighters joined the U.S.-backed Kurdish battle in northern Iraq over the weekend.
  • Israel-Palestine With the five-day truce between Israel and Hamas set to expire tonight, Israeli and Palestinian negotiators are continuing discussions in Cairo, although significant gaps remain between the two sides. While Israel is pushing for tougher security measures, Palestine is demanding an end to the Gaza blockade without preconditions [Associated Press; Reuters’ Nidal Al-Mughrabi and Jeffrey Heller]. Israeli troops have demolished the homes of two Palestinians suspected to have been behind the abduction and killing of the three Israeli teenagers in the West Bank in June [Haaretz’s Gili Cohen]. An IDF spokesperson said that the demolition “conveys a clear message to terrorists and their accomplices that there is a personal price to pay when engaging in terror and carrying out attacks against Israelis” [Al Jazeera]. Haaretz’s editorial board notes how the Israeli offensive in Gaza has generated “a very public crisis in relations between Israel and the United States” and warns that “Netanyahu must ease the tension with Washington and act to repair the rift with Obama.” The Wall Street Journal (Joshua Mitnick) explores how Israeli Prime Minister Benjamin Netanyahu’s “containment strategy” in the ongoing conflict is “a contrast from the tough talk against terrorism that fueled his political ascent.”
  • ulian Borger [The Guardian] notes how the potential International Criminal Court investigation into alleged war crimes in Gaza by both Israeli and Hamas forces has become a “fraught political battlefield.” Marwan Bishara [Al Jazeera] explains how and why the UN has been “sidelined” in the Middle East conflict. Meanwhile, the British government is facing a legal challenge over its decision to not suspend existing licenses for the sale of military hardware to Israel following the launch of Operation Protective Edge in Gaza last month [The Guardian’s Jamie Doward].
  • ...3 more annotations...
  • Texas Governor Rick Perry [Politico Magazine] writes that “[c]learly more strikes will be necessary, with nothing less than a sustained air campaign to degrade and destroy Islamic State forces.” The Hill (Alexander Bolton) notes that Democrats in both chambers have called for a vote in Congress over military strikes in Iraq, while Senate Majority Leader Harry Reid “almost certainly wants to avoid [a vote] as he seeks to keep the upper chamber majority in his party’s hands.” The United Kingdom has also expanded its military involvement in Iraq, with Defence Secretary Michael Fallon confirming that British warplanes are no longer confined to the initial humanitarian mission to assist Iraq’s Yazidi minority [The Guardian’s Nicholas Watt]. The UN Security Council has placed six individuals affiliated with extremist organizations in Iraq and Syria, including the Islamic State, on its sanctions list [UN News Centre]. Army Col. Joel Rayburn, writing in the Washington Post, considers the legacy of Nouri al-Maliki. While Maliki has agreed to step down as prime minister, Rayburn argues that “the damage he has wrought will define his country for decades to come.” Mike Hanna [Al Jazeera America] explains why Maliki’s ouster “is no magic bullet for Iraq,” noting that a “change of prime minister doesn’t in itself alter Iraq’s political or security equation.” And Ali Khedery [New York Times] writes how the latest change in government “really is Iraq’s last chance.”
  • Journalist James Risen, who faces prison over his refusal to reveal the source of a CIA operation story, has called President Obama “the greatest enemy of press freedom in a generation” [New York Times’ Maureen Dowd]. The International Atomic Energy Agency said that Iran has promised to co-operate with an investigation to be carried out by the nuclear watchdog, following a “useful” meeting in Tehran [Reuters’ Fredrik Dahl and Mehrdad Balali]. Sky News reports that WikiLeaks founder Julian Assange is planning to “soon” leave the Ecuadorian embassy in London, after spending more than two years inside the building. Assange said he is planning to meet with the British government to resolve his “lack of legal protection.”
  • If you want to receive your news directly to your inbox, sign up here for the Just Security Early Edition. For the latest information from Just Security, follow us on Twitter (@just_security) and join the conversation on Facebook. To submit news articles and notes for inclusion in our daily post, please email us at news@justsecurity.org. Don’t forget to visit The Pipeline for a preview of upcoming events and blog posts on U.S. national security.
  •  
    Until about a month ago, I thought that Barack Obama would leave only two lasting accomplishments for future history books: [i] first African-American President; and [ii] ending the U.S. war in Iraq. Make it item 1 only now. It's no longer U.S. military "mission creep" in Iraq; it's full bore reinvasion topped off with a U.S. enguineered coup of the Iraqi government.   Just Security is a very high quality politico-legal site for issues involving U.S. and U.S.-sponsored violence and surveillance issues. It's based at the Center for Human Rights and Global Justice at New York University School of Law. Their emailed weekday newsletter is great for the topics I try to follow.  
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

News Roundup and Notes: September 12, 2014 | Just Security - 0 views

  • Iraq and Syria The Pentagon has begun rolling out the expanded campaign against the Islamic State, although operations will increase gradually over a number of months [Wall Street Journal’s Julian E. Barnes]. Retired Marine general, John R. Allen, has been chosen to coordinate the international coalition against ISIS, according to a senior administration official [New York Times’ Michael R. Gordon]. In an interview with NPR (Eyder Peralta), Obama’s national security advisor Susan Rice emphasized that the operation against ISIS would not be “Iraq war redux” and that the U.S. is not going to deploy ground troops with a combat role.
  • Democratic senators are reportedly unnerved by President Obama’s attempt to gain swift authority from Congress to arm and train Syrian rebels [Politico’s Burgess Everett and Seung Min Kim]. House Republicans are said to be split on their views, with some, including Intelligence Chairman Mike Rogers speaking out in favor, whereas others showed more caution [The Hill’s Scott Wong et al]. The New York Times (Jonathan Weisman) reports that House Republican leaders will call members back to the Capitol early next week, in “a rare show of unity” with President Obama, to authorize the arming and training of rebels in Syria. Arab states remained reserved about the extent of their commitment to military efforts to combat the Islamic State yesterday, even as Secretary of State John Kerry succeeded in obtaining their support at a meeting in Saudi Arabia [Wall Street Journal’s Maria Abi-Habib and Jay Solomon].   Al Jazeera reports that French President Francois Hollande is travelling to Iraq in an act of visible support ahead of possible airstrikes with the U.S.-led coalition against the Islamic State.
  • The Syrian deputy foreign minister has said that Syria has “no reservations” about airstrikes in the territory, but said that “it is a must” for Obama to call Syrian President Assad [NBC News]. Anne Bernard [New York Times] writes that the prospect of U.S. strikes in Syria “captivated” the people on Thursday, with debate over whether the strikes would help or hinder President Assad. The New York Times (Ben Hubbard et al.) explores the complexities faced by the U.S. in using decentralized and diverse Syrian rebels to counter the Islamic State in Syria. Tom Perry and Alexander Dziadosz [Reuters] explore the impact that U.S. support for the Syrian opposition against the Islamic State will have on the Assad regime.
  • ...3 more annotations...
  • In Politico Magazine, Mary Ellen O’Connell argues that President Obama’s strategy against the Islamic State in Syria has no basis in international law, drawing comparison in legal terms between Obama and Russian President Vladimir Putin in Ukraine: “arming rebels and conducting airstrikes.” The New York Times editorial board discusses the legal basis for U.S. action against ISIS, accusing Congress of “outrageous” cowardice and allowing President Obama a “free reign to set a dangerous precedent that will last well past this particular military campaign.” The Washington Post editorial board calls President Obama’s strategy “incomplete,” suggesting that airstrikes alone are insufficient and that the U.S. must assist Iraq and Syria to develop so that “terrorist organizations do not emerge again as soon as Americans look away.” Dan Froomkin [The Intercept] discusses media coverage of Obama’s strategy, which indicates that news organizations have realized the plan is a “hot mess.”
  • In other developments, the new UN special envoy to Syria met with President Bashar al-Assad yesterday, pressing for more truces in the country and saying the UN’s first priority was to “facilitate reduction of the violence” [Wall Street Journal’s Sam Dagher]. The CIA has estimated that the number of fighters with the Islamic State in Iraq and Syria may have reached 31,000, a number three times their previous calculation [BBC]. The German interior ministry is working on banning the Islamic State terrorist group due to concerns over returning ISIS fighters and public expressions of sympathy with the group [Wall Street Journal’s Andrea Thomas and Harriet Torry]. The Australian government has raised the terror alert level to the second highest, as Prime Minister Tony Abbott warned that a terrorist attack on home soil was likely, though no specific plots were known of [Wall Street Journal’s Rob Taylor].
  • The head of Homeland Security has warned that while ISIS is the most apparent threat to the U.S. currently, officials must stay vigilant to other threats to the United States [Associated Press]. Dennis B. Ross [New York Times] cautions that “Islamists are not our friends,” noting that the “new fault line” in the Middle East is defined by Islamists who “subordinate national identities to an Islamic identity.” The New York Times (David E. Sanger) discusses how President Obama’s decision to take on the Islamic State in Iraq and Syria shifts his focus in the Middle East away from his previous objective of preventing Iran from obtaining nuclear weapons.
Paul Merrell

And The Benghazi Media Circus Plays On… | Global Research - 0 views

  • A recent article written by this writer for Global Research posted last Saturday – “The Benghazi Scandal Is Obama’s Watergate But Worse” – was written in an effort to seek and uncover the truth. Accurate reporting on major world events is a challenge in today’s world where propaganda and disinformation are mainstream media norms and where virtually all major players in American politics simply lie through their teeth every time they open their mouths in constant effort to look good and cover up the truth. The American public knows this pathetic and sobering fact that deception has come to rule in the world of both politics and the media. People today neither believe their newscasters nor their political leaders. That is why examining the content of the tidal wave of assertions and opinions spewing forth from politicians and pundits in the aftermath of the latest Benghazi revelations must be taken with a grain of salt. Again, truth in today’s world is hard to come by. But as an investigative reporter, presenting a brief overview of recent comments and statements for any informed citizen to process and digest seems a worthwhile and important enterprise.
  • A timeline of recently unfolding events: On 10/12/12 exactly one month after the Benghazi incident, the legal conservative group Judicial Watch filed a Freedom of Information Act request seeking documents related to the Benghazi attack on September 11th, 2012 that killed the US Ambassador to Libya Christopher Stevens and three other Americans. Obama, who had campaigned on a promise of transparency in the criminal wake of the Bush regime, has proven to be anything but open and transparent. Having to sue the US government for access to the records, on April 18th, 2014, a full year and a half later, the Obama administration’s stonewalling ultimately failed and Judicial Watch successfully got hold of 41 State Department Benghazi related documents. Emails between high level White House officials discussing damage control strategies in the immediate aftermath of the Benghazi assault were released last week. Jubilant Republicans are now calling one of those emails their “smoking gun,” believing it is so incriminating that it will do in their would-be opponent Hillary Clinton from potentially competing in the 2016 presidential election.
  • The newly declassified email written by Obama’s then Deputy Strategic Communications Adviser Ben Rhodes specifically directed then UN Ambassador Susan Rice in preparation for her Sunday morning talk show appearances on September 16th, 2012 to explain the administration’s take on what it knew of the Benghazi murders. Rhodes advised Rice to attribute the Benghazi uprising as “rooted in an Internet video, and not a failure of policy,” pushing talking points designed to bolster Obama’s presidential image as a cool-as-a-cucumber-under-fire kind of wise and benevolent leader and statesman. The major emphasis of the email instructed Rice to blame the bogus anti-Moslem video as inciting a spontaneous protest like in other countries in the region that apparently grew violently out of control, of course all the while knowing that that was a boldface lie. This crucial piece of evidence proves that President Obama and Secretary of State Hillary Clinton both knew that the video did not cause the attack but that they chose to willfully deceive the American public in order to protect their own political careers and hence was born the infamously never ending Benghazi cover-up. Obama and Hillary withheld this damning email evidence even from the House Oversight Committee led by Congressman Darrel Issa (R-CA) requesting all documents pertaining to Benghazi more than a year ago. With the presidential election less than two months away at the time of the attack, Obama and Hillary were determined at all cost to keep hidden from Americans the real truth of criminal Benghazi activity they were guilty of engaging in during the months leading up to the attack. Last Thursday an angry Issa subpoenaed current Secretary of State John Kerry to appear before the committee on May 21st to further explain why those critical State Department records recently given to Judicial Watch were not among the 3200 documents originally handed over to his committee well over a year ago.
  • ...9 more annotations...
  • Investigative reporter Kenneth R. Timmerman as author of a new forthcoming book entitled ‘Dark Forces: The Truth About What Happened in Benghazi’ states: We know that orders were issued, then recalled, to deploy a 50-man Special Forces unit from Croatia that could have reached Benghazi within hours.Timmerman concludes that to date no documents revealing the person who ordered that unit to stand down have yet to surface.
  • Within hours of the general’s testimony came rebukes from both the senior Republican and Democrat on the powerful House Armed Services Committee making claims backing the administration’s that the military was incapable of responding in time to assist the ill-fated Americans in Benghazi. Because they represent the military in Congress that had already drawn the conclusion that nothing tactically could have been done to save the four Americans, they were quick to rebut the general’s testimony. Yet the day before 9/11 every year since 9/11/01 including on 9/10/11, the president meets with top military and security personnel to ensure that US embassies around the globe are bolstered with much needed extra security for 9/11 readiness. Yet the Benghazi compound was so insecure despite repeated requests, both Obama and the military apparently failed to have any military units on standby that could reach Benghazi to be of service on the night of 9/11/12. And this comes after intelligence sources have been reporting insufficient security at the Benghazi embassy compound.
  • Another disclosure at last Thursday’s House Oversight Committee hearing further damaging the credibility and actions of the Obama administration came from retired Air Force General Robert Lovell who at the time of Benghazi was in Germany serving as the senior African Command deputy director for intelligence. Lovell testified, “We should have sent help,” adding that the White House decision not to attempt military assistance due to the time factor was unacceptable. Lovell also stated unequivocally that the military knew that the Benghazi attack had nothing to do with the video falsely used by the administration to explain away the tragedy. The ex-general felt his military should have intervened and was waiting all night long for the call that never came from his bosses in Washington. Clearly he feels a sense of remorse and regret over the passivity imposed on him by his commander-in-chief Obama and State Department head Clinton.
  • Meanwhile, last week in a heated exchange with ABC correspondent Jon Karl a visibly agitated White House Press Secretary Jay Carney insisted that Rhodes’ email was not related to Benghazi at all but referred to the Moslem protests generally taking place in the region in response to the video. The next day Fox reporter Ed Henry engaged Carney on the same issue, eliciting the same haranguing reaction. All this appears to be yet more desperate lies in a feeble attempt to cover his bosses’ Obama and Hillary’s asses called criminal guilt, and by so doing committing his own. Carney had been among the original recipients of Rhodes’ email. Carney further explained that the same Rhodes talking points echoed those delivered earlier to Congress and the White House by deputy CIA director Mike Morell who a month ago claimed he received no pressure or influence from anyone in the Obama administration in coming up with his version of what most likely transpired on 9/11/12 based on all CIA intelligence sources available at the time. Yet on his own Morell admitted to toning down the intelligence reports leading up to the Benghazi attack purposely so as to not appear to be an “I told you so” gesture that would offend Hillary and her State Department. That said, Hillary’s underling and rising star Victoria Nuland (the later promoted to profanity-speaking Assistant Secretary of State who played such a key role in the recent US backed fascist Ukrainan coup) objected to Morell’s talking points that in her mind leaned too heavily toward blaming her boss and their State Department for insufficient security at the Benghazi compound. Her words:
  • Why do we want Hill to start fingering Ansar Al Sharia [the known al Qaeda affiliated attackers that murdered the four Americans], when we aren’t doing that ourselves until we have the investigation results…and the penultimate point could be abused by Members to beat the State Department for not paying attention to Agency warnings so why do we want to feed that?… Concerned.Observe how the exclusive focus of all post-Benghazi interdepartmental correspondence from Rhodes’ to Morell’s to Nuland’s all center on appearance and potential perception to avoid CYA blame. Furthest down on their priority list is honest and truthful disclosure and self-accountability. Again, the name of the game in the world of politics is passing the buck whenever possible to minimize potential heat that comes with looking bad and maximizing looking good by any means or lies necessary. Benghazi perfectly illustrates all of this.
  • Based on the information finally coming to light all last week, last Friday House Speaker John Boehner (R-OH) called for a special select committee not unlike the one for Watergate to further investigate Benghazi. Representative Trey Gowdy (SC-R) has already been selected as its lead investigator. This grandstanding ploy seems a bit superfluous and redundant since the House Oversight Committee has ostensibly been trying to get to the bottom of Benghazi for nearly a year and a half, albeit thus far ineffective in its results, no help from the State Department’s prior email omissions. Not only is Benghazi the hot topic buzzing here in America, on that same day last Friday, more bullets was buzzing in Benghazi as well. Nine police security soldiers were gunned down by, you guessed it, the same murderers still remaining at large that were behind the 9/11/12 Benghazi attack – the militant group the US has for years labeled an al Qaeda affiliated terrorist organization Ansar al-Sharia. After massacring 31 peaceful demonstrators protesting outside the militants’ headquarters last June, last week’s massacre is a powerful statement showing that the terrorists are still in charge in Benghazi and immune from any accountability from the US installed puppet government either in Tripoli or Washington. They remain free men at large despite Obama’s promise to hunt them down and bring them to justice.
  • The senior Democratic House Intel Committee Representative Adam Schiff (D-CA) typifies the partisan Obama-Hillary politics games of each side racing to the media to point fingers at each other in their same old, same old blame game. On Sunday Schiff stated he does not want any Democrats to participate in the newly forming select committee that the Republican House Speaker Boehner has just recently called for, already naming its GOP chair. That is simply a game the Dems will refuse to play. Why? Because Republicans cannot make them. Sound familiar? Perhaps your 7-year old child might employ this same game strategy. Insider Dems like former White House advisor turned ABC analyst (and another original recipient of Rhodes’ infamous email) David Plouffe conveniently took to ABC’s Sunday morning On This Week with George Stephanopoulos crying foul even louder with their familiar “conspiracy” chant they customarily use to discredit any criticism leveled at the Obama administration. His cries reaching desperation this week accuse a “very loud, delusional minority” of Republicans of an obsessive politics game over Benghazi. Another all too familiar grade school tactic, whatever misbehavior you are accused of, simply accuse your enemy of the same offense, an old early childhood trick that you never need outgrow in the world of politics.
  • Still another indignant reaction hardcore defenders of Hillary and Obama are now quick to cite are the thirteen embassy attacks that occurred as so called “Benghazi’s on Bush’s watch” when not a peep was ever heard from the press. This straw house strategy is designed to show how Republicans and Fox News are hypocritical in their obsession to find dirt on Benghazi where they deny any exists. Yet this accusation seems to omit one very significant fact. Not one of those embassy attacks during the Bush regime resulted in any murdered Americans, much less four of them and one being a US Ambassador, something that has not happened in the last 32 years before Benghazi. The media circus demonizing partisan politics players on both sides epitomizes why the US government is so utterly broken, horribly dysfunctional, morally bankrupt and totally ineffective in addressing any and all of the most pressing problems facing America and the world today. The blame game is all they know. Yet in all their exaggeration, lies, name calling and finger pointing, not one of them is even addressing the pink elephant in the room.
  • Obama, Hillary and then CIA Director retired General Betrayus Petraeus were/are international gun running criminal outlaws of the worst kind, working with the very same al Qaeda terrorist bunch that murdered those four nearly forgotten Americans. US tax dollars were/are going into the pockets of Ansar al-Sharia and al Qaeda mercenaries that looted Muammar Kaddafi’s gold cache and enormous weapon arsenal that included chemical weapons as well as surface to air missiles. And Obama, Petraeus and 2016 presidential heir apparent Hillary were in deep over their heads under Hillary and Stevens’ State Department cover, shipping them from Benghazi through Turkey to Syria to covertly fight a war by proxy against Assad’s government forces. After more than three bloody years, to this day the US is still bent on destroying another sovereign nation posing absolutely no security threat to America. These are the war crimes constantly being committed by Obama, Petraeus and Hillary and their lies upon lies are unraveling at an accelerated clip with each passing month. Thus, expect to see more desperate acts of aggression from desperate despots who know that their jig is up. Yet desperate despots do not care how many humans they will take down with them. But justice for these longtime perpetrators of multiple crimes against humanity will be served in the end.
Gary Edwards

America Is Exhibiting All of the Signs of a Failing Empire Washington's Blog - 1 views

  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • ...2 more annotations...
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  • The U.S. is also following the age-old recipe for imperial decline by: Creating unsustainable levels of inequality Destroying upward mobility (and see this) Incurring staggering levels of debt to finance war and luxury goods Debasing its currency Military overspending Runaway corruption Apathy and greed And the decline of the America empire is speeding up due the U.S. falling into the Thucydides trap.
  •  
    "America Is Exhibiting All of the Signs of a Failing Empire Posted on October 10, 2015 by WashingtonsBlog The American Empire Is Quickly Declining Consummate insider Colonel Lawrence Wilkerson - former chief of staff to Colin Powell, and now distinguished adjunct professor of Government and Public Policy at William & Mary - notes that the U.S. is exhibiting all of the signs of a failing empire, including: Relying on massive military force (and using gigantic complexes to support it) as the be-all and end-all of power, and belittling diplomacy Maintaining standing armies, instead of disbanding military forces between wars Using more mercenary forces than citizen troops Spending disproportionately large amounts of blood and treasure in order to counter threats on the status quo … which simply exacerbates the threat against the empire Going ethically and morally bankrupt Ending up up having bankers and financiers end up running the real power Suffering great hiccups in finance and trade The leaders no longer really believe in or follow the ideals of the founders"
  •  
    The 1 hour-25 minute video talk is well worth listening to. Col. Wilkerson is now a professor who has deeply studied the decline of empires. He speaks from deep knowledge both as a former insider and as a scholar about the state of the American Empire. But notice that the linked page has two copies of the same talk embedded. Don't bother watching both unless you want to hear it twice. :-)
Paul Merrell

Defending Dissent » New Docs Show Army Coordinated Spy Ring - 1 views

  • Army illegally supplied  intelligence on nonviolent antiwar protesters to FBI and police in multiple states Tacoma, WA – Recently obtained public records confirm an Army-led, multi-agency spy network that targeted “leftists/anarchists” as domestic terrorists. The Army used illegal infiltration to gather information on nonviolent antiwar protesters, disseminate it to the FBI and police departments in multiple states, and in some cases used it to disrupt planned protests by preemptively and falsely arresting activists. Public records obtained last month by Olympia activist Paul French reveal new evidence in the widely-watched Army spying case Panagacos v. Towery. An email from November 2007, in particular, shows that intelligence analyst John J. Towery was paid by the Army to infiltrate political groups and share unlawfully obtained intelligence with a growing network of law enforcement agencies, including the FBI, and police departments in Los Angeles, Portland, Eugene, Everett, and Spokane. The Towery email not only represents a broader spying program than previously thought, it also confirms the program was led by the Army, a fact contradicted by Towery’s 2009 sworn statements.
  • “The latest revelations show how the Army not only engaged in illegal spying on political dissidents, it led the charge and tried to expand the counterintelligence network targeting leftists and anarchists,” said Larry Hildes, a National Lawyers Guild attorney who filed the Panagacos lawsuit in 2010. “By targeting activists without probable cause, based on their ideology and the perceived political threat they represent, the Army clearly broke the law and must be held accountable.” Previously obtained public records indicate that absent such accountability, the Army will continue to spy on and target protesters, which it did until at least 2010, long after Towery’s identity was exposed. Public records previously obtained in 2009 already established that over a two-year period beginning in 2006, Towery (under the alias “John Jacob”) spied on the Olympia antiwar group Port Militarization Resistance (PMR) as well as several other organizations, including Students for a Democratic Society, the Industrial Workers of the World, and Iraq Veterans Against the War. It has also already been established that Towery’s intelligence was passed on to the Washington State Fusion Center, a communications hub of  local, state and federal law enforcement, and then used by local police to target activists for repeated harassment, preemptive and false arrest, excessive use of force, and malicious prosecution
  • The recently disclosed Towery email was a follow-up to a 2007 Domestic Terrorism Conference he attended in Spokane, during which “domestic terrorist” dossiers on some of the Panagacos plaintiffs were distributed. The Towery email shows the development of a multi-agency spying apparatus in intimate detail. “I thought it would be a good idea to develop a leftist/anarchist mini-group for intel sharing and distro,” wrote the Army analyst to several law enforcement officials. Towery references books, “zines and pamphlets,” and a “comprehensive web list” as source material, but cautions the officials on file sharing “because it might tip off groups that we are studying their techniques, tactics and procedures.” Towery, who worked at Joint Base Lewis-McChord, not only coordinated his actions with local, state and federal law enforcement agencies, many of whom are named defendants in the Panagacos case, he also admitted to eavesdropping on a confidential, privileged attorney-client email listserv of criminal defendants and their legal counsel. Such conduct is considered a constitutional violation, but Towery also took sensitive information from the listserv vital to a pending criminal trial in 2007 and passed it on to fusion center officials who then transmitted it to prosecutors, forcing a mistrial in a case the defense was winning handily. The case was later dismissed for prosecutorial misconduct.
  • ...2 more annotations...
  • The public records disclosure comes as government spying and criticism of the National Security Agency’s surveillance program has reached a fever pitch. However, a little-known and rarely, if ever, enforced law from 1878 distinguishes the spying under Panagacos from that of the NSA. The Posse Comitatus Act prohibits the military from enforcing domestic laws on U.S. soil by making such actions a Gross Misdemeanor, yet to-date no official has been prosecuted under the Act. Instead of conceding to the violations, the Army is currently using the Panagacos case to try to seal nearly 10,000 pages of documents, many of which are incriminating and embarrassing to the government. The legal effort to unseal those documents will play out over the next few weeks. The Obama Administration tried to dismiss the Panagacos lawsuit, but in a Ninth Circuit decision from December 2012 the court rejected the government’s arguments, ruling that allegations of First and Fourth Amendment violations were “plausible,” and ordered the case to proceed to trial. The lawsuit was filed on behalf of seven PMR members who sought to oppose the wars in Iraq and Afghanistan through nonviolent civil disobedience and is being heard by U.S. District Court Judge Ronald B. Leighton. In addition to Towery, named defendants in Panagacos include Thomas Rudd, one of Towery’s superiors at Joint Base Lewis-McChord, the U.S. Army, Navy, and Coast Guard, as well as certain officials within its ranks, the City of Olympia and its police department, the City of Tacoma and its police department, Pierce County, and various personnel from those jurisdictions.
  • Panagacos v. Towery is currently in the discovery stage and is scheduled to go to trial in June 2014. Further information: Recently disclosed Towery email Panagacos lawsuit complaint Domestic terrorism dossiers on plaintiffs
  •  
    One I had missed from February, 2014. I believe I had bookmarked something about this before the lawsuit was filed. Now not only has the case been filed but the alleged grounds for the lawsuit have been greenlighted by the 9th U.S. Circuit Court of Appeals. If you click through the link to the court's opinion, you'll find one of the Ninth Circuit's shorter opinions, less than five pages, which does not even mention that the defendants were employed by the U.S. Army or any branch of government, while still rejecting their claim of government officials' qualified immunity from suit for the alleged First and Fourth Amendment violations. The third amended complaint sufficiently alleged facts to support claims that had been clearly established as violative of the First and Fourth Amendments.   It's clear that the plaintiffs have smoking gun evidence and that the National Lawyers' Guild is all over this one. Trial is scheduled next month, according to the article. It's just under 300 miles from here to Seattle, but I just might make the trip to watch a few days of this trial. Strong First Amendment cases for damages that survive appellate review of the qualified immunity nearly always settle before trial. But this one smells like it is going to trial for publicity purposes even if not for the vindication of rights, considering the nature of the organizations involved both as targets of the surveillance and their lawyers. It's great entertainment watching government guys and gals squirm on the witness stand when they've been caught violating civil rights. In criminal cases, invoking the Fifth Amendment right against self-incrimination cannot be taken as evidence of guilt. But in a federal civil rights case, that entitles the plaintiffs to have the jury instructed that it can infer liability from the resort to the Fifth Amendment to refuse answering questions.  Better back in the day when I was the lawyer asking the questions. But it's still great fun just to watch
Paul Merrell

Israeli Comptroller Report Reveals 2014 Gaza Massacre Was A War Of Choice - 0 views

  • Palestinians from the Gaza Strip have criticized an Israeli report on the country’s 2014 military operation against the besieged coastal enclave. The report was released by Israeli state comptroller Yosef Shapira on Tuesday. “I understand from the report that Gaza was merely the setting for an Israeli war game, with no objective but to destroy and murder indiscriminately,” said Basman Alashi, executive director of the El-Wafa Medical Rehabilitation and Specialized Surgery Hospital. The hospital, formerly located in the Shujaya neighborhood by the separation barrier with Israel east of Gaza City, was repeatedly shelled by Israeli forces during the 51-day offensive before it was evacuated under fire on July 17, 2014.
  • “The overall impression it leaves is this: ‘Netanyahu, You didn’t do a good job of destroying Gaza, do it better next time,’” Alashi said of the report. Others said the document contained useful information about Israel’s behavior during the offensive, even if its conclusions remained incomplete. “The report shows that Israel follows a systematic policy of humiliating Palestinians, especially through careless targeting of civilians,” said Ramy Abdu, founder and chairman of the Euro-Mediterranean Human Rights Monitor. Abdu’s Geneva-based agency has conducted investigations of Israel’s military conduct, including an Oct. 30, 2014 report stating that its forces had “deliberately targeted locations with concentrations of civilians” during operations earlier that year. “What the report has failed to cover is to cite careless targeting of civilians as a consistent failure of the Israeli forces, with almost no serious actions to do something about it,” Abdu said in regard to the Israeli comptroller’s findings.
  • It also claimed the cabinet had not only failed to consider diplomatic alternatives to military action, but also to set any clear strategy concerning Gaza. Once the operation began, it said, Israeli forces largely failed to meet their objective of thwarting tunnels dug by Palestinian resistance groups, destroying only half of them over weeks of a bloody ground invasion that produced many casualties. The comptroller did not appear to consider the goals of an earlier military operation, launched by Israel in the West Bank on June 13, 2014. These goals were to weaken Hamas, obstruct an agreement by Hamas and Fatah to form a unity government across the West Bank and Gaza Strip and recover three young settlers captured by Palestinians.
  • ...2 more annotations...
  • The resulting deaths, along with the demands of an impoverished population and weeks of Israeli strikes on the Gaza Strip, ultimately spurred Palestinian resistance groups into action and forced their armed wings to respond. By the time its guns fell silent on Aug. 26, Israel had achieved the first two of its three goals for its West Bank operation. The third had always been questionable, as Netanyahu knew from the outset that the three settlers were likely dead. Along with the weakness of Israel’s strategy in the Gaza Strip, where its forces quickly found themselves unprepared to face the threat of resistance tunnels, the mixed results raise questions about which objectives were the real ones. Military operations in Gaza and the West Bank made 2014 the most lethal year for Palestinians under occupation since 1967, when Israeli forces seized Palestinian enclaves over six days of war with neighboring Arab states. As the report shows, even senior figures in Israel’s security establishment now acknowledge their government’s responsibility for the loss of life. After its release, Isaac Herzog, chairman of the Israeli Labor Party head of the opposition Zionist Union, called for Netanyahu to resign over its charges, saying “Netanyahu must draw his conclusions and hand in the keys.”
  • But Netanyahu’s re-election, along with the seating of an even more right-wing governing coalition only seven months after the Gaza offensive, shows that Palestinian bloodshed is not a liability in Israeli politics, even at the cost of Israeli lives. Israel’s continued tightening of its Gaza closure, even as the country’s comptroller finds it to have been a key cause of the 2014 carnage, demonstrates that while its government may not seek immediate conflict with the Strip, it does not prioritize its avoidance.
  •  
    This report is causing a political firestorm in Israel. This article does an excellent job of tying all the major Israeli press reports together. The report will obviously be handed off quickly to the International Criminal Court by Palestinians because it clearly establishes intent to commit war crimes.
Paul Merrell

Cynics, Step Aside: There is Genuine Excitement Over a Hillary Clinton Candidacy - The Intercept - 0 views

  • It’s easy to strike a pose of cynicism when contemplating Hillary Clinton’s inevitable (and terribly imminent) presidential campaign. As a drearily soulless, principle-free, power-hungry veteran of DC’s game of thrones, she’s about as banal of an American politician as it gets. One of the few unique aspects to her, perhaps the only one, is how the genuinely inspiring gender milestone of her election will (following the Obama model) be exploited to obscure her primary role as guardian of the status quo. That she’s the beneficiary of dynastic succession – who may very well be pitted against the next heir in line from the regal Bush dynasty (this one, not yet this one) - makes it all the more tempting to regard #HillaryTime with an evenly distributed mix of boredom and contempt. The tens of millions of dollars the Clintons have jointly “earned” off their political celebrity - much of it speaking to the very globalists, industry groups, hedge funds, and other Wall Street appendages who would have among the largest stake in her presidency - make the spectacle that much more depressing (the likely candidate is pictured above with Goldman Sachs CEO Lloyd Blankfein at an event in September).
  • But one shouldn’t be so jaded. There is genuine and intense excitement over the prospect of (another) Clinton presidency. Many significant American factions regard her elevation to the Oval Office as an opportunity for rejuvenation, as a stirring symbol of hope and change, as the vehicle for vital policy advances. Those increasingly inspired factions include: Wall Street Politico Magazine, November 11, 2014 (“Why Wall Street Loves Hillary”):
  • The Israel Lobby Foreign Policy, Aaron David Miller, November 7, 2014 (“Would Hillary Be Good For the Holy Land?”):
  • ...2 more annotations...
  • Interventionists (i.e., war zealots) New York Times, June 15, 2014 (“Events in Iraq Open Door for Interventionist Revival, Historian Says”):
  • Old school neocons New York Times, Jacob Heilbrunn, July 5, 2014 (“The Next Act for Neocons: … Getting Ready to Ally With Hillary Clinton”?):
  •  
    Glenn Greenwald serves some satire about Hillary Clinton's 2016 candidacy.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Just Security - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Voters Say "Yes" to the Republican Who Said "No" to Wall Street | The Nation - 0 views

  • House Speaker John Boehner and his cronies removed North Carolina Congressman Walter Jones from the House Financial Services Committee in late 2012, as part of a purge that removed Republicans who were not all in for Wall Street -- and for Boehner's brand of "service" to the industries that are supposed to be regulated by Congress -- from the one panel with the power to hold bankers and brokers to account. But Jones, who had opposed bank bailouts and favored Wall Street regulation, did not go quietly. He spoke up about the purge and made little secret of his sense that -- though he had split with Boehner on a number of issues -- his biggest "sin" in the eyes of the party leadership was his refusal to bow to the demands of big campaign donors. “This whole place is all about money. Money is more important than policy,” complained Jones, who has in recent years co-sponsored most major pieces of campaign-finance reform legislation in the House -- including a call for a constitutional amendment designed to restore the ability of federal, state and local officials to regulate campaign spending.
  • The congressman's bluntness did not go over well with the masters of the universe on Wall Street. So, this spring, they set out to purge Walter Jones from Congress altogether. They found a consummate DC insider with close ties to the financial-services industry, Taylor Griffin, and filled the challenger's campaign treasury with PAC checks from J.P. Morgan, Wells Fargo and Bank of America, as well as political powerbrokers like former Republican National Committee chairman Haley Barbour and Wayne Berman of the Blackstone Group. It did not stop there. Jones' independence extended far beyond debates over Wall Street bailouts and regulation. The Republican is a social and economic conservative -- make that a social and economic very conservative -- but he has repeatedly broken with the party establishment on issues of war and peace, privacy rights, trade policy and budgets. He even voted against proposals by the darling of Wall Street and the party establishment, Congressman Paul Ryan
  • Bush administration aides and apologists rushed in with public statements and "independent" expenditures to attack Jones for his opposition to wars in Iraq and Afghanistan, and for his refusal to go along with moves that might lead to wars with Iran and other countries. Former Bush White House spokesman Ari Fleischer gave his enthusiastic backing to Griffin, as did former national security adviser Juan Zarate. Sarah Palin, one of the party's most consistent militarists, came in big for Griffin, who hailed her as an "old friend." A neo-conservative group, the Emergency Committee For Israel, spent at least $250,000 on ads that claimed Jones "preaches American decline." What Jones actually said was that, “Lyndon Johnson’s probably rotting in hell right now because of the Vietnam War, and he probably needs to move over for Dick Cheney.” At the same time, the wealthy champions of Ryan's crony-capitalist approach to budgeting were in with big money for TV ads and direct mail from the "Ending Spending Action Fund" -- a super PAC backed by billionaire businessman Joe Ricketts. By a lot of DC measures, Jones should have been doomed.
  • ...1 more annotation...
  • But the ten-term congressman bet that the voters of eastern North Carolina would stick with him. “I’m not going to sacrifice my integrity for anyone or any party,” he said. “It’s the price you pay. I didn’t come (to Washington) to be a puppet for anyone. And I think the public back in my district, which is the most important, has seen I’m willing to do what I think is right.” It was the right bet. On Tuesday, Republican primary voters in eastern North Carolina decided to purge the Wall Street donors and the special interests. The reelected Walter Jones by a solid 51-45 margin.
Paul Merrell

ISIS: Made in Washington, Riyadh - and Tel Aviv by Justin Raimondo -- Antiwar.com - 0 views

  • The Islamic State in Iraq and Syria (ISIS) is being touted as the newest "threat" to the American homeland: hysterics have pointed to Chicago as the locus of their interest, and we are told by everyone from the President on down that if we don’t attack them – i.e. go back into Iraq (and even venture into Syria) to root them out – they’ll soon show up on American shores.
  • If we step back from the hysteria generated by the beheading of US journalist James Foley, what’s clear is that this new bogeyman is the creation of the United States and its allies in the region. ISIS didn’t just arise out of the earth like some Islamist variation on the fabled Myrmidons: they needed money, weapons, logistics, propaganda facilities, and international connections to reach the relatively high level of organization and lethality they seem to have achieved in such a short period of time. Where did they get these assets? None of this is any secret: Saudi Arabia, Qatar, and the rest of the oil-rich Gulf states have been backing them all the way. Prince Bandar al-Sultan, until recently the head of the Kingdom’s intelligence agency – and still the chief of its National Security Council – has been among their biggest backers. Qatar and the Gulf states have also been generous in their support for the Syrian jihadists who were too radical for the US to openly back. Although pressure from Washington – only recently exerted – has reportedly forced them to cut off the aid, ISIS is now an accomplished fact – and how can anyone say that support has entirely evaporated instead of merely going underground?
  • Washington’s responsibility for the success of ISIS is less direct, but no less damning. The US was in a de facto alliance with the groups that merged to form ISIS ever since President Barack Obama declared Syria’s Bashar al-Assad "must go" – and Washington started funding Syrian rebel groups whose composition and leadership kept changing. By funding the Free Syrian Army (FSA), our "vetted" Syrian Islamists, this administration has actively worked to defeat the only forces capable of rooting out ISIS from its Syrian nest – Assad’s Ba’athist government. Millions of dollars in overt aid – and who knows how much covertly? – were pumped into the FSA. How much of that seeped into the coffers of ISIS when constantly forming and re-forming chameleon-like rebel groups defected from the FSA? These defectors didn’t just go away: they joined up with more radical – and militarily effective – Islamist militias, some of which undoubtedly found their way to ISIS. How many ISIS cadres who started out in the FSA were trained and equipped by American "advisors" in neighboring Jordan? We’ll never know the exact answer to that question, but the number is very likely not zero – and this Mother Jones piece shows that, at least under the Clinton-Petraeus duo, the "vetting" process was a joke. Furthermore, Senator Rand Paul (R-Kentucky) may have been on to something when he confronted Hillary with the contention that some of the arms looted from Gaddafi’s arsenals may well have reached the Syrian rebels. There was, after all, the question of where that mysterious "charity ship," the Al Entisar, carrying "humanitarian aid" to the Syrian rebels headquartered in Turkey, sailed from.
  • ...3 more annotations...
  • In a recent public event held at the Aspen Institute, former Israeli ambassador to the US Michael Oren bluntly stated that in any struggle between the Sunni jihadists and their Iranian Shi’ite enemies, the former are the "lesser evil." They’re all "bad guys," says Oren, but "we always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran." Last year, Sima Shine, Israel’s Minister of Strategic Affairs, declared: "The alternative, whereby [Assad falls and] Jihadists flock to Syria, is not good. We have no good options in Syria. But Assad remaining along with the Iranians is worse. His ouster would exert immense pressure on Iran." None of this should come as much of a surprise to anyone who has been following Israel’s machinations in the region. It has long been known that the Israelis have been standing very close to the sidelines of the Syrian civil war, gloating and hoping for "no outcome," as this New York Times piece put it.
  • Secondly, the open backing by the US of particular Syrian rebel groups no doubt discredited them in the eyes of most Islamist types, driving them away from the FSA and into the arms of ISIS. When it became clear Washington wasn’t going to provide air support for rebel actions on the ground, these guys left the FSA in droves – and swelled the ranks of groups that eventually coalesced into ISIS. Thirdly, the one silent partner in all this has been the state of Israel. While there is no evidence of direct Israeli backing, the public statements of some top Israeli officials lead one to believe Tel Aviv has little interest in stopping the ISIS threat – except, of course, to urge Washington to step deeper into the Syrian quagmire.
  • Israel’s goal in the region has been to gin up as much conflict and chaos as possible, keeping its Islamic enemies divided, making it impossible for any credible challenge to arise among its Arab neighbors – and aiming the main blow at Tehran. As Ambassador Oren so brazenly asserted – while paying lip service to the awfulness of ISIS and al-Qaeda – their quarrel isn’t really with the Arabs, anyway – it’s with the Persians, whom they fear and loathe, and whose destruction has been their number one objective since the days of Ariel Sharon. Why anyone is shocked that our Middle Eastern allies have been building up Sunni radicals in the region is beyond me – because this has also been de facto US policy since the Bush administration, which began recruiting American assets in the Sunni region as the linchpin of the Iraqi "surge." This was part and parcel of the so-called "Sunni turn," or "redirection," in Seymour Hersh’s phrase, which, as I warned in 2006, would become Washington’s chosen strategy for dealing with what they called the "Shia crescent" – the crescent-shaped territory spanning Iran, Iraq, Syria, and parts of Lebanon under Hezbollah’s control, which the neocons began pointing to as the Big New Threat shortly after Saddam Hussein’s defeat.
  •  
    If one were to attempt to write the most damning yet throughly referenced report on U.S. involvement with ISIL, this manuscript would make a very good first draft.  But probably unintentionally, the author gives less credit to Israel than it is due. At least twice (and I think more but would have to check), the Israeli Air Force has struck Syria, destroying Russian heavy weaponry, missiles capable of reaching Israel, being delivered to the Lebanonese Hezbollah in Syria. Hesbollah is fighting side-by-side with the Syrian government forces in Syria. So Israel has had a direct and overt hand in the Syrian war. 
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | Global Research - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
1 - 20 of 1666 Next › Last »
Showing 20 items per page