Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "2004" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
9More

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
8More

How a false witness helped the CIA make a case for torture | Al Jazeera America - 0 views

  • Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program  — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot. Both the torture program and President Bush's warrantless wiretap program, Stellar Wind, were partly halted from March through June of 2004. That March, Assistant Attorney General Jack Goldsmith prepared to withdraw Pentagon authorization for torture, amid growing concern following the publication of pictures of detainee abuse at Iraq's Abu Ghraib, and a May 2004 CIA inspector general report criticizing a number of aspects of the Agency's interrogation program. On June 4, 2004, CIA Director George Tenet suspended the use of torture techniques.
  • During the same period, the DOJ lawyers who pushed to stop torture were also persuading President George W. Bush to halt aspects of Stellar Wind, a program that conducted warrantless wiretapping of Americans’ communications inside the U.S., on top of the Internet metadata. After a dramatic confrontation in the hospital room of Attorney General John Ashcroft on March 10, 2004, acting Attorney General Jim Comey and Goldsmith informed Bush there was no legal basis for parts of the program. Ultimately, Bush agreed to modify aspects of it, in part by halting the collection of Internet metadata. But even as Bush officials suspended that part of the program on March 26, they quickly set about finding legal cover for its resumption. One way they did so was by pointing to imminent threats — such as a planned election-season attack — in the United States.
  • The CIA in March 2004 received reporting from a source the torture report calls "Asset Y,” who said a known Al-Qaeda associate in Pakistan, Janat Gul — whom CIA at the time believed was a key facilitator — had set up a meeting between Asset Y and Al-Qaeda's finance chief, and was helping plan attacks inside the United States timed to coincide with the November 2004 elections. According to the report, CIA officers immediately expressed doubts about the veracity of the information they’d been given by Asset Y. A senior CIA officer called the report "vague" and "worthless in terms of actionable intelligence." He noted that Al Qaeda had already issued a statement “emphasizing a lack of desire to strike before the U.S. election” and suggested that since Al-Qaeda was aware that “threat reporting causes panic in Washington” and inevitably results in leaks, planting a false claim of an election season attack would be a good way for the network to test whether Asset Y was working for its enemies. Another officer, assigned to the group hunting Osama bin Laden, also expressed doubts. In its rebuttal to the Senate report, the CIA argues the agency was right to take seriously Asset Y’s reporting , in spite of those initial doubts. The CIA wrote numerous reports about the claim “even as we worked to resolve the inconsistencies.” Reports from detainee Hassan Ghul, who was captured in January 2004, supported the possibility that a cell of Al-Qaeda members in Pakistan’s tribal areas might be planning a plot of which he was unaware. And the CIA corroborated other parts of Asset Y's reporting.
  • ...5 more annotations...
  • Still, the CIA had one further reason for doubting claims that Gul was at the center of an Al-Qaeda election-year plot. Ghu told the CIA about an attempt by Gul, in the fall of 2003, to sell anti-aircraft missiles to Al-Qaeda; the Qaeda figure in Ghul’s story didn't even want to work with Gul. And Ghul later learned Gul was probably lying about his ability to acquire the missiles.
  • Nevertheless, the CIA took seriously Asset Y’s claim that Gul was involved in an election plot and moved quickly to gain custody of him after his arrest by Pakistan in June 2004. Even before CIA rendered Gul to its custody, Tenet started lobbying to get torture techniques reapproved for his interrogation. On June 29, Tenet wrote National Security Adviser Condoleezza Rice seeking approval to once again use some of the techniques whose use he suspended less than four weeks earlier, in the hope of gathering information on the election season plot. "Given the magnitude of the danger posed by the pre-election plot and Gul's almost certain knowledge of any intelligence about that plot” Tenet wrote, relying on Asset Y's claims, “I request the fastest possible resolution of the above issues." On July 20, according to the report, top administration officials gave CIA verbal approval to get back into the torture business. Ashcroft stated that most previously approved interrogation techniques would not violate U.S. law on July 22 (though not waterboarding). And by the end of July, CIA started coaxing DOJ to approve other techniques — such as slapping someone in the stomach or hosing them down with cold water or limiting their food — which had already been used by the CIA but never officially approved by DOJ.
  • At the same time, the government was also using the ostensible election-season plot, among others, to persuade the Foreign Intelligence Surveillance Court (FISC) – the secret court that approves domestic spying on Americans – to authorize the Internet dragnet. After Bush halted the Internet dragnet on March 26, his aides began working with FISC presiding judge Colleen Kollar-Kotelly to find a way to use FISA authority -- normally been used to access records for a single phone or Internet account -- to collect Internet metadata in bulk. They provided a series of briefings, including one attended by Terrorist Threat Integration Center head John Brennan and CIA Director George Tenet, to explain the threat. In addition, they provided what – under Stellar Wind – analysts called a “scary memo,” summarizing all the threats facing the country to underscore the urgency of the program. Tenet's declaration included as an appendix to an application submitted in the days before July 14, 2004, laid out the threats CIA and others were fighting that summer.
  • Judge Kollar-Kotelly invoked Tenet's material in a redacted section of her opinion authorizing the phone dragnet, pointing to it as a key reason to permit collection of what she called “enormous” amounts of data from innocent Americans.
  • Soon after the reauthorization of the torture and the Internet dragnet, the CIA realized ASSET Y's story wasn't true. By September, an officer involved in Janat Gul's interrogation observed, “we lack credible information that ties him to pre-election threat information or direct operational planning against the United States, at home or abroad.” In October, CIA reassessed ASSET Y, and found him to be deceptive. When pressured, ASSET Y admitted had had made up the story of a meeting set up by Gul. ASSET Y blamed his CIA handler for pressuring him for intelligence, leading him to lie about the meeting. By 2005, CIA had concluded that ASSET Y was a fabricator, and Janat Gul was a “rather poorly educated village man [who is] quite lazy [who] was looking to make some easy money for little work and he was easily persuaded to move people and run errands for folks on our target list” (though the Agency wasn't always forthright about the judgment to DOJ). The torture program, which was resumed in part because of a perceived urgency of extracting information from Gul on a plot that didn't exist, continued for several more years. The Internet dragnet continued under FISC authorization, on and off, until December 2011. And several other still active NSA programs, including the phone dragnet, relied on Kollar-Kotelly's earlier authorization as precedents – the case for which had also been derived, in part, from one long discredited fabricator.
1More

Gold Price "Manipulated For A Decade", Repeatedly Slammed Lower, Bloomberg Reports | Ze... - 0 views

  •  
    "While the FT promptly retracted an article on precisely the topic of gold manipulation from earlier this week (recorded for posterity here), Bloomberg appears to not have had the same "editorial" concerns and pressures, and today released an article once again slamming the final conspiracy theory that while every other asset class is manipulated, gold is in a pristine class of its own, untouched by close-banging, price fixing traders or central bankers, and reports that "the London gold fix, the benchmark used by miners, jewelers and central banks to value the metal, may have been manipulated for a decade by the banks setting it, researchers say." Of course, over the past 5 years we have reported time and again how official gold manipulation started in earnest some time in the 1960s (who can forget the "reshuffle club") but we will start with a decade. Here is what BBG finds: Unusual trading patterns around 3 p.m. in London, when the so-called afternoon fix is set on a private conference call between five of the biggest gold dealers, are a sign of collusive behavior and should be investigated, New York University's Stern School of Business Professor Rosa Abrantes-Metz and Albert Metz, a managing director at Moody's Investors Service, wrote in a draft research paper.   "The structure of the benchmark is certainly conducive to collusion and manipulation, and the empirical data are consistent with price artificiality," they say in the report, which hasn't yet been submitted for publication. "It is likely that co-operation between participants may be occurring."   The paper is the first to raise the possibility that the five banks overseeing the century-old rate -- Barclays Plc, Deutsche Bank AG, Bank of Nova Scotia, HSBC Holdings Plc and Societe Generale SA -- may have been actively working together to manipulate the benchmark. It also adds to pressure on the firms to overhaul the way the rate is calculated. Authorities around the world, already inv
7More

Let's check James Comey's Bush years record before he becomes FBI director | Laura Murp... - 0 views

  • Comey is lionised in DC for one challenge over liberties. Yet he backed waterboarding, wire-tapping and indefinite detention
  • It had the air of Hollywood. On the night of 10 March 2004, James Comey, the nominee to lead the FBI for the next ten years, rushed to the hospital bedside of his terribly ill boss, Attorney General John Ashcroft.There, he eventually confronted White House Chief of Staff Andrew Card and White House Counsel Alberto Gonzales, who were trying to get the pancreatitis-stricken Ashcroft to renew a still secret and illegal surveillance program on Americans' electronic communications. Neither Ashcroft nor Comey, then acting attorney general because of Ashcroft's condition, would reauthorize the program. When Gonzales authorized the program to go forward without a Justice Department certification, Comey threatened to resign, along with his staff and FBI Director Robert Mueller.The threats worked: President Bush blinked, and Comey won modifications to the secret surveillance program that he felt brought it into compliance with the law. This event, now the stuff of DC legend, has solidified Comey's reputation as a "civil liberties superhero", in the words of CNN's Jake Tapper, and may be one of the reasons President Obama nominated him Friday to be the next director of the FBI.
  • There's one very big problem with describing Comey as some sort of civil libertarian: some facts suggest otherwise. While Comey deserves credit for stopping an illegal spying program in dramatic fashion, he also approved or defended some of the worst abuses of the Bush administration during his time as deputy attorney general. Those included torture, warrantless wiretapping, and indefinite detention.On 30 December 2004, a memo addressed to James Comey was issued that superseded the infamous memo that defined torture as pain "equivalent in intensity to the pain accompanying serious physical injury, such as organ failure". The memo to Comey seemed to renounce torture but did nothing of the sort. The key sentence in the opinion is tucked away in footnote 8. It concludes that the new Comey memo did not change the authorizations of interrogation tactics in any earlier memos.In short, the memo Comey that approved gave a thumbs-up on waterboarding, wall slams, and other forms of torture – all violations of domestic and international law.
  • ...3 more annotations...
  • Then, there's warrantless wiretapping. Many media reports describe that Comey's defiant stand at Ashcroft's bedside was in opposition to the warrantless wiretapping of Americans international communications. But we simply do not know exactly what Comey opposed, or why or what reforms he believed brought the secret program within the rule of law. We do, however, know that Comey was read into the program in January 2004.While, to his credit, he immediately began raising concerns, the program was still in existence when the New York Times exposed it in December 2005. This was a year and a half after Comey's hospital showdown with Gonzales and Card. In fact, the warrantless wiretapping program was supported by a May 2004 legal opinion (pdf) produced by the Justice Department's Office of Legal Counsel and signed off by Comey, which replaced the 2001 legal opinion Comey had problems with.This, of course, raises the question: just what illegal surveillance program did Comey oppose so much he would resign over it? Last weekend, the Washington Post provided a new theory: the Marina program, which collects internet metadata. Now, the Senate has an opportunity to end the theorizing and find out what exactly Comey objected to. It's a line of questioning that senators should focus doggedly on, in light of the recent revelations in the Post and the Guardian.
  • The final stain on Comey's record was his full-throated defense of the indefinite military detention of an American citizen arrested on American soil. In a June 2004 press conference, Comey told of Jose Padilla, an alleged al-Qaida member accused of plotting to detonate a dirty bomb as well as blow up apartment buildings in an American city. By working for al-Qaida, Padilla, Comey argued, could be deprived of a lawyer and indefinitely detained as an enemy combatant on a military brig off the South Carolina coast for the purpose of extracting intelligence out of him. It turned out that Padilla was never charged with the list of crimes and criminal associations pinned on him by Comey that day. When Padilla was finally convicted – in a federal court – in August 2007, it wasn't for plotting dirty bomb attacks or blowing up apartment buildings. Rather, he was convicted of material support of terrorism overseas. During his indefinite military detention, Padilla was tortured.
  • Everyone has a backstory, and the confirmation process should ensure the American public hears all relevant background information, both good and bad, when Comey appears before the Senate. Senators should insist that Comey explain his role during the Bush era and repudiate policies he endorsed on torture, indefinite detention, and illegal surveillance.The new FBI director will be around for the next decade. We need one who will respect the constitution and the rule of law; not one who will use discredited and illegal activities in the name of justice and safety.
  •  
    Comey's not right for the FBI directorship this time around. The nation needs an FBI Director and Comey's role in government surveillance, torture, warrantless wiretapping, extraordinary rendition, and indefinite detention of a U.S. citizen. That's too much to get sorted out any time soon given the government shroud of secrecy on those topics. 
5More

James Comey remained at Justice Department as monitoring went on | World news | guardia... - 0 views

  • James Comey famously threatened to resign from the Justice Department in 2004 over the warrantless surveillance of Americans' internet records. But once Justice Department and National Security Agency lawyers found a novel legal theory to cover the surveillance, the man Barack Obama tapped last week to lead the FBI stayed on as deputy attorney general for another year as the monitoring continued.Comey was the acting attorney general in March 2004, when long-simmering legal tensions over the online "metadata" surveillance pitted the Justice Department and FBI against the Bush White House and NSA. That incident, dramatically recounted by Comey to the Senate in May 2007, earned the 6ft 8in former federal prosecutor a reputation for integrity that has become central to his persona.
  • President Obama directly referred to that reputation when he nominated Comey to take over the FBI on June 21. Hovering over the announcement were the Guardian and Washington Post's revelations of wide-ranging surveillance efforts."To know Jim Comey is also to know his fierce independence and his deep integrity," Obama said. "He was prepared to give up a job he loved rather than be part of something he felt was fundamentally wrong."Except that a classified report recounting the incident, acquired by the Guardian, complicates that view. Comey threatened to resign over the perceived illegality of one aspect of the surveillance. But he remained at the Justice Department for another year as that effort, operating under a new legal theory, continued nearly unchanged.
  • Comey would later testify to the Senate that the episode was "the most difficult of my professional career."But "immediately," the NSA IG report shows, lawyers from the NSA and Comey's Justice Department "began efforts to recreate this authority." They found it in what the document nebulously refers to as a Pen Register/Trap and Trace Order – a reference to devices traditionally used by surveillance officials to record the incoming and outgoing calls made and received by a telephone.The Fisa court, the secret court that oversees NSA surveillance, approved the first such order for NSA to again collect and analyze large volumes of internet records from Americans on July 14 2004, barely three months after Comey's rebellion.
  • ...1 more annotation...
  • "Although NSA lost access to the bulk metadata from 26 March 2004 until the order was signed, the order essentially gave NSA the same authority to collect bulk internet metadata that it had" previously, the NSA IG report reads, "except that it specified the datalinks from which NSA could collect, and it limited the number of people that could access the data."The surveillance Comey and his colleagues – including Mueller, the FBI director he is nominated to replace – objected to had merely been paused and rerouted under a new legal basis. Comey remained at the Justice Department as deputy attorney general until August 15, 2005.
  •  
    Here's hoping that the Senate has the sense to reject James Comey as the new FBI Director. The FBI needs a Director and Comey's active assistance  in unconstitutional NSA surveillance, even if not an absolute disqualifier, cannot possibly be sorted out  during the foreseeable future.   Hey, Mr. President, how about a real civil libertarian instead?
5More

How William Hague Deceived the House of Commons on Ukraine | David Morrison - 0 views

  • In a statement on 4 March 2014, Foreign Minister William Hague deceived the House of Commons about the legitimacy of the new regime in Ukraine. He led the House to believe that the Ukrainian parliament, the Verkhovna Rada, had removed President Yanukovich from power on 22 February in accordance with the Ukrainian constitution. "It is wrong to question the legitimacy of the new authorities", he said. It is simply untrue that the Rada followed the procedure laid down in the Ukrainian constitution to impeach and remove a president from power. Article 108 of the constitution specifies four circumstances in which a president may cease to exercise power before the end of his term. Those are: resignation; inability to exercise his or her powers for reasons of health; removal from office by the procedure of impeachment; death.
  • The procedure for removal from office by impeachment is laid down in Article 111. It is not unlike that required for the impeachment and removal from power of a US president, which could take months. Thus, Article 111 obliges the Rada to establish a special investigatory commission to formulate charges against the president, seek evidence to justify the charges and come to conclusions about the president's guilt for the Rada to consider. To find the president guilty, at least two-thirds of Rada members must assent. Prior to a final vote to remove the president from power, the procedure requires the Constitutional Court of Ukraine to review the case and certify that the constitutional procedure of investigation and consideration has been followed, and the Supreme Court of Ukraine to certify that the acts of which the President is accused are worthy of impeachment. To remove the president from power, at least three-quarters of Rada members must assent. The Rada didn't follow this procedure at all. No investigatory commission was established and the Courts were not involved. On 22 February, the Rada simply passed a bill removing President Yanukovych from office.
  • Furthermore, the bill wasn't even supported by three-quarters of Rada members as required by Article 111 - it was supported by 328 members, when it required 338 (since the Rada has 450 members). Nevertheless, justifying UK support for the new regime in Kiev in the House of Commons on 4 March, William Hague said: "Former President Yanukovych left his post and then left the country, and the decisions on replacing him with an acting President were made by the Rada, the Ukrainian Parliament, by the very large majorities required under the constitution, including with the support of members of former President Yanukovych's party, the Party of Regions, so it is wrong to question the legitimacy of the new authorities." That gives the impression that the procedure prescribed in the Ukrainian constitution for the removal of a president from office had been followed, when in fact it hadn't and therefore the new authorities in Kiev are illegitimate. President Putin questioned the legitimacy of the authorities in Kiev at his press conference on 4 March, just before William Hague spoke in the House of Commons:
  • ...1 more annotation...
  • "Are the current authorities legitimate? The Parliament is partially, but all the others are not. The current Acting President is definitely not legitimate. There is only one legitimate President, from a legal standpoint. Clearly, he has no power. However, as I have already said, and will repeat: Yanukovych is the only undoubtedly legitimate President. "There are three ways of removing a President under Ukrainian law: one is his death, the other is when he personally steps down, and the third is impeachment. The latter is a well-deliberated constitutional norm. It has to involve the Constitutional Court, the Supreme Court and the Rada. This is a complicated and lengthy procedure. It was not carried out. Therefore, from a legal perspective this is an undisputed fact." There is a fourth way - ill health - but, aside from that, Putin is undoubtedly correct.
  •  
    Although directed at comments made by the UK Foreign Minister, similar statements were issued by the Obama Administration. What happened in the Ukraine was a coup, not a legitimate impeachment of its President.  Notice that the article's link to the Ukraine Constitution is now dead. Among the coup leader's other unlawful actions, post-coup the Ukraine Rada repealed the former constitution by simple majority and reinstated the Constitution of 2004. But the enacting legislation was never signed by Ukraine's President, who had fled into exile. Moreover, the 2004 constitution had already been declared void by Ukraine's Constitutional Court because of procedural violations, repeated in its re-enactment. See https://en.wikipedia.org/wiki/Constitution_of_Ukraine#2004_and_2010_amendments_and_alleged_2014_return_to_2004_amendments  It definitely was a coup, not a legitimate transfer of power.   
4More

Redactions in U.S. Memo Leave Doubts on Data Surveillance Program - NYTimes.com - 0 views

  • The Justice Department has released a newly declassified version of a May 2004 legal memo approving the National Security Agency’s Stellarwind program, a set of warrantless surveillance and data collection activities that President George W. Bush secretly authorized after the terrorist attacks of Sept. 11, 2001. But questions about the program remain.A more heavily redacted version of the memo had been released in 2011 as part of Freedom of Information Act lawsuits by the American Civil Liberties Union and the Electronic Privacy Information Center. The new version includes previously censored references to the existence of the data collection related to Americans’ phone calls and emails.
  • The Obama administration voluntarily reprocessed the memo from Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel, in light of the fact that it had declassified the existence of the bulk phone and email data programs last year after leaks by Edward J. Snowden, a former N.S.A. contractor.The fuller release adds to the public record of an important historical episode. However, the government continued to redact crucial portions of the memo that would answer a primary remaining question about the history of Stellarwind: What prompted the Justice Department to conclude in early 2004 that one aspect of the program, which collected records about Americans’ emails in bulk, was illegal — even though it permitted other aspects, like warrantless wiretapping and the bulk collection of Americans’ phone records, to continue?“They have continued to keep redacted something very significant,” said Jameel Jaffer, a lawyer with the A.C.L.U.
  • The Justice Department’s conclusion that the email metadata program was illegal led to a March 2004 confrontation between White House and department officials in the hospital room of Attorney General John Ashcroft, after which nearly the entire top leadership of the department threatened to resign, prompting President Bush to agree to changes.
  • ...1 more annotation...
  • parts of what had happened began to become public, starting with a December 2005 article in The New York Times that revealed the warrantless wiretapping portion of the program. The bulk phone and email metadata programs, however, remained secret until 2013, when they came to light in leaks by Mr. Snowden.While the basic existence of the March 2004 crisis has been known, it was not until Mr. Snowden’s leaks that it became clear that it pertained only to the Internet metadata program. However, it has remained murky what Mr. Goldsmith objected to in light of his willingness to bless the rest of Stellarwind based on a sweeping theory of presidential wartime powers.Those portions of the memo remain redacted in the newly released version.
11More

New Saudi King Tied to Al Qaeda, Bin Laden and Islamic Terrorism Washington's Blog - 0 views

  • We’ve long noted that Saudi Arabia is a huge supporter of terrorism. But the new Saudi king is particularly bad. Investors Business Daily notes: King Salman has a history of funding al-Qaida, and his son has been accused of knowing in advance about the 9/11 attacks. *** Salman once ran a Saudi charity tied to al-Qaida and has been named a defendant in two lawsuits accusing the Saudi royal family of helping the 9/11 terrorists, one of which the U.S. Supreme Court recently let move forward after years of being blocked by the State Department and the well-funded Saudi lobby. Plaintiffs have provided an enormous amount of material to source their accusations against Salman. Here’s why his ascension to the throne is not good news, especially as the terrorism threat grows: • Salman once headed the Saudi High Commission for Relief to Bosnia and Herzegovina, which served as a key charitable front for al-Qaida in the Balkans. • According to a United Nations-sponsored investigation, Salman in the 1990s transferred more than $120 million from commission accounts under his control — as well as his own personal accounts — to the Third World Relief Agency, another al-Qaida front and the main pipeline for illegal weapons shipments to al-Qaida fighters in the Balkans.
  • • A U.N. audit found that the money was transferred following meetings with Salman, transfers that had no legitimate “humanitarian” purpose. • Former CIA officer Robert Baer has reported that an international raid of Saudi High Commission offices found evidence of terrorist plots against America. • Baer also revealed that Salman “personally approved” distribution of funds from the International Islamic Relief Organization, which also has provided material support to al-Qaida. • A recent Gulf Institute report says Salman and former Saudi intelligence chief Prince Turki al-Faisal knowingly aided and abetted al-Qaida in the run-up to 9/11. • Salman works closely with Saudi clerics Saleh al-Moghamsy, a radical anti-Semite, and Safar Hawali, a one-time mentor of Osama bin Laden, according to the Washington Free Beacon. • In “Why America Slept,” author Gerald Posner claimed that Salman’s son Ahmed bin Salman also had ties to al-Qaida and even advance knowledge of the Sept. 11, 2001 attacks.
  • David Andrew Weinberg provides a superb round-up of Salman’s ties to terrorism and extremism: As former CIA official Bruce Riedel astutely pointed out, Salman was the regime’s lead fundraiser for mujahideen, or Islamic holy warriors, in Afghanistan in the 1980s, as well as for Bosnian Muslims during the Balkan struggles of the 1990s. In essence, he served as Saudi Arabia’s financial point man for bolstering fundamentalist proxies in war zones abroad. As longtime governor of Riyadh, Salman was often charged with maintaining order and consensus among members of his family. Salman’s half brother King Khalid (who ruled from 1975 to 1982) therefore looked to him early on in the Afghan conflict to use these family contacts for international objectives, appointing Salman to run the fundraising committee that gathered support from the royal family and other Saudis to support the mujahideen against the Soviets. Riedel writes that in this capacity, Salman “work[ed] very closely with the kingdom’s Wahhabi clerical establishment.” Another CIA officer who was stationed in Pakistan in the late 1980s estimates that private Saudi donations during that period reached between $20 million and $25 million every month. And as Rachel Bronson details in her book, Thicker Than Oil: America’s Uneasy Partnership With Saudi Arabia, Salman also helped recruit fighters for Abdul Rasul Sayyaf, an Afghan Salafist fighter who served as a mentor to both Osama bin Laden and 9/11 mastermind Khalid Sheikh Mohammed.
  • ...7 more annotations...
  • Reprising this role in Bosnia, Salman was appointed by his full brother and close political ally King Fahd to direct the Saudi High Commission for Relief of Bosnia and Herzegovina (SHC) upon its founding in 1992. Through the SHC, Salman gathered donations from the royal family for Balkan relief, supervising the commission until its until its recent closure in 2011. By 2001, the organization had collected around $600 million — nominally for relief and religious purposes, but money that allegedly also went to facilitating arms shipments, despite a U.N. arms embargo on Bosnia and other Yugoslav successor states from 1991 to 1996. And what kind of supervision did Salman exercise over this international commission? In 2001, NATO forces raided the SHC’s Sarajevo offices, discovering a treasure trove of terrorist materials: before-and-after photographs of al Qaeda attacks, instructions on how to fake U.S. State Department badges, and maps marked to highlight government buildings across Washington. The Sarajevo raid was not the first piece of evidence that the SHC’s work went far beyond humanitarian aid. Between 1992 and 1995, European officials tracked roughly $120 million in donations from Salman’s personal bank accounts and from the SHC to a Vienna-based Bosnian aid organization named the Third World Relief Agency (TWRA). Although the organization claimed to be focused on providing humanitarian relief, Western intelligence agencies estimated that the TWRA actually spent a majority of its funds arming fighters aligned with the Bosnian government.
  • A defector from al Qaeda called to testify before the United Nations, and who gave a deposition for lawyers representing the families of 9/11 victims, alleged that both Salman’s SHC and the TWRA provided essential support to al Qaeda in Bosnia, including to his 107-man combat unit. In a deposition related to the 9/11 case, he stated that the SHC “participated extensively in supporting al Qaida operations in Bosnia” and that the TWRA “financed, and otherwise supported” the terrorist group’s fighters. The SHC’s connection to terrorist groups has long been scrutinized by U.S. intelligence officials as well. The U.S. government’s Joint Task Force Guantanamo once included the Saudi High Commission on its list of suspected “terrorist and terrorist support entities.” The Defense Intelligence Agency also once accused the Saudi High Commission of shipping both aid and weapons to Mohamed Farrah Aidid, the al Qaeda-linked Somali warlord depicted as a villain in the movie Black Hawk Down. Somalia was subject to a United Nations arms embargo starting in January 1992. *** The board of trustees for the Prince Salman Youth Center, which Salman himself chairs, today includes Saleh Abdullah Kamel, a Saudi billionaire whose name showed up on a purported list of al Qaeda’s earliest supporters known as the “golden chain.” (The Wall Street Journal reported that Kamel “denies supporting terror.”) But as the United States sought to shut down Saudi charities with ties to terrorism in the aftermath of the 9/11 attacks, Kamel and Salman both condemned the effort as an anti-Islamic witch hunt.
  • In 1995, US aid worker William Jefferson is killed in Bosnia. One of the likely suspects, Ahmed Zuhair Handala, is linked to the SHC. He also is let go, despite evidence linking him to massacres of civilians in Bosnia. [Schindler, 2007, pp. 263-264] In 1997, a Croatian apartment building is bombed, and Handala and two other SHC employees are suspected of the bombing. They escape, but Handala will be captured after 9/11 and sent to Guantanamo prison. [Schindler, 2007, pp. 266] In 1997, SHC employee Saber Lahmar is arrested for plotting to blow up the US embassy in Saravejo. He is convicted, but pardoned and released by the Bosnian government two years later. He will be arrested again in 2002 for involvement in an al-Qaeda plot in Bosnia and sent to Guantanamo prison (see January 18, 2002). By 1996, NSA wiretaps reveal that Prince Salman is funding Islamic militants using charity fronts (Between 1994 and July 1996).
  • History Commons adds important details: By 1994, if not earlier, the NSA is collecting electronic intercepts of conversations between Saudi Arabian royal family members. Journalist Seymour Hersh will later write, “according to an official with knowledge of their contents, the intercepts show that the Saudi government, working through Prince Salman [bin Abdul Aziz], contributed millions to charities that, in turn, relayed the money to fundamentalists. ‘We knew that Salman was supporting all of the causes,’ the official told me.” By July 1996 or soon after, US intelligence “had more than enough raw intelligence to conclude… bin Laden [was] receiving money from prominent Saudis.” [Hersh, 2004, pp. 324, 329-330] One such alleged charity front linked to Salman is the Saudi High Commission in Bosnia (see 1996 and After). Prince Salman has long been the governor of Riyadh province. At the time, he is considered to be about fourth in line to be king of Saudi Arabia. His son Prince Ahmed bin Salman will later be accused of having connections with al-Qaeda leader Abu Zubaida (see Early April 2002). [PBS, 10/4/2004] It appears this surveillance of Saudi royals will come to an end in early 2001 (see (February-March 2001)).
  • Author Roland Jacquard will later claim that in 1996, al-Qaeda revives its militant network in Bosnia in the wake of the Bosnian war and uses the Saudi High Commission (SHC) as its main charity front to do so. [Jacquard, 2002, pp. 69] This charity was founded in 1993 by Saudi Prince Salman bin Abdul-Aziz and is so closely linked to and funded by the Saudi government that a US judge will later render it immune to a 9/11-related lawsuit after concluding that it is an organ of the Saudi government. [New York Law Journal, 9/28/2005] In 1994, British aid worker Paul Goodall is killed in Bosnia execution-style by multiple shots to the back of the head. A SHC employee, Abdul Hadi al-Gahtani, is arrested for the murder and admits the gun used was his, but the Bosnian government lets him go without a trial. Al-Gahtani will later be killed fighting with al-Qaeda and the Taliban in Afghanistan. [Schindler, 2007, pp. 143-144; Schindler is a professor at the U.S. Army War College] In 1995, the Bosnian Ministry of Finance raids SHC’s offices and discovers documents that show SHC is “clearly a front for radical and terrorism-related activities.” [Burr and Collins, 2006, pp. 145]
  • In November 2002, Prince Salman patronized a fundraising gala for three Saudi charities under investigation by Washington: the International Islamic Relief Organization, al-Haramain Foundation, and the World Assembly of Muslim Youth. Since 9/11, all three organizations have had branches shuttered or sanctioned over allegations of financially supporting terrorism. That same month, Salman cited his experience on the boards of charitable societies, asserting that “it is not the responsibility of the kingdom” if others exploit Saudi donations for terrorism. *** The new king has also embraced Saudi cleric Saleh al-Maghamsi, an Islamic supremacist who declared in 2012 that Osama bin Laden had more “sanctity and honor in the eyes of Allah,” simply for being a Muslim, than “Jews, Christians, Zoroastrians, apostates, and atheists,” whom he described by nature as “infidels.” That didn’t put an end to Salman’s ties to Maghamsi, however. The new Saudi king recently served as head of the supervisory board for a Medina research center directed by Maghamsi. A year after Maghamsi’s offensive comments, Salman sponsored and attended a large cultural festival organized by the preacher. Maghamsi also advises two of Salman’s sons ….
  • A 1996 CIA report mentions, “We continue to have evidence that even high ranking members of the collecting or monitoring agencies in Saudi Arabia, Kuwait, and Pakistan – such as the Saudi High Commission – are involved in illicit activities, including support for terrorists” (see January 1996). Jacquard claims that most of the leadership of the SHC supports bin Laden. The SHC, while participating in some legitimate charitable functions, uses its cover to ship illicit goods, drugs, and weapons in and out of Bosnia. In May 1997, a French military report concludes: ”(T)he Saudi High Commission, under cover of humanitarian aid, is helping to foster the lasting Islamization of Bosnia by acting on the youth of the country. The successful conclusion of this plan would provide Islamic fundamentalism with a perfectly positioned platform in Europe and would provide cover for members of the bin Laden organization.” [Jacquard, 2002, pp. 69-71] However, the US will take no action until shortly after 9/11, when it will lead a raid on the SHC’s Bosnia offices. Incriminating documents will be found, including information on how to counterfeit US State Department ID badges, and handwritten notes about meetings with bin Laden. Evidence of a planned attack using crop duster planes is found as well. [Schindler, 2007, pp. 129, 284]
  •  
    So the U.S. invades Afghanistan and Iraq instead of Saudi Arabia? 
8More

THE TRUTH ABOUT SPYING: The Feds Are Intercepting Your Internet Data And Tech Giants Kn... - 0 views

  • Last year James Bamford of Wired — who wrote the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that the NSA hired secretive companies linked to Israeli intelligence to establish 10 to 20 wiretapping rooms at key Internet Service Provider (ISP) telecommunication points throughout the country.
  • In 2004 AT&T engineer Mark Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • Glenn Greenwald revealed that the National Security Agency (NSA) is secretly using the so-called "business records" provision of the Patriot Act to collect telephone records of millions of Americans from Verizon. Greenwald noted that "previous reporting has suggested the NSA has collected cell records from all major mobile networks," which was best illustrated by this ACLU infographic graphic illustrating how the NSA intercepts more than a billion electronic records and communications every day.
  • ...4 more annotations...
  • NSA whistleblowers William Binney and Thomas Drake corroborated Klein's assertions: Binney contends that the NSA analyzes the information "to be able to monitor what people are doing" and who they are doing it with while Drake maintains that the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications."
  • Eric Lichtblau and James Risen of the New York Times won a Pulitzer-Prize for this 2005 story: As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.
  • in January Google released a transparency report detailing the government's use of controversial legislation that bypasses judicial approval to access the online information of private citizens.
  • Given the fact that the CIA's recently visited tech conference to detail the Agency's vision for collecting and analyzing all of the information people put on the Internet, it would be naïve to think that American tech giants hasn't know that all their data belongs to NSA.
  •  
    Timeline for reports and whistleblower information going public about NSA world wide dragnet of information and communications.  Note that the official timeline the NSA slides depict the start of the Internet dragnet as late 2007, when the Bush Administration wrangled Microsoft as a source.  The whistleblower timeline starts in 2001 and is rolling worldwide by 2004.
3More

Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004 - 0 views

  • #news_entries #ad_sharebox_260x60 img {padding:0px;margin:0px} Russ Tice, a former intelligence analyst who in 2005 blew the whistle on what he alleged was massive unconstitutional domestic spying across multiple agencies, claimed Wednesday that the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama in 2004. Speaking on "The Boiling Frogs Show," Tice claimed the intelligence community had ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. "Here's the big one ... this was in summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois," he said. "You wouldn't happen to know where that guy lives right now would you? It's a big white house in Washington, D.C. That's who they went after, and that's the president of the United States now."
  • Host Sibel Edmonds and Tice both raised concerns that such alleged monitoring of subjects, unbeknownst to them, could provide the intelligence agencies with huge power to blackmail their targets. "I was worried that the intelligence community now has sway over what is going on," Tice said.
  • After going public with his allegations in 2005, Tice later admitted that he had been a key source in a bombshell New York Times report that blew the lid off the Bush administration's use of warrantless wiretapping of international communications in the U.S. The article forced Bush to admit that the practice was indeed used on a small number of Americans, but Tice maintained that the NSA practice was likely being used the gather records for millions of Americans. The NSA denied Tice's allegations. In the wake of recent reports detailing the extent of the NSA's data surveillance programs, Tice has again come out as a skeptic of the administration's response. While defenders of the program have insisted that there is nothing to suggest the government has the authority -- or desire -- to listen in on people's phone calls without a warrant, Tice told The Guardian that he believes the NSA has developed the capability "to collect all digital communications word for word."
7More

Obama Pins Fate of Nuclear Pact on Documents From an Iranian "Curveball" - 0 views

  • Obama administration officials insist "possible military dimensions" of Iran’s nuclear program must be resolved to the satisfaction of the IAEA to complete a nuclear agreement. But the term refers to discredited intelligence from suspect sources. One of the issues Obama administration officials are insisting must be resolved to the satisfaction of the International Atomic Energy Agency (IAEA) before any nuclear agreement may be concluded involves "possible military dimensions." That term refers to documents long discredited by German intelligence but which the United States and the IAEA have maintained came from a covert Iranian nuclear weapons program. A former senior German official has now revealed that the biggest collection of documents cited as evidence of such a covert Iran program actually came from a member of the Iranian terrorist organization Mujihedin-E-Khalq (MEK) and that German intelligence sought to warn the George W. Bush administration that the source of the documents was not trustworthy.
  • The use of those documents to make a case for action against Iran closely parallels the Bush administration's use of the testimony of the now-discredited Iraqi exile called "Curveball" to convince the US public to support war against Iraq. The parallel between the two episodes was recognized explicitly by the German intelligence service, the Bundesnachrichtendienst (BND), according to Karsten Voigt, who was the German Foreign Office's coordinator of North American-German relations. Voigt provided details of the story behind the appearance of the mysterious Iran nuclear documents in an interview with this writer last March for a book on the false narrative surrounding Iran's nuclear program that is newly published, Manufactured Crisis. 
  • In 2004, Powell and his State Department team still regarded the MEK as a disreputable terrorist organization, but the neoconservatives in the administration viewed it as useful as an anti-regime tool. The MEK was known to have served the interests of Israel's Mossad by providing a way to "launder" intelligence claims that Israel wanted to get out to the public but didn't want identified as having come from Israel. In the best-known case, the group's political front organization, the National Council of Resistance in Iran, had revealed the location of the Iranian uranium enrichment facility at Natanz in an August 2002 press conference, but it had been given the coordinates of the construction site by Israeli intelligence, according to both a senior IAEA official and an Iranian opposition group source, cited by Seymour Hersh and New Yorker writer Connie Bruck, respectively. The purported Iranian documents conveyed by the MEK to Western intelligence also displayed multiple indications of having been fabricated by an outside actor. The clearest and most significant anomaly was that the drawings of efforts to redesign the Shahab-3 missile to accommodate a nuclear weapons showed a missile that had already been abandoned by Iran's Defense Ministry by the time the drawings were said to have been made, as was confirmed by former IAEA deputy director general for safeguards, Olli Heinonen, in an interview with this writer. The Iranian abandonment of the earlier missile design became known to foreign analysts, however, only after Iran flight-tested a completely new missile design in August 2004 - after the "laptop documents" had already been conveyed to the BND by its MEK source. Whoever ordered those drawings was unaware of the switch to the new missile design, which would rule out a genuine Iranian Defense Ministry or military program.
  • ...3 more annotations...
  • A former IAEA official familiar with those documents recalled in interview with Truthout that senior officials at the IAEA were immediately suspicious of the entire collection of documents given to the agency in 2005. "The documents were never really convincing," said the former official. The creators of the documents had taken publicly available information about people, organizations and location and had "woven their own narrative" around them, he said. Furthermore, he recalled finding anomalies in the stamps and signature blocs of documents. The fabricated documents, depicting Iran as redesigning their missile reentry vehicle to accommodate a nuclear weapon, among other things, fit into a Bush administration strategy - coordinated with Israel - that was aimed at justifying a military confrontation with Iran. The working assumption, as was revealed by David Wurmser, special assistant to Bolton and then to Cheney, in October 2007, was that the United States would probably need to use force to bring about that change once Iraq was brought under control. Bolton recalls in his memoirs that his aim was to move the Iran nuclear issue out of the IAEA to the United Nations Security Council, where the Bush administration would call for international action against Iran, and failing that, take unilateral action.
  • The IAEA got more documents and intelligence directly from Israel in 2008 and 2009 claiming Iranian work on nuclear weapons, according to then-IAEA Director-General Mohamed ElBaradei. The intelligence passed on by Israel included the claim that Iran had installed a large metal cylinder for high explosives tests at its Parchin military facility in 2000, which it intended to use for hydrodynamic tests of nuclear weapons designs. But the IAEA never revealed the information had come from Israel, covering up the primary fact relevant to its reliability and authenticity. The Safeguards Department had been prepared as early as 2009 to publish a dossier on what it called the "possible military dimensions" of the Iranian nuclear program that would accept all the intelligence reports and documents provided by Israel as genuine and accurate. But ElBaradei's successor, Yukiya Amano, waited to do so until November 2011, when the Obama administration was ready to organize an international coalition for harsh sanctions against Iran's oil export sector. The Obama administration returned to the "possible military dimensions" last November, insisting on a provision in the interim Iran nuclear agreement that required Iran to "resolve" all the "concerns" about that issue. A "senior administration official" briefing the press on the agreement November 24 said there would be no final agreement unless Iran showed that it had "come into compliance with its obligations under the NPT and its obligations to the IAEA."
  • In response to a request from Truthout for a confirmation or denial of the revelation by Karsten Voigt of the MEK role in transmitting the purported Iranian documents to the BND in 2004, NSC officials declined to comment on the matter, according to NSC spokesperson Bernadette Meehan. Some observers believe US negotiators hope to get Iran to admit to having had a nuclear weapons program. However, Iran is certainly not going to admit that the documents and intelligence reports it knows to be fabrications are true. But the Obama administration may well believe so strongly in the Iran nuclear narrative it inherited from the Bush administration and in the idea that the sanctions against Iran confer ultimate negotiating leverage on the United States that it sees an Iranian confession as a realistic goal. In any case, the decision to introduce the falsified evidence of the past into the final negotiations is bound to bring them to an impasse unless the United States is prepared to back down.
  •  
    Neocons in the Obama administration are at it again, fueling the Iranian nukes myth with fabricated intelligence on behalf of Israel. 
3More

Feds confirm Bush-era e-mail surveillance - POLITICO.com - 0 views

  • The U.S. government has acknowledged that it swept up huge volumes of data from emails in the U.S. for several years without any court approval, based solely on the orders of former President George W. Bush. In a court filings on Monday, government lawyers said that the Internet program ran in parallel with a program gathering so-called metadata about telephone calls. The counterterrorism efforts operated under presidential authority before a judge approved them in July 2004, said a 2007 court filing made public Monday by the Justice Department (and posted here.)
  • "After the 9/11 attacks and pursuant to an authorization of the President, [redacted] the NSA [redacted] the bulk collection of non-content information about  telephone calls and Internet communications (hereafter 'metadata') activities that enable the NSA to uncover the contacts [redacted] of members or agents of al Qaeda or affiliated terrorist organizations," a senior NSA official wrote in an October 2007 declaration originally filed under seal as part of an effort to defeat litigation about the snooping Bush ordered. "Specifically, the President authorized the the NSA to collect metadata related to Internet communications for the purpose of conducting targeted analysis to track Al Qaeda-related networks. Internet metadata is header/router/addressing information, such as the 'to,' 'from,' 'cc,' and 'bcc' lines, as opposed to the body or 're' lines, of a standard e-mail. Since July 2004, the collection of Internet metadata has been conducted pursuant to an Order of the Foreign Intelligence Surveillance Court," the still-unidentified official from NSA's Signals Intelligence Directorate continued. The email program was effectively public since June of last year, after contractor Edward Snowden leaked a top-secret National Security Agency inspector general report that described the program.
  • FISC Judge Colleen Kollar-Kotelly's opinion approving the surveillance was officially released in November 2013. However, the date she issued it was redacted. Many surmised that her opinion followed a dust-up in March 2004, when then-Deputy Attorney General James Comey questioned the legality of some aspect of Bush's post-9/11 surveillance programs and refused to reauthorize that portion of the surveillance. Comey's refusal is said to have put the program into turmoil for a period of months, until officials sought and won the order from Kollar-Kotelly blessing the gathering of both the email and telephone metadata. The publicly released version of Kollar-Kotelly's opinion does not discuss the operation of the program during the period before the application for court approval. The filings Monday came in continuing legal wrangling over obligations pending lawsuits may create for the NSA to hang on to aging metadata that it would ordinarily have been required to erase under FISC orders. A federal judge in San Francisco has required that the NSA preserve that data, at least for now, rather than erasing it.
13More

Homan Square revealed: how Chicago police 'disappeared' 7,000 people | US news | The Gu... - 0 views

  • Police “disappeared” more than 7,000 people at an off-the-books interrogation warehouse in Chicago, nearly twice as many detentions as previously disclosed, the Guardian can now reveal.
  • From August 2004 to June 2015, nearly 6,000 of those held at the facility were black, which represents more than twice the proportion of the city’s population. But only 68 of those held were allowed access to attorneys or a public notice of their whereabouts, internal police records show. The new disclosures, the result of an ongoing Guardian transparency lawsuit and investigation, provide the most detailed, full-scale portrait yet of the truth about Homan Square, a secretive facility that Chicago police have described as little more than a low-level narcotics crime outpost where the mayor has said police “follow all the rules”. The police portrayals contrast sharply with those of Homan Square detainees and their lawyers, who insist that “if this could happen to someone, it could happen to anyone”. A 30-year-old man named Jose, for example, was one of the few detainees with an attorney present when he surrendered to police. He said officers at the warehouse questioned him even after his lawyer specifically told them he would not speak.
  • “The Fillmore and Homan boys,” Jose said, referring to police and the facility’s cross streets, “don’t play by the rules.” According to an analysis of data disclosed to the Guardian in late September, police allowed lawyers access to Homan Square for only 0.94% of the 7,185 arrests logged over nearly 11 years. That percentage aligns with Chicago police’s broader practice of providing minimal access to attorneys during the crucial early interrogation stage, when an arrestee’s constitutional rights against self-incrimination are most vulnerable. But Homan Square is unlike Chicago police precinct houses, according to lawyers who described a “find-your-client game” and experts who reviewed data from the latest tranche of arrestee records obtained by the Guardian.
  • ...9 more annotations...
  • The narcotics, vice and anti-gang units operating out of Homan Square, on Chicago’s west side, take arrestees to the nondescript warehouse from all over the city: police data obtained by the Guardian and mapped against the city grid show that 53% of disclosed arrestees come from more than 2.5 miles away from the warehouse. No contemporaneous public record of someone’s presence at Homan Square is known to exist. Nor are any booking records generated at Homan Square, as confirmed by a sworn deposition of a police researcher in late September, further preventing relatives or attorneys from finding someone taken there.
  • But those documents do not tell the entire story of Homan Square. Chicago police have not disclosed any figures at all on people who were detained at Homan Square but never ultimately charged. Nor has it released any information about detentions or arrests before September 2004, claiming that information is burdensome to produce because it is not digital. (Chicago purchased the warehouse in 1995.) “It’s hard to believe that 7,185 arrests is an accurate number of arrestees at Homan Square,” said the University of Chicago’s Futterman. “Even if it were true that less than 1% of Homan arrestees were given access to counsel, that would be abhorrent in and of itself.”
  • 11.8% of detainees in the Homan Square logs were Hispanic, compared with 28.9% of the population. 5.5% of the detainees were white, compared with 31.7% of the population. Of the 68 people who Chicago police claim had access to counsel at Homan Square, however, 45% were black, 26% were Hispanic and another 26% were white.
  • Despite the lack of booking and minimal attorney access at Homan Square, it is not a facility for detaining and interrogating the most violent of Chicago’s criminals. Drug possession charges were eventually levied in 5,386 of the disclosed Homan Square arrests, or 74.9%; heroin accounted for 35.4% of those, with marijuana next at 22.3%. The facility’s use by police has intensified in recent years. Nearly 65% of documented Homan Square arrests since August 2004 took place in the five years since Rahm Emanuel, formerly Barack Obama’s top aide, became mayor. (The Guardian has filed a Foia request with Emanuel’s office to disclose the extent of its involvement in Homan Square.) The 68 documented attorney visits are actually slightly higher, statistically speaking, than the extremely minimal legal access Chicago police provide suspects in custody during the initial stages of their arrest. The 2014 citywide total at declared police stations, according to First Defense Legal Aid, was 0.3%. On face value, the lawyer visit rate at Homan Square, according to the newly disclosed documents, was 0.9% over nearly 11 years.
  • Twenty-two people have told the Guardian that Chicago police kept them at Homan Square for hours and even days. They describe pressure from officers to become informants, and all but two – both white – have said the police denied them phone calls to alert relatives or attorneys of their whereabouts. Their accounts point to violations of police directives, which say police must “complete the booking process” regardless of their interest in interrogating a suspect and must also “allow the arrestee to make a reasonable number of telephone calls to an attorney, family member or friend”, usually within “the first hour” of detention. The most recent disclosure of Homan Square data provides the scale behind those accounts: the demographic trends within the 7,185 disclosed arrests at the warehouse are now far more vast than what the Guardian reported in August after launching the transparency lawsuit – but are consistently disproportionate in terms of race and constitutional access to legal counsel. 82.2% of people detained at Homan Square were black, compared with 32.9% of the Chicago population.
  • Chicago attorneys say they are not routinely turned away from police precinct houses, as they are at Homan Square. The warehouse is also unique in not generating public records of someone’s detention there, permitting police to effectively hide detainees from their attorneys. “Try finding a phone number for Homan to see if anyone’s there. You can’t, ever,” said Gaeger. “If you’re laboring under the assumption that your client’s at Homan, there really isn’t much you can do as a lawyer. You’re shut out. It’s guarded like a military installation.”
  • “Often,” Futterman continued, “prisoners aren’t entered into the central booking system until they’re being processed – which doesn’t occur at Homan Square. They’re supposed to begin that processing right away, under CPD procedures, and at Homan Square the reality is, that isn’t happening or is happening sporadically and inconsistently, which leads to the whole find-your-client game.”
  • According to police, when they took a woman the Guardian will identify as Chevoughn to Homan Square in May 2007 regarding a theft, they allowed her attorney to see her. Chevoughn says that never happened. “I was there a very long time, maybe eight to 10 hours,” said Chevoughn, who remembered being “petrified”, particularly as police questioned her in what she calls a “cage”. “I went to Harrison and Kedzie,” Chevoughn said, referring to the cross streets of central booking. “That’s where I slept. It’s where they did fingerprinting, all that crap. That’s when my attorney came.”
  • Police arrested another man, whom the Guardian will call Anthony, in 2006 on charges of starting a garbage fire, and moved him to Homan Square. Police identified him as receiving an attorney there. But Anthony told the Guardian: “That’s not true.”
  •  
    It's good to see The Guardian following through on this story.
1More

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Ar... - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
1More

Cheney: Lawmakers favored secrecy on surveillance :: WRAL.com - 0 views

  • Former Vice President Dick Cheney said Monday U.S. congressional leaders he briefed in 2004 on a surveillance program recently disclosed by leaker Edward Snowden supported it, and both Republicans and Democrats wanted to keep it secret. Cheney said he was directly involved in setting up the program, run by the National Security Agency, or NSA, in the weeks after the 9/11 attacks. He said it has had "phenomenal results" in preventing terrorist attacks. Cheney did not specify which survelliance program he was referring to. Snowden, a former NSA contractor, is facing espionage charges stemming from his disclosure of U.S. surveillance programs that collect phone records and online data in the name of national security. "There was a time when it was a very, very close hold. Unfortunately it's become public," said Cheney.
9More

US Corporations Used Personal Armies To Uproot, Terrorize Colombia - 0 views

  • Some of the numerous foreign corporations accused of serious human rights abuses in Colombia include fruit companies Dole, Del Monte, and Chiquita, agribusiness giant Cargill, and other representatives of the fossil fuel industry like Texaco (formerly Texas Petroleum Company) and Exxon Mobil. Heeding corporate orders, paramilitary groups murdered union and labor rights activists, tortured and terrorized countless indigenous and Afro-Colombian people, and devastated entire villages of subsistence farmers to make way for mining, fossil fuel extraction, or plantations that would bring massive profits to foreign corporations. The Colombian military — and, in at least one high-profile massacre, the U.S. military — sometimes lent a hand in these human rights crimes. “Every human rights person I work with in Colombia believes the peace process is a necessary precondition” to ending corporate exploitation of Colombia, Dan Kovalik, a human rights and labor rights lawyer who teaches at the University of Pittsburgh School of Law, told MintPress News.
  • In court, “Chiquita admitted to paying paramilitaries and giving them 3,000 Kalashnikov rifles between 1997 and 2004,” Kovalik said. Chiquita allied with the United Auto-Defense Forces of Colombia (AUC), one of the country’s most violent paramilitary groups, Steven Cohen noted in a report for ThinkProgress in 2014. The AUC, a group once designated as a terrorist group by the U.S. government, is responsible for thousands of deaths in Colombia. It turns out that Chiquita had been playing both sides of the conflict. Cohen reported: “By its own account, Chiquita made at least 100 payments — $1.7 million in total — to the AUC between 1997 and 2004. In the decade prior to that, the company had maintained a similar arrangement with the Revolutionary Armed Forces of Colombia (FARC), the nominally leftist rebel group chased out of the region by the combined (and coordinated) efforts of the AUC and Colombian military.”
  • “There’s been some recent reports that [Chiquita’s funding of paramilitaries] may have continued until very recently through a subsidiary,” Kovalik added. While these allegations remain unproven in court, they do suggest a staggering number of victims. Multiple lawsuits were consolidated in 2011, accusing Chiquita of being involved in the killings of as many as 4,000 Colombian nationals. While the evidence is clearest in the case of Chiquita, other international banana growers are suspect as well. “According to Salvatore Mancuso, a high-ranking paramilitarian in U.S. prison, Dole and Del Monte also worked with the paramilitaries,” Kovalik said. “All the banana companies have.” Mancuso is currently serving a 15-year sentence in a federal prison and has been spoken openly about the influence that corporations like Chiquita hold in Colombia.
  • ...6 more annotations...
  • The influence of banana growers in Colombia pre-dates the ongoing civil war. In 1928, the Colombian government brutally shut down a strike by United Fruit Company banana pickers under threat from the U.S. government. Some estimates put the death toll from the military action as high as 2,000, including workers, women and children. United Fruit was once one of the most powerful corporations in the world, manipulating the governments and economies of multiple Latin American countries. Chiquita was a trademark of United Fruit until 1990, when the company renamed itself Chiquita Brands International in an effort to rehabilitate its image. (Chiquita was purchased by two Brazilian companies in 2015, and is now headquartered in Switzerland.)
  • “It should be noted under the peace agreement, at least the one that went down in October, Coca-Cola was one of the companies named [that will be] subjected to further investigation for paramilitary ties,” Kovalik said. Coca-Cola, or at least its Colombian bottlers, have also been linked to paramilitary groups and human rights abuses. The bottlers and the company’s Atlanta headquarters have faced multiple lawsuits over attacks on union organizers. A 2010 documentary, “The Coca-Cola Case,” focused on the soda giant’s role in turning Colombia into the “trade union murder capital of the world,” June Chua wrote in a review for Rabble.ca that year.
  • Colombia is rich with resources that foreign corporations are eager to exploit, particularly in the mining, agriculture, and biofuels industries. “Mining is probably the biggest threat now to indigenous people, Afro-Colombians and peasants, and will continue to be as the peace agreement goes forward,” Kovalik added. Justin Podur, an author and global political analyst, told MintPress that Colombian human rights activists frequently say that “displacement in Colombia is not a side effect of the war, it’s really the point of the war.” Whether by design or coincidence, decades of unrest created fertile ground for profit.
  • In one of the most shocking examples of fossil fuel companies supporting the death and displacement of Colombian people, Kovalik highlighted the “the Santo Domingo massacre, in which Occidental Petroleum were part of an operation to bomb the Santo Domingo community.”
  • In a 2005 article for Z Net on the massacre, Kovalik and Luis Galvis explained: “On December 13, 1998, in what has become one of the most notorious war crimes in Colombia, the hamlet of Santo Domingo was attacked by a U.S. cluster bomb from a Colombian Air Force helicopter. Seventeen civilians, including 7 children, were killed as a result of the bombing.” In 2002, the Los Angeles Times revealed that the bombing had actually been carried out at the behest of, and with the assistance of, the Houston-based oil company which had its headquarters in Los Angeles at the time. Times staff writer T. Christian Miller wrote: “Los Angeles-based Occidental Petroleum, which runs an oil complex 30 miles north of Santo Domingo, provided crucial assistance to the operation. It supplied, directly or through contractors, troop transportation, planning facilities and fuel to Colombian military aircraft, including the helicopter crew accused of dropping the bomb.”
  • And, earlier this year, Gilberto Torres, a Colombian union activist, sued BP in London. He alleges that in 2002, he was kidnapped and tortured for 42 days by paramilitaries who were following orders from the oil giant.
3More

MI6 gets off scot-free over rendition of suspected Islamists to Libya | World news | Th... - 0 views

  • So after more than four years of Scotland Yard investigations, and months of agonising within the Crown Prosecution Service, ministers and MI6 are getting off scot-free over the abduction and subsequent torture of two suspected Islamists. Abdel Hakim Belhaj and Sami al-Saadi were enemies of Muammar Gaddafi delivered to Tripoli, courtesy of MI6 and the CIA, in 2004 when Tony Blair’s government was cuddling up to the Libyan dictator. Gaddafi had promised to abandon his nuclear and chemical weapons programme and as a reward for British friendship – including the secret rendition of his opponents – he agreed to huge and lucrative oil deals for BP.
  • In one of the deepest ironies in the history of British intelligence, clear evidence of British involvement in the rendition of Belhaj, Saadi and their families to Tripoli’s jails emerged in 2001. They were spelled out in a letter from Sir Mark Allen, then head of MI6 counter-terrorism operations, to Moussa Koussa, Gaddafi’s intelligence chief, written in March 2004. In it, Allen trumpeted MI6’s role in the operation. The letter was found among documents in Moussa’s office destroyed by Nato bombs. Saadi accepted £2.2m compensation from the British government. Belhaj chose to fight on, demanding an apology. The supreme court is soon due to deliver judgment on his claim that Britain must take responsibility for his abduction. Lawyers for the government argue that British courts have no right to hear the case since the agents of foreign intelligence agencies – notably the CIA – were also involved in the operation. Eliza Manningham-Buller, then head of MI5 – MI6’s sister service responsible for British security as opposed to spying abroad – was so angry with what MI6 had been up to, that, as the Guardian reported last week, she fired off a letter to Blair complaining about it, saying its actions may have compromised the security and safety of MI5 officers and their informants. Such was her fury that she ejected MI6 staff from MI5’s headquarters, Thames House.
  • After the Allen letter came to light, Blair said he had “no recollection at all” of the Libyan rendition. Jack Straw, then foreign secretary responsible for MI6, told MPs in 2005 – a year after the Libyan abductions – that “there is simply no truth in the claims that the United Kingdom has been involved in rendition full stop.” After the Allen letter emerged, Straw said: “No foreign secretary can know all the details of what its intelligence agencies are doing at any one time.” Government officials have insisted that the operation was in response to “ministerially authorised government policy”. Sir Richard Dearlove, head of MI6 at the time, has said: “It was a political decision, having very significantly disarmed Libya, for the government to cooperate with Libya on Islamist terrorism.” Referring to MI6’s links with Gaddafi, Manningham-Buller has stated: “There are clearly questions to be answered about the various relationships that developed afterwards and whether the UK supped with a sufficiently long spoon.” Section 7 of the 1994 Intelligence Services Act, sometimes described as the “James Bond clause”, protects MI6 officers from prosecution for actions anywhere in the world that would otherwise be illegal. They would be protected as long as their actions were authorised in writing by the secretary of state.
1More

Fact Check: Osama Bin Laden Alive, General Motors Dead - 0 views

  •  
    Excellent analysis and statement of facts in evidence.   Conclussion is that Osama is well on his way to winning on every one of his stated objectives, and GM is heading for a real bankruptcy, despie $100 Billion in taxpayer bailout funds.  GM is expected to cost taxpayers upwards of $56 Billion when all is said and done. excerpt: "Vice President Joe Biden has a suggested slogan for the Obama/Biden 2012 campaign. He repeats it everywhere he goes. "Osama Bin Laden is dead," he bellows, "and General Motors is alive!" There's only one problem. He's wrong. Yes, Bin Laden's dead, thank God. And General Motors is still an operating concern. But in point of fact, the cause for which Osama Bin Laden stood is stronger than at any time in American history, thanks in large part to the Obama administration. And as for GM, it's not so much alive as it is a member of the corporate living dead, feasting on taxpayer brains while slowly deteriorating, the first zombie company created by Obama's cronyism. On the eleventh anniversary of Osama Bin Laden's attack on America, it's worthwhile to examine just what he hoped to accomplish. He spelled out his goals in three documents: a 1996 fatwa titled, "Declaration of War Against The Americans Occupying The Land of the Two Holy Places"; a 2002 "Letter to America"; and a 2004 video. In these manifestos, he declared his willingness to die, of course. His goals included:"
14More

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
1 - 20 of 138 Next › Last »
Showing 20 items per page