Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "British-Terrorism-Act" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
6More

The FBI Has a New Plan to Spy on High School Students Across the Country | Alternet - 0 views

  • Under new guidelines, the FBI is instructing high schools across the country to report students who criticize government policies and “western corruption” as potential future terrorists, warning that “anarchist extremists” are in the same category as ISIS and young people who are poor, immigrants or travel to “suspicious” countries are more likely to commit horrific violence.Based on the widely unpopular British “anti-terror” mass surveillance program, the FBI’s "Preventing Violent Extremism in Schools" guidelines, released in January, are almost certainly designed to single out and target Muslim-American communities. However, in its caution to avoid the appearance of discrimination, the agency identifies risk factors that are so broad and vague that virtually any young person could be deemed dangerous and worthy of surveillance, especially if she is socio-economically marginalized or politically outspoken.
  • This overwhelming threat is then used to justify a massive surveillance apparatus, wherein educators and pupils function as extensions of the FBI by watching and informing on each other.The FBI’s justification for such surveillance is based on McCarthy-era theories of radicalization, in which authorities monitor thoughts and behaviors that they claim to lead to acts of violent subversion, even if those people being watched have not committed any wrongdoing. This model has been widely discredited as a violence prevention method, including by the U.S. government, but it is now being imported to schools nationwide as official federal policy.
  • Under the category of domestic terrorists, the educational materials warn of the threat posed by “anarchist extremists.” The FBI states, “Anarchist extremists believe that society should have no government, laws, or police, and they are loosely organized, with no central leadership… Violent anarchist extremists usually target symbols of capitalism they believe to be the cause of all problems in society—such as large corporations, government organizations, and police agencies.”Similarly, “Animal Rights Extremists and Environmental Extremists” are placed alongside “white supremacy extremists”, ISIS and Al Qaeda as terrorists out to recruit high school students. The materials also instruct students to watch out for  extremist propaganda messages that communicate criticisms of "corrupt western nations" and express "government mistrust.”If you "see suspicious behavior that might lead to violent extremism," the resource states, consider reporting it to "someone you trust," including local law enforcement officials like police officers and FBI agents.
  • ...3 more annotations...
  • “The whole concept of CVE is based on the conveyor belt theory – the idea that ‘extreme ideas’ lead to violence,” Michael German, a fellow with the Brennan Center for Justice’s Liberty and National Security Program, told AlterNet. “These programs fall back on the older ‘stages of radicalization’ models, where the identified indicators are the expression of political grievances and religious practices.”The lineage of this model can be traced to the first red scare in America, as well as J. Edgar Hoover’s crackdown on civil rights and anti-war activists. In the post-9/11 era, the conveyor-belt theory has led to the mass surveillance of Muslims communities by law enforcement outfits ranging from the FBI to the New York Police Department.U.S. government agencies continue to embrace this model despite the fact that it has been thoroughly debunked by years of scholarly research, Britain’s M15 spy agency and an academic study directly supported by the Department of Homeland Security.
  • “The document aims to encourage schools to monitor their students more carefully for signs of radicalization but its definition of radicalization is vague,” said Arun Kundnani, author of The Muslims are Coming! Islamophobia, extremism, and the domestic War on Terror and an adjunct professor at New York University. “Drawing on the junk science of radicalization models, the document dangerously blurs the distinction between legitimate ideological expression and violent criminal actions.”
  • As Hugh Handeyside, staff attorney for the ACLU’s national security project, told AlterNet, “Broadening the definition of violent extremism to include a range of belief-driven violence underscores that the FBI is diving head-first into community spying. Framing this conduct as ‘concerning behavior’ doesn’t conceal the fact that the FBI is policing students’ thoughts and trying to predict the future based on those thoughts.”
12More

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
6More

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
10More

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
5More

GCHQ captured emails of journalists from top international media | UK news | The Guardian - 0 views

  • GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals. Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
  • Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa). More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists’ communications. In the wake of terror attacks on the Charlie Hebdo offices and a Jewish grocer in Paris, Cameron has renewed calls for further bulk-surveillance powers, such as those which netted these journalistic communications.
  • One restricted document intended for those in army intelligence warned that “journalists and reporters representing all types of news media represent a potential threat to security”. It continued: “Of specific concern are ‘investigative journalists’ who specialise in defence-related exposés either for profit or what they deem to be of the public interest. “All classes of journalists and reporters may try either a formal approach or an informal approach, possibly with off-duty personnel, in their attempts to gain official information to which they are not entitled.” It goes on to caution “such approaches pose a real threat”, and tells staff they must be “immediately reported” to the chain-of-command.
  • ...2 more annotations...
  • The journalists’ communications were among 70,000 emails harvested in the space of less than 10 minutes on one day in November 2008 by one of GCHQ’s numerous taps on the fibre-optic cables that make up the backbone of the internet. The communications, which were sometimes simple mass-PR emails sent to dozens of journalists but also included correspondence between reporters and editors discussing stories, were retained by GCHQ and were available to all cleared staff on the agency intranet. There is nothing to indicate whether or not the journalists were intentionally targeted. The mails appeared to have been captured and stored as the output of a then-new tool being used to strip irrelevant data out of the agency’s tapping process. New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.
  • GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals. Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
6More

Obama, Biden are war criminals under UN Charter: Analyst - 0 views

  • Most Americans, their minds focused at the moment on the tragic slaughter of 20 young children aged 5 and 6, along with five teachers and a school principal in Connecticut by a heavily-armed psychotic 21-year-old, are blissfully unaware that their previous president, George W. Bush, along with five key members of his administration, were recently convicted in absentia of war crimes at a tribunal in Kuala Lumpur, Malaysia. They are unaware because the US corporate media have ignored the story, just as that same corporate media have failed to note that the crimes of which Bush, Vice President Dick Cheney, former Defense Secretary Donald Rumsfeld and five White House lawyers, were convicted all could apply equally well to current President Barack Obama and his administration. Bush, Cheney, White House counsel (and later Attorney General) Alberto Gonzalez and others were found guilty earlier this month of war crimes and crimes against humanity relating to the executive orders that launched the wars against Iraq and Afghanistan, as well as of authorizing and failing to punish torture and other war crimes by US forces, including the military and the CIA.
  • But as international law expert Francis Boyle, a professor of law at the University of Illinois, notes, under the Geneva Convention, failing to take action to prosecute those guilty of war crimes such as the “Crime against Peace” (invading a country that does not pose an imminent threat to the attacker), and torture, are war crimes in and of themselves. Speaking last week at a Summit Conference on Human Rights held at the University of the Sacred Heart in the US island colony of Puerto Rico, Boyle said US authorities, including President Obama, are engaged in an “ongoing criminal conspiracy under international law” both to cover up and protect criminals like Bush, Cheney and Rumsfeld, and to continue the commission of war crimes by the US government.
  • Obama, when initially campaigning in 2008 for the presidency, vowed that he wanted to restore the respect for the law and the Constitution, once elected President, he and his attorney general Eric Holder quickly made it clear that they were “looking forward, not backward,” and that there would be no prosecutions or indictments for war crimes of any Bush administration people.   The thing is, at that moment, both President Obama and AG Holder became war criminals themselves under the UN Charter and the Nuremberg Principles, which declare that covering up war crimes by prior government and military leaders, and failure to prosecute such war crimes, are in themselves war crimes.
  • ...1 more annotation...
  • But as Boyle noted in his address in San Juan, P.R., Obama, Vice President Joseph Biden, and the various secretaries of defense and state, the head of the CIA and the Pentagon Chiefs of Staff, as well as other Obama administration personnel, are also guilty of perpetrating ongoing war crimes themselves. Boyle accuses the Obama administration of continuing to conduct a “bogus” war on “international terrorism” including the ever escalating campaign of drone strikes in Pakistan, Afghanistan, Somalia, Yemen and other jurisdictions. He termed the president’s program of “targeted killings,” in which President Obama himself draws up the “kill list,” to be simply a case of “pure murder” under both traditional British common law and international law, and says these attacks constitute a “Crime against Humanity under Article 7(1)(a) of the Rome Statute for the International Criminal Court.”
  •  
    While the charge that Obama and other administration officials committed crimes under the Rome Statute for the International Criminal Court might seem odd because the U.S. never acceded to that treaty or to the jurisdiction of the ICC, the statute applies to those who commit war crimes within the jurisdictions of nations that have acceded to the treaty and to their superiors who either knew of should have known that such crimes would be committed and did not act to prevent them.  Pakistan  and Yemen have acceded to the treaty. The Rome treaty requires the arrest of those classified as war criminals under that treaty if they set foot in any nation that has acceded to the treaty. So just as Bush administration figures have done, Obama and crew will need to restrict where they travel after he leaves office.
  •  
    The linked article should have mentioned that it was a mock tribunal, without legal authority or powers.
4More

Germany Opens Criminal Investigation On Alleged NSA Merkel Phone Tap - 0 views

  • German prosecutors have opened an investigation into the alleged monitoring of Chancellor Angela Merkel’s cellphone by the U.S. National Security Agency, officials said Wednesday, in a move that could again complicate diplomatic relations between the two allies. It was not immediately clear what the new investigation might mean in terms of possible prosecutions of Americans. Documents provided by National Security Agency leaker Edward Snowden indicated in October that the U.S. was monitoring Merkel’s cellphone conversations, as well as those of 35 other foreign leaders. Merkel expressed outrage and accused Washington of a grave breach of trust. In the ensuing diplomatic fallout, President Barack Obama acknowledged Germany’s anger and promised that new guidelines would cut back on such monitoring, except in the case of a national security interest. “The leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them rather than turning to surveillance,” Obama said at the time.
  • Following the news of the German probe, Obama’s deputy national security adviser, Ben Rhodes, said the U.S. believes direct dialogue between the two countries rather than an investigation is the best way to address Germany’s concerns. “We believe we have an open line and good communication” with Merkel and her team, Rhodes told reporters aboard Air Force One as Obama flew to Brussels for a meeting of the Group of Seven nations. After mulling for months whether to open a formal probe, Chief Federal Prosecutor Harald Range determined “that sufficient factual evidence exists that unknown members of U.S. intelligence services spied on the mobile phone of Chancellor Angela Merkel,” his office said. In a similarly thorny diplomatic case, Germany got as far as issuing warrants for 13 unidentified CIA agents suspected of kidnapping a German terrorism suspect and taking him to a detention center in Afghanistan. The case was shelved in 2007 after the U.S. Justice Department said extraditing the agents would harm “American national interests.”
  • In his Wednesday announcement, Range’s office said he was not opening a formal investigation of wider allegations of blanket surveillance of telecommunications data in Germany by U.S. and British intelligence, saying that there was not yet sufficient factual evidence of concrete crimes. His office said that will remain under consideration. Merkel’s spokesman, Steffen Seibert, declined to comment on Range’s decision or on whether the government fears it will weigh on relations with the U.S. The government didn’t exert any influence on the prosecutor, Seibert told reporters. “I am not going to evaluate here the decision he has made,” he said. Separately, the German Parliament earlier this year set up a committee to investigate the scope of spying by the NSA and other intelligence services in Germany.
  •  
    There's a bit of comedy beneath the surface here. When Edward Snowden was in Hong Kong and news of the NSA leak hit, the U.S. Dept. of Justice promptly filed a criminal espionage charge against Snowden and attempted to extradite him from Hong Kong. Snowden left Hong Kong before the extradition paperwork was processed enough to result in his arrest.  Now with a pending criminal investigation of the NSA's espionage activities aimed at Germany's chancellor, the Obama White House says it wants dialog, not a criminal investigation. Would the U.S. honor its extradition treaty with Germany if NSA officials or the Director of Intelligence were charged with espionage in Germany? One might suspect that a dual-standard would be deployed, in effect saying that only espionage charges that the U.S. lodges can justify extradition. Or at least that's the way it worked when Italy tried and convicted in absentia several CIA officials and an Air Force officer of espionage activities, relating to the kidnapping and "extraordinary rendition" of a gentleman in Italy.       But this incident serves as a reminder that when the NSA officials conduct foreign intelligence activities, they will in most cases be deliberately violating the criminal laws of other nations. And the same activity aimed at U.S. citizens is also criminal, which is undoubtedly why Sen. Ron Wyden asked Director of Intelligence Clapper if the NSA had taken account of the Computer Fraud and Abuse Act in its processing of domestic digital communications. Clapper said he would get back to Wyden on that in writing. So far as I'm aware, Wyden is still waiting for that answer. There are lots of comedians in Washington, D.C. Most of them have no idea that they are comedians.   
3More

GCHQ handed new smartphone-hacking legal powers - RT UK - 0 views

  • Spy agencies in Britain will be given the explicit right to hack into smartphones and computers as part of a new law being introduced by the Conservative government. Security services MI5, MI6 and GCHQ can already access electronic devices by exploiting software security vulnerabilities, but the legal foundation for the practice is under scrutiny.New powers laid out in the Investigatory Powers Bill, due to be introduced in Parliament next month, will give spies a solid legal basis for hacking into computer systems, according to the Times.The revelation has sparked criticism from human rights group Liberty, which accuses the government of giving spy agencies “unlimited potential” to act against citizens.The bill, which was announced in the Queens’ Speech following the general election, is likely to include the new Snooper’s Charter, according to privacy campaigners at the Open Rights Group.
  • British spies will be able to hack into a person’s “property” through backdoors in the software. Once inside, intelligence agents can install software that allows them operate microphones to eavesdrop on conversations and even control the camera to take photographs of targets.The government admitted in February that MI5, MI6 and GCHQ were hacking into computers, servers, routers and mobile phones using the Intelligence Services Act 1994, which does not give explicit authorization for such practices.Independent reviewer of terrorism legislation Dave Anderson QC recommended in June that new legislation be introduced to clarify give intrusive hacking a firm legal basis.Anderson said that hacking presents a “dizzying array of possibilities to the security and intelligence agencies.”While some methods are appropriate, “many are of the view that there are others which are so intrusive that they would require exceptional safeguards for their use to be legal … A debate is clearly needed,” he said.
  • The investigatory powers bill will give agents explicit powers to interfere with “property” once they have obtained a warrant from the home secretary.Digital evidence expert Peter Sommer said the powers circumvented encryption technology.“Increasingly, [intelligence agents] can’t read communications sent over the internet because of encryption, so their ability to get information from interception is rapidly diminishing. The best way around this is to get inside someone’s computer. This is an increasingly important avenue for them,” he told the Times.
9More

Failed NATO Invasion of Moldova SITREP, by Scott | The Vineyard of the Saker - 0 views

  • It’s hard to overestimate the value of planning in advance, especially when it comes to getting reservations in popular restaurants and invading countries by military force. In the week of the May 9th Victory Day two significant failures took place  each one remarkable in its own way. Each event went completely unreported by the Western corporate and government media, but discussed on Social Media.
  • In the following three weeks after the incident with the USS Florida, while Russia was preparing for Victory Day celebrations and all eyes were on Moscow, attention of Ukrainians was fully concentrated on the visit of Victoria Nuland to Kiev on April 26th allegedly to discuss the implementation of the Minsk II Agreement and the future elections in Donetsk and Lugansk republics. Since the day when President Putin said that the republics can have their elections anytime they want, the question of these elections ceased to be a subject of blackmail toward the Kremlin.   It appeared that the true reason for Nuland’s visit could be located to the west of Kiev, rather than the east. Just recently, Robert D. Kaplan, a former Stratfor’s Chief Geopolitical Analyst, and currently a senior fellow at the Center for a New American Security (CNAS) has published a book “In Europe’s Shadow” where he lays out a plan to reunite Romania with “its lost province of Moldova.” Nuland visited Moldova back in January, with the task to coerce Moldova’s government and its oligarchs to change the country’s Constitution provision of neutrality. Before she left, she gave a short speech at the American Embassy in Bucharest after a private dinner with PM Ciolos and President Klaus. “We powerfully support the desire of the people in Moldova to have responsible leaders who can implement reforms. This is the best way to assure the future of Moldova. Romania and the United States, in conjunction with NATO, have support programs in place to assure the security of Moldova but the government has to work to implement these programs.”
  • Moldova is one of the poorest countries in Eastern Europe, and its economy heavily relies on Russia. According to the CIA Fact Book: Moldova’s annual remittances of about $1.12 billion comes from the roughly one million Moldovans working in Europe, Russia, and other former Soviet Bloc countries; Moldova imports almost all of its energy supplies from Russia and Ukraine; Moldova’s dependence on Russian energy is underscored by a more than $5 billion debt to Russian natural gas supplier Gazprom; Moldova signed an Association Agreement and a Deep and Comprehensive Free Trade Agreement with the EU during fall 2014, however its biggest trade partner remains Russia. Everyone understands that a NATO membership will cut all economic ties with Russia, including jobs, and it will turn Moldova into a failed state, or in the CIA doublespeak, the country would stop being vulnerable to “Russian pressure.” Apparently, the failure of Moldova as a state, and its disappearance as a nation is also what the EU wants. On January 6, the new Moldovan Ambassador to Germany was presenting his credentials when, out of the blue, the German president asked the new ambassador what the procedure was for Republic of Moldova to formally unite with Romania. On May 4th, the Katehon reported on Vladimir Plahotniuc’s (the infamous Moldavian oligarch and mafia boss) visit to the US and his meeting with Victoria Nuland there. As the Victory Day celebration was approaching, we all fully anticipated from the US to conduct terror acts, military excursions/drills, and political and legal attacks on Russia as the US and the EU always do to harass Russia during its major national and Church holidays.
  • ...6 more annotations...
  • Starting with April 21st,  we saw a flurry of “news” about Ukraine and Romania joining NATO Black Sea flotilla and the organization of Romanian-Ukrainian-Bulgarian brigade similar to that created by Poland. On April 26, Georgia (Gruzia) pitched in via the Georgia Today: “creation of NATO Black Sea Fleet Gains US Support” and praising Turkey, Bulgaria and Romania for calls to expand the Western military. All what Russia said to all this NATO generated noise was a brief statement of  Russia’s envoy to NATO Alexander Grushko. “NATO should be in a position to know that all necessary steps will be taken from our side to neutralize the emerging threats.” With all these  preparations for the war on Russia going on, NATO also planned military drills in neutral Moldova, chosen to start on May 2nd, the day of remembrance for the victims of the Odessa Massacre. Meanwhile, the patriots of Moldavia who worked together regardless of their political views, discovered something interesting and saved Moldova. NATO reported that for drills they would be entering Moldova in four formations, and that the total of motorized units will be 50+. However, the very first formation that made an attempt to enter the territory of Moldova contained 100+ unites. This was just one formation. And there was expected three more formations.
  • The plan of NATO was to enter the country with too large for this tiny country forces, to stage a bloody false flag attack during the Victory Day celebration in Moldova with the participation of Ukrainian Right Sector terrorists masquerading as “pro-Russia separatists.” This plot worked in Ukraine, so it should work in Moldova, right? That’s the true reason why Nuland was in Kiev two weeks prior. After this false flag attack, a Romanian fleet was planned to enter Ukrainian territorial waters “by invitation of the Ukrainian government” and arrive to Odessa in order to block Russian fleets from interfering and helping Transnistria. But… Coming back to the bizarre incident near Gibraltar, when one NATO member’s tiny 20 tone Costal Guards’ boat was attacked by another NATO member for interfering with the 18,000 tones behemoth of a submarine  of the third NATO member. The NATO plan apparently was to stealthy and quietly position the Ohio-class ballistic guided-missile submarine USS Florida (SSGN 728) in the Mediterranean or even in the Black Sea so it would be able to shoot into Moldova to overwhelm Moldovan minuscule defense forces. We have to remember that it was the USS Florida “that opened up the Libya intervention,” firing more than 90 cruise missiles to destroy Libya’s air defenses and clearing the way for NATO air strikes. “Never before in the history of the United States of America has one ship conducted that much land attack strikes, conventionally, in one short time period,” Rear Adm. Rick Breckenridge had said.
  • However, thanks to Spanish Costal Guards the submarine was discovered and talked about all around the world via social media and the press. The USS Florida had no other options but to retreat and return to home base. In fact, there were TWO incidents on the same April 16th  day involving the USS Florida. First, it was  the Spanish patrol boat belonged to the Servicio de Vigilancia Aduanera, at whom the British Navy opened  fire.  A bit later,  the Guardia Civil vessel Rio Cedeña tried to cut across the submarine’s bow and was photographed  by multiple witnesses.
  • According to V.V. Pyakin, a political analyst with the Concept Technologies Foundation, a think tank located in St. Petersburg, NATO was in a process of conducting a full-scale invasion of Moldova with the annexation of a Southern part of Ukraine including Odessa to construct a NATO Navy base there. Moldova was supposed to become a part of Romania automatically with the US military forces arriving to the capital and taking  over the government of Moldova. That’s why NATO needed all those military “drills” in the Black Sea region and in the Baltics simultaneously. When the patriotic forces of Moldavia discovered that NATO was about to enter the territory of Moldova in four formations, 100+ motorized units each, they protested loudly and blocked the entrance of NATO troops on the border. Meanwhile, the biggest political fraction in Moldova threatened with the impeachment of the president for treason, if  NATO troops would be allowed to enter the country. Reports from Moldova at the time disclosed that American troops stopped at the border crossing didn’t have proper ID and other papers. Moldovans came to greet them with the banners “Moldova is a neutral country” and “Stop bases of NATO,” “Stop NATO” and “NATO go home.” As the result, on April 28th only about 60 units and 200 servicemen the U.S. Army 2nd Cavalry Regimental Engineer Squadron were allowed to enter the country.
  • When a formation of American military crossed the Romanian-Moldova border allegedly to take part in  Dragon Pioneer 2016 NATO military drills, Moldavian opposition leaders expressed protests. Several members of the Parliament blocked the road.  They reported to Russian and international media and news outlets that the US troops didn’t have an international agreement signed by the defense ministers of Moldova and USA. They also lacked a legal government agreement on the entrance of the heavy military equipment and weaponry to the territory of the country. 60% of American servicemen didn’t have valid military IDs. According to a TASS report,  “To prevent collisions, officers from the Fulger (Lightning) police battalion of special purpose intervened, which were specially delivered from Chisinau. After checking the documents, a column of military vehicles followed the US to the place of temporary location at the site of Negresht,” said the inspectorate.” “The initiative to invite the US troops into the country and hold the exhibition of American technology belongs to the Minister of Defense of Moldova Anatol Șalaru, who is famous for the organization of the “Museum of Soviet occupation” in Chisinau, calls to repeal neutrality and make the country a member of NATO, and the fight against monuments of the Soviet era.” This move was harshly criticized by Igor Dodon, whose party has the largest faction in Parliament and controls a quarter of the seats.
  • He stated: “We believe military exercises involving US troops on Moldovan territory is a flagrant violation of the constitutional principle of neutrality of Moldova. In this regard, the deputies from the Party of socialists have already initiated a number of procedures. They will continue, and this will be one of the reasons for introducing in May the initiative to dismiss the government.” By Victory Day it became apparent that the Nuland-Kogan-NATO plan for invasion of Moldova was foiled. All Americans could do was   to “crush” a Victory Day parade in the center of Moldova’s capital by coming uninvited and bringing their motorized vehicles to it. And that’s where NATO troops and Moldovan patriots came face to face. Pindos lost their freaking mind:  An American Colonel demands from the citizen of Moldova to leave the central square ПИНДОСЫ ОХРЕНЕЛИ В КОНЕЦ! Американский полковник предлагает покинуть центральную площадь Кишинева гражданину РМ pic.twitter.com/FfECO3NBXi — Серж Высоцкий (@Albertich50) May 12, 2016 An American Colonel demands from the citizen of Moldova to leave the central square
4More

BBC News - Google and Facebook can be legally intercepted, says UK spy boss - 0 views

  • UK intelligence service GCHQ can legally snoop on British use of Google, Facebook and web-based email without specific warrants because the firms are based abroad, the government has said. Classed as "external communications", such activity can be covered by a broad warrant and intercepted without extra clearance, spy boss Charles Farr said. The policy was revealed as part of a legal battle with campaign group Privacy International (PI). PI labelled the policy "patronising".
  • Charles Farr, director general of the Office for Security and Counter-Terrorism, told PI that Facebook, Twitter, YouTube and web searches on Google - as well as webmail services such as Hotmail and Yahoo - were classified as "external communications", which meant they could be intercepted without the need for additional legal clearance. Internal communications between citizens can only be intercepted when a targeted warrant is issued. Warrants must be signed by a minister and can only be issued when there is suspicion of illegal activity. But when someone searches for something on Google or posts on Facebook they are sending information overseas - constituting an act of external communication that could be collected under a broader warrant which does not need to be signed by a minister, explained Mr Farr in a 48-page written statement.
  • However, he said data collected in this way "cannot be read, looked at or listened to" except in strictly limited circumstances. Mr Farr said there was a "significant distinction" between intercepting material and a person actually reading, looking at or listening it.
  •  
    Well, that should ratchet up the controversy scale in the UK a bit. :-) 
6More

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
‹ Previous 21 - 31 of 31
Showing 20 items per page