Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "publishers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
4More

WorldLII - WorldLII: About WorldLII - 0 views

  • You are here: WorldLII >> About WorldLII   What is WorldLII? The World Legal Information Institute (WorldLII) is a free, independent and non-profit global legal research facility developed collaboratively by the following Legal Information Institutes and other organisations. Australasian Legal Information Institute (AustLII) British and Irish Legal Information Institute (BAILII) Canadian Legal Information Institute (CanLII) Hong Kong Legal Information Institute (HKLII) Legal Information Institute (Cornell) (LII (Cornell)) Pacific Islands Legal Information Institute (PacLII) Wits University School of Law (Wits Law School) For further details, see the WorldLII brochure. The LIIs, meeting in Montreal in October 2002, adopted the Montreal Declaration on public access to law. WorldLII comprises three main facilities: Databases, Catalog and Websearch.
  • WorldLII Databases WorldLII provides a single search facility for databases located on the following Legal Information Institutes: AustLII; BAILII; CanLII; HKLII; LII (Cornell); and PacLII. WorldLII also includes as part of this searchable collection its own databases not found on other LIIs. These include databases of decisions of international Courts and Tribunals, databases from a number of Asian countries, and databases from South Africa (provided by Wits Law School). Over 270 databases from 48 jurisdictions in 20 countries are included in the initial release of WorldLII. Databases of case-law, legislation, treaties, law reform reports, law journals, and other materials are included. WorldLII welcomes enquiries concerning the possible inclusion of other databases on WorldLII or on one of its collaborating LIIs. WorldLII Catalog and Websearch The WorldLII Catalog provides links to over 15,000 law-related web sites in every country in the world. WorldLII's Websearch makes searchable the full text of as many of these sites as WorldLII's web-spider can reach. WorldLII welcomes enquiries from law librarians and other legal experts who are interested to become Contributing Editors to the WorldLII Catalog.
  • Operation of WorldLII The provision of the WorldLII service is coordinated by the Australasian Legal Information Institute (AustLII), which maintains WorldLII's user interface, the WorldLII Catalog and Websearch, and the databases located only on WorldLII. Technical enhancements to WorldLII are being developed jointly by the cooperating Legal Information Institutes. Contacting WorldLII General contact: feedback@worldlii.org AustLII/WorldLII Co-Directors: Professor Andrew Mowbray, UTS <andrew@austlii.edu.au> Professor Graham Greenleaf, UNSW <graham@austlii.edu.au> Philip Chung, AustLII Executive Director <philip@austlii.edu.au> Mail: WorldLII, c/- AustLII, UTS Faculty of Law, PO Box 123 Broadway NSW 2007 Australia Telephone: +61 2 9514 4921 Fax: +61 2 9514 4908 We hope that you enjoy using WorldLII and find it to be a useful service. Feedback (particularly words of encouragement or constructive criticism) are welcome and may be sent to feedback@worldlii.org. WorldLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback URL: http://www.worldlii.org/worldlii/
  •  
    The various Legal information Institutes that collaborate on WorldLII have the most advanced, integrated, and largest public legal research databases available on the Internet, searchable through a common interface. Still nothing like a complete university law library because so many legal source materials are copyrighted, this is the combined effort of many law schools. A companion browser extension is available for Chrome and Firefox called Jureeka. That extension causes your pages rendered in the browser to contain hyperlinks to all legal authorities cited on the page that are recognized by the extension, with the links going to case law, regulations, and statues that are in the public domain. https://chrome.google.com/webstore/detail/jureeka/ediidjmindkcaflpfjgabfaibhngadbb?utm_source=chrome-app-launcher-info-dialog Thus far, Jureeka is integrated with all legal materials published by the Legal Information Institute long located at Cornell Law School, as well as the Justia archives of U.S. case law. Rumor has it that the extension will be extended to cover materials published by other Legal Information Institutes at various law schools around the globe.
3More

WikiLeaks to publish more Hillary Clinton emails - Julian Assange | Media | The Guardian - 0 views

  • Julian Assange, the founder of WikiLeaks, has said his organisation is preparing to publish more emails Hillary Clinton sent and received while US secretary of state. Clinton, the presumptive Democratic presidential nominee, is under FBI investigation to determine whether she broke federal law by using her private email in sending classified information. A new WikiLeaks release of Clinton emails is likely to fan a controversy that has bedevilled her campaign and provide further ammunition for Donald Trump, her Republican presidential rival, who has used the issue to attack her. Assange’s comments came in an interview on ITV’s Peston on Sunday. “We have upcoming leaks in relation to Hillary Clinton … We have emails pending publication, that is correct,” Assange said.He did not specify when or how many emails would be published. WikiLeaks launched a searchable archive in March of 30,322 emails and email attachments sent to and from Clinton’s private email server while she was secretary of state. The 50,547 pages of documents are from 30 June 2010 to 12 August 2014, and 7,570 of the documents were sent by Clinton, who served as secretary of state from 2009 to 2013. Assange, a trenchant Clinton critic, said she was receiving constant personal updates on his situation.
  • Assange said it was highly unlikely that the US attorney general, Loretta Lynch, would indict Clinton. “She’s not going to indict Hillary Clinton, that’s not possible. It’s not going to happen. But the FBI can push for concessions from a Clinton government,” he said.
  • His attacks on Clinton may be dismissed as highly partial, but the email controversy continues to dog her. An internal report last month found she had broken several government rules by using a private server rather than more secure official communication systems. The 78-page investigation by the inspector general of the state department singled out several previously unknown breaches while Clinton was secretary of state, including the use of mobile devices to conduct official business without checking whether they posed a security risk.
3More

Turkey Expands Purge, Shutting Down News Media Outlets - The New York Times - 0 views

  • The Turkish government ordered the closing of more than 100 media outlets on Wednesday, including newspapers, publishing companies and television channels, as part of a sweeping crackdown following a failed military coup this month.The Turkish authorities ordered the shutdown of 45 newspapers, three news agencies, 16 television channels, 15 magazines and 29 publishers in a decree that was published in the government’s official gazette on Wednesday.Among those ordered to close are the newspaper Zaman and the Cihan News Agency, which had previously been seized by the government over suspicions that it has links to the network of Fethullah Gulen, a Muslim cleric who lives in self-imposed exile in the United States and has been accused of orchestrating the July 15 coup attempt.
  • In response to the botched coup, the government has purged tens of thousands of soldiers, police officers, journalists, teachers and government employees accused of having ties to the Gulen organization. Advertisement Continue reading the main story More than 9,000 people have been arrested in connection with the coup attempt, and thousands more have been detained, the semiofficial Anadolu News Agency reported. Since Monday, detention warrants have been issued for at least 80 journalists suspected of having ties to Mr. Gulen.
  • More than 1,000 members of the Turkish military, including 127 generals and 32 admirals, were also dismissed as a result of the decree published under the state of emergency late Wednesday. They have been accused of having connections to Mr. Gulen.
3More

Watchdog: FBI Facial Recognition May Not Be Accurate - Nextgov.com - 0 views

  • The FBI doesn’t know exactly how accurate its facial recognition technology is, new watchdog report finds. The bureau's Next Generation Identification-Interstate Photo System, a database including more than 30 million photos of criminals, lets law enforcement match a surveillance camera photo to that of a known criminal by narrowing their identity to between two and 50 possible candidates. But the FBI hasn't ensured its facial recognition technology doesn’t “unnecessarily include photos of innocent people as investigative leads,” according to a new report from the Government Accountability Office. The NGI-IPS and the FBI’s "Facial Analysis, Comparison and Evaluation Services," or FACE, which accesses databases from other federal, state and local groups, were the subject of a recent audit.  Most photos in NGI-IPS are submitted from 18,000 external groups among federal, state and local law enforcement -- about 70 percent are criminal mugshots. It’s the same technology that helped the FBI and a state track down a sex offender who had been on the run for 20 years. The FBI has spent about $55 million on facial recognition over the last six years.
  • FBI officials haven’t tested the detection rate -- how often a match is generated against a submitted photo -- for lists less than 50 candidates, according to GAO. Law enforcement may request a specific number of candidates for any search, though the default is 20. Verifying that NGI-IPS is accurate for all candidate list sizes would provide more assurance that the system helps to “enhance, rather than hinder, criminal investigations,” the GAO report said. <a href="http://pubads.g.doubleclick.net/gampad/jump?sz=300x300&c=801138892&iu=%2F617%2Fnextgov.com%2Fsection_emergingtech%2Fcontent%2Fpid_129155&t=noscript%3Dtrue%26referring_domain%3DTyped%252FBookmarked%26pos%3Dinjector%26level%3D0"> <img src="http://pubads.g.doubleclick.net/gampad/ad?sz=300x300&c=801138892&iu=%2F617%2Fnextgov.com%2Fsection_emergingtech%2Fcontent%2Fpid_129155&t=noscript%3Dtrue%26referring_domain%3DTyped%252FBookmarked%26pos%3Dinjector%26level%3D0"/> </a> The FBI also hasn’t assessed how often errors occur in facial matching. These can be caused both by lower-quality technology, but also by low-quality photos, the report said. The detection- and the false-positive rate are key data points that will help the bureau and the public understand these risks before the technology is deployed, the report said. GAO also found FBI hadn’t determined whether the facial recognition technology its federal, state and local partners use is accurate enough to support its own investigations. These oversights could impinge on citizen's privacy and civil liberties, the report noted. In 2012, the advocacy group the Electronic Frontier Foundation suggested facial recognition systems could allow “covert, remote, and mass capture and identification of images.”
  • In criminal cases, a false positive might force a defendant to prove he or she isn’t who the facial recognition system thought he was -- such a scenario might “alter the traditional presumption of innocence,” an EFF statement said. The FBI has also been slow in publishing its privacy protocol, the report found. The Justice Department hadn’t updated a key “Privacy Impact Assessment” between 2008 and 2015; and though NGI-IPS has existed since 2011, the FBI also didn’t publish the requisite System of Records Notice, explaining how the technology is used, until May 2016. Publishing these notices more promptly would reassure the public “the FBI is evaluating risks to privacy,” the report said.  The GAO review comes shortly after DOJ published a notice arguing its massive biometric database should be excluded from the Privacy Act, which requires the federal government to disclose, upon inquiry from the subject, the information it collects on the public. The system includes finger and palm prints, iris and facial scans, images of tattoos, from criminals, suspects, detainees and anyone undergoing background checks, security clearances and other government assessments.
6More

The Daily Dot - How a major bank and the U.S. government joined forces to spy on Anonymous - 0 views

  • New details have surfaced regarding the surveillance protocols used by Bank of America to keep tabs on social activists. Last year, Anonymous hacktivists published 14 gigabytes of private emails and spreadsheets which revealed that Bank of America was monitoring social media and other online services used by activists for basic communication. This time however, information about the bank’s recent surveillance activities were obtained legally through a public records request by a single petitioner. The newly published documents reveal a coordinated effort by Bank of America, the Washington State Patrol (WSP), and federal counterterrorism agencies, to monitor activists as they prepared for a public demonstration in Olympia, Wash. Over 230 people originally signed up to attend the “Million Mask March” event, which was organized by the Anonymous movement and took place on November 5, 2013. Although an official report by the WSP described the event as a “peaceful protest” being organized by activists who had made “no threats of violence,” those involved were still monitored by the department before the event took place. Information gathered about the potential protesters was then shared with Bank of America. Furthermore, Bank of America solicited information about activists from various federal agencies, including the Federal Bureau of Investigation.
  • According to Andrew Charles Hendricks, an activist who originally acquired the documents, the emails included the home address of a demonstration organizer. Hendricks claims he redacted the address before publishing the documents online. The relationship between Bank of America and the WSP, as well as their long-term investment in surveillance, is highlighted by an email sent on September 23, 2013. Kim Triplett-Kolerich, an intelligence analyst for Bank of America requested that WSP share any intelligence gathered on activists taking part in the Million Mask March with the bank. She began the email by identifying herself as a former officer and provided her former rank. “From time to time I will see items that I believe will be of use to my friends at WSP—especially during session,” she told the officer. “May Day I will pick your brain for intel and I will give you a lot also,” she wrote.
  • The next week, Triplett-Kolerich emailed the same WSP sergeant again about the march. “Sorry for not getting back to you sooner—hectic weeks lately with foreclosures and this MMM,” Triplett-Kolerich wrote. She then notified the sergeant that Bank of America has been in contact with “the Fusion Center and JTTF” regarding the Anonymous march. JTTF refers to the Joint Terrorism Task Force, which is a group comprised of local law enforcement agencies, the Federal Bureau of Investigation (with whom it shares a website) and the Homeland Security department. The Fusion Center is a state-level counterterrorism agency, which coordinates “national intelligence” between various local law enforcement and public safety departments. In addition, the Fusion Center provides for “the effective communication of locally generated threat-related information to the federal government.”
  • ...2 more annotations...
  • Triplett-Kolerich concluded her email by boasting that the surveillance tactics used by Bank of America to monitor activists online was superior to that of the WSP. “I will most likely find it first as social media trolling is not what WSP does best. Bank of America has a team of 20 people and that’s all they do all day and then pass it to us around the country!!!” On October 24, an email was sent by a sergeant at the WSP’s Special Operations Division to an executive aide at the Thurston County Sheriff’s Office. The sergeant notified the office that a large number of arrests may take place during the Million Mask March, which could impact the jail. Attached to the letter was a message written by an Anonymous activist, and a link to its Facebook event page where the names of those planning to attend the march could be seen.
  • Unbeknownst to the crowd, the supervisor of a local transit company had dropped off an Olympia city bus nearby at the request of the WSP. According to recently published emails, it was parked on the west side of an administration building close to the demonstration, just in case they needed to move in and haul a large group of disorderly protesters off to jail—but they didn’t. The Daily Dot reached out to Triplett-Kolerich and three Bank of America media relations contacts requesting a comment for this article, but received no response. 
  •  
    More evidence of the cozy relationship between the banksters and the "anti-terrorism" folk in the U.S. Of particular interest BofA has a 20-person unit that spends their days trolling social media for intelligence.
6More

BBC News - Australia sites hacked amid spying row with Indonesia - 0 views

  • A member of Anonymous Indonesia said the group carried out the cyber attacks Continue reading the main story Spy leaks How intelligence is gathered History of spying NSA secrets failure 'Five eyes' club Hackers have attacked the websites of the Australian police and Reserve Bank amid an ongoing row over reports Canberra spied on Jakarta officials. The row has heightened diplomatic tensions between the allies and sparked protests in Indonesia. Indonesia has suspended military co-operation with Australia and recalled its ambassador over the allegations. A top Australian adviser has also come under fire for several tweets critical of Indonesia's handling of the row. Reports of the spying allegations came out in Australian media from documents leaked by whistleblower Edward Snowden.
  • The leaked documents showed that Australian spy agencies named Indonesian President Susilo Bambang Yudhoyono, the first lady, the vice-president and other senior ministers as targets for telephone monitoring, Australian media said. The alleged spying took place in 2009, under the previous Australian government. "It is not possible that we can continue our co-operation when we are still uncertain that there is no spying towards us," Mr Yudhoyono said on Wednesday. He added he would also write to Australian Prime Minister Tony Abbott to seek an official explanation over spying allegations. Mr Abbot has said he regretted the embarrassment the media reports have caused. However, he also said that he does not believe Australia "should be expected to apologise for reasonable intelligence-gathering operations"
  • The Australian Federal Police (AFP) and Australia's Reserve Bank confirmed that their sites were victims of a cyber attack on Wednesday night.
  • ...2 more annotations...
  • The Reserve Bank also said its website was "the subject of a denial of service attack". "The bank has protections for its website, so the bank website remains secure," a spokesman added. Australian media identified a Twitter user who described herself as a member of Anonymous Indonesia and appeared to claim responsibility for the attack. The user wrote: "I am ready for this war!" and said she would conduct further attacks unless there was an apology from the Australian government for the alleged spying. Twitter outburst
  • Meanwhile, Mark Textor, a campaign strategist who advised Australian Prime Minister Tony Abbott's Liberal Party came under fire for a series of provocative tweets that criticised Indonesia's handling of the spying row. Mr Textor wrote in a Twitter post: "Apology demanded from Australia by a bloke who looks like a 1970's Pilipino [sic] porn star and has ethics to match". The tweet has since been deleted. Australian media widely reported that he was referring to Indonesian Foreign Minister Marty Natalegawa, who has called for an apology from Australia over the spying claims.
  •  
    Edward Snowden's leak continues to roil international relations.
4More

Revealed: How the Nsa Targets Italy - 0 views

  • A special unit operating under cover and protected by diplomatic immunity, assigned to a very sensitive mission: to spy on the communication of the Italian leadership. That is what top secret documents leaked by Edward Snowden and published in Italy exclusively by l'Espresso in collaboration with "la Repubblica" reveal. A file mentions the "Special Collection Service " (SCS) sites in Rome and in Milan, the very same service which, according to the German weekly "Der Spiegel ", spied on the mobile phone of the German Chancellor, Angela Merkel. "Special Collection Sites", reads the file published today by l'Espresso, "provide considerable perishable intelligence on leadership communications largely facilitated by site presence within a national capital". These documents are very important because they contradict recent statements by the Italian Prime Minister reassuring the Italian Parliament. Speaking to the Chamber of Deputies four weeks ago, Enrico Letta said: "Based on the analysis conducted by our intelligence services and our international contacts, we are not aware that the security of the communications of the Italian government and embassies has been compromised, nor are we aware that the privacy of Italian citizens has been compromised". These top secret documents tell a different story, however.
  • The Special Collection Service is likely one of the most sensitive units in U.S. intelligence. The service deploys teams under diplomatic cover, operating in US embassies around the world to control friendly and enemy governments. The top secret NSA document examined by l'Espresso reveals that "in 1988 [SCS] had 88 sites, our peak". The SCS is assigned to a special mission: monitoring the communications of the political, and likely economical, leaders of host nations. For this reason, SCS teams operate within the heart of power: in embassies and consulates, working in close collaboration with the CIA. Also in Rome, in the US embassy located in via Veneto, from those very same roofs which witnessed the Dolce Vita. Snowden's files reveal that, at least until 2010, the Special Collection Service maintained two sites in Italy: one in Rome, a base staffed with agents, and one in Milan, the capital of the Italian economy where, according to a file dated 2010 and originally published in Der Spiegel, the SCS would run an unmanned site. Two sites in a relatively small country like Italy is unusual: only in Germany -- a prime target for NSA in Europe -- does SCS maintain two bases.
  • NSA's mass spying activities did not target our leadership and diplomacy alone, but it possibly also targeted millions of Italian citizens. A file on the top secret programme "Boundless Informant" that is labeled "Italy" reveals that between December 10, 2012 and January 9, 2013, the NSA collected the metadata for 45.893.570 telephone calls. Estimates close to this figure had already circulated, but now the actual document indicates the penetration of this monitoring. All of the metadata gathered in our country between December 10^th and January 9^th 2013 as reflected on this slide relate to phone communication, unlike the slides published in Germany and France, where internet communication metadata were targeted as well.
  • ...1 more annotation...
  • The Snowden file examined by l'Espresso reveals that the collection of phone metadata in Italy between December 10, 2012 and January 9, 2013 reached over four million metadata per day during the period of political crisis that culminated in the resignation of the Mario Monti government.
2More

Wiretap Numbers Don't Add Up | Just Security - 0 views

  • Last week, the Administrative Office (AO) of the US Courts published the 2014 Wiretap Report, an annual report to Congress concerning intercepted wire, oral, or electronic communications as required by Title III of the Omnibus Crime Control and Safe Streets Act of 1968. News headlines touted that the number of federal and state wiretaps for 2014 was down 1% for a total of 3,554. Of these, there were few involving encrypted communications; and for those, law enforcement agencies were in most cases able to overcome the encryption. But there is a bigger story that calls into question the accuracy of the all of the prior reports submitted to the AO and the overall data provided to Congress and the public in the Wiretap Reports. Since the Snowden revelations, more and more companies have started publishing “transparency reports” about the number and nature of government demands to access their users’ data. AT&T, Verizon, and Sprint published data for 2014 earlier this year and T-Mobile published its first transparency report on the same day the AO released the Wiretap Report. In aggregate, the four companies state that they implemented 10,712 wiretaps, a threefold difference over the total number reported by the AO. Note that the 10,712 number is only for the four companies listed above and does not reflect wiretap orders received by other telephone carriers or online providers, so the discrepancy actually is larger.
  • So what accounts for the huge gap in reporting? That is a question Congress and the AO should be asking prosecutors and judges who are required by law to make complete and accurate reports of the number of wiretaps conducted each year. Are wiretaps being consistently under­reported to Congress and the public? Based on the data reported by the four major carriers for 2013 and 2014, it certainly would appear to be the case.
2More

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. It is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. It is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
4More

NSA contracted French cyber-firm for hacking help - RT USA - 0 views

  • The latest revelation regarding the National Security Agency doesn't come courtesy of Edward Snowden. A Freedom of Information Act request has confirmed the NSA contracted a French company that makes its money by hacking into computers. It's no secret that the United States government relies on an arsenal of tactics to gather intelligence and wage operations against its adversaries, but a FOIA request filed by Muckrock's Heather Akers-Healy has confirmed that the list of Uncle Sam's business partners include Vupen, a French-based security company that specializes in selling secret codes used to crack into computers. Documents responsive to my request to #NSA for contracts with VUPEN, include 12/month exploit subscription https://t.co/x3qJbqSUpa — Heather Akers-Healy (@abbynormative) September 16, 2013 Muckrock published on Monday a copy of a contract between the NSA and Vupen in which the US government is shown to have ordered a one-year subscription to the firm's “binary analysis and exploits service” last September.
  • That service, according to the Vupen website, is sold only to government entities, law enforcement agencies and computer response teams in select countries, and provides clients with access to so-called zero-day exploits: newly-discovered security vulnerabilities that the products' manufacturers have yet to discover and, therefore, have had zero days to patch-up. “Major software vendors such as Microsoft and Adobe usually take 6 to 9 months to release a security patch for a critical vulnerability affecting their products, and this long delay between the discovery of a vulnerability and the release of a patch creates a window of exposure during which criminals can rediscover a previously reported but unpatched vulnerability, and target any organization running the vulnerable software,” Vupen says elsewhere on their website. Last year, Vupen researchers successfully cracked Google's Chrome browser, but declined to show developers how they did so — even for an impressive cash bounty. “We wouldn’t share this with Google for even $1 million,” Vupen CEO Chaouki Bekrar told Forbes' Andy Greenberg of the Chrome hack in 2012. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • And why the NSA and other clients may benefit from being privy to these vulnerabilities, knowing how to exploit security holes in adversarial systems is a crucial component to any government's offensive cyber-operations. Last month, the Washington Post published excerpts from the previously secretive “black budget,” a closely guarded ledger listing the funding requests made by America's intelligence community provided by NSA leaker Edward Snowden. According to that document, a substantial goal of the US in fiscal year 2013 was to use a portion of $52.6 billion in secretive funding towards improving offensive cyber-operations.
  • ...1 more annotation...
  • The portion of the contract obtained by Muckrock where the cost of the subscription is listed has been redacted, but a Vupen hacker who spoke to Greenberg last year said deals in the five-figures wasn't uncommon. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," Bekrar wrote in an email to Information Week's Matthew Schwartz after the NSA contract with his signature was published. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries." Critics of Vupen and its competitors see government-waged cyber-operations in a different light, however. Christopher Soghoian of the American Civil Liberties Union's Speech, Privacy and Technology Project has spoken outright against companies that sell exploits and have equated the computer codes being sold for big money as a new sort of underground arms trade fueling an international, online battle. To Greenberg last year, Soghoian described Vupen as  a “modern-day merchant of death” selling “the bullets for cyberwar," and upon publishing of the NSA contract called the company a “cyber weapon merchant.” The NSA is a customer of French 0-day cyber weapon merchant VUPEN, FOIA docs reveal: (via @ramdac & @MuckRockNews) https://t.co/OPJ82miK3c — Christopher Soghoian (@csoghoian) September 16, 2013
6More

Drone strikes counterproductive, says secret CIA report - 0 views

  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.The leaked document is classified secret and "NoForn" (meaning not to be distributed to non-US nationals) and reviews attacks by the United States and other countries engaged in counter-insurgency operations over the past 50 years.The CIA assessment is the first leaked secret intelligence document published by WikiLeaks since 2011. Led by Australian publisher Julian Assange, the anti-secrecy group says the CIA assessment is the first in what will be a new series of leaked documents relating to the US agency.
  • The 2009 CIA study lends support to critics of US drone strikes in Afghanistan, Iraq, Pakistan, Somalia and Yemen by warning that such operations "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent".
  • The CIA study observes that the US-led coalition in Afghanistan made "a sustained effort since 2001 to target Taliban leaders", but "Afghan government corruption and lack of unity, insufficient strength of Afghan and NATO security forces, and the country's endemic lawlessness have constrained the effectiveness of these counter-insurgency elements"."Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," the CIA says. "Moreover, the Taliban has a high overall ability to replace lost leaders, a centralised but flexible command and control overlaid with egalitarian Pashtun structures, and good succession planning and bench strength, especially at the middle levels."The CIA study also reports mixed results for such tactics in Iraq, noting that al-Qaeda in Iraq "initially lost several iterations of its senior leadership and numerous local emirs, but these losses initially did little to slow AQI's momentum".
  • ...2 more annotations...
  • Similarly, the CIA observes that Israel's "targeted-killings campaign" against Hamas and Hezbollah was of limited effectiveness owing to "decentralised command structures, compartmented leadership, strong succession planning, and deep ties to their communities, making the[se] groups highly resilient to leadership losses".The CIA review does suggest that targeted killings can be useful when they are part of a broader counter-insurgency strategy that employs other military and non-military counter-insurgency instruments. 
  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.
  •  
    The report is at http://www.wikileaks.org/cia-hvt-counterinsurgency/ Apparently we have a new leaker with access to top secret/no foreign documents.  
10More

The PJ Tatler » 'Vetted Moderate' Free Syrian Army Commander Admits Alliance ... - 0 views

  • As President Obama laid out his “strategy” last night for dealing with the Islamic State of Iraq and Syria (ISIS), and as bipartisan leadership in Congress pushes to approve as much as $4 billion to arm Syrian “rebels,” it should be noted that the keystone to his anti-Assad policy — the “vetted moderate” Free Syrian Army (FSA) — is now admitting that they, too, are working with the Islamic State. This confirms PJ Media’s reporting last week about the FSA’s alliances with Syrian terrorist groups. On Monday, the Daily Star in Lebanon quoted a FSA brigade commander saying that his forces were working with the Islamic State and Jabhat al-Nusra, al-Qaeda’s official Syrian affiliate — both U.S.-designated terrorist organizations — near the Syrian/Lebanon border. “We are collaborating with the Islamic State and the Nusra Front by attacking the Syrian Army’s gatherings in … Qalamoun,” said Bassel Idriss, the commander of an FSA-aligned rebel brigade. “We have reached a point where we have to collaborate with anyone against unfairness and injustice,” confirmed Abu Khaled, another FSA commander who lives in Arsal. “Let’s face it: The Nusra Front is the biggest power present right now in Qalamoun and we as FSA would collaborate on any mission they launch as long as it coincides with our values,” he added.
  • In my report last week I noted that buried in a New York Times article last month was a Syrian “rebel” commander quoted as saying that his forces were working with ISIS and Jabhat al-Nusra in raids along the border with Lebanon, including attacks on Lebanese forces. The Times article quickly tried to dismiss the commander’s statements, but the Daily Star article now confirms this alliance. Among the other pertinent points from that PJ Media article last week was that this time last year the bipartisan conventional wisdom amongst the foreign policy establishment was that the bulk of the Syrian rebel forces were moderates, a fiction refuted by a Rand Corporation study published last September that found nearly half of the Syrian “rebels” were jihadists or hard-core Islamists.
  • Another relevant phenomenon I noted was that multiple arms shipments from the U.S. to the “vetted moderate” FSA were suspiciously raided and confiscated by ISIS and Jabhat al-Nusra, prompting the Obama administration and the UK to suspend weapons shipments to the FSA last December. In April, the Obama administration again turned on the CIA weapons spigot to the FSA, and Obama began calling for an additional $500 million for the “vetted moderate rebels,” but by July the weapons provided to the FSA were yet again being raided and captured by ISIS and other terrorist groups. Remarkably, one Syrian dissident leader reportedly told Al-Quds al-Arabi that the FSA had lost $500 million worth of arms to rival “rebel” groups, much of which ended up being sold to unknown parties in Turkey and Iraq.
  • ...7 more annotations...
  • As the Obama administration began to provide heavy weaponry to Harakat al-Hazm, the Washington Institute for Near East Policy published an analysis hailing Harakat Hazm as “rebels worth supporting,” going so far as to say that the group was “a model candidate for greater U.S. and allied support, including lethal military assistance.” That error was not as egregious as the appeal by three members of the DC foreign policy establishment “smart set” (including one former senior Bush administration National Security Council official) who argued in the pages of the January issue of Foreign Affairs for U.S. engagement with another Syrian “rebel” group, Ahrar al-Sham.
  • Earlier this week I reported on Harakat al-Hazm, which was the first of the “vetted moderates” to receive U.S. anti-tank weaponry earlier this year. Harakat al-Hazm is reportedly a front for the Muslim Brotherhood as well as Turkey and Qatar, its Islamist state sponsors. An L.A. Times article was published this past Sunday from the battle lines in Syria. The reporter recounted a discussion with two Harakat al-Hazm fighters who admitted, “But Nusra doesn’t fight us, we actually fight alongside them. We like Nusra.” Despite a claim by the L.A. Times that Harakat al-Hazm had released a statement of “rejection of all forms of cooperation and coordination” with al-Nusra Front, I published in my article earlier this week an alliance statement signed by both Jabhat al-Nusra and Harkat al-Hazm forging a joint front in Aleppo to prevent pro-Assad forces from retaking the town.
  • At the same time U.S.-provided FSA weapons caches were being mysteriously raided by ISIS and Jabhat al-Nusra, one of the senior FSA commanders in Eastern Syria, Saddam al-Jamal, defected to ISIS. In March, Jabhat al-Nusra joined forces with the FSA Liwa al-Ummah brigade to capture a Syrian army outpost in Idlib. Then in early July I reported on FSA brigades that had pledged allegiance to ISIS and surrendered their weapons after their announcement of the reestablishment of the caliphate. More recently, the FSA and Jabhat al-Nusra teamed up last month to capture the UN Golan Heights border crossing in Quneitra on the Syria/Israel border, taking UN peacekeepers hostage. But the Free Syrian Army is not the only U.S.-armed and trained “rebel” force in Syria that the Obama administration is having serious trouble keeping in the “vetted moderate” column.
  • At the time their article appeared, however, Ahrar al-Sham was led by one of al-Qaeda chief Ayman al-Zawahiri’s top lieutenants and former Bin Laden courier, Mohamed Bahaiah (aka Abu Khaled al-Suri). This is why the article was originally subtitled “An Al-Qaeda affiliate worth befriending.” Giving too much of the game away for non-Beltway types, that subtitle was quickly changed on the website to “An Al-Qaeda-linked group worth befriending.” That dream of “befriending al-Qaeda” was dealt a major blow earlier this week when a blast of unknown origin killed most of Ahrar al-Sham’s senior leadership. Bereft of leadership, many analysts have rightly expressed concern that the bulk of Ahrar al-Sham’s forces will now gravitate towards ISIS and other terrorist groups.
  • While a McClatchy article on the explosion laughably claimed that the dead Ahrar al-Sham’s leaders represented the group’s “moderate wing” who were trying to come under another fictional “vetted moderate” alliance to obtain the next anticipated flood of U.S. weapons, others have observed that tributes to the dead leaders have poured in from al-Qaeda leaders for their “moderate wing” allies. This is what the D.C. foreign policy establishment has reduced itself to when it comes to Syria — cozying up to al-Qaeda (or Iran and Assad) in the name of “countering violent extremism,” namely ISIS, and entertaining each other with cocktail party talk of “moderate wings” of al-Qaeda. As my colleague Stephen Coughlin observes, our bipartisan foreign policy establishment has created a bizarre language about Iraq and Afghanistan to avoid the stark reality that we lost both wars. This is the state American foreign policy finds itself in on the 13th anniversary of the 9/11 attacks by al-Qaeda.
  • As congressional Republicans and Democrats alike will undoubtedly rush in coming days to throw money at anyone the Obama administration deems “vetted moderates” to give the appearance of doing something in the absence of a sensible, reality-based strategy for understanding the actual dynamics at work in Syria and Iraq, an urgent reexamination of who the “vetted moderates” we’ve been financing, training and arming is long overdue. It is also essential to know to whom the State Department has contracted the “vetting.” This is especially true as ISIS leaders are openly bragging about widespread defections to ISIS amongst FSA forces that have been trained and armed by the U.S. Predictably, the usual suspects (John McCain and Lindsey Graham) who have been led wide-eyed around Syria by the “vetted moderate” merchants and have played the administration’s “yes men” for a fictional narrative that has never had any basis in reality will undoubtedly hector critics for not listening to their calls to back the “vetted moderate” rebels last year when they could have contained ISIS — an inherently false assumption. These usual suspects should be ashamed of their role in helping sell a fiction that has cost 200,000 Syrians their lives and millions more their homes while destabilizing the entire region. Shame, sadly, is a rare commodity in Washington, D.C.
  • Notwithstanding Obama’s siren call for immediate action, Congress should think long and hard before continuing to play along with the administration and D.C. foreign policy establishment’s “vetted moderate” fairy tale and devote themselves to some serious reflection and discussion on how we’ve arrived at this juncture where we are faced with nothing but horribly bad choices and how to start walking back from the precipice. As we remember the thousands lost on that terrible day thirteen years ago, truly honoring their memory deserves nothing less.
7More

C.I.A. Officer Is Found Guilty in Leak Tied to Times Reporter - NYTimes.com - 0 views

  • Jeffrey A. Sterling, a former Central Intelligence Agency officer, was convicted of espionage Monday on charges that he told a reporter for The New York Times about a secret operation to disrupt Iran’s nuclear program.The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.
  • On the third day of deliberations, the jury in federal court in Alexandria, Va., convicted Mr. Sterling on nine felony counts. Mr. Sterling, who worked for the C.I.A. from 1993 to 2002 and now lives in O’Fallon, Mo., faces a maximum possible sentence of decades in prison, though the actual sentence is likely to be far shorter. Judge Leonie M. Brinkema of Federal District Court, who presided over the weeklong trial, allowed Mr. Sterling to remain free on bond and set sentencing for April 24.
  • The Justice Department had no direct proof that Mr. Sterling, who managed the Iranian operation, provided the information to Mr. Risen, but prosecutors stitched together a strong circumstantial case.
  • ...3 more annotations...
  • The trial was part Washington spectacle, part cloak and dagger. Former Secretary of State Condoleezza Rice testified, as did C.I.A. operatives who gave only their first names and last initials, with their faces shielded behind seven-foot-high partitions. A scientist was referred to only by his code name, Merlin. His wife was Mrs. Merlin.Officials revealed their preferred strategies for persuading reporters not to run sensitive stories. Jurors learned that, at the C.I.A.’s office in New York, employees could easily walk out with classified documents and never be searched.
  • Mr. Sterling is the latest in a string of former officials and contractors the Obama administration has charged with discussing national security matters with reporters. Under all previous presidents combined, three people had faced such prosecutions. Under President Obama, there have been eight cases, and journalists have complained that the crackdown has discouraged officials from discussing even unclassified security matters.
  • While the administration has defended the crackdown, Mr. Holder said he believed it went too far at times when it targeted journalists. Under Mr. Holder, prosecutors seized phone records from The Associated Press, labeled one Fox News reporter a potential criminal co-conspirator for inquiring about classified information and tried to force another to testify before a grand jury.
  •  
    "Mr. Holder said he believed it went too far at times when it targeted journalists." What Attorney-General Holder actually meant was that he believed it went too far at times when it targeted journalists *who work for major publishers."* Mr. Holder has allowed prosecutions of journalists who do not work for major publishing firms to proceed, e.g., Barrett Brown. 
5More

AP News : Both sides prepare for new Gaza war crimes probe - 0 views

  • In a replay of the last major Gaza conflict, human rights defenders are again accusing Israel and Hamas of violating the rules of war, pointing to what they say appear to be indiscriminate or deliberate attacks on civilians.In 2009, such war crimes allegations leveled by U.N. investigators - and denied by both sides at the time - never came close to reaching the International Criminal Court.Some Palestinians hope the outcome will be different this time, in part because President Mahmoud Abbas, as head of a U.N.-recognized state of Palestine, has since earned the right to turn directly to the court.Still, the road to the ICC, set up in 2002 to prosecute war crimes, is filled with formidable political obstacles.
  • Israel and the United States strongly oppose bringing any possible charges stemming from the Israeli-Palestinian conflict before the court, arguing such proceedings could poison the atmosphere and make future peace talks impossible.If Abbas seeks a war crimes investigation of Israel, he could lose Western support and expose Hamas - a major Palestinian player - to the same charges.
  • Unlike in 2009, Abbas has the option of turning to the court directly because of the upgrade in legal standing awarded by the U.N. General Assembly in 2012. At the time, the assembly recognized "Palestine" in the West Bank, Gaza and east Jerusalem as a non-member observer state, meeting the ICC requirement of accepting requests for jurisdiction from states over crimes committed in their territory.After 20 years of failed negotiations with Israel, many Palestinians believe the ICC offers the only opportunity to hold Israel accountable, not only for Gaza military operations, but for continued expansion of settlement-building on occupied lands. With daily scenes of Gaza carnage, the West Bank-based Abbas is under growing pressure to join the court.He still hesitates, because going after Israel at the ICC would signal a fundamental policy shift, instantly turning his tense relationship with Israel into a hostile one and creating a rift with the United States.
  • ...1 more annotation...
  • He also has Hamas to consider, since action against Israel would likely trigger a war crimes investigation of Hamas as well. The Islamic militant group seized Gaza from Abbas in 2007, and relations between the two rivals remain tense. However, they reached a power-sharing agreement in the spring and Abbas does not want to return to confrontations with Hamas.Last week, Abbas told leaders of PLO factions in the West Bank that he would only turn to the ICC if Hamas agrees, in writing. Abbas aide Saeb Erekat told The Associated Press on Monday that he put the request to the top Hamas leader in exile, Khaled Mashaal, in a meeting in Doha last week. Erekat said he was told that Hamas needs time to decide.
  •  
    Some conflicting reports on Palestine taking Israel to the International Criminal Court charging war crimes. The conflict may be because of the different times they were published This article published yesterday says that Abbas said last week that he would only do so if Hamas agrees and said he was awaiting a decision by Hamas. But the Haaretz live blog on Gaza says that "Palestinian Foreign Minister Riad al-Malki says after meeting prosecutors at the International Criminal Court [today] that there was "clear evidence" that Israel committed war crimes in  Gaza." http://www.haaretz.com/news/diplomacy-defense/1.608928 So it sounds like Palestine has initiated the process at the ICC and that Hamas leadership has decided to accept the risk that they will face war crime charges themselves. If so, that's a strong sign that some nation has agreed to bankroll the Palestine government if the U.S. ends its aid to Palestine. Most likely Qatar from what I've read. The U.N. Human Rights Council has already launched its own investigation of potential war crimes committed during Israel's latest invasion of Gaza. An article passed by me sometime during the last 48 hours that quoted the Chief Prosecutor at the ICC to the effect that she would act if Palestine filed charges but said that "the ball is in Palestine's court." The ICC has been widely criticized for its preference of convicting the leaders of African nations rather than of caucasian nations. Given that circumstance, the Court of 15 judges may welcome the Palestinian opportunity to prove that it is willing to convict leaders of a non-African nation. Certainly, Israel's occupation and colonization of Palestine since hostilities ceased in 1967 offers more than fertile ground for such a case. I have to admit that I enjoy my mental picture of Benjamin Netanyahu in chains standing in the Court's dock in The Hague. 
2More

Tomgram: Anand Gopal, How to Create an Afghan Blackwater | TomDispatch - 0 views

  • The Real Afghan War How an American Fantasy Conflict Created Disaster in Afghanistan By Anand Gopal [This essay is taken from chapter five of Anand Gopal’s No Good Men Among the Living: America, the Taliban, and the War Through Afghan Eyes and appears at TomDispatch.com with the kind permission of Metropolitan Books.]
  •  
    "The other day, as I was reading through the New York Times, I came upon this headline: "Powerful Afghan Police Chief Killed in Kabul." His name was Matiullah Khan.  He had once been "an illiterate highway patrol commander" in an obscure southern province of Afghanistan and was taken out in a "targeted suicide bombing" on the streets of the capital -- and I realized that I knew him!  Since I've never been within a few thousand miles of Kabul, I certainly didn't know him in the normal sense. I had, you might say, edited Matiullah Khan. He was one of a crop of new warlords who rose to wealth and power by hitching their ambitions to the American war and the U.S. military personnel sent to their country to fight it.  Khan, in particular, made staggering sums by essentially setting up an "Afghan Blackwater," a hire-a-gun -- in fact, so many guns -- protection agency for American convoys delivering supplies to far-flung U.S. bases and outposts in southern Afghanistan. He became the protector and benefactor of a remarkable Afghan woman who is a key character in Anand Gopal's No Good Men Among the Living: America, the Taliban, and the War Through Afghan Eyes, which I edited and published in the American Empire Project series I co-run for Metropolitan Books. I don't think it's an exaggeration to say that Gopal covered the Afghan War for years in a way no other Western journalist did. He spent time with crucial allies of Afghan President Hamid Karzai and with a Taliban commander, with warlords and American Special Ops guys, politicians and housewives. He traveled rural Afghanistan as few American reporters were capable of doing.  In the process, he made a discovery that was startling indeed and has yet to really sink in here. In a nutshell, in 2001, the invading Americans put al-Qaeda to flight and crushed the Taliban.  From most of its top leadership to its foot soldiers, the Talibs were almost uniformly prepared, even eager, to put down thei
5More

Google will 'de-rank' RT articles to make them harder to find - Eric Schmidt - RT World... - 0 views

  • Eric Schmidt, the Executive Chairman of Google’s parent company Alphabet, says the company will “engineer” specific algorithms for RT and Sputnik to make their articles less prominent on the search engine’s news delivery services. “We are working on detecting and de-ranking those kinds of sites – it’s basically RT and Sputnik,” Schmidt said during a Q & A session at the Halifax International Security Forum in Canada on Saturday, when asked about whether Google facilitates “Russian propaganda.”
  • “We are well of aware of it, and we are trying to engineer the systems to prevent that [the content being delivered to wide audiences]. But we don’t want to ban the sites – that’s not how we operate.”The discussion focused on the company’s popular Google News service, which clusters the news by stories, then ranks the various media outlets depending on their reach, article length and veracity, and Google Alerts, which proactively informs subscribers of new publications.
  • The Alphabet chief, who has been referred to by Hillary Clinton as a “longtime friend,” added that the experience of “the last year” showed that audiences could not be trusted to distinguish fake and real news for themselves.“We started with the default American view that ‘bad’ speech would be replaced with ‘good’ speech, but the problem found in the last year is that this may not be true in certain situations, especially when you have a well-funded opponent who is trying to actively spread this information,” he told the audience.
  • ...1 more annotation...
  • RT America registered under FARA earlier this month, after being threatened by the US Department of Justice with arrests and confiscations of property if it failed to comply. The broadcaster is fighting the order in court.
  •  
    " HomeWorld News Google will 'de-rank' RT articles to make them harder to find - Eric Schmidt Published time: 20 Nov, 2017 19:58 Edited time: 21 Nov, 2017 03:41 Get short URL   © Global Look Press Eric Schmidt, the Executive Chairman of Google's parent company Alphabet, says the company will "engineer" specific algorithms for RT and Sputnik to make their articles less prominent on the search engine's news delivery services. "We are working on detecting and de-ranking those kinds of sites - it's basically RT and Sputnik," Schmidt said during a Q & A session at the Halifax International Security Forum in Canada on Saturday, when asked about whether Google facilitates "Russian propaganda." Schmidt appearance begins at 1:07:00 mark, relevant question at 1:33:00 "We are well of aware of it, and we are trying to engineer the systems to prevent that [the content being delivered to wide audiences]. But we don't want to ban the sites - that's not how we operate." The discussion focused on the company's popular Google News service, which clusters the news by stories, then ranks the various media outlets depending on their reach, article length and veracity, and Google Alerts, which proactively informs subscribers of new publications. Read more 'Slap at the First Amendment' - RT America forced to register as foreign agent RT has criticized the proposed move - whose timescale has not been publicized - as arbitrary and a form of censorship. "Good to have Google on record as defying all logic and reason: facts aren't allowed if they come from RT, 'because Russia' - even if we have Google on Congressional record saying they've found no manipulation of their platform or policy violations by RT," Sputnik and RT Editor-in-Chief Margarita Simonyan said in a statement. During the discussion, Schmidt claimed that he was "very strongly not in favor of censorship," but said that he has faith in "ranking" without ackno
10More

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
3More

In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots - 0 views

  • Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him? But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow. To see how extreme and damaging this behavior has become, let’s just quickly examine two utterly false claims that Democrats over the past four days — led by party-loyal journalists — have disseminated and induced thousands of people, if not more, to believe. On Friday, WikiLeaks published its first installment of emails obtained from the account of Clinton campaign chair John Podesta. Despite WikiLeaks’ perfect, long-standing record of only publishing authentic documents, MSNBC’s favorite ex-intelligence official, Malcolm Nance, within hours of the archive’s release, posted a tweet claiming — with zero evidence and without citation to a single document in the WikiLeaks archive — that it was compromised with fakes:
  • As you can see, more than 4,000 people have re-tweeted this “Official Warning.” That includes not only random Clinton fans but also high-profile Clinton-supporting journalists, who by spreading it around gave this claim their stamp of approval, intentionally leading huge numbers of people to assume the WikiLeaks archive must be full of fakes, and its contents should therefore simply be ignored. Clinton’s campaign officials spent the day fueling these insinuations, strongly implying that the documents were unreliable and should thus be ignored. Poof: Just like that, unpleasant facts about Hillary Clinton disappeared, like a fairy protecting frightened children by waving her magic wand and sprinkling her dust over a demon, causing it to scatter away. Except the only fraud here was Nance’s claim, not any of the documents published by WikiLeaks. Those were all real. Indeed, at Sunday night’s debate, when asked directly about the excerpts of her Wall Street speeches found in the release, Clinton herself confirmed their authenticity. And news outlets such as the New York Times and AP reported — and continue to report — on their contents without any caveat that they may be frauds. No real print journalists or actual newsrooms (as opposed to campaign operatives masquerading as journalists) fell for this scam, so this tactic did not prevent reporting from being done.
  •  
    Glenn Greenwald chastises Dems for claiming leaked Clintone emails are forgeries.
2More

The Guardian's Summary of Julian Assange's Interview Went Viral and Was Completely False - 0 views

  • Julian Assange is a deeply polarizing figure. Many admire him and many despise him (into which category one falls in any given year typically depends on one’s feelings about the subject of his most recent publication of leaked documents). But one’s views of Assange are completely irrelevant to this article, which is not about Assange. This article, instead, is about a report published this week by The Guardian that recklessly attributed to Assange comments that he did not make. This article is about how those false claims — fabrications, really — were spread all over the internet by journalists, causing hundreds of thousands of people (if not millions) to consume false news. The purpose of this article is to underscore, yet again, that those who most flamboyantly denounce Fake News, and want Facebook and other tech giants to suppress content in the name of combating it, are often the most aggressive and self-serving perpetrators of it.
  •  
    Glenn Greenwald takes down The Guardian for publishing some seriously fake news. (Let's recall that Greenwald used to work for The Guardian.)
4More

ISIS Chief Al-Baghdadi Allegedly Dead or Disappeared - Syrian Leads Internal Revolt - n... - 0 views

  • A Syrian national known as Abu Abdullah al-Shami in the Iraqi city of Mosul is leading a revolt within the self-proclaimed Islamic State amidst rumors about the death or disappearance of Abu Bakr al-Baghdadi.
  • Al-Shami is calling upon ISIS combatants and supporters to cease to pledge allegiance to Abu Bakr al-Baghdadi. Al-Shami stressed that the survival of Al-Baghdadi (a.k.a. Al-Badir or Caliph Ibrahim) cannot be confirmed. Al-Shami’s call for what some describe as an “ISIS-internal” rebellion was published via several ISIS-affiliated media. Al-Shami’s call was published after reports that Abu Bakr al-Baghdadi either had been killed or had disappeared. Al-Shami stressed that the Islamic State’s (ISIS, ISIL, Daesh) code of leadership demands that a pledge of allegiance be revoked once the whereabouts of a leader could not be confirmed or when the leader’s competence is questioned.
  • ISIS is still controlling western parts of Iraq, bordering Syria as well as western Mosul. Al-Baghdadi’s whereabouts are still unknown, but he is widely believed to be hiding at a  stronghold in western Mosul near the borders with Syria. The reports about the alleged death or disappearance and Al-Shami’s call to stop to pledge allegiance to Al-Baghdadi would not surprise many informed analysts; and there can be any number of plausible reasons. To mention but a few of them; Al-Baghdadi could indeed have been killed, for example during an air strike. In 2016 there have been at least two attempts on Al-Baghdadi’s life by members of his own security detail, another of these attempts could have been successful. There is also the possibility that ISIS leaks reports about his alleged death or disappearance to buy time for Al-Baghdadi to suddenly “reappear”, in places such as Raqqa, Syria. So far, all that can positively be confirmed is that Al-Shami published his call in several outlets which are considered official ISIS media.
  •  
    But see this 2007 NYT article, quoting a senior U.S. military official who claims that al-Baghdadi never existed, that he was a fictional character. http://www.nytimes.com/2007/07/18/world/africa/18iht-iraq.4.6718200.html The information in that article has ever since been treated as though it does not exist, i.e., the NYT and all other media have treated al-Baghdadi as a real person. Was it time to retire the fictional character?
‹ Previous 21 - 40 of 635 Next › Last »
Showing 20 items per page