Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "americans" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

U.K. file on Entebbe contains claim that Israel behind hijacking Israel News | Haaretz - 0 views

  • Newly released British documents contain a claim by an unnamed contact that the Shin Bet security service collaborated with the Popular Front for the Liberation of Palestine to hijack the June 1976 flight from Israel that was diverted to Entebbe, Uganda, the BBC reported Friday. Israel's rescue of the dozens of hostages taken in the hijacking of the Air France plane, popularly known as the Entebbe raid, is considered one of the most daring and successful operations in Israeli history. Elite Israel Defense Forces troops stormed the airport where the hostages, many of them Israeli, were held and overpowered the hijackers and Ugandan soldiers.
  • "The operation was designed to torpedo the PLO's standing in France and to prevent what they see as a growing rapprochement between the PLO and the Americans," the BBC report said British diplomat D.H. Colvin wrote in the document, citing his source. "My contact said the PFLP had attracted all sorts of wild elements, some of whom had been planted by the Israelis," Colvin reportedly wrote. "According to his information, the hijack was the work of the PFLP, with help from the Israeli Secret Service, the Shin Beit."
2More

German spy who sold secrets to US tried to make deal with Russians - Europe - World - T... - 0 views

  • The German intelligence "double agent" who allegedly sold hundreds of top secret documents to the Americans was caught by his own country's counter espionage agents while trying to broker an additional spying deal with the Russian secret services, according to intelligence sources in Berlin.
  •  
    More details emerging.
2More

Exclusive: U.S. discloses secret Somalia military presence, up to 120 troops | Reuters - 0 views

  • (Reuters) - U.S. military advisors have secretly operated in Somalia since around 2007 and Washington plans to deepen its security assistance to help the country fend off threats by Islamist militant group al Shabaab, U.S. officials said. The comments are the first detailed public acknowledgement of a U.S. military presence in Somalia dating back since the U.S. administration of George W. Bush and add to other signs of a deepening U.S. commitment to Somalia's government, which the Obama administration recognized last year.The deployments, consisting of up to 120 troops on the ground, go beyond the Pentagon's January announcement that it had sent a handful of advisors in October. That was seen at the time as the first assignment of U.S. troops to Somalia since 1993 when two U.S. helicopters were shot down and 18 American troops killed in the "Black Hawk Down" disaster.
  •  
    Add one more to the growing number of nations in which the U.S. is actively engaged in combat, i.e., at war, without a Congressional declaration of war.
2More

Germany to escalate counter-espionage efforts in wake of US spying allegations | World ... - 0 views

  • Germany may step up its counter-espionage efforts after an employee of its intelligence service was arrested on suspicion of spying for the US.Measures being considered in response to scandal include monitoring the intelligence activities of nominal Nato allies such as America, Britain and France, as well as expelling US agents from Germany.
  • The BND staffer, a technical support worker employed in a unit dealing mainly with the protection of German soldiers abroad, is alleged to have established contact with the American secret service by contacting the US embassy. Rather than report the contact to their allied German counterparts, the CIA is reported to have paid the agent €25,000 (£20,000) for 218 documents classified as confidential or top secret .
4More

Security fears loom over CIA report | TheHill - 0 views

  • Security concerns are complicating the release of a controversial report on “enhanced interrogations techniques,” with officials fearing the document could inflame the Arab Street and put Americans in danger.The White House and the CIA are working on final redactions to a 481-page executive summary of the investigation, which was conducted by Democrats on the Senate Intelligence Committee but boycotted by Republicans, who dispute its findings.ADVERTISEMENTA congressional staffer said the report wouldn’t be ready for a “couple of weeks,” while the CIA said the declassification process should be finished by August 29th. 
  • In a June 20 court document, the CIA said it would need time before the report is released for the “implementation of security measures to ensure the safety of U.S. personnel and facilities overseas.” The White House said it is looking to get the report out as “expeditiously as possible” but would be assessing the security situation.
  • The State Department reportedly warned the White House last year that the release of the report could strain diplomatic relations and put lives at risk. State was particularly fearful that the committee would expose which countries hosted the secret “black sites” where the CIA took prisoners for interrogations, according to The Daily Beast.
  • ...1 more annotation...
  • Not everyone is convinced that the report will pose a security threat.Reuel Marc Gerecht, a former CIA case officer who supports aggressive interrogations, said warnings about violent protests overseas are "make-believe." "Given the Middle east is cracking up, this [report] will not even measure on the Richter scale," he said. 
4More

Top Obama official blasts Israel for denying Palestinians sovereignty, security, dignit... - 0 views

  • ‘How can Israel have peace if it’s unwilling to delineate a border, end the occupation?’ asks White House Mideast chief, Phillip Gordon, in blistering Tel Aviv speech
  • srael’s ongoing occupation of the West Bank is wrong and leads to regional instability and dehumanization of Palestinians, a top American government official said Tuesday in Tel Aviv, hinting that the current Israeli government is not committed to peace.
  • In an unusually harsh major foreign policy address, Philip Gordon, a special assistant to US President Barack Obama and the White House coordinator for the Middle East, appealed to Israeli and Palestinian leaders to make the compromises needed to reach a permanent peace agreement. Jerusalem “should not take for granted the opportunity to negotiate” such a treaty with Palestinian Authority President Mahmoud Abbas, who has proven to be a reliable partner, Gordon said. “Israel confronts an undeniable reality: It cannot maintain military control of another people indefinitely. Doing so is not only wrong but a recipe for resentment and recurring instability,” Gordon said. “It will embolden extremists on both sides, tear at Israel’s democratic fabric and feed mutual dehumanization.”
  • ...1 more annotation...
  • Delivering the keynote address at the Haaretz newspaper’s Israel Conference on Peace, Gordon reiterated Obama’s position that a final-status agreement should be based on the 1967 lines with mutually agreed land swaps.
4More

Is there a second NSA leaker after Snowden? | TheHill - 0 views

  • Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.Glenn Greenwald, the journalist most closely associated to Snowden, said he suspects someone else has been involved in leaking out new documents, and other experts have backed up the claim.ADVERTISEMENTThe existence of a second leaker “seems clear at this point,” Greenwald wrote on Twitter over the weekend. “The lack of sourcing to Snowden on this & that last [Der Spiegel] article seems petty telling,” he added, after German broadcasters reported that the NSA was tracking people searching for details about privacy software. 
  • Neither the Der Spiegel article from December nor last week’s story, both of which were partly written by privacy advocate and security researcher Jacob Appelbaum, specifically mentioned that the information emanated from leaks by Snowden.“That's particularly notable given that virtually every other article using Snowden documents - including der Spiegel - specifically identified him as the source,” Greenwald said in an email to The Hill on Monday.Other people who have seen Snowden’s trove of documents have agreed that the documents revealed by German outlets seem to indicate a second source.
  • Bruce Schneier, a cryptologist and cybersecurity expert who has helped the Guardian review Snowden’s disclosures, said he did “not believe that this came from the Snowden documents.”“I think there’s a second leaker out there,” he wrote in a blog post last week. If true, it could add another headache for the NSA, which has struggled for more than a year to contain the fallout from Snowden’s revelations. Defenders of the NSA say that the disclosures have hurt U.S. security and empowered terrorists and other enemies abroad.Among other internal reforms, the spy agency has beefed up its clearance procedures to prevent another employee from passing along secret documents to journalists or governments in Beijing and Moscow.
  • ...1 more annotation...
  • “If in fact this is a post-Snowden NSA leak, then it’s probably just proof that you can always build a bigger mousetrap; that doesn’t mean you’re going to catch the mice,” said Stephen Vladeck, a law professor at American University who specializes in national security issues.Vladeck added that leaks about controversial national security programs are in many ways inevitable, and may not be tied to Snowden’s leaks in any way.For Greenwald, however, a second leaker would be affirmation of Snowden’s actions.“I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward,” he told The Hill. 
6More

How Netanyahu provoked this war with Gaza | +972 Magazine - 0 views

  • On Monday of last week, June 30, Reuters ran a story that began:Prime Minister Benjamin Netanyahu accused Hamas on Monday of involvement, for the first time since a Gaza war in [November] 2012, in rocket attacks on Israel and threatened to step up military action to stop the strikes. So even by Israel’s own reckoning, Hamas had not fired any rockets in the year-and-a-half since “Operation Pillar of Defense” ended in a ceasefire. (Hamas denied firing even those mentioned by Netanyahu last week; it wasn’t until Monday of this week that it acknowledged launching any rockets at Israel since the 2012 ceasefire.) So how did we get from there to here, here being Operation Protective Edge, which officially began Tuesday with 20 Gazans dead, both militants and civilians, scores of others badly  wounded and much destruction, alongside about 150 rockets flying all over Israel (but no serious injuries or property damage by Wednesday afternoon)? We got here because Benjamin Netanyahu brought us here. He’s being credited in Israel for showing great restraint in the days leading up to the big op, answering Gaza’s rockets with nothing more than warning shots and offering “quiet for quiet.” But in fact it was his antagonism toward all Palestinians – toward Mahmoud Abbas’ Palestinian Authority no less than toward Hamas – that started and steadily provoked the chain reaction that led to the current misery.
  • And nobody knows this, or should know it, better than the Obama administration, which is now standing up for Israel’s “right to defend itself.” It was Netanyahu and his government that killed the peace talks with Abbas that were shepherded by U.S. Secretary of State John Kerry; the Americans won’t exactly spell this out on-the-record, but they will off-the record. So a week before those negotiations’ April 29 deadline, Abbas, seeing he wasn’t getting anywhere playing ball with Israel and the United States, decided to shore things up at home, to end the split between the West Bank and Gaza, and he signed the Fatah-Hamas unity deal – with himself as president and Fatah clearly the senior partner. The world – even Washington – welcomed the deal, if warily so, saying unity between the West Bank and Gaza was a good thing for the peace process, and holding out the hope that the deal would compel Hamas to moderate its political stance. Netanyahu, however, saw red. Warning that the unity government would “strengthen terror,” he broke off talks with Abbas and tried to convince the West to refuse to recognize the emerging new Palestinian government – but he failed. He didn’t stop trying, though. At a time when Hamas was seen to be weak, broke, throttled by the new-old Egyptian regime, unpopular with Gazans, and acting as Israel’s cop in the Strip by not only holding its own fire but curbing that of Islamic Jihad and others, Netanyahu became obsessed with Hamas – and obsessed with tying it around Abbas’ neck. Netanyahu’s purpose, clearly enough, was to shift the blame for the failure of the U.S.-sponsored peace talks from himself and his government to Abbas and the Palestinians.
  • But Netanyahu used the kidnappings to go after Hamas in the West Bank. The target, as one Israeli security official said, was “anything green.” The army raided, destroyed, confiscated and arrested anybody and anything having to do with Hamas, killed some Palestinian protesters and rearrested some 60 Hamasniks who had been freed in the Gilad Shalit deal, throwing them back in prison. Meanwhile, in Gaza, Israel had already escalated matters on June 11, the day before the kidnappings, by killing not only a wanted man riding on a bicycle, but a 10-year-old child riding with him. Between that, the kidnappings a day later and the crackdown on Hamas in the West Bank that immediately followed, Gaza and Israel started going at it pretty fierce – with all the casualties and destruction, once again, on Gaza’s side only.
  • ...3 more annotations...
  • But it wasn’t working. Then on June 12 something fell into Netanyahu’s lap which he certainly would have prevented if he’d been able to, but which he also did not hesitate exploiting to the hilt politically: the kidnapping in the West Bank of Gilad Sha’ar and Naftali Fraenkel, both 16, and Eyal Yifrah, 19. Netanyahu blamed Hamas for the kidnapping. He said he had proof. To this day, neither he nor any other Israeli official has come forward with a shred of proof. Meanwhile, it is now widely assumed that the Hamas leadership did not give the order for the kidnapping, that it was instead carried out at the behest of a renegade, Hamas-linked, Hebron clan with a long history of blowing up Hamas’ ceasefires with Israel by killing Israelis. Besides, it made no sense for Hamas leaders to order up such a spectacular crime – not after signing an agreement with Abbas, and not when they were so badly on the ropes.
  • And that was basically it. Netanyahu had given orders to smash up the West Bank and Gaza over the kidnapping of three Israeli boys that, as monstrous as it was, apparently had nothing to do with the Hamas leadership. Thus, he opened an account with Israel’s enemies, who would wish for an opportunity to close it. On June 30, the bodies of the three kidnapped Israeli boys were found in the West Bank. “Hamas is responsible, Hamas will pay,” Netanayhu intoned. That payment was delayed by the burning alive of Mohammed Abu Khdeir, 15, which set off riots in East Jerusalem and Israel’s “Arab Triangle,” and which put Israel on the defensive. It probably encouraged the armed groups in Gaza to step up their rocketing of Israel, while Netanyahu kept Israel’s in check. Then on Sunday, as many as nine Hamas men were killed in a Gazan tunnel that Israel bombed, saying it was going to be used for a terror attack. The next day nearly 100 rockets were fired at Israel. This time Hamas took responsibility for launching some of the rockets – a week after Netanyahu, for the first time since November 2012, accused it of breaking the ceasefire. And the day after that, “Operation Protective Edge” officially began. By Wednesday afternoon, there were 35 dead and many maimed in Gaza, Israelis were ducking rockets, and no one can say when or how it will end, or what further horrors lie in store.
  • Netanyahu could have avoided the whole thing. He could have chosen not to shoot up the West Bank and Gaza and arrest dozens of previously freed Hamasniks (along with hundreds of other Palestinians) over what was very likely a rogue kidnapping. Before that, he could have chosen not to stonewall Abbas for nine months of peace negotiations, and then there wouldn’t have even been a unity government with Hamas that freaked him out so badly – a reaction that was, of course, Netanyahu’s choice as well. But Israel’s prime minister is and always has been at war with the Palestinians – diplomatically, militarily and every other way; against Abbas, Hamas and all the rest – and this is what has guided his actions, and this is what provoked Hamas into going to war against Israel.
3More

ITAR-TASS: World - Foreign Ministry outraged by Russian citizen's detention by US secre... - 0 views

  • Russia considers the detention of the Russian citizen Roman Seleznyov by US secret services as Washington's unfriendly step, the Russian Foreign Ministry said on Tuesday. “As it became known, July 5, Russian citizen Roman Seleznyov was detained in the international airport of the city of Male, the capital of Maldives,” the ministry recalled. “On the same day, he was forced by agents of American secret service into a private jet and delivered to Guam Island. This fact has been already confirmed by the US Department of Homeland Security.” “We consider the incident as another Washington’s unfriendly step,” the Russian Ministry of Foreign Affairs stressed.
  • “It is not the first time that the US kidnaps a Russian citizen ignoring the 1999 mutual legal assistance agreement,” the ministry said. “In particular, the same occurred with Viktor Bout and Konstantin Yaroshenko, who were brought by force in the USA from third countries and convicted on questionable charges.” “Noteworthy that we are not informed about the claims lodged against our compatriots, furthermore, as in Seleznyov’s case, they don’t even inform Russia’s diplomatic agencies about their detention,” the ministry emphasized.
  • State Duma member representing the Liberal Democratic Party (LDPR)  Valery Seleznyov has confirmed his son Roman had been detained by US secret service in the Maldives. “I am now in negotiations with the Russian Foreign Ministry. Kidnapping is a crime,” he told ITAR-TASS on Tuesday. “The country must protect its citizens, and Roman should go back to Russia.” Earlier on Tuesday, Valery Seleznyov dubbed a provocation media reports saying that his son Roman was allegedly arrested in the USA on suspicion of a cyber attack, data theft and computer-related fraud.
4More

Maldives denies US kidnapped Russian credit card fraudster - The Rakyat Post - The Raky... - 0 views

  • The Maldives has said it acted alone to expel a Russian national suspected by the US of being one of the world’s most prolific traffickers of stolen credit cards. President Abdulla Yameen denied a claim by Moscow that the United States had abducted Roman Seleznev from the Maldives and taken him to the American territory of Guam. Yameen told reporters that Maldives police, acting on an Interpol arrest warrant, had moved against 30-year-old Seleznev during the weekend.
  • he US Justice Department said on Monday that Seleznev was arrested and taken to Guam, although the details of his seizure were not known. He is charged with hacking into retail computer systems and installing malicious software to steal credit card numbers in a scheme that operated between October 2009 and February 2011. Seleznev and his partners stole over 200,000 credit card numbers, with bank losses from the scheme estimated at over US$1.1 million, according to a 2011 indictment.
  • The Russian foreign ministry said Seleznev’s detention was a “hostile step”, adding that Russian diplomatic missions had not been notified of his arrest.
  • ...1 more annotation...
  • The Maldivian Home Ministry, in a brief statement, said the suspect was “sent from the Maldives” in response to an Interpol red notice for his arrest. “Since the Maldives is a member state of Interpol… the Maldives attaches the utmost importance to the ‘red notices’ issued by the organisation,” it said.
4More

Germany asks CIA station chief to leave over spying allegations - The Washington Post - 0 views

  • The German government ordered the CIA’s top officer in Berlin to leave the country Thursday in an extraordinary escalation of a conflict between the two allies over American espionage. The move amounts to a high-profile expression of German anger over alleged CIA operations uncovered by German investigators in recent weeks, as well as continued public outrage over the exposure last year of widespread U.S. surveillance programs whose targets included Chancellor Angela Merkel. A spokesman for the German government, Steffen Seibert, confirmed the expulsion of the CIA station chief in a statement that made clear Berlin regards U.S. espionage efforts as a breach of trust.
  • The decision means that the United States will be forced to withdraw an officer who oversees U.S. spying programs in Germany but also serves as the main point of contact with German intelligence services — exchanging information on subjects ranging from terrorist plots to Iranian nuclear ambitions. In ordering the CIA station chief to leave, Germany resorted to a form of retaliation that is occasionally employed by determined espionage adversaries — such as the United States and Russia — but rarely by such a close ally.
  • Before ordering him out, Germany “had to make a calculation of what they were going to lose — they get a substantial amount of intelligence from us,” said a senior former U.S. intelligence official who worked closely with Berlin and spoke on the condition of anonymity because of the sensitivity of the subject. “There will be people in the [U.S.] intelligence community who will want to say, ‘That’s it.’ ” Former U.S. officials said the agency pulled back on certain spying operations last year amid concern about the fallout from the Edward Snowden leaks. At the same time, the former officials said, the latest arrest and raids indicate that Germany has stepped up its defenses and efforts to root out U.S. spies. Even before the expulsion, U.S. officials said espionage-related frictions with Germany had hurt diplomatic relations with an ally the United States has relied on for support in a series of security matters, including efforts to contain Russian aggression in Ukraine.
  •  
    O.K. Now how do we boot the CIA out of America?
5More

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
6More

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
1More

Over a dozen CIA-recruited spies work in German ministries - report - RT News - 0 views

  • US secret services have recruited more than a dozen officials in various German government ministries to work as spies, with some of them working for the CIA for many years, a German tabloid reported on Sunday. Following previous espionage scandals in Germany, with several suspected US agents exposed in July, a report of more spies infiltrating German ministries was published by Bild am Sonntag, Germany's largest-selling national Sunday paper. The alleged spies work within the country's defense, development, economic, and interior ministries, reported the paper, referring to unnamed sources in the US intelligence community. Due to the current diplomacy tensions between Washington and Berlin, caused by espionage concerns, the spies are reportedly not meeting with their US handlers at the moment, according to Bild. Several inquiries into the activities of American embassies in Prague and Warsaw have been initiated, as US intelligence agencies are reportedly considering basing their recruitment activities there.
11More

WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief's ou... - 0 views

  • An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.“This is very, very serious, and I will tell you, as a member of the committee, someone who has great respect for the CIA, I am extremely disappointed in the actions of the agents of the CIA who carried out this breach of the committee’s computers,” said Sen. Saxby Chambliss, R-Ga., the committee’s vice chairman.
  • The rare display of bipartisan fury followed a three-hour private briefing by Inspector General David Buckley. His investigation revealed that five CIA employees, two lawyers and three information technology specialists improperly accessed or “caused access” to a database that only committee staff were permitted to use.Buckley’s inquiry also determined that a CIA crimes report to the Justice Department alleging that the panel staff removed classified documents from a top-secret facility without authorization was based on “inaccurate information,” according to a summary of the findings prepared for the Senate and House intelligence committees and released by the CIA.In other conclusions, Buckley found that CIA security officers conducted keyword searches of the emails of staffers of the committee’s Democratic majority _ and reviewed some of them _ and that the three CIA information technology specialists showed “a lack of candor” in interviews with Buckley’s office.
  • The inspector general’s summary did not say who may have ordered the intrusion or when senior CIA officials learned of it.Following the briefing, some senators struggled to maintain their composure over what they saw as a violation of the constitutional separation of powers between an executive branch agency and its congressional overseers.“We’re the only people watching these organizations, and if we can’t rely on the information that we’re given as being accurate, then it makes a mockery of the entire oversight function,” said Sen. Angus King, an independent from Maine who caucuses with the Democrats.The findings confirmed charges by the committee chairwoman, Sen. Dianne Feinstein, D-Calif., that the CIA intruded into the database that by agreement was to be used by her staffers compiling the report on the harsh interrogation methods used by the agency on suspected terrorists held in secret overseas prisons under the George W. Bush administration.The findings also contradicted Brennan’s denials of Feinstein’s allegations, prompting two panel members, Sens. Mark Udall, D-Colo., and Martin Heinrich, D-N.M., to demand that the spy chief resign.
  • ...7 more annotations...
  • Another committee member, Sen. Ron Wyden, D-Ore., and some civil rights groups called for a fuller investigation. The demands clashed with a desire by President Barack Obama, other lawmakers and the CIA to move beyond the controversy over the “enhanced interrogation program” after Feinstein releases her committee’s report, which could come as soon as next weekMany members demanded that Brennan explain his earlier denial that the CIA had accessed the Senate committee database.“Director Brennan should make a very public explanation and correction of what he said,” said Sen. Carl Levin, D-Mich. He all but accused the Justice Department of a coverup by deciding not to pursue a criminal investigation into the CIA’s intrusion.
  • “I thought there might have been information that was produced after the department reached their conclusion,” he said. “What I understand, they have all of the information which the IG has.”He hinted that the scandal goes further than the individuals cited in Buckley’s report.“I think it’s very clear that CIA people knew exactly what they were doing and either knew or should’ve known,” said Levin, adding that he thought that Buckley’s findings should be referred to the Justice Department.A person with knowledge of the issue insisted that the CIA personnel who improperly accessed the database “acted in good faith,” believing that they were empowered to do so because they believed there had been a security violation.“There was no malicious intent. They acted in good faith believing they had the legal standing to do so,” said the knowledgeable person, who asked not to be further identified because they weren’t authorized to discuss the issue publicly. “But it did not conform with the legal agreement reached with the Senate committee.”
  • Feinstein called Brennan’s apology and his decision to submit Buckley’s findings to the accountability board “positive first steps.”“This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly,” she said in a statement.“The investigation confirmed what I said on the Senate floor in March _ CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers,” she said.It was not clear why Feinstein didn’t repeat her charges from March that the agency also may have broken the law and had sought to “thwart” her investigation into the CIA’s use of waterboarding, which simulates drowning, sleep deprivation and other harsh interrogation methods _ tactics denounced by many experts as torture.
  • Buckley’s findings clashed with denials by Brennan that he issued only hours after Feinstein’s blistering Senate speech.“As far as the allegations of, you know, CIA hacking into, you know, Senate computers, nothing could be further from the truth. I mean, we wouldn’t do that. I mean, that’s _ that’s just beyond the _ you know, the scope of reason in terms of what we would do,” he said in an appearance at the Council on Foreign Relations.White House Press Secretary Josh Earnest issued a strong defense of Brennan, crediting him with playing an “instrumental role” in the administration’s fight against terrorism, in launching Buckley’s investigation and in looking for ways to prevent such occurrences in the future.Earnest was asked at a news briefing whether there was a credibility issue for Brennan, given his forceful denial in March.“Not at all,” he replied, adding that Brennan had suggested the inspector general’s investigation in the first place. And, he added, Brennan had taken the further step of appointing the accountability board to review the situation and the conduct of those accused of acting improperly to “ensure that they are properly held accountable for that conduct.”
  • The allegations and the separate CIA charge that the committee staff removed classified documents from the secret CIA facility in Northern Virginia without authorization were referred to the Justice Department for investigation.The department earlier this month announced that it had found insufficient evidence on which to proceed with criminal probes into either matter “at this time.” Thursday, Justice Department officials declined comment.
  • In her speech, Feinstein asserted that her staff found the material _ known as the Panetta review, after former CIA Director Leon Panetta, who ordered it _ in the protected database and that the CIA discovered the staff had it by monitoring its computers in violation of the user agreement.The inspector general’s summary, which was prepared for the Senate and the House intelligence committees, didn’t identify the CIA personnel who had accessed the Senate’s protected database.Furthermore, it said, the CIA crimes report to the Justice Department alleging that panel staffers had removed classified materials without permission was grounded on inaccurate information. The report is believed to have been sent by the CIA’s then acting general counsel, Robert Eatinger, who was a legal adviser to the interrogation program.“The factual basis for the referral was not supported, as the author of the referral had been provided inaccurate information on which the letter was based,” said the summary, noting that the Justice Department decided not to pursue the issue.
  • Christopher Anders, senior legislative counsel with the American Civil Liberties Union, criticized the CIA announcement, saying that “an apology isn’t enough.”“The Justice Department must refer the (CIA) inspector general’s report to a federal prosecutor for a full investigation into any crimes by CIA personnel or contractors,” said Anders.
  •  
    And no one but the lowest ranking staffer knew anything about it, not even the CIA lawyer who made the criminal referral to the Justice Dept., alleging that the Senate Intelligence Committee had accessed classified documents it wasn't authorized to access. So the Justice Dept. announces that there's insufficient evidence to warrant a criminal investigation. As though the CIA lawyer's allegations were not based on the unlawful surveillance of the Senate Intelligence Committee's network.  Can't we just get an official announcement that Attorney General Holder has decided that there shall be a cover-up? 
5More

Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s - NYTimes.com - 0 views

  • For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.
  • The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant. The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.
  • The scale and longevity of the data storage appears to be unmatched by other government programs, including the N.S.A.’s gathering of phone call logs under the Patriot Act. The N.S.A. stores the data for nearly all calls in the United States, including phone numbers and time and duration of calls, for five years. Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.
  • ...1 more annotation...
  • The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.
  •  
    "Hemisphere covers every call that passes through an AT&T switch - not just those made by AT&T customers[.]"  I meant to bookmark this one back when but missed doing it.
5More

Britain faces exposure over links to CIA secret torture sites | World news | The Observer - 0 views

  • US Senate report may confirm that Diego Garcia was used for extraordinary rendition after 9/11
  • The government stands accused of seeking to conceal Britain's role in extraordinary rendition, ahead of the release of a declassified intelligence report that exposes the use of torture at US secret prisons around the world.
  • Now, in a letter to the human rights group Reprieve, former foreign secretary William Hague has confirmed that the UK government has held discussions with the US about what it intends to reveal in the report which, according to al-Jazeera, acknowledges that the British territory of Diego Garcia was used for extraordinary rendition."We have made representations to seek assurances that ordinary procedures for clearance of UK material will be followed in the event that UK material provide[d] to the Senate committee were to be disclosed," Hague wrote.Cori Crider, a director at Reprieve, accused the UK government of seeking to redact embarrassing information: "This shows that the UK government is attempting to censor the US Senate's torture report. In plain English, it is a request to the US to keep Britain's role in rendition out of the public domain."
  • ...2 more annotations...
  • Lawyers representing a number of terrorist suspects held at Guantánamo Bay believe their clients were rendered via Diego Garcia. Papers found in Libya indicated that the US planned to transport Abdul-Hakim Belhaj, an opponent of Muammar Gaddafi, and his wife via the territory, an atoll in the Indian Ocean leased by Britain to the US. The government has denied Belhaj was rendered via Diego Garcia, but there are suspicions that others were held on the atoll.Crider said the UK's attempts to lobby the US into redacting parts of the report "turns the government's defence in the Libyan renditions case of Abdul-Hakim Belhaj and his wife entirely on its head".The government has consistently sought to block Belhaj from bringing a case against it.
  • "The government protested America would be angered if this kidnap case ever went to trial – and now we learn the British government is leaning on the Americans not to air Britain's dirty laundry. It exposes their litigation stance as mere posturing," she added.Confirmation that a British territory was involved in extraordinary rendition could leave the government vulnerable to legal action. Last month the European court of human rights ruled that the Polish government actively assisted the CIA's European "black site" programme, which saw detainees interrogated in secret prisons across the continent.The court concluded it was "established beyond reasonable doubt" that Abu Zubaydah, a Guantánamo detainee the US mistakenly believed to be a senior member of al-Qaida, was flown from a secret site in Thailand to another CIA prison in Stare Kiejkuty in northern Poland.The judges concluded that not only was Poland "informed of and involved in the preparation and execution of the [High Value Detainee] Programme on its territory", but also "for all practical purposes, facilitated the whole process, created the conditions for it to happen and made no attempt to prevent it", prompting lawyers to ask what else it has been used for since.
3More

Lessons from Tonkin « LobeLog.com - 0 views

  • Exactly 50 years ago today, I was working in the Lyndon Johnson White House, on the domestic side — mostly on education and other aspects of the Great Society, as deputy to Douglass Cater, one of the giants of the trade. I was 24, though with two years of foreign policy under my belt, as a Fulbright Scholar at the London School of Economics. I cite my tyro status only as partial exculpation for not foretelling the tragedy that was about to ensue for the United States as it became more deeply embroiled in a conflict, to borrow from Neville Chamberlain, “in a far-away country between peoples of whom we know nothing.” A half-century ago, I read in my White House office the press release just put out by the White House that spoke of an attack by North Vietnam on two US destroyers, the Maddox and the Turner Joy, in a place called the Tonkin Gulf. From that point on, to use a common but in retrospect bitter phrase, “we were off to the races.” The Tonkin Gulf Resolution — technically the Southeast Asia Resolution — followed, and the US became mired in a conflict the purposes of which are still being debated. But as a White House staff person with top-secret security clearance, I had an advantage over the average American. Rummaging through the files after I joined the staff in July 1964, I came across a draft that had been sitting there for some time which, with emendations, became — you guessed it — the Tonkin Gulf Resolution. Ready to be used, just waiting for an “incident” to set it in motion.
  • It is now generally understood that the “attack” on the two US destroyers was likely a radar blip and the “fog-of-not-quite-war,” and that, in any event, the US had been engaged in provocative naval actions against North Vietnam.
  •  
    Adds to the historical record the new fact that what became the Gulf of Tonkin Resolution had been drafted long before the incident. 
8More

Obama Should Release Ukraine Evidence | Consortiumnews - 0 views

  • With the shoot-down of Malaysia Airlines Flight 17 over Ukraine turning a local civil war into a U.S. confrontation with Russia, U.S. intelligence veterans urge President Obama to release what evidence he has about the tragedy and silence the hyperbole. MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Intelligence on Shoot-Down of Malaysian Plane Executive Summary
  • U.S.–Russian tensions are building in a precarious way over Ukraine, and we are far from certain that your advisers fully appreciate the danger of escalation. The New York Times and other media outlets are treating sensitive issues in dispute as flat-fact, taking their cue from U.S. government sources. Twelve days after the shoot-down of Malaysian Airlines Flight 17, your administration still has issued no coordinated intelligence assessment summarizing what evidence exists to determine who was responsible – much less to convincingly support repeated claims that the plane was downed by a Russian-supplied missile in the hands of Ukrainian separatists.
  • We, the undersigned former intelligence officers want to share with you our concern about the evidence adduced so far to blame Russia for the July 17 downing of Malaysian Airlines Flight 17. We are retired from government service and none of us is on the payroll of CNN, Fox News, or any other outlet. We intend this memorandum to provide a fresh, different perspective.
  • ...4 more annotations...
  • As intelligence professionals we are embarrassed by the unprofessional use of partial intelligence information. As Americans, we find ourselves hoping that, if you indeed have more conclusive evidence, you will find a way to make it public without further delay. In charging Russia with being directly or indirectly responsible, Secretary of State John Kerry has been particularly definitive. Not so the evidence. His statements seem premature and bear earmarks of an attempt to “poison the jury pool.”
  • Regarding the Malaysia Airlines shoot-down of July 17, we believe Kerry has typically rushed to judgment and that his incredible record for credibility poses a huge disadvantage in the diplomatic and propaganda maneuvering vis-a-vis Russia. We suggest you call a halt to this misbegotten “public diplomacy” offensive. If, however, you decide to press on anyway, we suggest you try to find a less tarnished statesman or woman.
  • If the U.S. has more convincing evidence than what has so far been adduced concerning responsibility for shooting down Flight 17, we believe it would be best to find a way to make that intelligence public – even at the risk of compromising “sources and methods.” Moreover, we suggest you instruct your subordinates not to cheapen U.S. credibility by releasing key information via social media like Twitter and Facebook. The reputation of the messenger for credibility is also key in this area of “public diplomacy.” As is by now clear to you, in our view Secretary Kerry is more liability than asset in this regard. Similarly, with regard to Director of National Intelligence James Clapper, his March 12, 2013 Congressional testimony under oath to what he later admitted were “clearly erroneous” things regarding NSA collection should disqualify him. Clapper should be kept at far remove from the Flight 17 affair. What is needed, if you’ve got the goods, is an Interagency Intelligence Assessment – the genre used in the past to lay out the intelligence. We are hearing indirectly from some of our former colleagues that what Secretary Kerry is peddling does not square with the real intelligence. Such was the case late last August, when Kerry created a unique vehicle he called a “Government (not Intelligence) Assessment” blaming, with no verifiable evidence, Bashar al-Assad for the chemical attacks near Damascus, as honest intelligence analysts refused to go along and, instead, held their noses.
  • We believe you need to seek out honest intelligence analysts now and hear them out. Then, you may be persuaded to take steps to curb the risk that relations with Russia might escalate from “Cold War II” into an armed confrontation. In all candor, we see little reason to believe that Secretary Kerry and your other advisers appreciate the enormity of that danger. In our most recent (May 4) memorandum to you, Mr. President, we cautioned that if the U.S. wished “to stop a bloody civil war between east and west Ukraine and avert Russian military intervention in eastern Ukraine, you may be able to do so before the violence hurtles completely out of control.” On July 18, you joined the top leaders of Germany, France, and Russia in calling for an immediate ceasefire. Most informed observers believe you have it in your power to get Ukrainian leaders to agree. The longer Kiev continues its offensive against separatists in eastern Ukraine, the more such U.S. statements appear hypocritical. We reiterate our recommendations of May 4, that you remove the seeds of this confrontation by publicly disavowing any wish to incorporate Ukraine into NATO and that you make it clear that you are prepared to meet personally with Russian President Putin without delay to discuss ways to defuse the crisis and recognize the legitimate interests of the various parties. The suggestion of an early summit got extraordinary resonance in controlled and independent Russian media. Not so in “mainstream” media in the U.S. Nor did we hear back from you. The courtesy of a reply is requested.
  •  
    Veteran Intelligence Professionals for Sanity (VIPS) savage thecredibility of John Kerry and James Clapper, saying that Kerry's claims of Russian responsibility for shooting down MH17 are at odds with what they are being told by intelligence analysts still working for the government, and challenge Obama to release any evidence he has to support Kerry's version of events. Reading the entire communique is highly recommended.
2More

NSA Surveillance Chilling Effects: HRW and ACLU Gather More Evidence | Electronic Front... - 0 views

  • Human Rights Watch and the ACLU today published a terrific report documenting the chilling effect on journalists and lawyers from the NSA's surveillance programs entitled: "With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law and American Democracy." The report, which is chock full of evidence about the very real harms caused by the NSA's surveillance programs, is the result of interviews of 92 lawyers and journalists, plus several senior government officials.  This report adds to the growing body of evidence that the NSA's surveillance programs are causing real harm.  It also links these harms to key parts of both U.S. constitutional and international law, including the right to counsel, the right of access to information, the right of association and the free press. It is a welcome addition to the PEN report detailing the effects on authors, called Chilling Effects: How NSA Surveillance Drives US Writers to Self-Censor and the declarations of 22 of EFF's clients in our First Unitarian Church of Los Angeles v. NSA case. 
  • The HRW and ACLU report documents the increasing treatment of journalists and lawyers as legitimate surveillance targets and surveys how they are responding. Brian Ross of ABC says: There’s something about using elaborate evasion and security techniques that’s offensive to me—that I should have to operate as like a criminal, like a spy. The report also notes that the government increasingly likens journalists to criminals. As Scott Shane of the New York Times explains: To compare the exchange of information about sensitive programs between officials and the media, which has gone on for decades, to burglary seems to miss the point. Burglary is not part of a larger set of activities protected by the Constitution, and at the heart of our democracy. Unfortunately, that mindset is sort of the problem. Especially striking in the report is the disconnect between the real stories of chilling effects from reporters and lawyers and the skeptical, but undocumented, rejections from senior government officials.  The reporters explain difficulties in building trust with their sources and the attorneys echo that with stories about the difficulties building client trust.  The senior government officials, in contrast, just say that they don't believe the journalists and appear to have thought little, if at all about the issues facing lawyers.  
« First ‹ Previous 2061 - 2080 of 2283 Next › Last »
Showing 20 items per page