Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "NSA-targets-Americans" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

Study: Surveillance will cost US tech sector more than $35B by 2016 | TheHill - 0 views

  • A new study says that the U.S. tech industry is likely to lose more than $35 billion from foreign customers by 2016 because of concerns over government surveillance.“In short, foreign customers are shunning U.S. companies,” the authors of a new study from the Information Technology and Innovation Foundation write.ADVERTISEMENT“The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share,” they said.The think tank’s report found that the cost to the tech sector associated with ongoing concerns over surveillance programs run out of the U.S. was likely to “far exceed” $35 billion by 2016, an earlier estimate set by the group.
  • The group said that lawmakers must enact additional reforms to surveillance policy if they wish to help the tech sector regain the trust of foreign customers. That includes opposing “backdoors,” which allow law enforcement to access otherwise encrypted data, and signing off on trade agreements, including the controversial Trans-Pacific Partnership, that “ban digital protectionism.”The study’s authors found that the revelations about broad U.S. surveillance programs acted as a justification for foreign policymakers to enact protectionist policies aimed at aiding their own domestic technology sectors.Foreign companies have also used the information about U.S. surveillance programs to their advantage.“Some European companies have begun to highlight where their digital services are hosted as an alternative to U.S. companies,” the authors write.
  • American companies, they found, have lost contracts to foreign competitors over fears about mass surveillance.Earlier this month, President Obama signed the USA Freedom Act, a bill that reformed the three Patriot Act provisions that authorized the bulk, warrantless collection of Americans’ phone records. The bill was widely supported by technology companies, including giants like Apple and Google.
8More

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
5More

The Day - U.S. alerts foreign services about Snowden documents | News from southeastern... - 0 views

  • U.S. officials are alerting some foreign intelligence services that documents detailing their secret cooperation with the United States have been obtained by former National Security Agency contractor Edward Snowden, according to government officials.Snowden, U.S. officials said, took tens of thousands of documents, some of which contain sensitive material about collection programs against adversaries such as Iran, Russia and China. Some refer to operations that in some cases involve countries not publicly allied with the United States.The process of informing officials in capital after capital about the risk of disclosure is delicate. In some cases, one part of the cooperating government may know about the collaboration while others may not, the officials said. The documents, if disclosed, could compromise operations, officials said.
  • The Office of the Director of National Intelligence is handling the job of informing the other intelligence services, the officials said. ODNI declined to comment.
  • Snowden lifted the documents from a top secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines, according to sources, who spoke on the condition of anonymity to discuss sensitive matters.Snowden took 30,000 documents that involve the intelligence work of one of the services, the official said. He gained access to the documents through the Joint Worldwide Intelligence Communications System, or JWICS, for top secret/sensitive compartmented information, the sources said.The material in question does not deal with NSA surveillance but primarily with standard intelligence about other countries' military capabilities, including weapons systems-missiles, ships and jets, the officials say.
  • ...1 more annotation...
  • Nonetheless, the military intelligence agencies remain fearful, officials said. The NSA in recent months has provided them with an accounting of the documents it believes Snowden obtained.Intelligence officials said they could discern no pattern to the military intelligence documents taken and said Snowden appeared to harvest them at random. "It didn't seem like he was targeting something specific," the U.S. official said.
  •  
    A bit of comedy here. Our spy agencies will warn collaborating nations but when it comes to Congress or the American public, no warning. 
10More

U.S. officials scrambled to nab Snowden, hoping he would take a wrong step. He didn't. ... - 0 views

  • While Edward Snowden was trapped in the transit zone of Moscow’s Sheremetyevo Airport last year, U.S. officials were confronting their own dearth of options in the White House Situation Room. For weeks, senior officials from the FBI, the CIA, the State Department and other agencies assembled nearly every day in a desperate search for a way to apprehend the former intelligence contractor who had exposed the inner workings of American espionage then fled to Hong Kong before ending up in Moscow.
  • “The best play for us is him landing in a third country,” Monaco said, according to an official who met with her at the White House. The official, who like other current and former officials interviewed for this article discussed internal deliberations on the condition of anonymity, added, “We were hoping he was going to be stupid enough to get on some kind of airplane, and then have an ally say: ‘You’re in our airspace. Land.’ ” U.S. officials thought they saw such an opening on July 2 when Bolivian President Evo Morales, who expressed support for Snowden, left Moscow aboard his presidential aircraft. The decision to divert that plane ended in embarrassment when it was searched in Vienna and Snowden was not aboard.
  • Several U.S. officials cited a complication to gathering intelligence on Snowden that could be seen as ironic: the fact that there has been no determination that he is an “agent of a foreign power,” a legal distinction required to make an American citizen a target of espionage overseas. If true, it means that the former CIA employee and National Security Agency contractor, who leaked thousands of classified files to expose what he considered rampant and illegal surveillance of U.S. citizens, is shielded at least to some extent from spying by his former employers.
  • ...6 more annotations...
  • In interviews, U.S. officials acknowledged that they had no specific intelligence that Snowden would be on Morales’s plane. But the Bolivian leader’s remark was enough to set in motion a plan to enlist France, Spain, Italy and Portugal to block the Bolivian president’s flight home.
  • The lack of a warrant deeming Snowden a foreign agent would also cast doubt on the claims of some of his critics. U.S. officials, including Rep. Mike Rogers (R-Mich.), the chairman of the House Intelligence Committee, have speculated that Snowden had Russian help in stealing U.S. secrets and probably works with the FSB now. Snowden has acknowledged that he was approached by Russian intelligence upon his arrival, but he has said he rejected the pitch and did not bring any classified files with him. He insisted in a recent NBC television interview that he has “no relationship” with the Russian government.
  • State Department and CIA officials pressured countries seen as potential destinations to turn Snowden away, reducing his options to a handful hostile toward the United States. Among them was Bolivia, whose president had signaled publicly that he would consider giving Snowden asylum.
  • As it crossed Austria, the aircraft made a sudden U-turn and landed in Vienna, where authorities searched the cabin — with Morales’s permission, officials said — but saw no sign of Snowden.
  • Austrian officials said they were skeptical of the plan from the outset and noted that Morales’s plane had taken off from a different airport in Moscow than where Snowden was held. “Unless the Russians had carted him across the city,” one official said, it was unlikely he was on board. Even if Snowden had been a passenger, officials said, it is unclear how he could have been removed from a Bolivian air force jet whose cabin would ordinarily be regarded as that country’s sovereign domain — especially in Austria, a country that considers itself diplomatically neutral. “We would have looked foolish if Snowden had been on that plane sitting there grinning,” said a senior Austrian official. “There would have been nothing we could have done.”
  • Wizner declined to discuss where Snowden lives, or how he secured an apartment in a city where such transactions require government involvement — except to indicate that Snowden’s Russian attorney, Anatoly Kucherena, has helped with such arrangements. Snowden’s relationship with Kucherena, who has close ties to Putin and serves on an FSB advisory board, has fueled speculation that he is working with the Russian government.
  •  
    Lots of detail on the Feds' efforts to capture Snowden and to persuade the Russians to extradite him.
4More

F.B.I. Is Broadening Surveillance Role, Report Shows - NYTimes.com - 0 views

  • Although the government’s warrantless surveillance program is associated with the National Security Agency, the Federal Bureau of Investigation has gradually become a significant player in administering it, a newly declassified report shows.In 2008, according to the report, the F.B.I. assumed the power to review email accounts the N.S.A. wanted to collect through the “Prism” system, which collects emails of foreigners from providers like Yahoo and Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal District Court judge, developed procedures to make sure no such accounts belonged to Americans.
  • Then, in October 2009, the F.B.I. started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes. And in April 2012, the bureau began nominating new email accounts and phone numbers belonging to foreigners for collection, including through the N.S.A.’s “upstream” system, which collects communications transiting network switches.That information is in a 231-page study by the Justice Department’s inspector general about the F.B.I.’s activities under the FISA Amendments Act of 2008, which authorized the surveillance program. The report was entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a Freedom of Information Act lawsuit filed by The New York Times.
  • The report also filled in a gap about the evolving legality of the warrantless wiretapping program, which traces back to a decision by President George W. Bush in October 2001 to direct the N.S.A. to collect Americans’ international phone calls and emails, from network locations on domestic soil, without the individual warrants required by the Foreign Intelligence Surveillance Act, or FISA. The Times revealed that program in December 2005.After the article appeared, telecommunications providers that had voluntarily participated in the program were sued, and a Federal District Court judge in Detroit ruled that the program was illegal, although that decision was later vacated. The Bush administration sought to put the program on more solid legal footing by gaining orders from the Foreign Intelligence Surveillance Court approving it.Continue reading the main story Continue reading the main story Continue reading the main story In January 2007, the Bush administration persuaded the court’s Judge Malcolm Howard to issue an order to telephone and network companies requiring them to let the security agency target foreigners’ accounts for collection without individual warrants. But in April 2007, when the order came up for renewal before Judge Roger Vinson, he said that it was illegal.
  • ...1 more annotation...
  • Judge Vinson’s resistance led Congress to enact, in August 2007, the Protect America Act, a temporary law permitting warrantless surveillance of foreigners from domestic network locations. The next year, Congress replaced that law with the FISA Amendments Act.Last month, as a result of separate Freedom of Information Act lawsuits by The Times and the Electronic Frontier Foundation, the government declassified the identities of the judges who disagreed in early 2007 and several court filings from that episode. But it remained unclear what the N.S.A. had done in June and July of 2007.The newly declassified report said Judge Vinson issued an order on May 31, 2007, that allowed existing surveillance to continue by approving collection on a long list of specific foreign phone numbers and email addresses. But after that, when the agency wanted to start wiretapping an additional person, it had to ask the court for permission.The report said that “the rigorous nature of the FISA Court’s probable cause review of new selectors submitted to the various FISA Court judges following Judge Vinson’s May 31, 2007, order caused the N.S.A. to place fewer foreign selectors under coverage than it wanted to.” That and other factors “combined to accelerate the government’s efforts” to persuade Congress to enact the Protect America Act.
4More

U.S. Embedded Spyware Overseas, Report Claims - NYTimes.com - 0 views

  • The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted in Iran, Russia, Pakistan, China, Afghanistan and other countries closely watched by American intelligence agencies, according to a Russian cybersecurity firm.In a presentation of its findings at a conference in Mexico on Monday, Kaspersky Lab, the Russian firm, said that the implants had been placed by what it called the “Equation Group,” which appears to be a veiled reference to the National Security Agency and its military counterpart, United States Cyber Command.
  • It linked the techniques to those used in Stuxnet, the computer worm that disabled about 1,000 centrifuges in Iran’s nuclear enrichment program. It was later revealed that Stuxnet was part of a program code-named Olympic Games and run jointly by Israel and the United States.Kaspersky’s report said that Olympic Games had similarities to a much broader effort to infect computers well beyond those in Iran. It detected particularly high infection rates in computers in Iran, Pakistan and Russia, three countries whose nuclear programs the United States routinely monitors.
  • Some of the implants burrow so deep into the computer systems, Kaspersky said, that they infect the “firmware,” the embedded software that preps the computer’s hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls, Kaspersky reported, making it virtually impossible to wipe out.
  • ...1 more annotation...
  • In many cases, it also allows the American intelligence agencies to grab the encryption keys off a machine, unnoticed, and unlock scrambled contents. Moreover, many of the tools are designed to run on computers that are disconnected from the Internet, which was the case in the computers controlling Iran’s nuclear enrichment plants.
4More

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
5More

America Is Guilty if We Don't Prosecute Obama Washington's Blog - 0 views

  • I write both as a Democrat (which Barack Obama merely claims to be, but shows by his actions that he is not) and as an American (which he, unfortunately, actually is, but which Republicans often deny), in the hope of preserving the honor not just of my Country, but of my Party, both of which he violates routinely. When President Obama refused to allow the prosecution of George W. Bush and Dick Cheney for their manifest crimes, after they had been in office (their having lied this country into invading a country that was no imminent threat to the United States, tortured people, violated the 4th Amendment by unleashing the NSA against the American public, unleashed Wall Street crooks against the American people via MBS frauds, etc.), Obama thereby took upon himself Bush’s and Cheney’s crimes, as being his own. Those crimes still need to be prosecuted — now by America prosecuting Obama himself, for his covering them up: he still does it, after all of these years. Those crimes are no less heinous and, indeed, no less treasonous, now that a so-called “Democrat” is hiding them, than they were when his self-acknowledged Republican predecessors, and now in some cases even the fake “Democrat” Obama himself, were and have been and still are perpetrating them.
  • On 11 July 2014, Rebecca Gordon at rinf.com bannered, “America: Where the ‘Good Guys’ Torture,” and she noted that: There are several important reasons why the resurgence of torture remains a possibility in post-Bush America:     Torture did not necessarily end when Obama took office.     We have never had a full accounting of all the torture programs in the “war on terror.”     Not one of the senior government officials responsible for activities that amounted to war crimes has been held accountable, nor were any of the actual torturers ever brought to court. She documented each one of her points, the last two of which are urgent indicators of the necessity for Democrats (yes, Democrats, since Obama claims to be one of us) to bring forth in the U.S. House of Representatives an impeachment resolution and proceedings against the worst “Democratic” President in U.S. history, or else we shall be implicitly accepting his crimes as being unpunished crimes by our Party, in the person of Obama, just like the Republican Party accepts Bush’s and Cheney’s crimes as being unpunished crimes by their Party, in the persons of Bush and Cheney. And, if Obama’s crimes are acceptable by our Party, then our Party is an embarrassment to our country and should be dissolved,
  • However, there are two more reasons why Obama needs to be impeached, removed from office, and then prosecuted for treason: PROTECTING BANKSTERS:
  • ...2 more annotations...
  • PERPETRATING ETHNIC CLEANSING ABROAD: Finally, just as President Bush defiled the Presidency by unwarrantedly invading Iraq in 2003 and lying through his teeth all the way there and afterward about it, Obama has defiled the Presidency in 2014 by overthrowing the democratically elected President of Ukraine and lying through his teeth all the way and afterward, about that. And Obama’s crime in Ukraine is even worse than Bush’s crime in Iraq, because it’s much more dangerous, with even bigger stakes and risks (all of which are purely downside for both the American and the Ukrainian peoples — much as Bush’s Iraq-invasion also was, for both Americans and Iraqis).
  • DO-OR-DIE TIME FOR DEMOCRATS: If Democrats don’t initiate impeachment proceedings against Obama, then the Democratic Party will be at least as dishonored as the Republican Party is after George W. Bush, for their protecting him; and I, for one, will quit it and urge its replacement, hoping for a leader like Abraham Lincoln to emerge, who had quit the Whig Party and who succeeded at replacing it by the new (and, tragically, only briefly progressive) Republican Party (which tragically then became taken over by northern aristocrats the very moment when Lincoln was assassinated). Either Democrats need to retake our Party, or else to end it, now. We have tolerated Obama’s outrages too long, as it is. For Democrats to retake the Party, requires Democrats to impeach President Obama.
11More

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is i... - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
4More

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
3More

On Media Outlets That Continue to Describe Unknown Drone Victims As "Militants" - The I... - 0 views

  • It has been more than two years since The New York Times revealed that “Mr. Obama embraced a disputed method for counting civilian casualties” of his drone strikes which “in effect counts all military-age males in a strike zone as combatants…unless there is explicit intelligence posthumously proving them innocent.” The paper noted that “this counting method may partly explain the official claims of extraordinarily low collateral deaths,” and even quoted CIA officials as deeply “troubled” by this decision: “One called it ‘guilt by association’ that has led to ‘deceptive’ estimates of civilian casualties. ‘It bothers me when they say there were seven guys, so they must all be militants. They count the corpses and they’re not really sure who they are.’” But what bothered even some intelligence officials at the agency carrying out the strikes seemed of no concern whatsoever to most major media outlets. As I documented days after the Times article, most large western media outlets continued to describe completely unknown victims of U.S. drone attacks as “militants”—even though they (a) had no idea who those victims were or what they had done and (b) were well-aware by that point that the term had been “re-defined” by the Obama administration into Alice in Wonderland-level nonsense.
  • A new article in The New Yorker by Steve Coll underscores how deceptive this journalistic practice is. Among other things, he notes that the U.S. government itself—let alone the media outlets calling them “militants”—often has no idea who has been killed by drone strikes in Pakistan. That’s because, in 2008, George W. Bush and his CIA chief, Gen. Michael Hayden, implemented “signature strikes,” under which “new rules allowed drone operators to fire at armed military-aged males engaged in or associated with suspicious activity even if their identities were unknown.” The Intercept previously reported that targeting decisions can even be made on the basis of nothing more than metadata analysis and tracking of SIM cards in mobile phones.
  • The journalist Daniel Klaidman has noted that within the CIA, they “sometimes call it crowd killing….  If you don’t have positive ID on the people you’re targeting with these drone strikes.” The tactic of drone-killing first responders and rescuers who come to the scene of drone attacks or even mourners at funerals of drone victims—used by the Obama administration and designated “terror groups” alike—are classic examples. Nobody has any real idea who the dead are, but they are nonetheless routinely called “militants” by the American government and media. As international law professor Kevin Jon Heller documented in 2012, “The vast majority of drone attacks conducted by the U.S. have been signature strikes—those that target ‘groups of men who bear certain signatures, or defining characteristics associated with terrorist activity, but whose identities aren’t known.’”
6More

BERLIN: German expose of America's "Secret War" attracts quick, strong U.S. rebuttal | ... - 0 views

  • BERLIN — To appreciate the scope and impact of a joint investigative series by the highly regarded German newspaper Sueddeutsche Zeitung and German public television station NDR on the depth of American trespasses in this country, you don’t even have to read a word of the reports, or watch the videos.All you really have to do is take a look at the U.S. Embassy rebuttal of the series. The multi-part, multi-media series was put on line beginning Friday morning, though some parts weren’t up until evening. And others are said to be coming during the coming weeks. The U.S. Embassy in Germany press office statement came out just after 3 p.m.
  • News report charges U.S. with conducting illegal operations from German soil
  • The newspaper reaction to that reaction: "The American Embassy also comments and rejects the reports as innuendo. They are stating the the United States "are not kidnapping and torturing on principal." This is a daring claim. Only seven months ago a commission made up of Democrats and Republicans called it "undeniable" that the United States tortured inmates following the terror attacks of 2001. Even President Barack Obama said in 2009 that the American practice of water boarding was torture." The website does note that almost 20 reporters started gathering this series more than a year ago.So it doesn't look as if the newspaper and television station will be backing away from their reporting just yet.In any case, the U.S. embassy makes a strong statement, and takes on some of Germany's most respected journalists.Why? One piece of the SZ English language version of the series begins:“Tapping Germany’s Chancellor Angela Merkel’s phone would seem like an outrageous breach of trust—except that there have been so many other, deadlier and lesser-known, breaches of trust wrought by the U.S. in Germany in recent years.
  • ...2 more annotations...
  • “Where to begin? There’s the worldwide secret drone war—a massive break with international law. Then there’s the large and growing shadow army of private spies. And, finally, the asylum seekers, whose knowledge is unwittingly used to drop bombs in their home countries.“The worst part? Germany doesn't even seem to mind.”The series goes on at great detail in each of these areas. At times, it advances with videos, including one showing it's reporter being stopped from shooting video near the U.S. Embassy in Berlin, or near a number of bases, and allegedly secret bases, of both the United States and the United Kingdom around Germany.The series reports that the $3 billion a year the United States spends in Germany pay for everything from bases for the 43,000 U.S. soldiers stationed here to the American drone campaign in Africa. According to the newspaper’s English language version, that drone program works like this:
  • “First they practice with their 57 drones getting ready for the real thing. When they receive intelligence on potential targets and suspected terrorists, they deliver that information to U.S. intelligence officers, also based in Germany. And these soldiers are responsible when innocent civilians in Africa die as a result. Moral issues aside, the fact remains: without these bases in Germany, the U.S.’s ‘war on terror’ would not be the well-oiled machine it is now. Germany acts as the headquarters for secret wars in Africa, the European hub for CIA operations and the training ground for drone attacks worldwide. And Germany’s location is indispensable.”There is much, much more, here. And the website notes that stories will be coming out during the next several weeks. 
  •  
    German journalists are doing their own digging on U.S. abuse of that nation as a major base for spying and waging war against Africa. In the last line of the quoted article, there is a link to a site that is translating the German reports. 
4More

False Flags, Charlie Hebdo and Tsarnaev's Trial: Cui bono? | Global Research - 0 views

  • UPDATES: Well known writers Thierry Meyssan and Kevin Barrett see the “terrorist” attach on Charlie Hebdo as a false flag attack. See http://www.voltairenet.org/article186441.html [1] and http://presstv.com/Detail/2015/01/10/392426/Planted-ID-card-exposes-Paris-false-flag [2] Update: According to news reports, one of the accused in the attack on Charlie Hebdo when hearing that he was being sought for the crime turned himself in to police with an ironclad alibi. https://www.intellihub.com/18-year-old-charlie-hebdo-suspect-surrenders-police-claims-alibi/[3] According to news reports, police found the ID of Said Kouachi at the scene of the Charlie Hebdo shooting. Does this sound familiar? Remember, authorities claimed to have found the undamaged passport of one of the alleged 9/11 hijackers among the massive pulverized ruins of the twin towers. Once the authorities discover that the stupid Western peoples will believe any transparent lie, the authorities use the lie again and again. The police claim to have discovered a dropped ID is a sure indication that the attack on Charlie Hebdo was an inside job and that people identified by NSA as hostile to the Western wars against Muslims are going to be framed for an inside job designed to pull France firmly back under Washington’s thumb. http://www.wfmz.com/shooting-at-french-satirical-magazine-office/30571524 There are two ways to look at the alleged terrorist attack on the French satirical magazine Charlie Hebdo.
  • One is that in the English speaking world, or much of it, the satire would have been regarded as “hate speech,” and the satirists arrested. But in France Muslims are excluded from the privileged category, took offense at the satire, and retaliated. Why would Muslims bother? By now Muslims must be accustomed to Western hypocrisy and double standards. Little doubt that Muslims are angry that they do not enjoy the protections other minorities receive, but why retaliate for satire but not for France’s participation in Washington’s wars against Muslims in which hundreds of thousands have died? Isn’t being killed more serious than being satirized? Another way of seeing the attack is as an attack designed to shore up France’s vassal status to Washington. The suspects can be both guilty and patsies. Just remember all the terrorist plots created by the FBI that served to make the terrorism threat real to Americans. http://reason.com/blog/2014/07/22/human-rights-watch-all-of-the-high-profi [4] France is suffering from the Washington-imposed sanctions against Russia. Shipyards are impacted from being unable to deliver Russian orders due to France’s vassalage status to Washington, and other aspects of the French economy are being adversely impacted by sanctions that Washington forced its NATO puppet states to apply to Russia.
  • This week the French president said that the sanctions against Russia should end (so did the German vice-chancellor). This is too much foreign policy independence on France’s part for Washington. Has Washington resurrected “Operation Gladio,” which consisted of CIA bombing attacks against Europeans during the post-WW II era that Washington blamed on communists and used to destroy communist influence in European elections? Just as the world was led to believe that communists were behind Operation Gladio’s terrorist attacks, Muslims are blamed for the attacks on the French satirical magazine. The Roman question is always: Who benefits? The answer is: Not France, not Muslims, but US world hegemony. US hegemony over the world is what the CIA supports. US world hegemony is the neoconservative-imposed foreign policy of the US.
  •  
    Paul Craig Roberts is on a roll.
2More

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle - NYTimes.com - 0 views

  • In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow conspirators used Google Earth to show militants the routes to their targets in the city. He set up an Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury hotels, all sites of the eventual carnage.
  • But he did not know that by September, the British were spying on many of his online activities, tracking his Internet searches and messages, according to former American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor. They were not the only spies watching. Mr. Shah drew similar scrutiny from an Indian intelligence agency, according to a former official briefed on the operation. The United States was unaware of the two agencies’ efforts, American officials say, but had picked up signs of a plot through other electronic and human sources, and warned Indian security officials several times in the months before the attack.
9More

E.U. Official Pushes U.S. to Explain Its Surveillance - NYTimes.com - 0 views

  • BRUSSELS — Amid a growing outcry over American snooping on foreigners that threatens to cloud European-U.S. trade talks and President Barack Obama’s visit to Berlin, the European Union’s top justice official has demanded in unusually sharp terms that the United States reveal what its intelligence is doing with personal information of Europeans gathered under the Prism surveillance program revealed last week.
  • Viviane Reding, the Union’s combative commissioner of justice, told Attorney General Eric Holder in a letter sent on Monday evening that individual citizens of European countries had the right to know whether their personal information had been part of intelligence gathering “on a large scale.” In the letter, seen Tuesday by the International Herald Tribune, she also asked what avenues were available to Europeans to find out whether they had been spied on, and whether they would be treated similarly to U.S. citizens in such cases. “Given the gravity of the situation and the serious concerns expressed in public opinion on this side of the Atlantic, you will understand that I will expect swift and concrete answers,” Mrs. Reding wrote.
  • Speaking for a continent where snooping carries ghastly echoes of fascist or communist regimes, Mrs. Reding challenged Mr. Holder to answer a list of detailed questions by Friday, when they are expected to speak face-to-face in Dublin at a ministerial meeting scheduled before the Prism spy operation came to light. In Berlin, where Mr. Obama will speak next week before the Brandenburg Gate, privacy is a highly sensitive political issue and the Prism revelations have stirred a furor. “You can be sure that this will be one of the things the chancellor addresses when President Obama is in Germany,” said Steffen Seibert, spokesman for Angela Merkel, who grew up in the former Communist East.
  • ...5 more annotations...
  • Mrs. Reding — who has irked U.S. authorities in the past by threatening companies like Google for overstepping E.U. privacy standards — suggested Mr. Holder’s responses could shape the outcome of important trans-Atlantic initiatives like trade talks. Europe has been a frequent critic of the United States in recent years for jeopardizing individual liberties by filtering vast volumes of information on European bank transfers and in airline passenger records to fight terror plots. Mrs. Reding’s letter is another sign that the growth of government surveillance that began under the Bush administration after Sept. 11, 2001, and has expanded under the Obama administration, continues to touch raw nerves far beyond the United States.
  • The revelations have prompted members of the European Parliament, a directly elected body of representatives from across the Union that meets in Brussels and Strasbourg, to demand that data protection be included in upcoming U.S.-European talks on a long sought trade pact. Any “trade pact will have to fully ensure the highest standards of data privacy for all citizens,” and an ongoing reform of Europe’s data protection law “must guarantee these standards for E.U. citizens when using U.S.-based Internet companies,” Hannes Swoboda, an Austrian member of the parliament who is president of the Socialists & Democrats group, said in a statement on Tuesday. “It is no good the E.U. having strict regulation on data protection if those standards are not guaranteed when using U.S.-based Internet companies,” he said.
  • The talks are expected to be conducted by Mrs. Reding's colleague, Karel De Gucht, the E.U. trade commissioner — but the Parliament would have a final say over any such deal under its right, in force since 2009, to veto treaties with third countries. In the strongest demonstration against U.S. policy, the Parliament in 2010 blocked an agreement allowing U.S. authorities access to European banking data from a cooperative responsible for routing trillions of dollars daily among banks, brokerage houses, stock exchanges and other institutions.
  • In a thinly veiled warning to Mr. Holder about the trade pact, Ms. Reding said relations between the United States and Europe could be undermined by concerns about privacy, which many in Europe regard as an inviolable right. In her letter, Mrs. Reding said she “is accountable before the European Parliament, which is likely to assess the overall trans-Atlantic relationship also in the light of your responses.” In nine detailed questions, Ms. Reding asked Mr. Holder how much data-sifting the United States is conducting, whether those activities target individuals, and whether the surveillance involves issues beyond national security. Mrs. Reding also pushed Mr. Holder to tell her “what avenues” are available to citizens of countries in the European Union to obtain information about whether their personal information has been examined under the Prism program and other programs, and whether Europeans have similar access to that information as Americans.
  • For Mrs. Reding, the chance to push back against Washington is a welcome opportunity. Two years ago, she was forced to soften her initial proposals for data privacy rules in order to accommodate U.S. intelligence gathering. That followed intense pressure on the European Commission, the E.U.’s governing body, from the Obama administration.
  •  
    Article includes more detail on individual EU nations' objections, Germany, Ireland, and Italy.  
3More

In Secret, Court Vastly Broadens Powers of N.S.A. - NYTimes.com - 0 views

  • In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks, officials say.
  • The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny, according to current and former officials familiar with the court’s classified decisions. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come, the officials said.
  • “We’ve seen a growing body of law from the court,” a former intelligence official said. “What you have is a common law that develops where the court is issuing orders involving particular types of surveillance, particular types of targets.” In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures, the officials said. The special needs doctrine was originally established in 1989 by the Supreme Court in a ruling allowing the drug testing of railway workers, finding that a minimal intrusion on privacy was justified by the government’s need to combat an overriding public danger. Applying that concept more broadly, the FISA judges have ruled that the N.S.A.’s collection and examination of Americans’ communications data to track possible terrorists does not run afoul of the Fourth Amendment, the officials said. That legal interpretation is significant, several outside legal experts said, because it uses a relatively narrow area of the law — used to justify airport screenings, for instance, or drunken-driving checkpoints — and applies it much more broadly, in secret, to the wholesale collection of communications in pursuit of terrorism suspects. “It seems like a legal stretch,” William C. Banks, a national security law expert at Syracuse University, said in response to a description of the decision. “It’s another way of tilting the scales toward the government in its access to all this data.”
5More

Venezuela, Bolivia offer asylum to U.S. intel leaker Snowden - CNN.com - 1 views

  • Venezuelan President Nicolas Maduro has offered asylum to Edward Snowden, the state-run AVN news agency reported Friday, without offering details. And Bolivia "is willing to give asylum" to the U.S. intelligence leaker, President Evo Morales said Saturday, according to a government statement. The reports came shortly after Nicaraguan President Daniel Ortega said he would grant Snowden asylum in his country "if the circumstances permit." Ortega didn't elaborate on his announcement, made during a speech in Managua, except to say his country is "open and respectful to the right of asylum." "It's clear that that if the circumstances permit it we will gladly receive Snowden and will grant him asylum here in Nicaragua," Ortega said.
  • Meanwhile, an Icelandic lawmaker said Snowden would not get citizenship there, as he had requested, because Iceland's parliament refused to vote on an asylum proposal before ending its current session.
  • Another country that has seemed supportive of Snowden's quest for a new home is Bolivia, whose president has expressed anger at the United States over an incident involving the presidential plane and a rumor about Snowden. Several European countries refused to allow President Evo Morales' plane through their airspace Tuesday because of suspicions Snowden was aboard. With no clear path home available, the flight crew made an emergency landing in Vienna, Austria, where authorities confirmed Snowden was not a passenger. Bolivia's asylum offer is a "fair protest" to the incident, which involved Portugal, Italy, France and Spain, Morales said. Spain has said it did not restrict its airspace during that flight.
  • ...1 more annotation...
  • He put the blame squarely on the United States for the incident. "Message to the Americans: The empire and its servants will never be able to intimidate or scare us," Morales told supporters at El Alto International Airport outside La Paz, where he arrived late Wednesday. "European countries need to liberate themselves from the imperialism of the Americans." Morales said officials should analyze whether to shut the U.S. Embassy in his country. "Without the United States," he said, "we are better politically and democratically." Ecuadorian President Rafael Correa joined Morales in criticizing the United States' role in the situation, and Venezuela's Maduro blamed the CIA for pressuring the European governments to refuse to grant the plane passage.
  •  
    So three potential new homes for Edward Snowden, if he can find a route to one of them between hostile airspaces.
5More

FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Progra... - 0 views

  • While we've been disappointed that Senator Chuck Grassley appears to have a bit of a double standard with his staunch support for whistleblowers when it comes to Ed Snowden, it is true that he has fought for real whistleblower protections for quite some time. Lately, he's been quite concerned that the White House's "Insider Threat Program" (ITP) is really just a cover to crack down on whistleblowers. As we've noted, despite early promises from the Obama administration to support and protect whistleblowers, the administration has led the largest crackdown against whistleblowers, and the ITP suggests that the attack on whistleblowers is a calculated response. The program documentation argues that any leak can be seen as "aiding the enemy" and encourages government employees to snitch on each other if they appear too concerned about government wrong-doing. Despite all his high minded talk of supporting whistleblowers, President Obama has used the Espionage Act against whistleblowers twice as many times as all other Presidents combined. Also, he has never -- not once -- praised someone for blowing the whistle in the federal government.
  • Given all of that, Senator Grassley expressed some concern about this Insider Threat Program and how it distinguished whistleblowers from actual threats. He asked the FBI for copies of its training manual on the program, which it refused to give him. Instead, it said it could better answer any questions at a hearing. However, as Grassley explains, when questioned about this just 10 minutes into the hearing, the FBI abruptly got up and left: Meanwhile, the FBI fiercely resists any efforts at Congressional oversight, especially on whistleblower matters. For example, four months ago I sent a letter to the FBI requesting its training materials on the Insider Threat Program. This program was announced by the Obama Administration in October 2011. It was intended to train federal employees to watch out for insider threats among their colleagues. Public news reports indicated that this program might not do enough to distinguish between true insider threats and legitimate whistleblowers. I relayed these concerns in my letter. I also asked for copies of the training materials. I said I wanted to examine whether they adequately distinguished between insider threats and whistleblowers.
  • In response, an FBI legislative affairs official told my staff that a briefing might be the best way to answer my questions. It was scheduled for last week. Staff for both Chairman Leahy and I attended, and the FBI brought the head of their Insider Threat Program. Yet the FBI didn’t bring the Insider Threat training materials as we had requested. However, the head of the Insider Threat Program told the staff that there was no need to worry about whistleblower communications. He said whistleblowers had to register in order to be protected, and the Insider Threat Program would know to just avoid those people. Now I have never heard of whistleblowers being required to “register” in order to be protected. The idea of such a requirement should be pretty alarming to all Americans. Sometimes confidentiality is the best protection a whistleblower has. Unfortunately, neither my staff nor Chairman Leahy’s staff was able to learn more, because only about ten minutes into the briefing, the FBI abruptly walked out. FBI officials simply refused to discuss any whistleblower implications in its Insider Threat Program and left the room. These are clearly not the actions of an agency that is genuinely open to whistleblowers or whistleblower protection.
  • ...2 more annotations...
  • And yes, it's equally troubling that the FBI insists that as long as someone "registers" as a whistleblower, the FBI will suddenly, magically agree to stop investigating them as a "threat." We already know that's almost certainly bullshit. The stories of Thomas Drake and John Kiriakou are both clear examples of whistleblowers, who then had the DOJ search through basically everything they'd ever done to try to concoct some sort of Espionage Act case against them. In both cases, the eventual charges were totally ridiculous and unrelated to the whistleblowing they had done, but clearly the only reason they had been investigated was because of their status as whistleblowers. Drake was charged with having a classified document, which was just a meeting agenda and was both improperly classified and then declassified soon after. Kiriakou was charged with revealing the name of a CIA operative to a reporter, where the person in question was already widely known to journalists as working for the CIA. Meanwhile, while Grassley still hasn't come out in support of Snowden as a whistleblower, he does seem reasonably concerned that James Clapper's plans to stop the next Snowden will have severe consequences for whistleblowers:
  • Director of National Intelligence James Clapper seems to have talked about such procedures when he appeared before the Senate Armed Services Committee on February 11, 2014. In his testimony, he said: We are going to proliferate deployment of auditing and monitoring capabilities to enhance our insider threat detection. We’re going to need to change our security clearance process to a system of continuous evaluation. . . . What we need is . . . a system of continuous evaluation, where . . . we have a way of monitoring their behavior, both their electronic behavior on the job as well as off the job, to see if there is a potential clearance issue. . . . Director Clapper’s testimony gives me major pause. It sounds as though this type of monitoring would likely capture the activity of whistleblowers communicating with Congress. As Marcy Wheeler notes in her post (linked above, which called my attention to all this), by declaring war on whistleblowers, the administration is almost guaranteeing that many fewer will use "official channels" to blow the whistle. That just makes them targets with the likelihood of getting no results. Instead, all this does is incentivize people to go the Chelsea Manning/Ed Snowden route of going directly to journalists to make sure the stories get out.
4More

'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Repo... - 0 views

  • The U.S. government still wants to get its hands on Edward Snowden, the former CIA officer who has detailed the extent to which the NSA spies on citizens. Here's a timely question: Would the federal government ever do anything about Citizenfour, the Oscar-contending documentary that features Snowden?
  • So far, the Barack Obama administration has given the film a pass, but on Friday, one former government official decided that enough was enough.
  • Horace Edwards, who identifies himself as a retired naval officer and the former secretary of the Kansas Department of Transportation, has filed a lawsuit in Kansas federal court that seeks a constructive trust over monies derived from the distribution of Citizenfour. Edwards, who says he has "Q" security clearance and was the chief executive of the ARCO Pipeline Company, seeks to hold Snowden, director Laura Poitras, The Weinstein Co., Participant Media and others responsible for "obligations owed to the American people" and "misuse purloined information disclosed to foreign enemies."
  •  
    The complaint is appended to this article. To say that the complaint is laughable gives it too much credit. This is a case for publicity, not for a court victory. 
3More

ACLU files new lawsuit over Obama administration drone 'kill list' | World news | The G... - 0 views

  • As the US debates expanding its campaign against the Islamic State beyond Iraq and Syria, the leading US civil liberties group is intensifying its efforts to force transparency about lethal US counterterrorism strikes and authorities. On Monday, the American Civil Liberties Union (ACLU) will file a disclosure lawsuit for secret Obama administration documents specifying, among other things, the criteria for placement on the so-called “kill list” for drone strikes and other deadly force. Information sought by the ACLU includes long-secret analyses establishing the legal basis for what the administration terms its “targeted killing program” and the process by which the administration determines that civilians are unlikely to be killed before launching a strike, as well as verification mechanisms afterward to establish if the strike in fact has caused civilian deaths.
  • “Over the last few years, the US government has used armed drones to kill thousands of people, including hundreds of civilians. The public should know who the government is killing, and why it’s killing them,” Jameel Jaffer, deputy legal director for the ACLU, told the Guardian.
  • The ACLU suit proceeds after the Obama administration disclosed none of the lethal counterterrorism documentation through a Freedom of Information Act request the civil liberties group launched in October 2013. According to the new lawsuit, the departments of state, justice and defense, as well as the CIA, have stonewalled the ACLU’s requests for nearly 18 months. Recent legal history suggests the ACLU is in for an uphill court struggle. The Obama administration, which has called itself the most transparent in history, has thus far repelled or delayed ACLU lawsuits for disclosure around drone strikes and the 2011 assassination of Anwar al-Awlaki, a US citizen and al-Qaida propagandist. Additionally, the administration is fighting the ACLU on the legality of its bulk surveillance activities and to prevent the release of thousands of graphic photographs detailing Bush-era torture by the CIA and military. Yet the administration has seen the courts chip away at its blanket denials of documents sought by the ACLU. Most of the intelligence community’s disclosures of surveillance memos since Edward Snowden’s revelations have followed the administration’s courtroom losses to the ACLU and other civil-liberties groups. In June, the second circuit court of appeals forced the Department of Justice to release much of a critical 2010 memo blessing the killing of Awlaki. (The ACLU is seeking the release of 10 more major intelligence memos related to targeted killing.)
« First ‹ Previous 221 - 240 of 246 Next ›
Showing 20 items per page