Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "learning" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

Peter and Lou Berryman on Vimeo - 0 views

  • by luciano M
    • Joseph Skues
       
      "Solidarity Forever" When the union's inspiration through the workers' blood shall run, There can be no power greater anywhere beneath the sun; Yet what force on earth is weaker than the feeble strength of one, But the union makes us strong. CHORUS: Solidarity forever, Solidarity forever, Solidarity forever, For the union makes us strong. Is there aught we hold in common with the greedy parasite, Who would lash us into serfdom and would crush us with his might? Is there anything left to us but to organize and fight? For the union makes us strong. Chorus It is we who plowed the prairies; built the cities where they trade; Dug the mines and built the workshops, endless miles of railroad laid; Now we stand outcast and starving midst the wonders we have made; But the union makes us strong. Chorus All the world that's owned by idle drones is ours and ours alone. We have laid the wide foundations; built it skyward stone by stone. It is ours, not to slave in, but to master and to own. While the union makes us strong. Chorus They have taken untold millions that they never toiled to earn, But without our brain and muscle not a single wheel can turn. We can break their haughty power, gain our freedom when we learn That the union makes us strong. Chorus In our hands is placed a power greater than their hoarded gold, Greater than the might of armies, magnified a thousand-fold. We can bring to birth a new world from the ashes of the old For the union makes us strong.
  •  
    Solidarity Forever
4More

911: Lloyds of London Insurance brokers have sued Citigroup-AMEC et al. in respect of t... - 1 views

  • We allege the Citigroup-AMEC partners sabotaged the diesel generators to feed fires lit by arsonists on the 11th, 12th or 13th floors of WTC7 where the Securities & Exchange Commission lost between 3,000 to 4,000 files. The SEC files contained evidence of insider trading by Citigroup-AMEC investment bank partners in the shares of initial public offerings during the high-tech boom. The House Financial Services Committee was seeking information about the treatment Citigroup's Salmon Smith Barney investing banking division may have given WorldCom executives. Salomon had offices in 7 World Trade Center and Citigroup says back-up tapes of corporate emails from September 1998 through December 2000 were stored at the building and destroyed in 9/11. Citigroup subsequently paid $2.65 billion to the settlement class which purchased WorldCom securities during the period from April 1999 through June 2002. www.thestreet.com/markets...36925.html www.citigroup.com/citigro...40510a.htm
  • At 5:20 p.m. on 9/11, 7 World Trade Center collapsed in its own footprint at a speed slightly slower than free fall under gravity in a manner consistent with a controlled demolition. Molten steel and partially evaporated steel members were found in the debris pile of WTC #1, 2 and 7. The thermal signature of 32 hot spots, 5 days and 10 days after the collapse, is consistent with all the buildings being rigged for demolition with an incendiary such as thermite.
  • We allege that the Citigroup-AMEC partnership now conspired to remove and destroy evidence of arson before filing bogus property insurance claims in an arrangement with Larry Silverstein and Silverstein Properties, including a claim for a double payment for the destruction of the Twin Towers. "Griffin quotes court documents to the effect that Silverstein had only $14 million invested in the insurance deal for the Twin Towers (compared to 50 times as much by his [off-book] lenders) through limited liability investment vehicles."
  •  
    Incredible.  In 2006 Lloyd's of London sued a group comprised of Citigroup, AMEC and GMAC for a "concealed demolition" conspiracy resulting in insurance fraud.  This is complicated, but the key assertion is that World Trade Center building #1, #2, and #7 were rigged for demolition prior to the 9/11/01 attack.  The claim also alleges the involvement of Larry Silverstein, who had purchased these buildings a few months prior to the 9/11 attack, and made the subsequent and fraudulent insurance claim. Based on the Lloyd's of London report: "9/11 - A Citigroup-AMEC insurance fraud on Lloyd's of London?" .. by David Hawkins, Foundation Scholar, Cambridge University, Founder of the Citizen's Association of Forensic Economists at Hawks' CAFE .
2More

Revealed - the capitalist network that runs the world - physics-math - 19 October 2011 ... - 0 views

  •  
    The secret 1% revealed at last. Using advanced "complex systems heuristics", a group of mathematicians and scientist studying the stability of complex systems has applied their techniques to study the interlocking relationships driving the global economy. They claim to have identified the inner architecture of global economic power, and hope to make it more stable. Incredible stuff! A list of the top 50 of the 147 superconnected companies cross references nicely with the question, "Who Owns the Federal Reserve Bankster Cartel?" The focus is on global "Transnational Corporations" (TNCs) and how the interlocking ownership/cross-director-relationships has affected the global economy. The study discovers a "super-entity" comprised of a core 147 companies that control over 40% of the world's wealth and productivity capacity. Most of these are global banking and financial operations. Yes, Wall Street Banksters! "In effect, less than 1 per cent of the companies were able to control 40 per cent of the entire network," says James Glattfelder, head of the Zurich research team. Most were financial institutions. The top 20 included Barclays Bank, JPMorgan Chase & Co, and The Goldman Sachs Group. Collectively this 1% control a further 60% of global revenues. excerpt: AS OWS PROTESTS against financial power sweep the world this week, science may have confirmed the protesters' worst fears. An analysis of the relationships between 43,000 transnational corporations has identified a relatively small group of companies, mainly banks, with disproportionate power over the global economy.

    The study's assumptions have attracted some criticism, but complex systems analysts contacted by New Scientist say it is a unique effort to untangle control in the global economy. Pushing the analysis further, they say, could help to identify ways of making global capitalism more stable.

    The idea that a few bankers control a large chunk of the global econo
  •  
    Important work but perhaps too immature to base decisions on with confidence. I was struck by this statement: "Glattfelder says we may need global anti-trust rules, which now exist only at national level, to limit over-connection among TNCs. Sugihara says the analysis suggests one possible solution: firms should be taxed for excess interconnectivity to discourage this risk." My relevant question is, who would be the recipients of the postulated tax? Anytime you create a revenue stream, the recipients acquire a vested interest in maintaining and expanding that revenue stream and the folks who pay the revenue acquire a vested interest in minimizing or eliminating the expense. While the payers incentives are consistent with the article's statement, the identities of the recipients and their incentives to tweak the tax to produce more revenue needs more thought and discussion with a strong focus on: [i] who makes that decision; [ii] who has the the power to decide whether that authority is abused; and [iii] who has standing to initiate actions to correct abuse. On the latter, the U.S. Constitution would seem to require that those who pay the taxes are entitled to Due Process. But at the same time, the individual consumer can also be injured by abuse. However, a hallmark trait of most trade agreements is that only government and regulated corporations are granted standing to challenge regulatory decisions, which has skewed their interpretation heavily to the corporate side. Universal standing is the cure.
6More

An Israeli takeover of the Palestine Authority…? - Alan Hart - 0 views

  • On the face of it that’s a silly question and the speculation it represents – that Palestinian “President” Abbas could replaced by an Israeli agent or asset – is not worthy of discussion. But before dismissing it readers might do what I did and consider two things. The first is that Mohammed Dahlan, formerly one of the most powerful Fatah leaders and almost certainly the one who administered for Israel the polonium that killed Arafat, is now putting a big effort into getting rid of Abbas by one means or another and replacing him with – guess who? – himself. In passing it is interesting to note that according to a recent report in the Israeli newspaper Ma’ariv, Netanyahu’s special envoy, Yitzhak Molcho, is in a secret dialogue with Dahlan who spends his time shuttling between Cairo and the U.A.E. where he currently lives. One assumption has to be that Netanyahu is hoping that if Dahlan became “President” of the PA he would go much further than collaborator Abbas in delivering for Israel. (Also worth noting is that Dahlan speaks fluent Hebrew. He learned to do so during his 11 spells in Israeli jails between 1981 and 1986).
  • The second consideration is Israel’s track record in successfully placing its agents inside Arab institutions and organizations at very high levels.
  • My speculation (repeat speculation) is that if Mohammed Dahlan became the “President”, he would be prepared to use force as necessary to impose Israel’s terms for peace on the Palestinians. Dahlan demonstrated his enthusiasm for doing Israeli and American dirty work when, at the request of the Bush administration, he agreed to lead a military campaign to destroy Hamas after its election victory in 2006. The Bush administration provided Dahlan with money and arms and trained his Fatah fighters in a number of Arab countries. But it all went badly wrong for Dahlan and his sponsors. Hamas got wind of what Dahlan (fronting for the Bush administration and Israel) was intending and launched an Israeli-like pre-emptive strike. It destroyed Fatah’s security forces based in the Gaza Strip (which had been Dahlan’s base) and put Fatah politically out of business there. Commenting on what had happened in the Gaza Strip, Hani al-Hassan, for many years Arafat’s crisis manager and one of his two most trusted advisers, said it was “not a war between Fatah and Hamas but between Hamas and Fatah collaborators who served the Americans and the Israelis.”
  • ...3 more annotations...
  • Subsequently the Bush administration exerted heavy pressure on Abbas (which he resisted) to appoint Dahlan as his deputy. And some Palestinian officials said that the U.S. and a number of European countries had made it clear that they would like Dahlan to succeed Abbas as head of the P.A. They presumably believed then, as Netanyahu might well do today, that Dahlan as “President” would use whatever means were necessary to compel the Palestinians to make peace on Israel’s terms. Shortly after his forces were expelled from the Gaza Strip, Dahlan re-established himself in the West Bank. And thereafter tensions between his Fatah supporters and opponents grew and grew. In June 2011 he was expelled from Fatah because of the assumption that he had delivered for Israel whatever it was that poisoned Arafat. Three months later Abbas ordered a raid on Dahlan’s house and the arrest of his private armed guards. Today in exile, and consulting with his allies in Sisi’s Egypt and some Arab Gulf states as well as Israel and America, Dahlan is plotting his comeback to replace Abbas by one means or another.
  • The Ma’ariv article I mentioned above said that Dahlan has claimed that he and not Abbas can be counted on to bring peace, and that in 2010 he reportedly sent a letter to the Obama administration in which he said, “There is no choice but to replace Abbas with someone who can deliver results.” Because Dahlan must know that Israel’s leaders are not remotely interested in peace on terms the Palestinians could accept, I think it is reasonable to assume that the result he has in mind is peace imposed on Israel’s terms – effectively a Palestinian surrender to Zionism’s will. Is a Dahlan/Israeli takeover of the PA really possible? An indication that Abbas seems to think it cannot be ruled out was his request to President Obama that he press Israel to include Marwan Barghouti in the fourth and final batch of Palestinian prisoners due to be released at the end of this month. (Prisoner release was one of the inducements to secure Abbas’s green light for Secretary of State Kerry to launch his “peace process”. But today Netanyahu is under mounting pressure from the neo-fascist tendency to the right of him to say “No” to any further prisoner releases).
  • Barghouti is by far the most popular Palestinian leader and would easily win an election to replace Abbas as “President”. And that, of course, is precisely why Israel won’t release him. So if Abbas can be bullied and bribed by Israel and the U.S. into lifting the ban on Dahlan’s return from exile to the occupied West Bank, he, Dahlan, could be in with a chance. In my view a victory for him would be the final betrayal of the Palestinian cause.
12More

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
2More

Watch a message from Counselor to the President John Podesta. | The White House - 0 views

  • On January 17, President Obama spoke at the Justice Department about changes in the technology that we use for national security purposes, and what these technologies mean for our privacy broadly. He called on the administration to conduct a 90-day review of big data and privacy: how these areas affect the way we live, and the way we work — and how data is being used by universities, the private sector, and the government. This is a complicated issue that affects every American — and we want to hear your feedback. Learn more about this review, and if you like, share your thoughts.
  •  
    Please let them know what you think.
4More

The Most Important Surveillance Order We Know Almost Nothing About | American Civil Lib... - 0 views

  • Over the last seven months, we have learned an incredible amount about the government's post-9/11 surveillance efforts. But there is a crucial gap in our basic understanding. We now know, for example, a good deal about how the government conducts surveillance that targets Americans, and about surveillance of foreigners that sweeps up Americans' international communications when the actual surveillance takes place on U.S. soil (for example, from a Google facility in the United States). But we still know very little about Executive Order 12,333, which governs the NSA's surveillance abroad — even when that surveillance sweeps up Americans' communications. To fill that gap, the ACLU, along with the Media Freedom and Information Access Clinic at Yale Law School, today filed a Freedom of Information Act lawsuit demanding that the government release basic information about its use of Executive Order 12,333 to conduct surveillance of Americans' international communications. Why is Executive Order 12,333 so important? Here is how we explained it in our complaint (filed today in federal court in New York):
  • Although EO 12,333 permits the government to target foreigners abroad for surveillance, recent revelations have confirmed that the government interprets that authority to permit sweeping monitoring of Americans' international communications. How the government conducts this surveillance, and whether it appropriately accommodates the constitutional rights of American citizens and residents whose communications are intercepted in the course of that surveillance, are matters of great public significance and concern. While the government has released several documents describing the rules that govern its collection and use of Americans' international communications under statutory authorities regulating surveillance on U.S. soil, little information is publicly available regarding the rules that apply to surveillance of Americans' international calls and emails under EO 12,333. That gap in public knowledge is particularly troubling in light of recent revelations, which make clear that the NSA is collecting vast quantities of data worldwide pursuant to EO 12,333. For instance, recent news reports indicate that, relying on the executive order, the NSA is collecting: nearly 5 billion records per day on the location of cell phones, including Americans' cell phones; hundreds of millions of contact lists or address books from personal email and instant messaging accounts; and information from Google and Yahoo user accounts as that information travels between those companies' data centers located abroad.
  • The core of the problem is that the NSA has, for years, relied upon its authority to gather foreign intelligence as permission to conduct sweeping surveillance of Americans' international communications. We know that this happens under the laws that govern surveillance on U.S. soil, and recent revelations confirm that it happens — perhaps to an even greater extent — in the surveillance that takes place abroad under Executive Order 12,333. Moreover, the rules that govern surveillance under the executive order are of particular concern because that surveillance is not meaningfully overseen by Congress, and it is not overseen at all by the Foreign Intelligence Surveillance Court. In other words, the executive is conducting surveillance under its own executive order without any real oversight. We now know too well that unchecked surveillance authority can lead to dangerous overreach. That's why we are fighting for the release of documents that would shed light on the internal rules that the executive has set for itself when it monitors international communications abroad — including Americans' international communications.
  •  
    The lawsuit names as defendants the CIA, NSA, and DoD (because the Defense Intelligence Agency is under DoD). 
2More

President Obama claims the NSA has never abused its authority. That's false | Trevor Ti... - 0 views

  • Time and again since the world learned the extent of what the NSA was doing, government officials have defended the controversial mass surveillance programs by falling back on one talking point: the NSA programs may be all-powerful, but they have never been abused. President Obama continually evokes the phase when defending the NSA in public. In his end-of-year press conference, he reiterated, "There continues not to be evidence that the [metadata surveillance] program had been abused". Former NSA chief Michael Hayden says this almost weekly, and former CIA deputy director and NSA review panel member Mike Morrell said it again just before Christmas. This mantra is likely to be repeated often in 2014 as Obama is set to address the nation on government surveillance, and Congress and the president debate whether any reforms are necessary.There's only one problem: it's not true.
  •  
    The Guardian proves overwhelmingly that Obama lied about NSA abuse during his end-of-year press conference.-
3More

Guantánamo Inmate's Case Reignites Fight Over Detentions - NYTimes.com - 0 views

  • The seemingly unending struggle over Guantánamo Bay — the prison President Obama vowed to close shortly after he was sworn in — is again reverberating over an “anguishing” case of force-feeding a Syrian detainee.The case involves Jihad Ahmed Mujstafa Diyab, a Syrian who has been held for 12 years without a trial, and who has gone on prolonged hunger strikes. Late Thursday, a Federal District Court judge lifted an order barring his force-feeding, even as she rebuked the military for using procedures that she said caused “agony.”
  • Mr. Diyab was recommended for transfer more than four years ago, but officials fear repatriating him because of the chaos in Syria and the apparent death sentence.In February, the president of Uruguay offered to allow him to be released there, but Defense Secretary Chuck Hagel, who has the final say under restrictions imposed by Congress, has not signed off on the transfer.
  • Mr. Diyab’s defense team recently learned that some videotapes of forcible cell extractions and force-feeding of Mr. Diyab and other detainees exist, and on Wednesday, Judge Kessler ordered the military to turn 34 such tapes over to his lawyers.
6More

Vodafone reveals existence of secret wires that allow state surveillance | Business | T... - 0 views

  • Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.The company has broken its silence on government surveillance in order to push back against the increasingly widespread use of phone and broadband networks to spy on citizens, and will publish its first Law Enforcement Disclosure Report on Friday. At 40,000 words, it is the most comprehensive survey yet of how governments monitor the conversations and whereabouts of their people.The company said wires had been connected directly to its network and those of other telecoms groups, allowing agencies to listen to or record live conversations and, in certain cases, track the whereabouts of a customer. Privacy campaigners said the revelations were a "nightmare scenario" that confirmed their worst fears on the extent of snooping.
  • Vodafone's group privacy officer, Stephen Deadman, said: "These pipes exist, the direct access model exists."We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."Vodafone is calling for all direct-access pipes to be disconnected, and for the laws that make them legal to be amended. It says governments should "discourage agencies and authorities from seeking direct access to an operator's communications infrastructure without a lawful mandate".
  • In America, Verizon and AT&T have published data, but only on their domestic operations. Deutsche Telekom in Germany and Telstra in Australia have also broken ground at home. Vodafone is the first to produce a global survey.
  • ...2 more annotations...
  • Peter Micek, policy counsel at the campaign group Access, said: "In a sector that has historically been quiet about how it facilitates government access to user data, Vodafone has for the first time shone a bright light on the challenges of a global telecom giant, giving users a greater understanding of the demands governments make of telcos. Vodafone's report also highlights how few governments issue any transparency reports, with little to no information about the number of wiretaps, cell site tower dumps, and other invasive surveillance practices."
  • Snowden, the National Security Agency whistleblower, joined Google, Reddit, Mozilla and other tech firms and privacy groups on Thursday to call for a strengthening of privacy rights online in a "Reset the net" campaign.Twelve months after revelations about the scale of the US government's surveillance programs were first published in the Guardian and the Washington Post, Snowden said: "One year ago, we learned that the internet is under surveillance, and our activities are being monitored to create permanent records of our private lives – no matter how innocent or ordinary those lives might be. Today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same."
  •  
    The Vodafone disclosures will undoubtedly have a very large ripple effect. Note carefully that this is the first major telephone service in the world to break ranks with the others and come out swinging at secret government voyeur agencies. Will others follow. If you follow the links to the Vodafone report, you'll find a very handy big PDF providing an overview of the relevant laws in each of the customer nations. There's a cute Guardian table that shows the aggregate number of warrants for interception of content via Vodafone for each of those nations, broken down by content type. That table has white-on-black cells noting where disclosure of those types of surveillance statistics are prohibited by law. So it is far from a complete picture, but it's a heck of a good start.  But several of those customer nations are members of the E.U., where digital privacy rights are enshrined as human rights under an EU-wide treaty. So expect some heat to roll downhill on those nations from the European treaty organizations, particularly the European Court of Human Rights, staffed with civil libertarian judges, from which there is no appeal.     
16More

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
4More

Germany Opens Criminal Investigation On Alleged NSA Merkel Phone Tap - 0 views

  • German prosecutors have opened an investigation into the alleged monitoring of Chancellor Angela Merkel’s cellphone by the U.S. National Security Agency, officials said Wednesday, in a move that could again complicate diplomatic relations between the two allies. It was not immediately clear what the new investigation might mean in terms of possible prosecutions of Americans. Documents provided by National Security Agency leaker Edward Snowden indicated in October that the U.S. was monitoring Merkel’s cellphone conversations, as well as those of 35 other foreign leaders. Merkel expressed outrage and accused Washington of a grave breach of trust. In the ensuing diplomatic fallout, President Barack Obama acknowledged Germany’s anger and promised that new guidelines would cut back on such monitoring, except in the case of a national security interest. “The leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them rather than turning to surveillance,” Obama said at the time.
  • Following the news of the German probe, Obama’s deputy national security adviser, Ben Rhodes, said the U.S. believes direct dialogue between the two countries rather than an investigation is the best way to address Germany’s concerns. “We believe we have an open line and good communication” with Merkel and her team, Rhodes told reporters aboard Air Force One as Obama flew to Brussels for a meeting of the Group of Seven nations. After mulling for months whether to open a formal probe, Chief Federal Prosecutor Harald Range determined “that sufficient factual evidence exists that unknown members of U.S. intelligence services spied on the mobile phone of Chancellor Angela Merkel,” his office said. In a similarly thorny diplomatic case, Germany got as far as issuing warrants for 13 unidentified CIA agents suspected of kidnapping a German terrorism suspect and taking him to a detention center in Afghanistan. The case was shelved in 2007 after the U.S. Justice Department said extraditing the agents would harm “American national interests.”
  • In his Wednesday announcement, Range’s office said he was not opening a formal investigation of wider allegations of blanket surveillance of telecommunications data in Germany by U.S. and British intelligence, saying that there was not yet sufficient factual evidence of concrete crimes. His office said that will remain under consideration. Merkel’s spokesman, Steffen Seibert, declined to comment on Range’s decision or on whether the government fears it will weigh on relations with the U.S. The government didn’t exert any influence on the prosecutor, Seibert told reporters. “I am not going to evaluate here the decision he has made,” he said. Separately, the German Parliament earlier this year set up a committee to investigate the scope of spying by the NSA and other intelligence services in Germany.
  •  
    There's a bit of comedy beneath the surface here. When Edward Snowden was in Hong Kong and news of the NSA leak hit, the U.S. Dept. of Justice promptly filed a criminal espionage charge against Snowden and attempted to extradite him from Hong Kong. Snowden left Hong Kong before the extradition paperwork was processed enough to result in his arrest.  Now with a pending criminal investigation of the NSA's espionage activities aimed at Germany's chancellor, the Obama White House says it wants dialog, not a criminal investigation. Would the U.S. honor its extradition treaty with Germany if NSA officials or the Director of Intelligence were charged with espionage in Germany? One might suspect that a dual-standard would be deployed, in effect saying that only espionage charges that the U.S. lodges can justify extradition. Or at least that's the way it worked when Italy tried and convicted in absentia several CIA officials and an Air Force officer of espionage activities, relating to the kidnapping and "extraordinary rendition" of a gentleman in Italy.       But this incident serves as a reminder that when the NSA officials conduct foreign intelligence activities, they will in most cases be deliberately violating the criminal laws of other nations. And the same activity aimed at U.S. citizens is also criminal, which is undoubtedly why Sen. Ron Wyden asked Director of Intelligence Clapper if the NSA had taken account of the Computer Fraud and Abuse Act in its processing of domestic digital communications. Clapper said he would get back to Wyden on that in writing. So far as I'm aware, Wyden is still waiting for that answer. There are lots of comedians in Washington, D.C. Most of them have no idea that they are comedians.   
8More

NSA surveillance reform bill passes House by 303 votes to 121 | World news | theguardia... - 0 views

  • The first legislation aimed specifically at curbing US surveillance abuses revealed by Edward Snowden passed the House of Representatives on Thursday, with a majority of both Republicans and Democrats.But last-minute efforts by intelligence community loyalists to weaken key language in the USA Freedom Act led to a larger-than-expected rebellion by members of Congress, with the measure passing by 303 votes to 121.The bill's authors concede it was watered down significantly in recent days, but insist it will still outlaw the practice of bulk collection of US telephone metadata by the NSA first revealed by Snowden.Some members of Congress were worried that the bill will fail to prevent the National Security Agency from continuing to collect large amounts of data on ordinary US citizens.
  • “Perfect is rarely possible in politics, and this bill is no exception,” said Republican Jim Sensenbrenner, who has led efforts on the House judiciary committee to rein in the NSA.“In order to preserve core operations of the intelligence and law enforcement agencies, the administration insisted on broadening certain authorities and lessening certain restrictions. Some of the changes raise justifiable concerns. I don’t blame people for losing trust in their government, because the government violated their trust.”
  • But the revised language lost the support of several influential members of the judiciary committee who had previously voted for it, including Republicans Darrell Issa, Ted Poe and Raul Labrador and Democrat Zoe Lofgren.Issa also chairs the House oversight committee. Adam Smith, the most senior Democrat on the armed services committee, also voted against the bill.“Regrettably, we have learned that the intelligence community will run a truck through ambiguity,” said Lofgren during an hour and 15 minutes of debate which preceded the vote. No amendments were allowed.
  • ...4 more annotations...
  • After the vote, Mark Jaycox, a legislative analyst at the Electronic Frontier Foundation, said: “The bill is littered with loopholes. The problem right now, especially after multiple revisions, is that it doesn't effectively end mass surveillance.”In a statement, Zeke Johnson, the director of Amnesty International USA's security and human rights program, said the House had “failed to deliver serious surveillance reform”.
  • The size of the rebellion and the seniority of the rebels may support efforts to tighten language in the legislation as it makes its way to the Senate.Senator Patrick Leahy, the chair of the Senate judiciary committee and the lead Democratic author of the Freedom Act, said that the actions of the house in passing it was an “important step towards reforming our nation's surveillance authorities”which “few could have predicted less than a year ago.”However, in a statement issued on Thursday, Leahy expressed disappointment that the bill, which he had introduced jointly with Sensenbrenner in October, had been diluted.
  • Senator Ron Wyden, the Oregon Democrat who has waged an often lonely campaign against NSA surveillance, said he opposed the House bill in the form that passed on Thursday. "I am gravely concerned that the changes that have been made to the House version of this bill have watered it down so far that it fails to protect Americans from suspicionless mass surveillance," he said.He said the Senate version of the bill remained strong, and that he hoped that its provisions could be preserved.
  • The bill was the first vote on a NSA related matter in either the House or Senate since last July, when Republican congressman Justin Amash failed by 205-217 votes to pass an amendment to an appropriations bill that would have stripped funding for bulk surveillance.The revised USA Freedom Act was supported by the White House. Obama had urged for a solution to ending bulk collection of telephone metadata in ways that would not unduly constrain the NSA.
  •  
    On to the Senate. No meaningful reform from the House. That the measure passed was supported by Obama tells the story of its effectiveness. It will "constrain the NSA."
12More

Tony Blair, "Infanticide Endorser" is Rewarded by "Save The Children" | Global Research - 0 views

  • When the Orwellian “Middle East Peace Envoy” Tony Blair was named “Philanthropist of the Year” by GQ Magazine in September for “his tireless charitable work” (tell that to the dismembered, dispossessed, traumatized of Iraq, Afghanistan) there was widespread disbelief.
  • When the Orwellian “Middle East Peace Envoy” Tony Blair was named “Philanthropist of the Year” by GQ Magazine in September for “his tireless charitable work” (tell that to the dismembered, dispossessed, traumatized of Iraq, Afghanistan) there was widespread disbelief.
  • On 19th November, though, the Butcher of Baghdad, Dodgy Dossier Master, Sanctions Endorser of an embargo which condemned to death an average of 6,000 children a month according to the UN, was awarded Save The Children’s Global Legacy Award at a Gala Charity at The Plaza in New York.
  • ...8 more annotations...
  • In both roles he emphatically endorsed the Iraq embargo, thus the silent monthly infanticide. Madeleine Albright in trousers. Iraq’s new born and under fives for her were: “ … a price worth it.” Then came the 2003 dodgy Downing Street dossier used by Colin Powell at the UN for the invasion’s justification, the subsequent perhaps one and a half million deaths in a country where near half the population were children – the rest is holocaustal history. Between Madeleine Albright’s admission (12th May 1996) that “over half a million children had died” and Blair’s tenure between 1997 to the invasion, six years later, a further near half a million children died (do the maths.) Yet Save The Children – whose commitment “No Child Born to Die” is at the top of each page of the charity’s website – honour this tyrant.
  • It has to be hoped that this shameful lauding of a man who should be answering to a Nuremberg model Tribunal and on whom the Chilcot Inquiry is still to release it’s findings, has nothing to do with the fact that the Chief Executive of Save the Children, Justin Forsyth was in 2004: “ … recruited to No 10 (Downing Street) by Tony Blair …” and later became Blair’s successor: “ Gordon Brown’s Strategic Communications and Campaigns Director …” (6)
  • Another Save The Children executive, Chief Financial Officer Sam Aharpe: “worked for nearly 30 years with the UK Government development programme” including under Tony Blair, according to their website – whilst Fergus Drake, Director of Global Programmes since 2009: “Prior to this … worked for the Office of Tony Blair in Rwanda advising President Kagame …” The day after Blair’s Gala Award, Save The Children, with UNICEF and other aid agencies released a statement: “On the 25th anniversary of the Convention on The Rights of the Child – Stepping up the global effort to advance the rights of every child.” The enshrined commitments were: “ … not only to some children, but to all children … not only to advance some of their rights, but all their rights – including their right to survive and to thrive, to grow and to learn, to have their voices heard and heeded, and to be protected from discrimination and violence in all its manifestations.” (7) Irony, chutzpah, hypocrisy eat your hearts out.
  • Of course, as Gaza was decimated again in July and August, defenceless, with no army, navy or air force, resulting in over 2,000 deaths, including nearly 500 children, the Middle East “Peace Envoy” fled his posh pad in Jerusalem and gave a two month early “surprise birthday party” for his wife in one of his seven UK mansions, safely out of the firing line – and said nothing about saving the children, or indeed anyone else. He has subsequently been silent about Gaza’s 475,000 souls living in emergency conditions, 17,200 destroyed homes and 244 damaged schools (8.) Incidentally, if you are considering donating to Save the Children or buying their Christmas cards, give generously. Mr Forsyth and his colleagues struggle along on about 160 thousand pounds a year and the Chief Executive makes do on 234 pounds annually (9.)
  • Children saving seems to be somewhat selective at this agency which operates in “more than 120 countries.” For example, in November 2003, the Guardian reported that: “Senior figures at Save the Children US . . . demanded the withdrawal of the criticism and an effective veto on any future statements blaming the invasion for the plight of Iraqi civilians’ suffering malnourishment and shortages of medical supplies.” Fast forward to the run up to another US extrajudicial assassination of the man purported to be Osama bin Laden in May 2011 in Abbottabad, Pakistan. Save The Children: “had been under suspicion from authorities ever since a doctor accused of assisting the CIA in its search for the al-Qaida leader claimed that Save the Children had introduced him to US intelligence officers.” (11.) Dr Shakil Afridi, currently serving 33 years in jail was: “accused of setting up a bogus hepatitis B vaccination campaign in the Abbottabad area to try to pinpoint Bin Laden’s exact location”, via DNA samples which: “were to be tested by the CIA for genetic matches to Bin Laden.”
  • Whilst: “Afridi never succeeded in persuading (people) to give blood, his collaboration with a foreign intelligence service is regarded as an act of treason by Pakistan’s security establishment.” Save The Children which emphatically denied employing or paying Dr Afridi or indeed having a vaccination programme in Abbottabad were nevertheless expelled from Pakistan in September 2012. In spite of denials, internal mails on the dispute obtained by the Center for Investigative Reporting in Pakistan (12) which can be read in full (13) make interesting reading.
  • A relatively recent Save The Children initiative has been to appoint Samantha Cameron, wife of current UK Prime Minister David Cameron as their “Ambassador” for Syria. Since the organization cannot work in Syria, she has brought stories of “innocent childhoods being smashed to pieces” from neighbouring countries. Of course Britain under Cameron is arming and training the Syrian insurgents. (14.) Cameron is a Blair admirer, on record as taking his advice. “Peace Envoy” Blair is on record as enthusiast for another illegal overthrow in Syria with “no regrets” over Iraq.
  • As the fury mounts over Blair’s Award and Christmas approaches, Denis Halliday, former UN Coordinator in Iraq who resigned over the embargo during Blair’s premiership stating that it was “genocide”, reminded me of Christmas 1998 when Blair stood in front of his Christmas tree outside 10 Downing Street and declared that the UK and US were again (illegally of course) bombing Iraq. During this further blitz, Halliday’s successor, Hans von Sponeck, who was also to resign in disgust, was sleeping on the floor in the UN building in Baghdad, with his staff and families, the building was further out of town and seemed safer for those who took rescue. So as Save The Children lauds Blair and trumpets the Rights of the Child, perhaps they should reflect the horror he has wrought. In Iraq one in four surviving children now has stunted physical or intellectual development due to malnutrition. There are an estimated 35,000 infant deaths annually, over a quarter of Iraqi children, three million, suffer post traumatic stress disorder. (War Child: “Mission Unaccomplished”, 2013.)
  •  
    Another "charity" to cross-out from your charitable contributions list of candidates.
6More

The new European 'arc of instability' - RT Op-Edge - 0 views

  • The European Council on Foreign Relations and Berlin think-tank Friedrich Ebert Stiftung have just reached more or less the same conclusion. If the dangerous stand-off between the EU and Russia over Ukraine is not solved, the EU could face, up to 2030, a military build-up in eastern Europe; a new arms race with NATO as a protagonist; and a semi-permanent “zone of instability” from the Baltic to the Balkans and the Black Sea. What these two think-tanks don’t – and won’t – ever acknowledge is that a new European “arc of instability” – from the Baltic to the Black Sea, as myself and other independent analysts have stressed – is exactly what the Empire of Chaos and its weaponized arm – NATO – are working on to prevent closer Eurasia integration. By the way, the Pentagon excels in fabricating “arcs of instability.” The previous one was – and remains – massive, stretching from the Maghreb to Xinjiang in western China across the Middle East and Central Asia.
  • Moscow has totally identified the plot; Foreign Minister Sergey Lavrov, once again, has made it crystal clear, in detail. And crucially, some influential sectors in Germany also did, as in members of the cultural elite destroying the notion of a new war in Europe: “Not in our name.” The same applies to those that always preach more transatlantic cooperation, extol the US’s “defining” role in Germany, and effusively praise Germany as the most American country in Europe; that’s the case of the Frankfurter Allgemeine newspaper – which stands for the core of the political and economic establishment in Germany. It’s still in an embryonic stage, and has not yet made Chancellor Angela Merkel see the light; but a reverse reengineering of Atlanticist relations is already in progress in Germany.
  • Meanwhile, the proverbial group of extremist US senators, plus the notorious poodles/vassals of Britain and Poland, haven’t stopped lobbying to shut Russia off from SWIFT – just as they did with Iran. This would be nothing but yet another declaration of (economic) war – or the economic counterpoint to NATO hysteria. In fairness, a great deal of the EU – especially Germany – knows this is madness. Germany’s top financial paper Handelsblatt recently published a key interview with head of VTB-Bank Andrei Kostin, which has still not been translated into any major English-language paper.
  • ...3 more annotations...
  • Kostin went straight to the point: “Of course, there is a plan B [in the case of Russia being shut off from the SWIFT bank system], but in my personal opinion it would mean war – if this type of sanction will be introduced. America and Europe did that against Iran but with Iran at that time there were no diplomatic relations, only military containment...if Russian banks’ access to SWIFT will be prohibited, the US ambassador to Moscow should leave the same day. Diplomatic relations must be finished. Banking is the most vulnerable part of the Russian economy because the system is based so strongly on the dollar and the euro.” Next May, Russia’s Central Bank is planning to introduce an analogue to SWIFT – after key consultations with China. It’s always important to keep in mind that China set up a parallel SWIFT to do business with Iran under sanctions. But still there will be a window of four months for a lot of nasty things to happen after a Republican-controlled US Senate is empowered in January.
  • And then there’s the golden rule. Why is Russia buying so much gold? With the US dollar forced upward and gold downward, it makes total business sense to sell gas for inflated dollars and then buy cheap depressed gold; that’s what the Chinese call a “win-win.” And of course on both counts, the West loses. The Washington/Wall Street elites are fully aware that both Moscow and Beijing won’t accumulate US dollars anymore. As for the Masters of the Universe plutocrats who manipulate/control the value of the US dollar, a case can be made that one of their purposes is wrecking the US’s industrial base and the nation’s middle classes. Moscow, meanwhile, has adjusted to the new “instability.” The weak ruble has a positive effect – already stressed by President Putin – by forcing Russia to diversify its manufacturing and become more self-sufficient.
  • Of course, the problem remains for Russia to pay the foreign interest on its debt in US dollars. Moscow could always declare a moratorium in debt repayments. The ruble might go down even more. But as everyone from Lukoil to Rosneft converts more US dollars into rubles, that will drive the ruble back up. Not to mention that the ruble is shorted as it stands. The bottom line is that Moscow has learned yet another lesson for the immediate future: never become indebted to the West. What’s certain is that the Empire of Chaos won’t relent in its strategy of heating up the new arc of instability – inside Europe, across the economic/financial spectrum – and instrumentalizing its pre-fabricated New Iron Curtain from the Baltic to the Black Sea. The Kremlin seems to know exactly how high the stakes are. As The Saker told me in an email, “Putin is telling both the West and the Russian people that there is a long war in progress and that the Russian people have to morally be prepared to accept sacrifices for the survival of Russia. This is one more step in the 'coming-out' of what I call the ‘Eurasian Sovereignists’ in which the US [has] now openly declared as a Russophobic (Russia-hating and Russia-fearing) enemy, and the Europeans as a powerless colony. Military power is not directly a factor in this, the internal power balance between the pro-Western ‘Atlantic Integrationists’ and the ‘Eurasian Sovereignists’ is.” It’s all here – from the debacle of a regime (Bretton Woods) to the current, provoked crisis, all brilliantly explained by Mikhail Khazin. Russia is getting ready to rock. Is the West?
10More

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
2More

US Senate wants to know more about the intrusive "dirtboxes" that spy on Americans from... - 0 views

  • Sen. Jon Tester (D-MT) has sent a letter to the Department of Homeland Security and outgoing Attorney General Eric Holder to learn more about the use of “dirtboxes,” which collect phone data by masquerading as a nearby cell tower. The letter, which was co-signed by Democratic and Independent senators from Alaska, Vermont, and other states, argues that dirtboxes “potentially violate the Fourth Amendment and represent a significant intrusion into the private lives of thousands of Americans.” . The senators wrote the letter, which was sent on Wednesday, in response to a Wall Street Journal report about a US Marshals program that attaches these dirtboxes to planes flying across the United States. This reportedly allows law enforcement to collect information about “tens of thousands” of citizens under the planes’ flight path. It’s not clear how often these planes are flown. But it is clear that the devices  can determine someone’s location within a few meters, which could allow law enforcement to tell if that person is in a specific room inside a building, instead of merely knowing their general location. The devices are also thought to be able to snoop on phone calls, text messages, and other information transferred to affected cellphones.
  • Uber dra
4More

The Torture Report and the "Glomar Fig Leaf" | Just Security - 0 views

  • Buried in the SSCI’s report is an arresting passage that suggests that the CIA was quietly releasing information about the torture program to journalists while it was contending in court that release of such information to the public would compromise national security. After the April 15, 2005 National Security Principals Committee meeting, the CIA drafted an extensive document describing the CIA’s Detention and Interrogation Program for an anticipated media campaign.  CIA attorneys, discussing aspects of the campaign involving off-the-record disclosures, cautioned against attributing the information to the CIA itself.  One senior attorney stated that the proposed press briefing was “minimally acceptable, but only if not attributed to a CIA official.”  The CIA attorney continued: “This should be attributed to an ‘official knowledgeable’ about the program (or some similar obfuscation), but should not be attributed to a CIA or intelligence official.”
  • Referring to CIA efforts to deny Freedom of Information Act (FOIA) requests for previously acknowledged information, the attorney noted that, “[o]ur Glomar fig leaf is getting pretty thin.”  Another CIA attorney noted that the draft “makes the [legal] declaration I just wrote about the secrecy of the interrogation program a work of fiction.” The reference to the “Glomar fig leaf” related to an argument the CIA was making in ACLU litigation that was pending before Judge Alvin K.  Hellerstein in the Southern District of New York.  In connection with Freedom of Information Act requests we’d filed in October 2003 and June 2004, we were seeking, among other things, three documents we’d learned of from media reports: the Memorandum of Notification (MON) in which President Bush had authorized the CIA to establish black sites overseas, and two memos in which lawyers from the Office of Legal Counsel had concluded that CIA interrogators could lawfully torture prisoners in their custody.  The CIA responded with a “Glomar” response—it argued that the existence or non-existence of the three documents was a properly classified fact. 
  • As the SSCI report makes clear, CIA lawyers didn’t really believe what the agency was saying in its sworn declarations.  They understood that the sworn declarations the agency was filing in federal court were “work[s] of fiction.”  The agency was telling the courts that nothing could be disclosed about its torture program without compromising national security, but at the same time, it was providing quotations and “facts” to the media in order to persuade the public that its activities were lawful, necessary and effective. If all of this sounds familiar, it’s because the CIA is now doing precisely the same thing with respect to the targeted-killing program. To the courts, the CIA says that any disclosure about the program will gravely compromise national security.  To the media, it supplies a continuous stream of cherry-picked facts meant to cast the program in the most favorable light.
  • ...1 more annotation...
  • The SSCI report makes clear that some CIA lawyers were uncomfortable with the chasm between the agency’s representations to the court in the torture FOIA litigation and the agency’s actual conduct.  According to the SSCI, some CIA lawyers “urged that CIA leadership … ‘confront the inconsistency’ between CIA court declarations ‘about how critical it is to keep this information secret’ and the CIA ‘planning to reveal darn near the entire” program.’” Presumably those lawyers were worried about the possibility that a court would sanction the agency’s declarants; perhaps they were also worried about compliance with their own professional obligations. One wonders whether the CIA’s lawyers are worried about the same things today.
4More

U.S. Stockpiling Fighting Vehicles, Gear in Kuwait Ahead of Anti-ISIS Offensive - US News - 0 views

  • Since June, the U.S. military has been slowly stockpiling massive amounts of its gear coming out of Afghanistan at a depot in Kuwait adjacent to a bustling commercial port, in preparation for ultimately shipping it across the border into Iraq for an allied offensive against the Islamic State group.
  • The gear, primarily from the Army, will be fixed up and held as top U.S. planners in Iraq determine what they’ll need to defeat the Islamic State group in the coming months, says Air Force Maj. Gen. Rowayne “Wayne” Schatz, the director of operations and plans for U.S. Transportation Command. “From June to December, we’ve worked a lot on moving items into Kuwait,” he says. “The Army is holding the gear there, and it has room to hold it, as the mission fleshes out.”
  • “I don’t want to disclose any timelines,” Lt. Gen. James Terry, commander of the Combined Joint Task Force-Operation Inherent Resolve, said during a news conference at the Pentagon. The task force is focusing on supporting, rebuilding and training Iraq's fractured military and National Guard forces to prepare them to take on the vicious extremist army. Terry cited Mosul and Anbar province, along with the cities of Ramadi and Baiji, as key areas his forces will try to wrest away from Islamic State group control.
  •  
    And yes, President Obama promised no American boots on the ground in the "war against ISIL." No American troops will drive those thousands of MRAPS in Iraq or Syria; the vehicles are being fitted with remote control devices and will be driven by CIA personnel stationed in the U.S. who will concurrently operate protective drones. And of course, their target will be ISIL. Mr. Obama has no intention of giving in to Saudi Arabia's demand that the Assad regime be removed first, John Kerry's deal with the Saudis notwithstanding. Fauugh! 
8More

How a false witness helped the CIA make a case for torture | Al Jazeera America - 0 views

  • Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program  — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot. Both the torture program and President Bush's warrantless wiretap program, Stellar Wind, were partly halted from March through June of 2004. That March, Assistant Attorney General Jack Goldsmith prepared to withdraw Pentagon authorization for torture, amid growing concern following the publication of pictures of detainee abuse at Iraq's Abu Ghraib, and a May 2004 CIA inspector general report criticizing a number of aspects of the Agency's interrogation program. On June 4, 2004, CIA Director George Tenet suspended the use of torture techniques.
  • During the same period, the DOJ lawyers who pushed to stop torture were also persuading President George W. Bush to halt aspects of Stellar Wind, a program that conducted warrantless wiretapping of Americans’ communications inside the U.S., on top of the Internet metadata. After a dramatic confrontation in the hospital room of Attorney General John Ashcroft on March 10, 2004, acting Attorney General Jim Comey and Goldsmith informed Bush there was no legal basis for parts of the program. Ultimately, Bush agreed to modify aspects of it, in part by halting the collection of Internet metadata. But even as Bush officials suspended that part of the program on March 26, they quickly set about finding legal cover for its resumption. One way they did so was by pointing to imminent threats — such as a planned election-season attack — in the United States.
  • The CIA in March 2004 received reporting from a source the torture report calls "Asset Y,” who said a known Al-Qaeda associate in Pakistan, Janat Gul — whom CIA at the time believed was a key facilitator — had set up a meeting between Asset Y and Al-Qaeda's finance chief, and was helping plan attacks inside the United States timed to coincide with the November 2004 elections. According to the report, CIA officers immediately expressed doubts about the veracity of the information they’d been given by Asset Y. A senior CIA officer called the report "vague" and "worthless in terms of actionable intelligence." He noted that Al Qaeda had already issued a statement “emphasizing a lack of desire to strike before the U.S. election” and suggested that since Al-Qaeda was aware that “threat reporting causes panic in Washington” and inevitably results in leaks, planting a false claim of an election season attack would be a good way for the network to test whether Asset Y was working for its enemies. Another officer, assigned to the group hunting Osama bin Laden, also expressed doubts. In its rebuttal to the Senate report, the CIA argues the agency was right to take seriously Asset Y’s reporting , in spite of those initial doubts. The CIA wrote numerous reports about the claim “even as we worked to resolve the inconsistencies.” Reports from detainee Hassan Ghul, who was captured in January 2004, supported the possibility that a cell of Al-Qaeda members in Pakistan’s tribal areas might be planning a plot of which he was unaware. And the CIA corroborated other parts of Asset Y's reporting.
  • ...5 more annotations...
  • Still, the CIA had one further reason for doubting claims that Gul was at the center of an Al-Qaeda election-year plot. Ghu told the CIA about an attempt by Gul, in the fall of 2003, to sell anti-aircraft missiles to Al-Qaeda; the Qaeda figure in Ghul’s story didn't even want to work with Gul. And Ghul later learned Gul was probably lying about his ability to acquire the missiles.
  • Nevertheless, the CIA took seriously Asset Y’s claim that Gul was involved in an election plot and moved quickly to gain custody of him after his arrest by Pakistan in June 2004. Even before CIA rendered Gul to its custody, Tenet started lobbying to get torture techniques reapproved for his interrogation. On June 29, Tenet wrote National Security Adviser Condoleezza Rice seeking approval to once again use some of the techniques whose use he suspended less than four weeks earlier, in the hope of gathering information on the election season plot. "Given the magnitude of the danger posed by the pre-election plot and Gul's almost certain knowledge of any intelligence about that plot” Tenet wrote, relying on Asset Y's claims, “I request the fastest possible resolution of the above issues." On July 20, according to the report, top administration officials gave CIA verbal approval to get back into the torture business. Ashcroft stated that most previously approved interrogation techniques would not violate U.S. law on July 22 (though not waterboarding). And by the end of July, CIA started coaxing DOJ to approve other techniques — such as slapping someone in the stomach or hosing them down with cold water or limiting their food — which had already been used by the CIA but never officially approved by DOJ.
  • At the same time, the government was also using the ostensible election-season plot, among others, to persuade the Foreign Intelligence Surveillance Court (FISC) – the secret court that approves domestic spying on Americans – to authorize the Internet dragnet. After Bush halted the Internet dragnet on March 26, his aides began working with FISC presiding judge Colleen Kollar-Kotelly to find a way to use FISA authority -- normally been used to access records for a single phone or Internet account -- to collect Internet metadata in bulk. They provided a series of briefings, including one attended by Terrorist Threat Integration Center head John Brennan and CIA Director George Tenet, to explain the threat. In addition, they provided what – under Stellar Wind – analysts called a “scary memo,” summarizing all the threats facing the country to underscore the urgency of the program. Tenet's declaration included as an appendix to an application submitted in the days before July 14, 2004, laid out the threats CIA and others were fighting that summer.
  • Judge Kollar-Kotelly invoked Tenet's material in a redacted section of her opinion authorizing the phone dragnet, pointing to it as a key reason to permit collection of what she called “enormous” amounts of data from innocent Americans.
  • Soon after the reauthorization of the torture and the Internet dragnet, the CIA realized ASSET Y's story wasn't true. By September, an officer involved in Janat Gul's interrogation observed, “we lack credible information that ties him to pre-election threat information or direct operational planning against the United States, at home or abroad.” In October, CIA reassessed ASSET Y, and found him to be deceptive. When pressured, ASSET Y admitted had had made up the story of a meeting set up by Gul. ASSET Y blamed his CIA handler for pressuring him for intelligence, leading him to lie about the meeting. By 2005, CIA had concluded that ASSET Y was a fabricator, and Janat Gul was a “rather poorly educated village man [who is] quite lazy [who] was looking to make some easy money for little work and he was easily persuaded to move people and run errands for folks on our target list” (though the Agency wasn't always forthright about the judgment to DOJ). The torture program, which was resumed in part because of a perceived urgency of extracting information from Gul on a plot that didn't exist, continued for several more years. The Internet dragnet continued under FISC authorization, on and off, until December 2011. And several other still active NSA programs, including the phone dragnet, relied on Kollar-Kotelly's earlier authorization as precedents – the case for which had also been derived, in part, from one long discredited fabricator.
« First ‹ Previous 261 - 280 of 361 Next › Last »
Showing 20 items per page