Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "publishers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Edward Snowden's Father Speaks | News | Philadelphia Magazine - 0 views

  • In the course of reporting on John and Bonnie Raines for our January issue, writer-at-large Steve Volk spoke with a source who had a uniquely personal take on the plight of whistle-blowers — Edward Snowden’s father, retired U.S. Coast Guard chief warrant officer Lon Snowden. Lon appreciated how John and Bonnie’s story parallels his son’s, and agreed to share his perspective with Philadelphia magazine. With his permission, published for the first time here is Lon Snowden’s essay — a father speaking in his own words about the controversial and historic actions of his son; fellow activists separated by decades but united in their belief in a better government; and the price paid for exposing national secrets to the public.
  •  
    Ed Snowden's father delivers a powerful essay on what happened to his son. It's a must-read
9More

Secret US cybersecurity report: encryption vital to protect private data | US news | Th... - 0 views

  • A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.
  • In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access. Cameron, who landed in the US on Thursday night, is expected to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.
  • Cameron said the companies “need to work with us. They need also to demonstrate, which they do, that they have a social responsibility to fight the battle against terrorism. We shouldn’t allow safe spaces for terrorists to communicate. That’s a huge challenge but that’s certainly the right principle”. But the document from the US National Intelligence Council, which reports directly to the US director of national intelligence, made clear that encryption was the “best defence” for computer users to protect private data. Part of the cache given to the Guardian by Snowden was published in 2009 and gives a five-year forecast on the “global cyber threat to the US information infrastructure”. It covers communications, commercial and financial networks, and government and critical infrastructure systems. It was shared with GCHQ and made available to the agency’s staff through its intranet.
  • ...6 more annotations...
  • An unclassified table accompanying the report states that encryption is the “[b]est defense to protect data”, especially if made particularly strong through “multi-factor authentication” – similar to two-step verification used by Google and others for email – or biometrics. These measures remain all but impossible to crack, even for GCHQ and the NSA. The report warned: “Almost all current and potential adversaries – nations, criminal groups, terrorists, and individual hackers – now have the capability to exploit, and in some cases attack, unclassified access-controlled US and allied information systems.” It further noted that the “scale of detected compromises indicates organisations should assume that any controlled but unclassified networks of intelligence, operational or commercial value directly accessible from the internet are already potentially compromised by foreign adversaries”.
  • The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded. Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
  • The previous week, a day after the attack on the Charlie Hebdo office in Paris, the MI5 chief, Andrew Parker, called for new powers and warned that new technologies were making it harder to track extremists. In November, the head of GCHQ, Robert Hannigan, said US social media giants had become the “networks of choice” for terrorists. Chris Soghoian, principal senior policy analyst at the American Civil Liberties Union, said attempts by the British government to force US companies to weaken encryption faced many hurdles.
  • The Guardian, New York Times and ProPublica have previously reported the intelligence agencies’ broad efforts to undermine encryption and exploit rather than reveal vulnerabilities. This prompted Obama’s NSA review panel to warn that the agency’s conflicting missions caused problems, and so recommend that its cyber-security responsibilities be removed to prevent future issues.
  • The memo requested a renewal of the legal warrant allowing GCHQ to “modify” commercial software in violation of licensing agreements. The document cites examples of software the agency had hacked, including commonly used software to run web forums, and website administration tools. Such software are widely used by companies and individuals around the world. The document also said the agency had developed “capability against Cisco routers”, which would “allow us to re-route selected traffic across international links towards GCHQ’s passive collection systems”. GCHQ had also been working to “exploit” the anti-virus software Kaspersky, the document said. The report contained no information on the nature of the vulnerabilities found by the agency.
  • Michael Beckerman, president and CEO of the Internet Association, a lobby group that represents Facebook, Google, Reddit, Twitter, Yahoo and other tech companies, said: “Just as governments have a duty to protect to the public from threats, internet services have a duty to our users to ensure the security and privacy of their data. That’s why internet services have been increasing encryption security.”
4More

If the Supreme Court tackles the NSA in 2015, it'll be one of these five cases | Ars Te... - 0 views

  • Roughly a year and a half since the first Snowden disclosures, there's already been a judicial order to shut down the National Security Agency's bulk metadata collection program. The lawsuit filed by Larry Klayman, a veteran conservative activist, would essentially put a stop to unchecked NSA surveillance. And at the start of 2015, he remains the only plaintiff whose case has won when fighting for privacy against the newly understood government monitoring. However, it's currently a victory in name only—the judicial order in Klayman was stayed pending the government’s appeal.
  • Klayman v. Obama is only one of a number of notable national security and surveillance-related civil and criminal cases stemming fully or partially from the Snowden documents. In 2014, a handful of these advanced far enough through the legal system that 2015 is likely to be a big year for privacy policy. One or more could even end up before the Supreme Court. "I think it's impossible to tell which case will be the one that does it, but I believe that, ultimately, the Supreme Court will have to step in and decide the constitutionality of some of the NSA's practices," Mark Rumold, an attorney with the Electronic Frontier Foundation, told Ars. Rumold is one of the attorneys in First Unitarian Church, a case that is challenging government surveillance much like Klayman. Along with that pair, headline watchers should set alerts for cases such as American Civil Liberties Union (ACLU) v. Clapper, United States v. Moalin, and United States v. Muhtorov. Not only are there several other related cases that will likely be influenced by these decisions, but those five cases represent the strongest and most direct legal challenges to the current NSA surveillance state.
  • Before outlining the relevant cases, it's important to note the government's general justification for the legality of bulk metadata collection: the third-party doctrine. This theory was codified most recently from a 1979 Supreme Court decision in Smith v. Maryland. In the case, the court found that individuals do not have an inherent privacy right to data that has already been disclosed to a third party. So with telecom data for instance, the government has posited that because a call from one person to another forcibly transits Verizon’s network, those two parties have already shared that data with Verizon. Therefore, the government argues, such data can't be private, and it’s OK to collect it. But legal experts say that recent surveillance and privacy Supreme Court decisions could lead the courts to reconsider. The first Snowden revelation (published in June 2013) was that Verizon (and presumably other telecom firms) are routinely handing over all call records to the NSA. The metadata records include the date, times, and lengths of the calls.
  •  
    Joe Mullins does an excellent job of outlining the major pending cases that challenge NSA surveillance of U.S. citizens and the state of relevant case law.  At least one of those cases is likely to arrive in the Supreme Court during 2015. 
7More

Jordan hanged Two and vows to avenge Fate of Air Force Pilot: Intelligence? | nsnbc int... - 0 views

  • The Jordanian Armed Forces announced that they would avenge the murder of ISIS hostages, including the captured Jordanian pilot Moaz al-Kasasbeh. At dawn, Jordanian authorities hanged the two terrorism convicts Sajida al-Rishawi and Ziad al-Karbouli. The issue underpins questions about Jordan’s role as central player in the war on Syria and Iraq and the role and function of the so-called Islamic State. The hangings of al-Risawi and Ziad al-Karboui were carried out at 4.00 am local time. Both terrorism convicts, including the female would-be suicide bomber Sajida al-Rishawi whose release was demanded in videos and audios allegedly published by ISIS, were linked to Al-Qaeda in Iraq, which eventually was re-branded as ISIS/, a.k.a. ISIL, Daesh or Islamic State.
  • The executions were carried out after a video, allegedly disseminated by ISIS, that featured Jordanian pilot Moaz al-Kasasbeh being burned alive in a cage. Jordanian authorities, including the Royal Court and the Armed Forces of Jordan promised “a swift and lethal response” to the murder of the Jordanian pilot.
  • While there is little doubt about the tragic execution of the Jordanian pilot, there are serious questions about Jordan’s role as key player in the war on Syria since 2011 and subsequently, the war on Iraq.
  • ...4 more annotations...
  • ronically, Jordan has provided one of the main staging theaters for “Al-Qaeda” and Muslim Brotherhood linked, foreign funded and armed mercenary brigades since the onset of the war on Syria.
  • Especially the region around the town of al-Mafraq and the Ramtha Air Base in Jordan are notorious for their function as training and staging facilities for terrorist brigades, as well as for the presence of Saudi, Turkish, NATO and U.S. intelligence services, special forces, as well as liaisons between the terrorist brigades on the ground and civilian as well as military intelligence services.
  • Both the city of Al-Mafraq and the Ramtha Air Base have been used as staging theater for the 2012 invasion of Syria by the about 20,000 strong, so-called, Libyan Brigade. The brigade had been assembled by the so-called Libyan Islamic Fighting Group, whose leader, Abdelhakim Belhadj was promoted to become the head of the Tripoli Military Council after the US/Turkish/Qatari/Saudi/Israeli/NATO supported ousting of the Libyan government in 2011.
  • The Libyan Brigade was led by the Irish-Libyan national Mahdi Al-Harati, the Libyan Islamic Fighting Group’s second in command. Both Abdelhakim Belhadj and Mahdi al-Harati have been implicated in cooperation with British, U.S. and NATO intelligence. ISIS, for its part, has its origin in the so-called Al-Qaedea in Iraq. The organization has had ties to Saudi Arabian and western intelligence services since it’s origin. A person from within the inner circle around former Lebanese PM Saad Hariri held a personal meeting with nsnbc editor-in-chief Christof Lehmann and disclosed that the final decision to invade Iraq with “ISIS” was made on the sidelines of the Atlantic Council’s Energy Summit in Turkey, in November 2013, and that the U.S. Embassy functions as coordination and command post for the war on the, depending on utility, friend or foe known as ISIS.
6More

Explosive Saudi 9/11 Evidence Still Ignored By Media - WhoWhatWhy - 0 views

  • The Times goes on to say that Moussaoui’s testimony, if found to be factually accurate, could change our understanding of Saudi Arabia and its relationship to 9/11: [T]he extent and nature of Saudi involvement in Al Qaeda, and whether it extended to the planning and financing of the Sept. 11 attacks, has long been a subject of dispute. *** That may be so, but the Times, like the rest of the traditional media, has ignored earlier evidence of deep Saudi royal ties to the 9/11 attacks—evidence that isn’t dependent on a man whose sanity has been questioned. Back in 2011, a small non-profit news outfit in South Florida, the Broward Bulldog, which does primarily local stories, published an article that also appeared in a major traditional newspaper, the Miami Herald. Despite the story’s explosive content, it was widely ignored.
  • That article revealed that a well-heeled Saudi family, living in a gated community in Sarasota, Florida, had direct connections to the hijackers. Phone records documented communication, dating back more than a year, between this Saudi family and the alleged plot leader, Mohammed Atta, his hijack pilots and 11 of the other hijackers. In addition, records from the guard house at the gated community showed Atta and other hijackers had visited the house.
  • The family left the country abruptly just before the 9/11 attacks. Family members abandoned enough valuable possessions—such as three cars—to testify to the speed of their departure. The article also revealed that the FBI had quietly investigated the family and documented numerous interactions between them and the alleged hijackers. They, however, neglected to tell Congressional investigators and the evidence didn’t appear in the 9/11 Commission Report. You might think these revelations would attract widespread attention, considering that 15 of the 19 purported hijackers were Saudi citizens. Yet the Bulldog story generated barely a blip.
  • ...3 more annotations...
  • Next, our small non-profit news outfit, WhoWhatWhy, which covers primarily international and national investigative stories, took the reporting to another level. Our story established that the owner of the house, Esam Ghazzawi, was a direct lieutenant to a powerful member of the Saudi royal family who’d learned to fly in Florida years earlier. Ghazzawi was director of the UK division of EIRAD Trading and Contracting Co. Ltd., which among other things, holds the Saudi franchise for many multinational brands including UPS. Ghazzawi’s boss, the chairman of EIRAD Holding Co. Ltd., is Prince Sultan bin Salman bin Abdul Aziz Al-Saud.
  • A fighter pilot who also flew on a Space Shuttle mission, Prince Sultan is the son of the new Saudi king, Salman. WhoWhatWhy’s reporting raised serious questions about whether high-ranking Saudis were directly involved with the 9/11 operation, and whether the U.S. government covered up what it knew. WhoWhatWhy paid a major news distribution outfit to send our story to thousands of news outlets, major and minor, in the United States. Again, the silence was deafening. *** The debate about Moussaoui’s newly released testimony centers on whether he can be trusted. But there is no debate about the Sarasota evidence we uncovered. We’re still waiting for the Times, along with the rest of the mainstream media, to acknowledge that material. Whatever happened in Florida, whatever the veracity of Moussaoui’s claims, anyone with an open mind will smell enough smoke to wonder whose interests are being served by pretending there’s no fire in the Saudi-9/11 connection.
  • For more on the Bush family’s relationship to the Saudi royal family, see Russ Baker’s book, Family of Secrets.
5More

Britons loathe Israel more than Iran, survey finds | The Times of Israel - 0 views

  • ritons feel more “unfavorable” to Israel than any other country worldwide except North Korea, a survey found.
  • The survey — taken in August and published Thursday by Chatham House, the Royal Institute of International Affairs — showed a massive surge in negative attitudes toward Israel since the previous such study, two years earlier. Thirty-five percent of Britons said they “feel especially unfavorable towards” Israel in the 2014 survey, compared to 17% in 2012.
  • That figure meant that Israel is regarded more unfavorably by Britons than Iran — 33% in the 2014 survey, compared to 45% in 2012. Only North Korea fares worse — regarded as especially unfavorable by 47% in 2014, compared to 40% in 2012. Commenting on the dramatic rise in hostile attitudes to Israel, the compilers noted that, “The survey was conducted in August 2014 at a time when … Israel was engaged in a military operation in Gaza against Hamas that caused large numbers of civilian casualties.”
  • ...1 more annotation...
  • In a section summing up Britons’ attitudes to nations outside Europe, the authors noted that “North Korea is viewed most unfavorably (47%), followed by Israel (35%). The number of those viewing Israel unfavorably has increased by 18 points since 2012, presumably in response to the controversial military campaign in Gaza and the civilian casualties it caused, which were prominent in the news at the time the survey was conducted. Iran (33%) is the third most unfavorably viewed country, though its rating is down by 12 points compared with 2012. Pakistan (28%) and Nigeria (21%) complete the top five. The Chatham House study — entitled “Internationalism or Isolationism? British Attitudes Towards the UK’s International Priorities” – was based on a YouGov poll in August which questioned a representative sample of 2,059 adults.
  •  
    While the numbers might vary, I strongly suspect that there's been a similar shift of opinion in the U.S., driven by mainstream media's decision to cover Israel's brutal incursion into Gaza last summer from within Gaza. 
4More

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
6More

Proposed changes to US data collection fall short of NSA reformers' goals | US news | T... - 0 views

  • The US intelligence community has delivered a limited list of tweaks to how long it can hold information on ordinary citizens and hide secret trawls for data, responding to Barack Obama’s call for reform of its surveillance practices in the wake of revelations about NSA practices. Published by the office of the director of national intelligence, James Clapper, just six days before a recently announced visit to Washington by the German chancellor, Angela Merkel, the report is the culmination of a year-long effort to respond to revelations by whistleblower Edward Snowden.
  • But the report does not appear to address the role of telecommunications companies in collecting metadata and the use of encryption to prevent hacking, and privacy critics were quick to pounce on a year of promises with little reform to show. “It’s hard to see much ‘there’ there,” Senator Ron Wyden said in a statement. “When it comes to reforming intelligence programs and protecting Americans’ privacy, there is much, much more work to be done.” The outline from the intelligence community also appears to fall short of the legislative changes attempted by campaigners in Congress, focusing instead on measures to tighten internal guidelines and provide foreigners with some of the protections allowed for US citizens. These measures include:
  • Limiting how long personal data gathered from non-US citizens can be held to five years, so long as it is deemed not relevant to ongoing intelligence investigations. Asking Congress to provide some foreign nationals access to legal redress if their private information has been wilfully disclosed by US intelligence agencies. Limiting to three years how long the FBI can prevent disclosure of its surveillance activities using so-called national security letters, unless a special agent deems otherwise.
  • ...3 more annotations...
  • The official results of Obama’s call for surveillance reform also appear to have failed to address encryption. The FBI director, James Comey, and other officials have been highly critical of the use of encryption by tech companies such as Apple to protect their users’ information. Comey has argued that stronger encryption, baked in to some technology after the Snowden revelations, will aid criminals and terrorists and shut out law enforcement.
  • Other measures outlined in the new report include steps to clarify the protection given to whistleblowers if they follow internal rules and a requirement that “any significant compliance incident involving personal information, regardless of the person’s nationality” be reported to Clapper.
  • The intelligence report itself acknowledges that further reforms called for by the president, such as ending the collection of bulk data by the government, have not been implemented, possibly due to stalled legislative efforts in Congress.
4More

Sen. Menendez Top Recipient of MEK-Related Campaign Funding « LobeLog - 0 views

  • As readers of this blog already know, Sen. Robert Menendez (D-NJ) was the top congressional recipient of “pro-Israel” campaign funding in the 2012 election cycle, the last time he ran for office, according to the Center for Responsive Politics. He has since distinguished himself as the leading proponent among Senate’s Democrats of new sanctions against Iran. He has repeatedly co-sponsored sanctions legislation—with Mark Kirk (R-IL), the top recipient of pro-Israel campaign funding for the past decade—with the ostensible purpose of increasing pressure on Tehran to make far-reaching concessions at the negotiating table. It appears that Menendez has also been the top recipient of campaign funding from donors with ties to the Mojahedin-e Khalq (MeK), the cultish group that was until recently included on the State Department’s terrorism list, according to a new investigative report published Thursday by LobeLog alumni and occasional contributors Ali Gharib and Eli Clifton on The Intercept website. The article, “Long March of the Yellow Jackets: How a One-Time Terrorist Group Prevailed on Capitol Hill,” details how Menendez, then chairman of the Senate Foreign Relations Committee, maintained a hold for some six months—from July 2013 until late January 2014—on an arms package for the Iraqi government that included 24 Apache helicopters. Menendez explained publicly that he was concerned about then-Iraqi Prime Minister Nouri al-Maliki’s record of attacks against civilians and his tacitly allowing Iran to use Iraqi airspace to transport weapons to Syria.
  • But Ali and Eli cite sources that cumulatively suggest that Menendez’s position may have been influenced by intense lobbying on the part of pro-MeK individuals, including the lobbyist for one of the MeK’s political fronts and Menendez’s immediate predecessor, Robert Torricelli. Menendez finally lifted his hold after the Islamic State of Iraq and the Levant (ISIL) launched their first major offensive into al-Anbar province from bases along the Syrian-Iraqi border, taking Fallujah and most of Ramadi.
  • According to the article,Menendez accepted more than $25,000 from donors with ties to the MEK, making him the largest recipient from 2012, when the MeK was delisted that September, to the present. That’s not much compared to the well over $300,000 Menendez received from pro-Israel groups during the 2012 election cycle, but it was more than twice what was provided to the next biggest recipients, Sen. John McCain (R-AZ) and Rep. Dana Rohrabacher (R-CA). In any event, the article casts light on the seamier side of the politics around Iran, and it’s a good read besides.
  •  
    MEK has a long history of serving as the "source" of forged documents Mossad wishes to place into circulation that purport to paint Iran as untrustworthy, e.g., the documents that say Iran used to have a nuclear weapons program. 
4More

No, Obama, Russia's Economy Isn't 'in Tatters' - Bloomberg View - 0 views

  • Western politicians and pundits should be more careful with their predictions for the Russian economy: Reports of its demise may prove to be premature. Bashing the Russian economy has lately become a popular pastime. In his state of the nation address last month, U.S. President Barack Obama said it was "in tatters." And yesterday, Anders Aslund of the Peterson Institute for International Economics published an article predicting a 10 percent drop in gross domestic product this year -- more or less in line with the apocalyptic predictions that prevailed when the oil price reached its nadir late last year and the ruble was in free fall. Aslund's forecast focuses on Russia's shrinking currency reserves, some of which have been earmarked for supporting government spending in difficult times. At $364.6 billion, they are down 26 percent from a year ago and $21.6 billion from the beginning of this year. Aslund expects $166 billion to be spent on infrastructure investments and bailing out companies, and another $100 billion to exit via capital flight and other currency outflows. As a result, given foreign debts of almost $600 billion, "Russia's reserve situation is approaching a critical limit," he says.
  • What this argument ignores is that Russia's foreign debts are declining along with its reserves -- that's what happens when the money is used to pay down state companies' obligations. Last year, for example, the combined foreign liabilities of the Russian government and companies dropped by $129.4 billion, compared with a $124.3 billion decline in foreign reserves. Beyond that, a large portion of Russian companies' remaining foreign debt is really part of a tax-evasion scheme: By lending themselves money from abroad, the companies transfer profits to lower-tax jurisdictions. Such loans can easily be extended if sanctions prevent the Russian side from paying. The declining price of oil is also less of a threat than many have warned. True, the Russian government's revenues from energy exports will fall in dollar terms. But because Russia's central bank has allowed the ruble's value against the dollar to decline, the ruble value of the revenues will be higher than they otherwise would be. As a result, Russia no longer requires $100 oil to balance its budget -- and the effect of lower oil prices on the broader economy will be muted.
  • Economists at the respected Gaidar Institute, for example, expect the floating of the ruble to roughly halve the negative GDP impact of the decline in oil prices. They estimate that Russian GDP will shrink by a moderate 2.7 percent this year, even if Brent oil trades at $40 (it traded at $61 today). That's just a bit more optimistic than the consensus among 39 economists polled by Bloomberg between Feb. 20 and Feb. 25: On average, they see a decline of 4 percent. Economic sanctions, which most forecasts assume will continue this year, are having less impact that many in the West would like to believe. Sergei Tsukhlo of the Gaidar Institute estimates that the sanctions have affected only 6 percent of Russian industrial enterprises. "Their effect remains quite insignificant despite all that's being said about them," he wrote, noting that trade disruptions with Ukraine have been more important.
  • ...1 more annotation...
  • Granted, there's no avoiding a significant drop in Russians' living standards because of accelerating inflation. The economics ministry in Moscow predicts real wages will fall by 9 percent this year -- which, Aslund wrote, means that "for the first time after 15 years in power," Russian President Vladimir Putin "will have to face a majority of the Russian people experiencing a sharply declining standard of living." So far, though, Russians have taken the initial shock of devaluation and accompanying inflation largely in stride. The latest poll from the independent Levada Center, conducted between Feb. 20 and Feb. 23, actually shows an uptick in Putin's approval rating -- to 86 percent from 85 percent in January.  It's time to bury the expectation that Russia will fall apart economically under pressure from falling oil prices and economic sanctions, and that Russians, angered by a drop in their living standards, will rise up and sweep Putin out of office. Western powers face a tough choice: Settle for a lengthy siege and ratchet up the sanctions despite the progress in Ukraine, or start looking for ways to restart dialogue with Russia, a country that just won't go away.
1More

Colluders in Crude: The Oily Politics of How the Obama Administration Sided with BP Ove... - 0 views

  • The explosion and sinking of the Deepwater Horizon oil rig on April 21, 2010,  was the largest accidental marine oil spill in the history of the petroleum industry. The resulting devastation to human health and the environment continues to this day. A new Florida State University study, published on Jan. 20 in the journal Environmental Science & Technology, reports that up to 10 million gallons of crude oil “missing” from the spill settled at the bottom of the Gulf of Mexico, imperiling wildlife and marine ecosystems. Stuart H. Smith, an environmental plaintiff attorney who served as lead counsel on more than 100 oil pollution cases and has won major litigation against oil giants Chevron and ExxonMobil, came to represent thousands of claimants against BP. He saw from the inside how BP and the American government really responded to the crisis. This article is adapted from his book, Crude Justice: How I Fought Big Oil and Won, and What You Should Know about the New Environmental Attack on America (BenBella Books, 2015). 
5More

U.S. Syria strategy falters with collapse of rebel group | Reuters - 0 views

  • (Reuters) - The Hazzm movement was once central to a covert CIA operation to arm Syrian rebels, but the group's collapse last week underlines the failure of efforts to unify Arab and Western support for mainstream insurgents fighting the Syrian military. A blow to U.S. moves to aid rebels, the dissolution of Hazzm also highlights the risks that a new Department of Defense program could face in training and equipping fighters in Jordan, Turkey and Qatar.U.S. officials plan to train thousands of Syrian rebels over three years. The program is expected to begin this month in Jordan and focuses on battling the hardline Islamic State group rather than President Bashar al-Assad.Hazzm's collapse has shown how such efforts will prove difficult in a country where insurgents often battle each other and arms have fallen into the hands of hardline groups.
  • (Reuters) - The Hazzm movement was once central to a covert CIA operation to arm Syrian rebels, but the group's collapse last week underlines the failure of efforts to unify Arab and Western support for mainstream insurgents fighting the Syrian military. A blow to U.S. moves to aid rebels, the dissolution of Hazzm also highlights the risks that a new Department of Defense program could face in training and equipping fighters in Jordan, Turkey and Qatar.U.S. officials plan to train thousands of Syrian rebels over three years. The program is expected to begin this month in Jordan and focuses on battling the hardline Islamic State group rather than President Bashar al-Assad.Hazzm's collapse has shown how such efforts will prove difficult in a country where insurgents often battle each other and arms have fallen into the hands of hardline groups.
  • Reuters could not authenticate the photographs but the head of the Syrian Observatory for Human Rights, Rami Abdulrahman, said many arms had been seized, including 60 to 90 TOW anti-tank missiles.Hazzm members did not respond to requests for comment or were not reachable. The group once claimed to be the main recipient of the secret U.S.-led operation supporting rebels in the north. It numbered 1,200-1,500 last year, Abdulrahman said.It was set up in January 2014 and came under a body known as MOM, which was used to funnel resources to rebels in an attempt to coordinate funding. Money has poured into northern Syria from Gulf Arab states including Saudi Arabia and Qatar, much of it going to Islamist fighters, including hardliners. "The United States was never particularly serious in its support for the MOM, and coordination among the United States and other state backers broke down," said Noah Bonsey, a senior Syria analyst at the International Crisis Group. "The defeat of Hazzm is the latest indication of the MOM's failure in the north," he said.
  • ...2 more annotations...
  • An onslaught by al Qaeda's Syria wing, the Nusra Front, last week forced Hazzm into dissolution, its members swallowed by Jabhat al-Shamiyya, a mainly Islamist alliance. It was the second time in four months that Nusra had crushed a Western-backed rebel group.Nusra is now considering cutting its ties with al Qaeda in a rebranding exercise backed by Qatar and some other Gulf states that will bring in more funds, sources say.On Tuesday, Nusra followers published photographs on Twitter of what they said were U.S. weapons, including anti-tank missiles, seized in battles with opposition brigades.
  • State Department spokeswoman Marie Harf said Hazzm had received non-lethal U.S. assistance. Washington has never acknowledged the CIA program.The group's demise "will have an impact on the moderate opposition's capabilities in the north," Harf said.The group had shrunk to about 400 fighters last month after killings, desertions and arrests, the Observatory's Abdulrahman said. "They are now finished, like sugar in tea."
4More

General says U.S. will 'consider' saving Iraqi antiquities being destroyed by the Islam... - 0 views

  • The Islamic State's destruction of cultural antiquities in Iraq has stepped up a notch recently, with members of the extremist group both bulldozing the 3,000-year-old Nimrud archaeological site near Mosul and ransacking the similarly ancient ruins of Hatra in the past few days. Now, the United States' top military officer has said the U.S.-led coalition against the Islamic State would "consider" intervening to protect such sites. But Gen. Martin Dempsey stopped far short of any promises – and added that any action would have to "fit into the priority of all the other things we're being asked to do on behalf of Iraq." Dempsey – who was on a day-long visit to Baghdad, Iraq, during which he was joined by reporters including The Post's Missy Ryan – made his remarks after Iraq's antiquities ministry acknowledged reports of a third attack, on the ancient city of Dur Sharrukin, and called on the international community to intervene to stop the Islamic State from  “erasing the history of humanity.”
  • “We have warned previously and warn now that these gangs with their sick, takfiri ideology will continue to destroy and steal artifacts as long as there is no strong deterrent, and we still await a strong international stand to stop the crimes of Daesh that are targeting the memory of humanity," the ministry said in a statement published by the Guardian, using the Arabic acronym for the group. Separately, Iraqi Tourism and Antiquities Minister Adel Shirshab told reporters that only the U.S.-led coalition had the power to protect these sites. "Our airspace is not in our hands. It's in their hands," Shirshab said on Sunday, according to Reuters, alleging that coalition aircraft could have monitored attacks on archaeological sites and prevented them.
  • The U.S. government is well aware of the threat to antiquities posed by ongoing violence in Iraq and Syria – last year, the U.S. Department of State and the American Schools of Oriental Research (ASOR) signed a deal to document that damage caused to Syria's cultural heritage sites. There have also been a number of internal attempts in Iraq and Syria to defend sites that might be at risk, including the covert work of a group of preservationists dubbed modern-day "Monuments Men."
  •  
    The U.S. excuse to ramp up operations in Iraq and Syria?
12More

Most Agencies Falling Short on Mandate for Online Records - 0 views

  • Nearly 20 years after Congress passed the Electronic Freedom of Information Act Amendments (E-FOIA), only 40 percent of agencies have followed the law's instruction for systematic posting of records released through FOIA in their electronic reading rooms, according to a new FOIA Audit released today by the National Security Archive at www.nsarchive.org to mark Sunshine Week. The Archive team audited all federal agencies with Chief FOIA Officers as well as agency components that handle more than 500 FOIA requests a year — 165 federal offices in all — and found only 67 with online libraries populated with significant numbers of released FOIA documents and regularly updated.
  • Congress called on agencies to embrace disclosure and the digital era nearly two decades ago, with the passage of the 1996 "E-FOIA" amendments. The law mandated that agencies post key sets of records online, provide citizens with detailed guidance on making FOIA requests, and use new information technology to post online proactively records of significant public interest, including those already processed in response to FOIA requests and "likely to become the subject of subsequent requests." Congress believed then, and openness advocates know now, that this kind of proactive disclosure, publishing online the results of FOIA requests as well as agency records that might be requested in the future, is the only tenable solution to FOIA backlogs and delays. Thus the National Security Archive chose to focus on the e-reading rooms of agencies in its latest audit. Even though the majority of federal agencies have not yet embraced proactive disclosure of their FOIA releases, the Archive E-FOIA Audit did find that some real "E-Stars" exist within the federal government, serving as examples to lagging agencies that technology can be harnessed to create state-of-the art FOIA platforms. Unfortunately, our audit also found "E-Delinquents" whose abysmal web performance recalls the teletype era.
  • E-Delinquents include the Office of Science and Technology Policy at the White House, which, despite being mandated to advise the President on technology policy, does not embrace 21st century practices by posting any frequently requested records online. Another E-Delinquent, the Drug Enforcement Administration, insults its website's viewers by claiming that it "does not maintain records appropriate for FOIA Library at this time."
  • ...9 more annotations...
  • "The presumption of openness requires the presumption of posting," said Archive director Tom Blanton. "For the new generation, if it's not online, it does not exist." The National Security Archive has conducted fourteen FOIA Audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  • The federal government has made some progress moving into the digital era. The National Security Archive's last E-FOIA Audit in 2007, " File Not Found," reported that only one in five federal agencies had put online all of the specific requirements mentioned in the E-FOIA amendments, such as guidance on making requests, contact information, and processing regulations. The new E-FOIA Audit finds the number of agencies that have checked those boxes is now much higher — 100 out of 165 — though many (66 in 165) have posted just the bare minimum, especially when posting FOIA responses. An additional 33 agencies even now do not post these types of records at all, clearly thwarting the law's intent.
  • The FOIAonline Members (Department of Commerce, Environmental Protection Agency, Federal Labor Relations Authority, Merit Systems Protection Board, National Archives and Records Administration, Pension Benefit Guaranty Corporation, Department of the Navy, General Services Administration, Small Business Administration, U.S. Citizenship and Immigration Services, and Federal Communications Commission) won their "E-Star" by making past requests and releases searchable via FOIAonline. FOIAonline also allows users to submit their FOIA requests digitally.
  • THE E-DELINQUENTS: WORST OVERALL AGENCIES In alphabetical order
  • Key Findings
  • Excuses Agencies Give for Poor E-Performance
  • Justice Department guidance undermines the statute. Currently, the FOIA stipulates that documents "likely to become the subject of subsequent requests" must be posted by agencies somewhere in their electronic reading rooms. The Department of Justice's Office of Information Policy defines these records as "frequently requested records… or those which have been released three or more times to FOIA requesters." Of course, it is time-consuming for agencies to develop a system that keeps track of how often a record has been released, which is in part why agencies rarely do so and are often in breach of the law. Troublingly, both the current House and Senate FOIA bills include language that codifies the instructions from the Department of Justice. The National Security Archive believes the addition of this "three or more times" language actually harms the intent of the Freedom of Information Act as it will give agencies an easy excuse ("not requested three times yet!") not to proactively post documents that agency FOIA offices have already spent time, money, and energy processing. We have formally suggested alternate language requiring that agencies generally post "all records, regardless of form or format that have been released in response to a FOIA request."
  • Disabilities Compliance. Despite the E-FOIA Act, many government agencies do not embrace the idea of posting their FOIA responses online. The most common reason agencies give is that it is difficult to post documents in a format that complies with the Americans with Disabilities Act, also referred to as being "508 compliant," and the 1998 Amendments to the Rehabilitation Act that require federal agencies "to make their electronic and information technology (EIT) accessible to people with disabilities." E-Star agencies, however, have proven that 508 compliance is no barrier when the agency has a will to post. All documents posted on FOIAonline are 508 compliant, as are the documents posted by the Department of Defense and the Department of State. In fact, every document created electronically by the US government after 1998 should already be 508 compliant. Even old paper records that are scanned to be processed through FOIA can be made 508 compliant with just a few clicks in Adobe Acrobat, according to this Department of Homeland Security guide (essentially OCRing the text, and including information about where non-textual fields appear). Even if agencies are insistent it is too difficult to OCR older documents that were scanned from paper, they cannot use that excuse with digital records.
  • Privacy. Another commonly articulated concern about posting FOIA releases online is that doing so could inadvertently disclose private information from "first person" FOIA requests. This is a valid concern, and this subset of FOIA requests should not be posted online. (The Justice Department identified "first party" requester rights in 1989. Essentially agencies cannot use the b(6) privacy exemption to redact information if a person requests it for him or herself. An example of a "first person" FOIA would be a person's request for his own immigration file.) Cost and Waste of Resources. There is also a belief that there is little public interest in the majority of FOIA requests processed, and hence it is a waste of resources to post them. This thinking runs counter to the governing principle of the Freedom of Information Act: that government information belongs to US citizens, not US agencies. As such, the reason that a person requests information is immaterial as the agency processes the request; the "interest factor" of a document should also be immaterial when an agency is required to post it online. Some think that posting FOIA releases online is not cost effective. In fact, the opposite is true. It's not cost effective to spend tens (or hundreds) of person hours to search for, review, and redact FOIA requests only to mail it to the requester and have them slip it into their desk drawer and forget about it. That is a waste of resources. The released document should be posted online for any interested party to utilize. This will only become easier as FOIA processing systems evolve to automatically post the documents they track. The State Department earned its "E-Star" status demonstrating this very principle, and spent no new funds and did not hire contractors to build its Electronic Reading Room, instead it built a self-sustaining platform that will save the agency time and money going forward.
2More

Venezuela's Maduro says may go to U.S. to challenge Obama - Yahoo News - 0 views

  • Ridiculing the U.S. qualification of Venezuela as a security threat, President Nicolas Maduro said on Thursday he may travel to Washington to challenge American counterpart Barack Obama. "We demand, via all global diplomatic channels, that President Obama rectify and repeal the immoral decree declaring Venezuela a threat to the United States," Maduro said. In the worst flare-up between the ideological enemies since Maduro took power in 2013, Washington earlier this week declared a "national emergency" over "the unusual and extraordinary threat" from Venezuela and sanctioned seven officials over allegations of rights abuses and corruption. The Maduro government has demanded evidence of how it threatens U.S. security. Conversely, it accuses Washington of helping coup plotters and preparing a military invention. U.S. officials say the Obama government's intention is to make Venezuela's government change its ways, not fall.
  • With Venezuela also demanding that the United States slash its Caracas embassy from 100 to 17 staff, the dispute has dominated local headlines and overshadowed an economic crisis. Opposition leader Henrique Capriles accused Maduro of using the spat as a smokescreen. "Inflation through the roof. Scarcities too. Murders and poverty up. And the shameless rulers talking to us of an invasion," he tweeted. Venezuela's opposition coalition has sought to disassociate itself from any perception of supporting outside meddling, while supporting the allegations of repression and graft. Allies from Russia to Argentina have sent messages of support to Venezuela, as has the South American regional bloc UNASUR, while critics of U.S. foreign policy have protested. "Venezuela is one of the very few countries with significant oil reserves which does not submit to U.S. dictates," wrote Glenn Greenwald, the journalist who first published documents leaked by fugitive former U.S. spy contractor Edward Snowden.
3More

Did NSA, GCHQ steal the secret key in YOUR phone SIM? It's LIKELY * The Register - 0 views

  • The NSA and Britain's GCHQ hacked the world's biggest SIM card maker to harvest the encryption keys needed to silently and effortlessly eavesdrop on potentially millions of people. That's according to documents obtained by surveillance whistleblower Edward Snowden and leaked to the web on Thursday. "Wow. This is huge – it's one of the most significant findings of the Snowden files so far," computer security guru Bruce Schneier told The Register this afternoon. "We always knew that they would occasionally steal SIM keys. But all of them? The odds that they just attacked this one firm are extraordinarily low and we know the NSA does like to steal keys where it can." The damning slides, published by Snowden's chums at The Intercept, detail the activities of the as-yet unheard-of Mobile Handset Exploitation Team (MHET), run by the US and UK. The group targeted Gemalto, which churns out about two billion SIM cards each year for use around the world, and targeted it in an operation dubbed DAPINO GAMMA.
  • Gemalto's hacking may also bring into question some of its other security products as well. The company supplies chips for electronic passports issued by the US, Singapore, India, and many European states, and is also involved in the NFC and mobile banking sector. It's important to note that this is useful for tracking the phone activity of a target, but the mobile user can still use encryption on the handset itself to ensure that some communications remain private. "Ironically one of your best defenses against a hijacked SIM is to use software encryption," Jon Callas, CTO of encrypted chat biz Silent Circle told The Register. "In our case there's a TCP/IP cloud between Alice and Bob and that can deal with compromised routers along the path as well as SIM issues, and the same applies to similar mobile software."
  • On Wednesday the UK government admitted that its intelligence agencies had in fact broken the ECHR when spying on communications between lawyers and those suing the British state, so GCHQ might want to reconsider that statement.
4More

China could possibly be the pioneer of a world currency - 0 views

  • China’s yuan has just made it onto the list of the world’s top five payment currencies, but the country’s plans seem to go beyond an honourable fifth position.
  • A survey conducted in 2014 showed that the Chinese yuan will supersede the U.S. dollar as the top international reserve currency. The survey of 200 institutional investors published by State Street and the Economist Intelligence Unit found 53 per cent of investors think the renminbi (RMB) will top the U.S. dollar as the world’s major reserve currency. The report accompanying the survey claimed that “the global importance of the RMB will become magnified.” This view was shared by Yves Mersch, member of the Executive Board of European Central Bank, who stated that China’s yuan is gaining importance in international trade and investment and might even challenge the U.S. dollar. In January, global transaction services organisation SWIFT announced that China’s yuan has overtaken the Canadian dollar and the Australian dollar and jumped from the seventh spot on the world’s top payment currencies list to the fifth position. Wim Raymaekers, head of banking markets at SWIFT said in a statement that the yuan’s new position “confirms its transition from an ‘emerging’ to a ‘business as usual’ payment currency,” Reuters reported. Global yuan payments boosted by 20.3 per cent in value in December compared to the previous year.
  • The financial industry is currently anticipating the launch of the yuan for international use via China International Payment System (CIPS). A senior bank official told Reuters that the official launch of the CIPS “will be in September or October.” The CIPS will place the Chinese currency on equal position with other world currencies in terms of operating hours, risk reduction and maximizing liquidity. Its key features include simultaneous handling of payments in 17 times zones in the Americas, Asia, Africa and Europe, international reporting with multi-language features and cross-border yuan clearing for onshore and offshore clients, Chinese online media company Yibada noted.
7More

MEDIA FAIL: Is the West's Coverage of Ukraine a Failure of Nuclear Proportions? - WhoWh... - 0 views

  • Last July, The New York Times declared, “The Ukrainian conflict has gone on far too long, and it has become far too dangerous. There is one man who can stop it — President Vladimir Putin of Russia.” In the intervening months, the media’s assessment of Putin has only grown harsher, with his actions in Ukraine being seen as a possible prelude to a full-scale Russian invasion, along the lines of his 2008 takeover of two provinces in the nation of Georgia. But this analysis is dangerously unbalanced.
  • While Putin has made many missteps in the Ukrainian crisis–and many in Georgia in 2008–the West is far from blameless. If, as the Times asserts, it’s all Putin’s fault, then the U.S. and its allies have few options beyond waiting for him to have a sudden change of heart. But if the West can acknowledge its own mistakes and start to rectify them, that might point the way to resolving the current conflict before it escalates further, even possibly to nuclear threats. In considering options, let’s first look at the perception that Ukraine is a repeat of Putin’s land-grab in Georgia. That in turn has been compared to Hitler’s dismemberment of Czechoslovakia 70 years earlier. This analogy, with its hot-button allusion to the West’s appeasement of Nazi Germany at Munich in 1938, was promoted by, among others, former Secretary of State Hillary Clinton. But in fact, it was one-sided coverage in the mainstream Western media that created the false impression that Putin alone was responsible for the 2008 Russian-Georgian War. Disregarded in this coverage was a finding by European Union investigators that Georgia, backed by the West, had in fact fired the first shots. The EU ultimately found blame on both sides.
  • In Ukraine, Putin has justified his cross-border interventions as required to protect ethnic Russians from threats by hostile neighbors. His stated concerns may be self-serving, but not necessarily as misplaced as Western governments and media make out. Key precipitating events are left out of the narrative. For example, Western media barely covered a May 2, 2014, fire in the Black Sea port city of Odessa, where dozens of pro-Russian separatists were burned alive after they barricaded themselves in a government building to escape a violent Ukrainian mob. Ukrainian nationalists surrounded the building, sang the Ukrainian national anthem, and chanted the equivalent of “Burn, Russians, burn!” while the building went up in flames. An even more egregious failure of American mainstream media coverage in Ukraine came during the February 2014 anti-government demonstrations in Ukraine’s capital of Kiev. When sniper fire killed nearly 100 Ukrainians, Western media repeatedly stated as fact that the shots came from the forces of then-Ukrainian President Viktor Yanukovych, who had tilted toward Russia. Outrage over the deaths fueled calls for Yanukovych’s head, and on February 21 he fled the capital, eventually ending up in southern Russia, where he remains in exile.
  • ...4 more annotations...
  • But virtually ignored by the American mainstream media was a bombshell allegation by Estonian Foreign Minister Urmas Paet. On Feb. 26, 2014, Paet—no friend of Russia’s—said in an intercepted and later authenticated phone call: “There is now stronger and stronger understanding that behind [the] snipers, it was not Yanukovych, but it was somebody from the new coalition.” What Paet called “the new coalition” is essentially the West-leaning Ukrainian government that succeeded Yanukovych. (Please see the full transcript of the conversation here, the most relevant 48 seconds here, and audio of the entire conversation here.) Getting It Right In such conflicts, the truth is one of the first casualties.
  • For an American media outlet willing to tackle this issue, one has to turn to The National Interest, a specialized journal on international relations. Although its parent, The Center for the National Interest, was originally called The Nixon Center—hardly a left-wing group—it recently published “Ukraine Exposed: Kiev’s Authoritarianism” by James Carden, who served as an advisor to the U.S.-Russia Bilateral Presidential Commission at the State Department from 2011 to 2012. Questioning U.S. policy in Ukraine, Carden wrote: From the very start of the Ukraine crisis, Washington’s neoconservative lobby has sought to downplay the less appealing aspects of the government that came to power in Kiev in February. … But examples of the new authoritarianism gripping Kiev have become tougher to miss in recent months … Carden goes on to highlight a case in point. In October, Poroshenko signed a decree establishing October 14 as an official “Day of Ukrainian Defenders” to commemorate the founding of the Ukrainian Insurrectionist Army, known as the UPA, during World War II. Carden then notes:
  • As the historian Halik Kochanski has noted, the UPA worked hand in hand with Poland’s Nazi occupiers, killing, to take but one example, nearly 10,000 Poles over the night of July 11-12, 1943. “A feature of the UPA action,” according to Kochanski, “was its sheer barbarity. They were not content merely to shoot their victims but often tortured them first or desecrated their bodies afterwards.” … Don’t let anyone tell you Russia has a monopoly on “disinformation.” Thus, in its zeal to legitimize Poroshenko’s anti-Russian government in Kiev, the mainstream American media managed to ignore his commemoration of former Ukrainian atrocities. Under the Nuclear Cloud
  • The Risks of Ignorance
13More

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
5More

Drone memo should reverse Gitmo convictions, attorneys claim - RT USA - 0 views

  • Attorneys for a Canadian man who spent a decade detained by the United States military at Guantanamo Bay say details in the Obama administration’s recently released “drone memo” exonerates their client of war crimes.
  • But in a recent court filing [PDF], lawyers for Khadr, now 27, say a just-published US Department of Justice memorandum contains information that directly challenges the American government’s case against their client. Khadr’s attorneys wrote this week that the secret “drone memo” released by the White House last month — the DOJ document that the government relied on to justify the 2010 drone strike in Yemen that killed American citizen and suspected AL-Qaeda member Anwar Al-Awlaki — suggests prosecutors had no place to charge the Canadian teenager with murder in violation of the laws of war after he allegedly killed an American soldier during a firefight in Afghanistan. The DOJ memo itself was a penned by the department’s Office of Legal Counsel in response to the question of whether Central Intelligence Agency officers — who are not members of the US military — can be blamed for war crimes by launching drone strikes. The memo was written in July 2010, and justified the strike that later that year killed Al-Awlaki.
  • "The whole purpose...was to evaluate whether the CIA agents were violating the law," Morison said. "The only reasonable interpretation of that analysis is that there is no such thing (as the common law of war)." On Monday this week, Morrison and the rest of Khadr’s legal counsel, filed a motion in Guantanamo’s appeals court asking that the conviction against their client be vacated.
  • ...2 more annotations...
  • According to a footnote within the memo, released June 24 of this year due to a Freedom of Information Act lawsuit, “lethal activities conducted in accordance with the laws of war, and undertaken in the course of lawfully authorized hostilities, do not violate the laws of war by virtue of the fact that they are carried out in part by government actors who are not entitled to the combatant’s privilege.” "That completely blows away one of the major prongs of the government's theory in all these Guantanamo cases," Sam Morison, Khadr's Pentagon-based lawyer, told The Canadian Press during an interview on Wednesday this week. Although Khadr was charged with violating the “US common law of war” that dates back centuries, his attorneys say the memo concerning CIA drone strikes suggest such legislation simply doesn’t exist.
  • Should Khadr’s attorneys succeed, then a number of cases pertaining to current or former Guantanamo detainees accused of war crimes could be called into question. According to Human Rights Watch, however, only six of the 149 detainees at Gitmo face any formal charges — fewer than the number of prisoners who have died while held there in military custody.
« First ‹ Previous 501 - 520 of 635 Next › Last »
Showing 20 items per page