Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "public-trust" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
8More

U.S. accuses China of cyber spying on American companies | Reuters - 0 views

  • The United States on Monday charged five Chinese military officers and accused them of hacking into American nuclear, metal and solar companies to steal trade secrets, ratcheting up tensions between the two world powers over cyber espionage. China immediately denied the charges, saying in a strongly worded Foreign Ministry statement the U.S. grand jury indictment was "made up" and would damage trust between the two nations.Officials in Washington have argued for years that cyber espionage is a top national security concern. The indictment was the first criminal hacking charge that the United States has filed against specific foreign officials, and follows a steady increase in public criticism and private confrontation, including at a summit last year between U.S. President Barack Obama and Chinese President Xi Jinping.
  • Federal prosecutors said the suspects targeted companies including Alcoa Inc, Allegheny Technologies Inc, United States Steel Corp, Toshiba Corp unit Westinghouse Electric Co, the U.S. subsidiaries of SolarWorld AG, and a steel workers' union.
  • According to the indictment, Chinese state-owned companies "hired" Unit 61398 of the People's Liberation Army "to provide information technology services" including assembling a database of corporate intelligence. The Chinese companies were not named.The Shanghai-based Unit 61398 was identified last year by cybersecurity firm Mandiant as the source of a large number of espionage operations. All five defendants worked with 61398, according to the indictment.
  • ...4 more annotations...
  • U.S. officials have maintained that they do not steal secrets to give an advantage to U.S. companies, but in China, Lewis said, the line between military and business prowess is unclear.Unit 61398 has hundreds of active spies and is just one of dozens of such bodies in China, said Jen Weedon, an analyst at Mandiant, now owned by global network security company FireEye Inc. She said the group is not among the most sophisticated.
  • Washington announced the charges as new claims emerged last week about the scope of overseas spying by the United States. Documents leaked by Snowden showed the agency intercepted and modified equipment made by Cisco Systems Inc that was headed overseas.Cisco responded by asking Obama to curtail U.S. surveillance programs, underscoring the vulnerability of multinationals to a whipsaw of competing government interests.
  • Skeptics said U.S. authorities would not be able to arrest those indicted because Beijing would not hand them over. Still, the move would prevent the individuals from traveling to the United States or other countries that have an extradition agreement with the United States.
  • In an indictment filed in the Western District of Pennsylvania, prosecutors said the officers hacked into computers starting in 2006, often by infecting machines with tainted "spear phishing" emails to employees that purport to be from colleagues.Prosecutors alleged that one hacker, for example, stole cost and pricing information in 2012 from an Oregon-based solar panel production unit of SolarWorld. The company was losing market share at the time to Chinese competitors who were systematically pricing exports below production costs, according to the indictment.Another officer is accused of stealing technical and design specifications about pipes for nuclear plants from Westinghouse Electric as the company was negotiating with a Chinese company to build four power plants in China, prosecutors said.
  •  
    Yesterday I watched the DoJ press conference announcing charges. This article does not capture its spirit. AG Ben Holder faced stiff questions directed by attending reporters. One of the first questions went something like this: "Is it true that the U.S. has extradition treaty with China and these defendants will never be actually prosecuted, and if so, what's the real reason for the charges?" Others raised the hypocrisy of the U.S. move in light of what the NSA has been doing. Holder ducked the tough questions  The press conference was a farce and too many of the reporters realized it. Recall that Obama was days away from traveling to China with the announced purpose of chastising its leader for waging cyberesionage against the U.S. when the first Edward Snowden pulled the moral high ground from beneath Obama's feet. This stunt looks more like it was designed to lesson the government pain by promoting Obama's "everyone does it" meme.   Also not mentioned in this article, at the press confernence the five defendants were identified as generals in the Chinese Army. Might we see China respond by charging a few former and present NSA generals with cyber-espionage? Fun and games on the Beltway. 
7More

Turkish court issues "historic" arrest warrants for Israeli army commanders | The Elect... - 0 views

  • A court in Istanbul has issued arrest warrants against four Israeli military officials for their role in authorizing and carrying out the attacks on the Mavi Marmara, the Turkish humanitarian aid boat bound for Gaza on 31 May 2010. Israeli forces attacked and raided the boat, which was part of a flotilla in international waters and was attempting to break the siege on Gaza. Israeli commandos killed nine civilians and wounded dozens of others. Speaking to The Electronic Intifada, Rabia Yurt, a Turkish attorney for the families of the victims, says the ruling is unprecedented. Yurt says it is “the first [time] in history” that arrest warrants have been issued against Israeli officials, who have never been held responsible in an international court for the army’s “uncountable crimes.”
  • The judges presiding at the Istanbul Çağlayan Courthouse on 26 May ordered arrest warrants against former Israeli army Chief General Gabi Ashkenazi, Naval Forces commander Vice Admiral Eliezer Marom, Israeli military intelligence chief Major General Amos Yadlin and Air Forces Intelligence head Brigadier General Avishai Levi. It is now up to Interpol, the international police agency, to follow the Turkish court’s directives and arrest the four commanders, who were tried in absentia. This was the sixth trial so far in the case against the Israeli leaders for their role in the deadly attacks on the flotilla.
  • After the deadly raid on the Mavi Marmara, Israeli forces kidnapped the crew and hundreds of the flotilla’s passengers, bringing the boats and all aboard to an Israeli port, where the human rights activists were arrested, detained and deported. One of the civilians killed was Furkan Doğan, a 19-year-old dual citizen of Turkey and the US. The Center for Constitutional Rights stated that “Israeli commandos shot Furkan five times, including one shot to the head at point-blank range. At the time of the attack, it is believed Furkan was filming with a small video camera on the top deck of the Mavi Marmara.” A tenth activist, 51-year-old Turkish citizen Uğur Süleyman Söylemez, died on 23 May — days before the court’s decision, and nearly four years after Israeli forces shot him in the head. Söylemez was in a coma ever since his injury.
  • ...3 more annotations...
  • “The court argued that an arrest warrant had become necessary for the legal procedure as the defendants had neither attended the trial nor responded to an invitation sent to them through the related department of the Turkish justice ministry,” reported Turkish daily Hurriyet on 30 May. The Turkish humanitarian group IHH (Humanitarian Relief Foundation), which sponsored and helped organize the aid flotilla in 2010 and has been helping to represent the families of those killed, stated in a press release last week that the ruling was a “positive outcome” for the relatives and loved ones of the ten Turkish citizens who were killed by Israeli attacks. Last year, as The Electronic Intifada reported, the prosecutor of Spain’s national court formally requested a judge to begin steps to refer a case against Israeli leaders for the attack to the International Criminal Court (ICC). Three Spanish citizens, Manuel Tapial, Laura Arau and David Segarra, were aboard the Mavi Marmara when it was attacked and commandeered. Tapial, Arau and Segarra filed the case against Israeli Prime Minister Benjamin Netanyahu, six ministers and Vice Admiral Eliezer Marom of the Israeli navy who led the attack.
  • However, we are optimistic, because Turkey is a democratic country. It is part of and is a signatory to the European extradition convention and signed to Interpol, and therefore all other countries who are also signatories to these conventions and institution have an obligation to indeed arrest these Israeli officials for whom the arrest warrants were issued. So we have to trust [this] and we have to keep our faith in this. And we also know that — remember that this trial started way back in 2012 — the Israeli soldiers wouldn’t travel around too much, especially not go to Turkey. We know that Israeli soldiers were complaining about this. For instance, there was a case of an Israeli soldier who filed a claim against the State of Israel because he wanted to study in the United States, but because he took part in this operation he could not set foot out of Israel. So because we know this, we are quite optimistic about the arrest warrants, that they will be in fact implemented by other countries.
  • NBF: Finally, what’s next in this case on behalf of now ten victims of Israel’s raid, how are you pushing forward in this case? RY: In December, there is going to be another hearing, and we’re just going to make sure that the entire world will know about this arrest warrant, that we will follow whether any of these four defendants steps foot outside of Israel. We have lawyers in different countries also working together, and in South Africa, in the UK, many, many countries more — they will also closely follow whether these four defendants will travel in these countries. And then if this is the case, we will immediately take action and make sure that if the country in which one of the four defendants steps foot refuses, or neglects to fulfill its obligation to arrest [the defendant], then we will make sure that that country will not get away with it. And we will push for it, and publicize this as much as we can.
  •  
    A historic day indeed. Turkey is a member of both NATO and INTERPOL. Four high-ranking Israeli military officers will be on the INTERPOL arrest list soon, with a network of human rights lawyers around the world on the watch and ready to enforce INTERPOL arrest obligations. In other words, these officers' travel outside Israel will be very unlikely to include INTERPOL treaty nations and European extradition convention nations as either destinations or waypoints. The deterrent effect on Israeli government officials is considerable, particularly with another criminal prosecution pending in Spain. Fittingly, the Turkish court has aimed its message at high military officials who directed the assassinations rather than at the low-ranking soldiers who committed them. Message to high Israeli officials: be nice to Turkish citizens if you want to ever travel outside Israel.  One can only wish that the same message had been delivered about American citizens. The victim shot five times including a point blank shot to the head was an American citizen. Many of the kidnaped human rights people on the Navi Marmara and accompanying boats were Americans. One of the boats was American-flagged. Under international law, these actions were casus belli, a sufficient cause for military retaliation against the government of Israel. But the cowardly Obama and Secretary of State Hillary Clinton did not so much as lodge a diplomatic protest, so fearful they are of the powerful Israel Lobby. 
5More

Crypto-Gram: December 15, 2014 - 0 views

  • There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt, France, Germany, Great Britain, Hong Kong, India, Indonesia, Italy, Japan, Kenya, Mexico, Nigeria, Pakistan, Poland, South Africa, South Korea, Sweden, Tunisia, Turkey and the United States." Amongst the findings, 60% of Internet users have heard of Edward Snowden, and 39% of those "have taken steps to protect their online privacy and security as a result of his revelations." The press is mostly spinning this as evidence that Snowden has not had an effect: "merely 39%," "only 39%," and so on. (Note that these articles are completely misunderstanding the data. It's not 39% of people who are taking steps to protect their privacy post-Snowden, it's 39% of the 60% of Internet users -- which is not everybody -- who have heard of him. So it's much less than 39%.)
  • Even so, I disagree with the "Edward Snowden Revelations Not Having Much Impact on Internet Users" headline. He's having an enormous impact. I ran the actual numbers country by country, combining "data on Internet penetration with data from this survey. Multiplying everything out, I calculate that *706 million people* have changed their behavior on the Internet because of what the NSA and GCHQ are doing. (For example, 17% of Indonesians use the Internet, 64% of them have heard of Snowden and 62% of them have taken steps to protect their privacy, which equals 17 million people out of its total 250-million population.)
  • Note that the countries in this survey only cover 4.7 billion out of a total 7 billion world population. Taking the conservative estimates that 20% of the remaining population uses the Internet, 40% of them have heard of Snowden, and 25% of those have done something about it, that's an additional 46 million people around the world. It's certainly true that most of those people took steps that didn't make any appreciable difference against an NSA level of surveillance, and probably not even against the even more pervasive corporate variety of surveillance. It's probably even true that some of those people didn't take steps at all, and just wish they did or wish they knew what to do. But it is absolutely extraordinary that *750 million people* are disturbed enough about their online privacy that they would represent to a survey taker that they did something about it.
  • ...2 more annotations...
  • Name another issue that has caused over ten percent of the world's population to change their behavior in the past year? Cory Doctorow is right: we have reached "peak indifference to surveillance." From now on, this issue is going to matter more and more, and policymakers around the world need to start paying attention. https://www.cigionline.org/internet-survey Press mentions: http://www.ibtimes.co.uk/...http://www.theguardian.com/technology/2014/nov/25/... Internet penetration by country: http://www.internetlivestats.com/... Cory Docorow: http://boingboing.net/2014/11/12/...
  • Related: a recent Pew Research Internet Project survey on Americans' perceptions of privacy, commented on by Ben Wittes. http://www.pewinternet.org/2014/11/12/...http://www.lawfareblog.com/2014/11/...
5More

CIA Torture Report: Oversight, But No Remedies Yet - 0 views

  • The release of the executive summary of the Senate Intelligence Committee report on CIA’s post-9/11 interrogation program is, among other things, an epic act of record preservation. Numerous CIA records that might not have been disclosed for decades, or ever, were rescued from oblivion by the Senate report and are now indelibly cited and quoted, even if many of them are not yet released in full. That’s not a small thing, since the history of the CIA interrogation program was not a story that the Agency was motivated or equipped to tell. “The CIA informed the Committee that due to CIA record retention policies, the CIA could not produce all CIA email communications requested by the Committee,” the report noted, explaining that the desired information was sometimes recovered from a reply message when the original email was missing. Agency emails turned out to be a critical source of information, a fact that illuminates the Committee’s sharp response recently to the (now suspended) CIA proposal to the National Archives (NARA) to destroy most Agency emails of non-senior officials.
  • Thus, the gruesome record of the waterboarding of al Qaeda operative Abu Zubaydah “was referenced in emails, but was not documented or otherwise noted in CIA cables.” (This is at odds with NARA’s initial view that “It is unlikely that permanent records will be found in these email accounts that is not filed in other appropriate files.”) The Committee report is also a remarkable demonstration of the congressional oversight function that is all the more impressive because it was performed in adverse, unfavorable conditions. It is striking to see how the CIA sometimes treated the Senate Intelligence Committee, its leadership and its staff with the same disdain and evasiveness that is often perceived by FOIA requesters and other members of the public. Committee questions were ignored, inaccurate information was provided, and the oversight process was gamed.
  • “Internal CIA emails include discussion of how the CIA could ‘get… off the hook on the cheap’ regarding [then-Committee] Chairman [Bob] Graham’s requests for additional information…. In the end, CIA officials simply did not respond to Graham’s requests prior to his departure from the Committee in January 2003,” the report said. “I am deeply disturbed by the implications of the study for the committee’s ability to discharge its oversight responsibility,” wrote Sen. Angus King (I-Maine) in his additional remarks. “Because it appears from the study that the committee was continuously misled as to virtually all aspects of this program, it naturally raises the extremely troubling question as to whether we can trust the representations of the agency in connection with difficult or sensitive issues in the future.” But minority members of the Committee disputed this characterization: “In reality, the overall pattern of engagement with the Congress shows that the CIA attempted to keep the Congress informed of its activities,” they wrote in their extensive dissenting views. Perhaps the most important achievement of the Committee report was to document and memorialize the fact that agents of the US Government practiced torture. Not “harsh measures” or “enhanced techniques,” but torture.
  • ...2 more annotations...
  • Senator Susan Collins (R-Maine), who criticized what she said were methodological flaws in the Committee report, said in her additional views that “Despite these significant flaws, the report’s findings lead me to conclude that some detainees were subject to techniques that constituted torture. This inhumane and brutal treatment never should have occurred.” By the same token, the most important omission from the report is the absence of any discussion of remedies. Now that it is firmly established that “we tortured some folks,” as President Obama awkwardly put it, the question is what to do about it. Confession without atonement is incomplete. Prosecution seems problematic for a number of reasons, including the difficulty of localizing responsibility, when it is entire institutions and not just particular officials that failed. A different approach to the problem would start by considering the individuals who suffered abuse at the hands of the U.S. government, including a number of persons who were detained in error. Congress could now ask how some of them (i.e. those who are still alive) could be compensated in some measure for what was wrongly done to them.
  • Several previous efforts to seek remedies for torture were deflected by use of the state secrets privilege. In light of the detailed findings of the Senate Intelligence Committee report, that sort of evasion should be harder to sustain. Congress could accelerate a resolution of the problem with a focused investigation of what potential remedies are now feasible and appropriate.
4More

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
6More

Provocations as Pretexts for Imperial War: From Pearl Harbor to 9/11 | Global Research - 0 views

  • Wars in an imperialist democracy cannot simply be dictated by executive fiat, they require the consent of highly motivated masses who will make the human and material sacrifices. Imperialist leaders have to create a visible and highly charged emotional sense of injustice and righteousness to secure national cohesion and overcome the natural opposition to early death, destruction and disruption of civilian life and to the brutal regimentation that goes with submission to absolutist rule by the military. The need to invent a cause is especially the case with imperialist countries because their national territory is not under threat. There is no visible occupation army oppressing the mass of the people in their everyday life. The ‘enemy’ does not disrupt everyday normal life – as forced conscription would and does. Under normal peaceful time, who would be willing to sacrifice their constitutional rights and their participation in civil society to subject themselves to martial rule that precludes the exercise of all their civil freedoms?
  • The task of imperial rulers is to fabricate a world in which the enemy to be attacked (an emerging imperial power like Japan) is portrayed as an ‘invader’ or an ‘aggressor’ in the case of revolutionary movements (Korean and Indo-Chinese communists) engaged in a civil war against an imperial client ruler or a ‘terrorist conspiracy’ linked to an anti-imperialist, anti-colonial Islamic movements and secular states. Imperialist-democracies in the past did not need to consult or secure mass support for their expansionist wars; they relied on volunteer armies, mercenaries and colonial subjects led and directed by colonial officers. Only with the confluence of imperialism, electoral politics and total war did the need arise to secure not only consent, but also enthusiasm, to facilitate mass recruitment and obligatory conscription. Since all US imperial wars are fought ‘overseas’ – far from any immediate threats, attacks or invasions – -US imperial rulers have the special task of making the ‘causus bellicus’ immediate, ‘dramatic’ and self-righteously ‘defensive’. To this end US Presidents have created circumstances, fabricated incidents and acted in complicity with their enemies, to incite the bellicose temperament of the masses in favor of war.
  • The pretext for wars are acts of provocation which set in motion a series of counter-moves by the enemy, which are then used to justify an imperial mass military mobilization leading to and legitimizing war. State ‘provocations’ require uniform mass media complicity in the lead-up to open warfare: Namely the portrayal of the imperial country as a victim of its own over-trusting innocence and good intentions. All four major US imperial wars over the past 67 years resorted to a provocation, a pretext, and systematic, high intensity mass media propaganda to mobilize the masses for war. An army of academics, journalists, mass media pundits and experts ‘soften up’ the public in preparation for war through demonological writing and commentary: Each and every aspect of the forthcoming military target is described as totally evil – hence ‘totalitarian’ – in which even the most benign policy is linked to demonic ends of the regime. Since the ‘enemy to be’ lacks any saving graces and worst, since the ‘totalitarian state’ controls everything and everybody, no process of internal reform or change is possible. Hence the defeat of ‘total evil’ can only take place through ‘total war’. The targeted state and people must be destroyed in order to be redeemed. In a word, the imperial democracy must regiment and convert itself into a military juggernaut based on mass complicity with imperial war crimes. The war against ‘totalitarianism’ becomes the vehicle for total state control for an imperial war.
  • ...2 more annotations...
  • In the case of the US-Japanese war, the US-Korean war, the US-Indochinese war and the post-September 11 war against an independent secular nationalist regime (Iraq) and the Islamic Afghan republic, the Executive branch (with the uniform support of the mass media and congress) provoked a hostile response from its target and fabricated a pretext as a basis for mass mobilization for prolonged and bloody wars.
  • Wars in an imperialist democracy cannot simply be dictated by executive fiat, they require the consent of highly motivated masses who will make the human and material sacrifices. Imperialist leaders have to create a visible and highly charged emotional sense of injustice and righteousness to secure national cohesion and overcome the natural opposition to early death, destruction and disruption of civilian life and to the brutal regimentation that goes with submission to absolutist rule by the military. The need to invent a cause is especially the case with imperialist countries because their national territory is not under threat. There is no visible occupation army oppressing the mass of the people in their everyday life. The ‘enemy’ does not disrupt everyday normal life – as forced conscription would and does. Under normal peaceful time, who would be willing to sacrifice their constitutional rights and their participation in civil society to subject themselves to martial rule that precludes the exercise of all their civil freedoms?
  •  
    Lengthy look at provocations and pretexts used to start U.S. foreign wars. 
8More

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
4More

Planting False Evidence on Iran | Consortiumnews - 0 views

  • A month after former CIA officer Jeffrey Sterling was convicted on nine felony counts with circumstantial metadata, the zealous prosecution is now having potentially major consequences — casting doubt on the credibility of claims by the U.S. government that Iran has work on a nuclear weapons program.With negotiations between Iran and the United States at a pivotal stage, fallout from the trial’s revelations about the CIA’s Operation Merlin is likely to cause the International Atomic Energy Agency to re-examine U.S. assertions that Iran has pursued nuclear weapons.
  • In its zeal to prosecute Sterling for allegedly leaking classified information about Operation Merlin — which provided flawed nuclear weapon design information to Iran in 2000 — the U.S. government has damaged its own standing with the IAEA. The trial made public a treasure trove of information about the Merlin operation.Last week Bloomberg News reported from Vienna, where IAEA is headquartered, that the agency “will probably review intelligence they received about Iran as a result of the revelations, said the two diplomats who are familiar with the IAEA’s Iran file and asked not to be named because the details are confidential.”The Bloomberg dispatch, which matter-of-factly referred to Merlin as a “sting” operation, quoted a former British envoy to the IAEA, Peter Jenkins, saying: “This story suggests a possibility that hostile intelligence agencies could decide to plant a ‘smoking gun’ in Iran for the IAEA to find. That looks like a big problem.”
  • Investigative journalist Marcy Wheeler, my colleague at ExposeFacts, has written an extensive analysis of the latest developments. The article on her EmptyWheel blog raises key questions beginning with the headline “What Was the CIA Really Doing with Merlin by 2003?”An emerging big irony of United States of America v. Jeffrey Alexander Sterling is that the government has harmed itself in the process of gunning for the defendant. While the prosecution used innuendos and weak circumstantial evidence to obtain guilty verdicts on multiple felonies, the trial produced no actual evidence that Sterling leaked classified information. But the trial did provide abundant evidence that the U.S. government’s nuclear-related claims about Iran should not be trusted.In the courtroom, one CIA witness after another described Operation Merlin as a vitally important program requiring strict secrecy. Yet the government revealed a great deal of information about Operation Merlin during the trial — including CIA documents that showed the U.S. government to be committed to deception about the Iranian nuclear program.
  • ...1 more annotation...
  • If, as a result, the International Atomic Energy Agency concludes that U.S. assertions about an alleged Iranian nuclear weapons program lack credibility, top officials in Washington will have themselves to blame.
4More

Germany asks CIA station chief to leave over spying allegations - The Washington Post - 0 views

  • The German government ordered the CIA’s top officer in Berlin to leave the country Thursday in an extraordinary escalation of a conflict between the two allies over American espionage. The move amounts to a high-profile expression of German anger over alleged CIA operations uncovered by German investigators in recent weeks, as well as continued public outrage over the exposure last year of widespread U.S. surveillance programs whose targets included Chancellor Angela Merkel. A spokesman for the German government, Steffen Seibert, confirmed the expulsion of the CIA station chief in a statement that made clear Berlin regards U.S. espionage efforts as a breach of trust.
  • The decision means that the United States will be forced to withdraw an officer who oversees U.S. spying programs in Germany but also serves as the main point of contact with German intelligence services — exchanging information on subjects ranging from terrorist plots to Iranian nuclear ambitions. In ordering the CIA station chief to leave, Germany resorted to a form of retaliation that is occasionally employed by determined espionage adversaries — such as the United States and Russia — but rarely by such a close ally.
  • Before ordering him out, Germany “had to make a calculation of what they were going to lose — they get a substantial amount of intelligence from us,” said a senior former U.S. intelligence official who worked closely with Berlin and spoke on the condition of anonymity because of the sensitivity of the subject. “There will be people in the [U.S.] intelligence community who will want to say, ‘That’s it.’ ” Former U.S. officials said the agency pulled back on certain spying operations last year amid concern about the fallout from the Edward Snowden leaks. At the same time, the former officials said, the latest arrest and raids indicate that Germany has stepped up its defenses and efforts to root out U.S. spies. Even before the expulsion, U.S. officials said espionage-related frictions with Germany had hurt diplomatic relations with an ally the United States has relied on for support in a series of security matters, including efforts to contain Russian aggression in Ukraine.
  •  
    O.K. Now how do we boot the CIA out of America?
4More

CIA admits to spying on Senate staffers | World news | The Guardian - 0 views

  • The director of the Central Intelligence Agency, John Brennan, issued an extraordinary apology to leaders of the US Senate intelligence committee on Thursday, conceding that the agency employees spied on committee staff and reversing months of furious and public denials. Brennan acknowledged that an internal investigation had found agency security personnel transgressed a firewall set up on a CIA network, which allowed Senate committee investigators to review agency documents for their landmark inquiry into CIA torture. Among other things, it was revealed that agency officials conducted keyword searches and email searches on committee staff while they used the network.The admission brings Brennan’s already rocky tenure at the head of the CIA under renewed question. One senator on the panel said he had lost confidence in the director, although the White House indicated its support for a man who has been one of Barack Obama’s most trusted security aides.
  • CIA spokesman Dean Boyd acknowledged that agency staff had improperly monitored the computers of committee staff members, who were using a network the agency had set up, called RDINet. “Some CIA employees acted in a manner inconsistent with the common understanding reached between [the committee] and the CIA in 2009 regarding access to the RDINet,” he said.Asked if Brennan had or would offer his resignation, a different CIA spokesman, Ryan Trapani, replied: “No.”
  • McClatchy first reported the apology on Thursday.
  •  
    A bit more detail on what CIA admits to doing. 
2More

Iran 1953: US Envoy to Baghdad Suggested to Fleeing Shah He Not Acknowledge Foreign Rol... - 0 views

  • On August 16, 1953, the same day the Shah of Iran fled to Baghdad after a failed attempt to oust Prime Minister Mohammad Mosaddeq, the agitated monarch spoke candidly about his unsettling experience to the U.S. ambassador to Iraq. In a highly classified cable to Washington, the ambassador reported: "I found Shah worn from three sleepless nights, puzzled by turn of events, but with no (repeat no) bitterness toward Americans who had urged and planned action. I suggested for his prestige in Iran he never indicate that any foreigner had had a part in recent events. He agreed." Despite the passage of more than six decades, fundamental questions persist about Mosaddeq's overthrow, including who was responsible for this milestone event in Iranian history. The above cable, which was previously published but with these key passages excised for secrecy reasons, is one of several important pieces of evidence pointing to the United States role. Nevertheless, the question of how important the U.S. and British were in the events of 1953 has recently come under intensified scrutiny. An article in the July/August 2014 issue of Foreign Affairs by noted Iran analyst Ray Takeyh is the latest in a series of analyses by respected scholars who conclude Iranians, not the CIA or British intelligence, were fundamentally responsible.
  • In the course of explaining "What Really Happened in Iran," however, the piece spotlights some of the risks of writing about such sensitive historical events, particularly when they involve covert intelligence operations. In particular — how do you know when to trust your sources? Today's brief posting is by no means a full assessment or refutation of this argument. (In the interests of disclosure, the author believes the evidence shows that both the CIA — with British help — and Iranians themselves were critical in their own ways to the end result[1]). Instead, the posting mainly points out one of the peculiar challenges confronting historians of 1953, especially on the question of the U.S. and British roles. The challenge is simply that U.S. and British reporting about the coup cannot be taken strictly at face value. The main reason is secrecy. President Eisenhower underscored the need for confidentiality in a diary entry from the time. Dated October 8, 1953, but referring back to August 19, Eisenhower notes: "Another recent development that we helped bring about was the restoration of the Shah to power in Iran and the elimination of Mossadegh. The things we did were 'covert.' If knowledge of them became public, we would not only be embarrassed in that region, but our chances to do anything of like nature in the future would almost totally disappear." (See Document 1)
5More

Guantánamo hearing halted by supposed CIA 'black site' worker serving as war ... - 0 views

  • The 9/11 trial judge abruptly recessed the first hearing in the case since August on Monday after some of the alleged Sept. 11 plotters said they recognized a war court linguist as a former secret CIA prison worker.Alleged plot deputy Ramzi bin al Shibh, 42, made the revelation just moments into the hearing by informing the judge he had a problem with his courtroom translator. The interpreter, Bin al Shibh claimed, worked for the CIA during his 2002 through 2006 detention at a so-called “Black Site.”“The problem is I cannot trust him because he was working at the black site with the CIA, and we know him from there,” he said.This week’s is the first hearing for the five men accused of conspiring in the Sept. 11, 2001 attacks — that killed nearly 3,000 people in New York, the Pentagon and Pennsylvania — since the public release of portions of a sweeping Senate Intelligence Committee study of the agency’s secret prisons known as “The Torture Report.”
  • Instead the issue became, apparently, a stony-faced translator who was sitting alongside Bin al Shibh in court when the hearing started. Lawyers for the alleged mastermind, Khalid Sheik Mohammed, 49, and his nephew, Ammar al Baluchi, 37, said they learned about the recognition just as court began. The judge ordered a quick recess, excused Campoamor-Sanchez and summoned the chief prosecutor, Army Brig. Gen. Mark Martins, for questioning.Court resumed briefly with the linguist missing. Martins sought, and got, a continuing recess until 9 a.m. Wednesday, to look into the issue and file a written pleading with the court. Pleadings are sealed for at least 15 days for intelligence agencies’ scrub of secret information.Mohammed’s attorney, David Nevin, asked Pohl to order the suspected CIA worker to not leave this remote base in southeast Cuba and to submit to defense questioning.
  • Cheryl Bormann, attorney for another alleged plotter, Walid bin Attash, 36, told the judge, Army Col. James L. Pohl, that her client “was visibly shaken” at recognizing a man in the maximum-security war court.“My client relayed to me this morning that there is somebody in this courtroom who was participating in his illegal torture,” she said.Bormann said it was either “the biggest coincidence ever” or “part of the pattern of the infiltration of defense teams.” Monday’s hearing was supposed to start with a presentation by a Justice Department lawyer, Fernando Campoamor-Sanchez, on FBI agents secretly questioning members of the Bin al Shibh defense team. The Sept. 11 legal defense teams have called the FBI’s action spying on privileged attorney-client conversations.
  • ...2 more annotations...
  • War court translators are provided by one of two Defense Department contractors paid by the Pentagon unit that runs the war court, called the Office of the Convening Authority for Military Commissions. It’s run by retired Marine Maj. Gen. Vaughn Ary, a former military lawyer. The contractors are Leidos and All World.Ary’s office provides a list of qualified translators to the Office of Military Commissions Defense unit, and, in the capital cases, each one gets a dedicated translator assigned to the team. Teams can object to the choice, and have done so in the past, as unsuitable, according to earlier war court sessions.The war court’s Chief Defense Counsel, Air Force Col. Karen Mayberry, said after the court session Monday that the translator sitting with Bin al Shibh in court was not permanently assigned to his team, or the 9/11 case. The Bin al Shibh team had lost its translator after an FBI investigation secretly questioned Sept. 11 defense team members. Monday’s translator, the one that Bin al Shibh said he recognized from a CIA prison, had worked for years on war court defense teams, but none with the Sept. 11 death-penalty case, according to Mayberry. Monday’s translator was filling in for this session because, although the Bin al Shibh team had chosen a new team translator, the new permanent translator had not yet gotten a security clearance, which can be a lengthy process.
  • Bin al Shibh and the other four men are accused of helping to orchestrate, train, and arrange travel for the 19 men who hijacked four U.S. passenger aircraft on Sept. 11, 2001. The prosecutor is seeking their execution, if they are convicted. The CIA held and interrogated them for three to four years in secret overseas prisons before they were brought to Guantánamo in September 2006. But even once they got here, they continued to be in CIA custody, according to the Senate report. Jay Connell, attorney for Baluchi, 37, said Sunday it is still not known when the agency relinquished control of the men, who are held in a secret prison called Camp 7.
3More

How anti-Muslim are Americans? Data points to extent of Islamophobia | US news | The Gu... - 0 views

  • Who exactly was Donald Trump appealing to when he called on Monday for a “total and complete shutdown of Muslims entering the United States”? Quite a few people, according to a YouGov poll conducted earlier this year which found that 55% of surveyed Americans had an “unfavorable” opinion of Islam. Looking more closely at those respondents, Islamophobic sentiments are more common among Americans who are 45 and older, those who are Republican and those who are white.
  • Attitudes toward Islam and attitudes toward Muslims should be considered separately – however, studies suggests that the two overlap considerably, as many people fail to distinguish between the two. In 2014, Pew Research Center published a large study about American attitudes towards individuals of different faiths. Over 3,000 US respondents were asked to rate members of religious groups using a “feeling thermometer” that ranged from 0 to 100: 0 indicated the coldest, most negative possible rating and 100 the warmest, most positive rating. Muslims scored just 40. That score excludes Muslim respondents’ views about other Muslims. The only other group to fare similarly badly were atheists as rated by religious respondents – they too scored 40. There is however an important difference between those two scores: there are far more atheists in America than there are Muslims. Since the Census Bureau is prohibited by law from asking about religious affiliation, Pew surveys are the main source on America’s religious makeup. Their 2015 data shows that 3% of Americans identify as atheist (as well as 4% who say they’re agnostic and 16% who say they’re nothing in particular). By contrast, just under 1% of Americans identify as Muslim – although estimates vary widely and are partly dependent on Muslims’ willingness to identify with the label to interviewers.
  • Those two percentages – the number of Americans who dislike Muslims and the number of Americans who are Muslim – suggest that Trump would not have had the same receptive audience had he singled out members of any other religious group. So far, much of Trump’s anti-Muslim rhetoric has focused on security. That’s smart. When Brits were asked this year what words they think of when they hear the word Muslim, their most common responses were “terror”, “terrorism” and “terrorist”. It’s also relevant that when individuals (again often white, often Republican) were trying to undermine Barack Obama’s credibility in 2004 and claim that he could not be trusted, they said he was a secret Muslim. What sounded like an accusation only increased in frequency once Obama became a presidential candidate. As of September this year, 29% of Americans (and 43% of Republicans) still believe that Obama is a Muslim, according to a poll by CNN and the Opinion Research Corporation.
9More

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
7More

The NYPD's X-Ray Vans - The Atlantic - 0 views

  • In New York City, the police now maintain an unknown number of military-grade vans outfitted with X-ray radiation, enabling cops to look through the walls of buildings or the sides of trucks. The technology was used in Afghanistan before being loosed on U.S. streets. Each X-ray van costs an estimated $729,000 to $825,000.The NYPD will not reveal when, where, or how often they are used.
  • Here are some specific questions that New York City refuses to answer:How is the NYPD ensuring that innocent New Yorkers are not subject to harmful X-ray radiation? How long is the NYPD keeping the images that it takes and who can look at them? Is the NYPD obtaining judicial authorization prior to taking images, and if so, what type of authorization? Is the technology funded by taxpayer money, and has the use of the vans justified the price tag? Those specifics are taken from a New York Civil Liberties Union court filing. The legal organization is seeking to assist a lawsuit filed by Pro Publica journalist Michael Grabell, who has been fighting New York City for answers about X-ray vans for 3 years.“ProPublica filed the request as part of its investigation into the proliferation of security equipment, including airport body scanners, that expose people to ionizing radiation, which can mutate DNA and increase the risk of cancer,” he explained. (For fear of a terrorist “dirty bomb,” America’s security apparatus is exposing its population to radiation as a matter of course.)
  • A state court has already ruled that the NYPD has to turn over policies, procedures, and training manuals that shape uses of X-rays; reports on past deployments; information on the costs of the X-ray devices and the number of vans purchased; and information on the health and safety effects of the technology. But New York City is fighting on appeal to suppress that information and more, as if it is some kind of spy agency rather than a municipal police department operating on domestic soil, ostensibly at the pleasure of city residents.Its insistence on extreme secrecy is part of an alarming trend. The people of New York City are effectively being denied the ability to decide how they want to be policed.
  • ...3 more annotations...
  • For all we know, the NYPD might be bombarding apartment houses with radiation while people are inside or peering inside vehicles on the street as unwitting passersby are exposed to radiation. The city’s position—that New Yorkers have no right to know if that is happening or not—is so absurd that one can hardly believe they’re taking it. These are properly political questions. And it’s unlikely a target would ever notice. “Once equipped, the van—which looks like a standard delivery van—takes less than 15 seconds to scan a vehicle,” Fox News reported after looking at X-ray vans owned by the federal government. “It can be operated remotely from more than 1,500 feet and can be equipped with optional technology to identify radioactivity as well.”
  • And since the technology can see through clothing, it is easy to imagine a misbehaving NYPD officer abusing it if there are not sufficient safeguards in place. Trusting the NYPD to choose prudent, sufficient safeguards under cover of secrecy is folly. This is the same department that spent 6 years conducting surveillance on innocent Muslims Americans in a program so unfocused that it produced zero leads—and that has brutalized New York City protestors on numerous occasions. Time and again it’s shown that outside oversight is needed.Lest readers outside New York City presume that their walls still stand between them and their local law enforcement agency, that isn’t necessarily the case. Back in January, in an article that got remarkably little attention, USA Today reported the following:
  • At least 50 U.S. law enforcementagencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance. Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
  •  
    About the technology from the patent holder's web site: http://as-e.com/resource-center/technology/z-backscatter/ Example photos of the Z Backspatter Vans and examples of X-Ray photos taken with it. https://goo.gl/MO1TVi  Forty percent higher radiation than airport security scanners. with a range of over a thousand feet. 12-seconds to conduct a scan.  
4More

DiGenova: Rice Ordered 'Spreadsheets | The Daily Caller - 0 views

  • Former President Barack Obama’s national security adviser Susan Rice ordered U.S. spy agencies to produce “detailed spreadsheets” of legal phone calls involving Donald Trump and his aides when he was running for president, according to former U.S. Attorney Joseph diGenova. “What was produced by the intelligence community at the request of Ms. Rice were detailed spreadsheets of intercepted phone calls with unmasked Trump associates in perfectly legal conversations with individuals,” diGenova told The Daily Caller News Foundation Investigative Group Monday. “The overheard conversations involved no illegal activity by anybody of the Trump associates, or anyone they were speaking with,” diGenova said. “In short, the only apparent illegal activity was the unmasking of the people in the calls.”
  • Other official sources with direct knowledge and who requested anonymity confirmed to TheDCNF diGenova’s description of surveillance reports Rice ordered one year before the 2016 presidential election. Also on Monday, Fox News and Bloomberg News, citing multiple sources reported that Rice had requested the intelligence information that was produced in a highly organized operation. Fox said the unmasked names of Trump aides were given to officials at the National Security Council (NSC), the Department of Defense, James Clapper, President Obama’s Director of National Intelligence, and John Brennan, Obama’s CIA Director. Joining Rice in the alleged White House operations was her deputy Ben Rhodes, according to Fox. Critics of the atmosphere prevailing throughout the Obama administration’s last year in office point to former Obama Deputy Defense Secretary Evelyn Farkas who admitted in a March 2 television interview on MSNBC that she “was urging my former colleagues,” to “get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration.”
  • Michael Doran, former NSC senior director, told TheDCNF Monday that “somebody blew a hole in the wall between national security secrets and partisan politics.” This “was a stream of information that was supposed to be hermetically sealed from politics and the Obama administration found a way to blow a hole in that wall,” he said.
  • ...1 more annotation...
  • Doran charged that potential serious crimes were undertaken because “this is a leaking of signal intelligence.” “That’s a felony,” he told TheDCNF. “And you can get 10 years for that. It is a tremendous abuse of the system. We’re not supposed to be monitoring American citizens. Bigger than the crime, is the breach of public trust.” Waurishuk said he was most dismayed that “this is now using national intelligence assets and capabilities to spy on the elected, yet-to-be-seated president.” “We’re looking at a potential constitutional crisis from the standpoint that we used an extremely strong capability that’s supposed to be used to safeguard and protect the country,” he said. “And we used it for political purposes by a sitting president. That takes on a new precedent.”
4More

State witness turning point in Netanyahu corruption case | The News Tribune - 0 views

  • Now that one of Benjamin Netanyahu's closest confidants has turned state witness, according to Israeli media reports Wednesday, it may mark a turning point for the beleaguered prime minister facing a slew of corruption allegations that could topple him from power. The testimony by Shlomo Filber, a long-time Netanyahu aide, is the latest in a dizzying series of developments and scandals that have engulfed the prime minister, his family and his inner circle. Police would not confirm whether Filber would testify against Netanyahu, but all the major Israeli media outlets said a deal to do so had been reached. Aluf Benn, editor-in-chief of the Haaretz daily, wrote Wednesday that "these are the final days of Benjamin Netanyahu's rule" and that "Netanyahu's leadership has been dealt a harsh blow, apparently a mortal one."
  • Former Prime Minister Ehud Barak, a bitter rival of Netanyahu, told Channel 10 TV "there is no way back" for the premier. "This chapter in the political history of Israel is about to end," he said. Barak said he closely knows Netanyahu and believes he "understands that this is the end of the story" but will try and postpone the inevitable in different ways. Other leading Israeli columnists on Wednesday suggested that if Filber told all he knew, Netanyahu was probably more worried about avoiding prison than staying in office. "When so many dark clouds accumulate in the sky, the chances of rain increase," wrote Nahum Barnea in Yediot Ahronot. "His appearance lent the fight he is waging the dimensions of a Shakespearean tragedy. This isn't the end. It isn't even the beginning of the end. But it cannot have a different end."
  • Filber, the former director of the Communications Ministry under Netanyahu, is under arrest on suspicion of promoting regulation worth hundreds of millions of dollars to Israel's Bezeq telecom company. In return, Bezeq's popular news site, Walla, allegedly provided favorable coverage of Netanyahu and his family. The reports came shortly after another bombshell allegation that a different Netanyahu confidant attempted to bribe a judge in exchange for dropping a corruption case against Netanyahu's wife. Nir Hefetz, a longtime media adviser to Netanyahu and his family, remains in custody. The prime minister, who held the communications portfolio until last year, has not yet been named a suspect, though he may soon be questioned. Netanyahu has denied all the charges, calling them part of a media-orchestrated witch hunt that has swept up the police and prosecution as well, and has vowed to carry on. Still, the string of accusations appears to be taking its toll. Senior Cabinet ministers from Netanyahu's ruling Likud party, who until just recently have marched out dutifully to defend him, have largely gone silent. Netanyahu himself appeared ashen in a video released late Tuesday calling the claims "total madness."
  • ...1 more annotation...
  • Avi Gabbay, head of Labor Party, said he was preparing for elections. "The Netanyahu era is over," he said. "These are not easy days. Netanyahu's personal battle for survival has been accompanied by the corrupting of the public service and the harming of the free press." The latest probes come days after police announced that there was sufficient evidence to indict Netanyahu for bribery, fraud and breach of trust in two separate cases.
« First ‹ Previous 101 - 117 of 117
Showing 20 items per page