Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Police" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
4More

Turkey's Erdogan Gets Taste of His Own Medicine? « LewRockwell.com Blog - 0 views

  • After nearly a week of increasing public protests in Turkey, ostensibly over government plans to turn a last bit of green space in Istanbul into another shopping mall, matters became far more serious on Friday. Riot police descended on the protestors with various forms of tear gas (and possibly worse chemical and biological agents -- raw sewage?) and water cannon, blasting everyone and everything in sight including non-participants. When they caught protestors, they beat them violently and brutally, as can be seen in this video. Photographs show that police fired tear gas into crowded underground metro stations, leading to panic and worse. Istanbul looks like a war zone. Today indications are that protests have only increased in number and fury in response to the violence with which they were met yesterday.
  • Prime Minister Recep Tayyip Erdogan has come under increased criticism at home over his enthusiastic support for those fighting to overthrow the government in neighboring Syria. Turkish government support for the rebels came early and has included providing safe havens for the Islamist insurgents and safe passage into Syria from Libya, Yemen, and other countries of the insurgents' origin. Erdogan's stated policy of "zero problems with neighbors" has been turned on its head by his support for the rebels fighting next door. Public dissatisfaction with the Turkish government's policy of encouraging an Islamist insurgency next door has steadily increased. The insurgents fighting the Syrian government were still unsatisfied by the level of support they received from their Turkish hosts and they took to false flag attacks in places like Reyhanli and a planned false-flag sarin gas attack on southern Turkey in Adana in attempt to provoke a Turkish (and NATO) military response against Syria.
  • Suddenly the tables are turned at home. Faced with a nascent but growing protest movement of his own, Erdogan expresses a very different view toward the people in the street. The Prime Minister strongly supported the "Arab Spring" overthrow in Egypt and supports the overthrow of Assad next door because he said the leaders of these countries did not listen to their people. Just last week he met with President Obama and agreed that "Assad must go." Now with protesters in Turkey chanting "Erdogan must go" he is singing a different tune. Now "the people" he claimed to speak for -- on the streets in Egypt and Syria, at least -- were, in Turkey, "with terror, have dark ties," in his words. Suddenly "the people" are not so noble when they are calling for his ouster. With the tables turned on Erdogan, he can only demand order! "I call on the protesters to stop their demonstrations immediately," he thundered yesterday. Erdogan caught the tiger by the tail and thought he would become a new Ottoman Sultan. Reality bites back hard on the streets of Istanbul and elsewhere. This is far from over.
  •  
    The U.S. Pipelinestan war-by-proxy against Syria as a proxy for war against Iran as a proxy for war against Russia's lock on the natural gas market for the E.U. continues to run up against a rock wall of unanticipated consequences. With U.S. Patriot missile batteries stationed along Turkey's border with Syria through which Qatar's mercenary Al Qaeda forces are infiltrated and supplied, Turkey's autocratic government suddenly faces its own Arab Spring uprising.  With Obama trumpeting that Syrian use of chemical weapons would "cross a red line" justifying direct U.S. intervention, a mercenary false flag chemical attack in Turkey is unmasked. 
21More

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
6More

The Alamo II: Texans Up in Arms over TransCanada Land Grab - 0 views

  • Texans are having nightmares of a Niger Delta nature, and while they have always been the friends of Big Oil, TransCanada is changing the rules of the game in a legally-aided land grab that will test just how tough Texans are.
  • The lawsuits against TransCanada are piling up to the dismay of the Keystone XL pipeline project, which has been beleaguered by political, socio-economic, environmental and legal woes at every step from its US origins in Montana to its final destination point in south Texas. No one thought Texas would be part of the problem: Texans love their pipelines. Why the change of heart, then? The simplest answer is that Texans love their pipelines because Big Oil has been paying big bucks for the privilege of running them through Texas farmland, but TransCanada is bullying them out of their fair share. This is how it works: TransCanada makes an unacceptably low offer for the land it needs; the landowner rejects the offer; TransCanada gets the land condemned in court; then it legally acquires the land for a fraction of its original offer. Condemning land is not a new tactic by Big Oil, but while US oil companies have traditionally kept this to a minimum, TransCanada has taken far too much advantage of this legal loophole to get what it wants. According to CNBC.com, the Canadian company has so far condemned over 100 tracts of land out of the 800 tracts it has acquired for the pipeline in Texas.
  • Since Texans are being forced to give up their land for peanuts for the bigger picture “common good”, let’s look at why they aren’t buying it and why they don’t feel any less patriotic for their opinion. (Common good in this case meaning “national interest”)
  • ...2 more annotations...
  • First of all, Texans point out that TransCanada is a foreign company that does not feel obliged necessarily to use American steel for its pipeline construction. According to media reports, a large percentage of the steel used for construction is imported. They also balk at the idea that much of the tar sands oil refined it Texas will be exported via the Gulf of Mexico. If the US is going to export its crude oil that should mean that it is producing more than it needs. In other words, the US must achieve oil independence before it starts exporting oil; otherwise it’s moving away from rather than toward independence. Every good Texan knows this. The US is producing about 6.2 million bpd this year, and consuming twice that. To the Texan mind, foreign-company plus exports does not add up to a reduction of US independence on foreign oil. It only adds up to revenues for TransCanada and Big Oil.
  • What is most interesting is that Texans will end up making Keystone XL a bipartisan issue. Previously, anyone who balked at Keystone XL environmental and socio-economic risks was a tree-hugging hippie. Anyone supporting Keystone XL was a Big Oil “yes man” with no respect for the environment. With Texans now up in arms over Keystone XL thanks to TransCanada, the debate will metamorphose into something more rational. The Texans, in their own unique way, will bring legitimacy to this debate. After all, no one could accuse them of being tree-hugging liberals. Texans want Keystone, they want pipelines, but they won’t stand for being cut out of the “common good” equation. To this end, some landowners are opening the gates to activists to stage protests, and this has so far ended in a handful of arrests.
  •  
    Keep your eye on this battle. It sounds like the same conditions that led to the farmer uprising over the Minnesota Powerline Project in the late 70s. < http://en.wikipedia.org/wiki/CU_project_controversy#Organizations_formed_to_fight_the_power_line >.   In that fiasco, farmers occupied tower construction sites, tore down towers, shot out over 10K power line insulators, and sprayed hog manure on the state police using manure spreaders, on and on. And the establishment couldn't get a single criminal conviction because juries simply refused to find accused protesters guilty. A good time was had by all. 'Twas a marvelous rebellion, going well beyond passive resistance to include rampant sabotage. Will Texas farmers and ranchers follow that lead? It sounds like they may be.    
3More

Lawmakers warn of 'radical' move by NSA to share information | TheHill - 0 views

  • A bipartisan pair of lawmakers is expressing alarm at reported changes at the National Security Agency that would allow the intelligence service’s information to be used for policing efforts in the United States.“If media accounts are true, this radical policy shift by the NSA would be unconstitutional, and dangerous,” Reps. Ted Lieu (D-Calif.) and Blake FarentholdBlake FarentholdLawmakers warn of 'radical' move by NSA to share information Overnight Tech: Netflix scores win over Postal Service Lawmakers go green for St. Patrick's Day MORE (R-Texas) wrote in a letter to the spy agency this week. “The proposed shift in the relationship between our intelligence agencies and the American people should not be done in secret.ADVERTISEMENT“NSA’s mission has never been, and should never be, domestic policing or domestic spying.”The NSA has yet to publicly announce the change, but The New York Times reported last month that the administration was poised to expand the agency's ability to share information that it picks up about people’s communications with other intelligence agencies.The modification would open the door for the NSA to give the FBI and other federal agencies uncensored communications of foreigners and Americans picked up incidentally —&nbsp;but without a warrant — during sweeps. &nbsp;
  • Robert Litt, the general counsel at the Office of the Director of National Intelligence, told the Times that it was finalizing a 21-page draft of procedures to allow the expanded sharing. &nbsp;Separately, the Guardian reported earlier this month that the FBI had quietly changed its internal privacy rules to allow direct access to the NSA’s massive storehouse of communication data picked up on Internet service providers and websites.The revelations unnerved civil liberties advocates, who encouraged lawmakers to demand answers of the spy agency.“Under a policy like this, information collected by the NSA would be available to a host of federal agencies that may use it to investigate and prosecute domestic crimes,” said Neema Singh Guliani, legislative counsel and the American Civil Liberties Union. “Making such a change without authorization from Congress or the opportunity for debate would ignore public demands for greater transparency and oversight over intelligence activities.”In their letter this week, Lieu and Farenthold warned that the NSA’s changes would undermine Congress and unconstitutionally violate people’s privacy rights. &nbsp;&nbsp;
  • “The executive branch would be violating the separation of powers by unilaterally transferring warrantless data collected under the NSA’s extraordinary authority to domestic agencies, which do not have such authority,” they wrote.“Domestic law enforcement agencies — which need a warrant supported by probable cause to search or seize — cannot do an end run around the Fourth Amendment by searching warrantless information collected by the NSA.”
15More

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.&nbsp; Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.&nbsp; The answer is remarkably simple.&nbsp; For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.&nbsp; Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.&nbsp; Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.” &nbsp;This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.&nbsp; To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.&nbsp; It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.&nbsp; Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.&nbsp; In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
4More

Court Rules Feds Need Warrant to Access Drug Prescriptions Database | American Civil Li... - 0 views

  • In a significant win for the privacy rights of anyone who has ever gotten a drug prescription, a federal judge in Oregon ruled yesterday that the DEA needs a warrant to search confidential prescription records. Oregon, like 48 other states, has a Prescription Drug Monitoring Program (PDMP), which tracks patients’ prescriptions for medications used to treat a long list of sensitive medical conditions. Although Oregon law requires police to get a warrant from a judge before searching prescription records in the database, the DEA has been requesting records using administrative subpoenas, which do not involve judicial authorization or probable cause. After the State of Oregon sued the DEA over this practice, the ACLU and ACLU of Oregon joined the suit on behalf of four patients and a doctor in the state. Last month, we argued in court that the DEA is violating the Fourth Amendment by bypassing the Constitution’s warrant requirement when seeking private prescription records. Yesterday, the court agreed. The court’s ruling is the first time a judge has held that law enforcement must get a probable cause warrant to access confidential prescription records from a state database in a criminal investigation. The opinion is significant for several reasons.
  • First, the court soundly rejected the DEA’s extreme argument that people lose their Fourth Amendment privacy rights in their medical information when they engage in confidential discussions with their doctor and pharmacist about their illnesses and treatment decisions. The federal government had argued that the “third party doctrine” applied, comparing confidential prescription records to electricity consumption records, bank records, and other categories of information held by third-party companies, for which courts have said police don’t need a warrant. The judge batted this argument aside, explaining that prescription records are “more inherently personal or private than bank records, and are entitled to and treated with a heightened expectation of privacy.” As the court held: “Although there is not an absolute right to privacy in prescription information, as patients must expect that physicians, pharmacists, and other medical personnel can and must access their records, it is more than reasonable for patients to believe that law enforcement agencies will not have unfettered access to their records.” More importantly, this ruling fits into a series of recent opinions calling into question the continuing vitality of the third party doctrine in modern society. As Justice Sotomayor wrote in United States v. Jonestwo years ago, “it may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.” This sentiment was echoed by the federal judge who ruled last year that the NSA’s bulk telephone metadata program violates the Fourth Amendment. The Oregon case is another blow to the third party doctrine’s shaky foundation.
  • In addition, although yesterday’s ruling is only binding within Oregon, it will be persuasive precedent for courts evaluating law enforcement’s use of subpoenas to obtain private prescription records—and similar information—around the country. The case is a reminder to the DEA and other law enforcement agencies that they are not above the law, and that they must comply with the Fourth Amendment’s warrant requirement when seeking sensitive information in criminal investigations. Finally, the case should add momentum to a movement within state legislatures to amend PDMP statutes to require police to get a warrant for prescription records. Ten states currently require a warrant as a matter of state law (Rhode Island was the most recent state to add this requirement, last year). The Pennsylvania House has passed legislation creating a warrant requirement for that state’s PDMP, and is waiting for the state senate to act. The Florida legislature may update the privacy protections for its PDMP this year. Action by state legislatures will send a strong message to the DEA that it should be getting warrants everywhere, not just in Oregon.
  •  
    A case to watch as it wends it way through the appellate process. A very big win for the ACLU, with major implications for federal intelligence gathering in general. 
2More

Flautre accuses Erdoğan with being 'irresponsible' in corruption scandal - To... - 0 views

  • Hélène Flautre, the co-chairwoman of the EU-Turkey Joint Parliamentary Committee, released a statement on Saturday in which she criticized Turkish Prime Minister Recep Tayyip Erdoğan with being “irresponsible” for accusing those who investigate the recent corruption probe. "I observe the recent developments in Turkey with extreme vigilance, which greatly affect the credit of Prime Minister. In his statements, he accuses those who investigating the probe rather than require light on serious allegations of corruption involving his family is irresponsible. Allegations are certainly not findings, and justice must now continue its work in serenity and independence,” Flautre said. Flautre's statement came after the Council of State's decision on Friday to cancel the Erdoğan government's executive order requiring police and prosecutors to notify their superiors of all investigations, effectively giving the government advance warning of what should be secret investigations.
  • “This is a serious political crisis and the European Union must stand firmly on the side of the defense of the rule of law, avoiding any exploitation of the situation,” her statement added. After the cancellation of the order by the Council of State on Friday, Erdoğan said he would prosecute Turkey's top judicial body if he had the authority because it “committed a crime.” Erdoğan claimed the Supreme Board of Judges and Prosecutors (HSYK) has committed a crime by issuing a statement about a judicial police regulation while it was being assessed at the Council of State. On Thursday, the HSYK has harshly criticized the new judicial police regulation, saying that it is in violation of the Turkish Constitution. The Erdoğan government's interference into and pressure on the judiciary was met with a huge backlash from opposition parties, bar associations, advocacy groups and the media. It has raised concerns of an attempted government cover-up of the corruption probe that has implicated prominent people in the business community and government.
7More

Team America no longer wants to be the World's Police - 1 views

  • We've written repeatedly in this space over the past two weeks about how much Americans (and Congress) don't want to get involved in what's going on in Syria. This much is clear. But Americans' hesitation isn't really about Syria; it's more about their increasingly non-interventionist attitude toward foreign policy.
  • Case in point: opposition to military action in Syria tracks very closely to overall opposition to foreign intervention. Take two new polls. A newly released CBS News/New York Times poll asked people whether they felt the United States should "take the leading role ... in trying to solve international conflicts."
  • A CNN/Opinion Research poll, meanwhile, asked: "As a general rule, do you think the United States should be ready and willing to use military force around the world, or the United States should be very reluctant to use military force?" In each case, just 34 percent of Americans said they wanted a more involved foreign policy, while more than six in 10 Americans wanted to be more non-interventionist. The CBS/NYT poll also asked whether the United States should seek to remove dictators where it can. Americans opposed this resoundingly, 72-15.
  • ...3 more annotations...
  • President Obama, who is undoubtedly aware of these numbers, sought to address this issue during Tuesday's speech. Obama assured that the United States wouldn't be acting as the "world's policeman" in Syria. "Terrible things happen across the globe, and it is beyond our means to right every wrong," he said. "But when, with modest effort and risk, we can stop children from being gassed to death, and thereby make our own children safer over the long run, I believe we should act. That’s what makes America different. That’s what makes us exceptional." The problem for Obama is that Americans pretty clearly view the proposed military action in Syria as "police"-work. And this, more than the details of chemical weapons attacks and international diplomacy efforts, is what prevents the American public from getting behind military intervention in Syria.
  • What's more interesting is that, in each of these polls, opposition to military action is also higher than it has been in more recent years -- even at the height of the unpopularity of the Iraq and Afghanistan efforts. As recently as 2011, the CNN poll showed 46 percent of Americans saying the United States should be "ready and willing" to use military force; now it's 34 percent. And the 72 percent who opposed overthrowing dictators in the CBS/NYT poll was slightly higher than it was in 2011, 2008 and 2007, and much higher than it was in 2003. In other words, even as the United States withdraws from overseas conflicts, Americans appear to be getting more non-interventionist, not less.
  • We've written repeatedly in this space over the past two weeks about how much Americans (and Congress) don't want to get involved in what's going on in Syria. This much is clear. But Americans' hesitation isn't really about Syria; it's more about their increasingly non-interventionist attitude toward foreign policy.
  •  
    They should have voted for Ron Paul. 
9More

BBC - Blogs - Adam Curtis - Bugger - 1 views

  • The recent revelations by the whistleblower Edward Snowden were fascinating. But they - and all the reactions to them - had one enormous assumption at their heart.That the spies know what they are doing.It is a belief that has been central to much of the journalism about spying and spies over the past fifty years. That the anonymous figures in the intelligence world have a dark omniscience. That they know what's going on in ways that we don't.It doesn't matter whether you hate the spies and believe they are corroding democracy, or if you think they are the noble guardians of the state. In both cases the assumption is that the secret agents know more than we do.
  • But the strange fact is that often when you look into the history of spies what you discover is something very different.It is not the story of men and women who have a better and deeper understanding of the world than we do. In fact in many cases it is the story of weirdos who have created a completely mad version of the world that they then impose on the rest of us.I want to tell some stories about MI5 - and the very strange people who worked there. They are often funny, sometimes rather sad - but always very odd.The stories also show how elites in Britain have used the aura of secret knowledge as a way of maintaining their power. But as their power waned the "secrets" became weirder and weirder.They were helped in this by another group who also felt their power was waning - journalists. And together the journalists and spies concocted a strange, dark world of treachery and deceit which bore very little relationship to what was really going on. And still doesn't.
  • Here is Chapman Pincher being interviewed on the Wogan programme about what then happened. Up to this point Pincher had been the Defence correspondent on the Daily Express. He was successful for getting "scoops" from "inside sources" - although the historian EP Thompson said that really Chapman Pincher was:"A kind of official urinal in which ministers and intelligence and defence chiefs could stand patiently leaking."What the dissident MI5 agents now told Pincher was like super high-grade piss. Or, as he puts it in the Wogan interview, "it was like walking into an Aladdin's Cave". But what Pincher wrote was going to open the floodgates to a new kind of conspiracy journalism that still holds sway over large parts of the media imagination.Have a look at him and decide yourself - high grade toilet or investigative journalist? Or maybe often they are the same thing?
  • ...5 more annotations...
  • But something else happened to all the intelligence agencies during the war - MI6 as well as MI5. As they grew massively in size they became riddled with factions and infighting. And because all this happened behind a wall of secrecy, there was little to stop things becoming vicious and poisonous.The journalist Phillip Knightley has written a really good history of spies - called The Second Oldest Profession. In it he quotes an agent describing what happened during the war years:"The whole organisation was riddled with nepotism - dim, dreary people of utter unmemorability; sub-men who were doubled up with other sub-men to create an illusion of strength and only doubled the weakness; others made memorable only by poisonous, corrupt malevolence or crass, mulish stupidity; the whole run by a chain of command remarkable for its feebleness. The entire service was decrepit and incompetent."
  • The case that really shocked Mrs Thatcher was the traitor Geoffrey Prime. In the 1970s he had worked at the top secret listening centre GCHQ and had been selling all it's secrets to the Russians.
  • And yet again it wasn't MI5 who uncovered his treachery - it was the local police in Cheltenham.In 1982 a policeman came to his house enquiring about his car - a rather distinct two-tone brown and white Mk IV Cortina - a which had been seen in the vicinity of an assault on a young girl.Prime told the policeman that he had been at home all day. But that evening he and his wife Rhona went for a drive to the top of Cleeve Hill. As they sat in the twilight Prime told Rhona that he was the man the police were looking for. And not only that, he was also a Russian spy.
  • Prime was a paedophile - and had used spying techniques to monitor the activities of thousands of young girls around Cheltenham. He had created a vast set of index cards which showed when the girls were most likely to be alone at home. He then went round to their houses in his two tone Cortina and sexually assaulted them.Despite this Prime had been positively vetted six times. Even the Russians got worried about his paedophile activities and seemed to want to dump him. In 1980 Prime had gone to Vienna to meet the KGB. Instead of meeting him secretly as they normally did, the Russians took him openly to the best restaurants where they knew Western intelligence agents would recognise them as KGB agents.But even then noone noticed them - or Prime.Prime's wife Rhona wrestled with her conscience - and in the end went to the police and told them everything about Prime. He was sent to jail for 35 years for spying and 3 years for the assaults on young girls - which says a lot about the priorities of the British establishment at that time.
  • The cases of Bettaney and Prime revealed not only just how incompetent MI5 was - but also how sad and seedy the secret world of spies really was.
  •  
    Fascinating in-depth article on the history of British spy agencies' incompetence. From the great MI5 media hoax during World War I that the agency's reputation was built upon through the failures to foresee the collapse of the Soviet Union and the false report of WMDs in Iraq, the author builds a compelling case that the excessive secrecy and incompetence of the British Security Service staff has resulted in a marvelous collection of wackos mired in fantasies of conspiracies within conspiracies who feed gullible journalists lie after lie. Very well-written, Interspersed with spot-on historical videos. Well worth the read and watch. I've highlighted only small tidbits to avoid playing the part of a spoiler.      
5More

Cops And Second Chances In America | Popehat - 0 views

  • Officer Rush's arguments were ultimately rejected: Karla Rush, an officer based in East Oakland, faced especially severe charges. Of the 40 search warrants she had filed between March of 2007 and August 2008, 39 were fraudulent. Rush claimed that her misconduct was the result of poor training, but an arbitrator rejected her assertion, saying, "telling the truth is not a matter of training," according to court documents.
  • But isn't this America? Isn't Karla Rush an American? Isn't America a place where people like Carlos Danger get second chances? Yes. Yes it is. So Karla Rush — fired for multiple fraudulent search warrant applications — is employed as a law enforcement officer again. Maybe this isn't a shock to you. The criminal justice system decides to rely upon (and often conceal the misconduct of) dirty cops all the time. Just look at cops like Armando Saldate, Jr. in Arizona. Karla Rush probably got re-hired by some ultra-conservative small town department in some red state, right?
  • Yep. That's right. UC Berkeley — the hobgoblin of conservatives, the famously nutty liberal enclave — re-hired a police officer fired for filing fraudulent search warrants. After all, what's important in hiring a police officer?
  • ...1 more annotation...
  • Now, citizen, if you're concerned that misconduct is too easily forgiven and ignored in our society, take heart: the vast majority of people who get in serious trouble experience life-altering consequences that prevents them from ever getting similar jobs again, even after any draconian criminal sentences. Felony convictions, for instance, reliably keep people out of most positions of responsibility, not to mention housing, loans, youth activities, etc. So don't worry: the class of people who can commit grave misconduct with few long-term consequences is usually limited to law enforcement and, you know, banks and stuff. We want to be safe, right? So why should it bother us that, even in hotbeds of "liberalism," law enforcement misconduct generates little more than a shrug? Why should we be concerned that the "left" — once reliably protective of the rights of the accused — is now often a mouthpiece for "law and order" and contemptuous of the rights of the accused?
  •  
    The author, Ken White, is a former U.S. Dept. of Justice criminal prosecutor, a Libertarian, but he plays no favorites; he's also a civil libertarian and a leader in protection of First Amendment rights. He's one of my favorite bloggers. He has a real gift for sarcasm, which shines all over this gem. Well worth the read; this is a shining example of exemplary writing.
4More

Ed Markey letters from cellphone companies: How often AT&amp;T, T-mobile give the governmen... - 0 views

  • Cellphones are the spies in our pockets, gathering information about whom we befriend, what we say, where we go, and what we read. That’s why Sen. Edward Markey, D-Mass., recently asked the nation’s major cellphone companies to disclose how frequently they receive requests from law enforcement for customer call records—including the content of communications, numbers dialed, websites visited, and location data. Sometimes police have a warrant, sometimes they don’t. Seven companies provided information in response to the inqury. The letters Markey received, which were covered today in the Boston Globe, Washington Post, and New York Times, show that the quantity of requests for these records is staggering. T-Mobile and AT&amp;T together received nearly 600,000 requests for customer information in 2012. AT&amp;T has to employ more than 100 full-time workers to process them. And police demand for our call records is growing rapidly, with requests to Verizon doubling in the last five years.
  • he companies keep records of where you have traveled in the past and can track you in real time—so law enforcement can do it, too. In some ways having a police officer track you in real time electronically is even worse, because you never know when it’s happening. Historical records can be even more sensitive than real-time tracking, stretching back for months or even years, and reveal your daily routine and every deviation from it.
  • Unfortunately, according to the companies’ letters, some of them appear to be handing over the content of our digital communications without a warrant. AT&amp;T discloses stored texts or voicemails that are older than 180 days old with a subpoena—no court supervision or probable cause required. In one bright spot, T-Mobile requires a warrant for texts and voicemails. The letters also show that in its search for evidence about a handful of guilty people, law enforcement often obtains the data of hundreds or thousands of innocent people. For example, through a technique known as “tower dumps,” law enforcement agents can see all of the cellphones using a particular tower in a given time range. There were approximately 9,000 tower dumps reported in 2012 (with not all companies reporting). What happens to that data? Could it be used for future investigations? No one really knows, because there are no clear policies in place, and the people whose data is turned over are never notified.
  •  
    Note that this is about requests from *law enforcement," not from the federal spy agencies. 
2More

After Atlanta raid tragedy, new scrutiny of police tactics - CSMonitor.com - 0 views

  • The number of no-knock raids has increased from 3,000 in 1981 to more than 50,000 last year, according to Peter Kraska, a criminologist at Eastern Kentucky University in Richmond.
  • The legal precept for knocking before entering goes back to the Middle Ages. But US courts have allowed no-knock raids, with some limits. In June, the Supreme Court upheld a previous no-knock decision that said police should wait at least 15 seconds for an occupant to answer before bursting through the door. (A longer wait might give a drug dealer time to flush evidence down the toilet.) But in the same decision, the court decided by a 5-to-4 vote to allow evidence gained in raids that used less time than that.The upshot, says Mr. Moran, who argued that case for the plaintiff in front of the Supreme Court, is that "we'll see a lot more of these [no-knock] raids in the future."
4More

CISPA is back! - 0 views

  • OPERATION: Fax Big Brother Congress is rushing toward a vote on CISA, the worst spying bill yet. CISA would grant sweeping legal immunity to giant companies like Facebook and Google, allowing them to do almost anything they want with your data. In exchange, they'll share even more of your personal information with the government, all in the name of "cybersecurity." CISA won't stop hackers — Congress is stuck in 1984 and doesn't understand modern technology. So this week we're sending them thousands of faxes — technology that is hopefully old enough for them to understand. Stop CISA. Send a fax now!
  • (Any tweet w/ #faxbigbrother will get faxed too!) Your email is only shown in your fax to Congress. We won't add you to any mailing lists.
  • CISA: the dirty deal between government and corporate giants. It's the dirty deal that lets much of government from the NSA to local police get your private data from your favorite websites and lets them use it without due process. The government is proposing a massive bribe—they will give corporations immunity for breaking virtually any law if they do so while providing the NSA, DHS, DEA, and local police surveillance access to everyone's data in exchange for getting away with crimes, like fraud, money laundering, or illegal wiretapping. Specifically it incentivizes companies to automatically and simultaneously transfer your data to the DHS, NSA, FBI, and local police with all of your personally-indentifying information by giving companies legal immunity (notwithstanding any law), and on top of that, you can't use the Freedom of Information Act to find out what has been shared.
  • ...1 more annotation...
  • The NSA and members of Congress want to pass a "cybersecurity" bill so badly, they’re using the recent hack of the Office of Personnel Management as justification for bringing CISA back up and rushing it through. In reality, the OPM hack just shows that the government has not been a good steward of sensitive data and they need to institute real security measures to fix their problems. The truth is that CISA could not have prevented the OPM hack, and no Senator could explain how it could have. Congress and the NSA are using irrational hysteria to turn the Internet into a place where the government has overly broad, unchecked powers. Why Faxes? Since 2012, online and civil liberties groups and 30,000+ sites have driven more than 2.6 million emails and hundreds of thousands of calls, tweets and more to Congress opposing overly broad cybersecurity legislation. Congress has tried to pass CISA in one form or another 4 times, and they were beat back every time by people like you. It's clear Congress is completely out of touch with modern technology, so this week, as Congress rushes toward a vote on CISA, we are going to send them thousands of faxes, a technology from the 1980s that is hopefully antiquated enough for them to understand. Sending a fax is super easy — you can use this page to send a fax. Any tweet with the hashtag #faxbigbrother will get turned into a fax to Congress too, so what are you waiting for? Click here to send a fax now!
3More

Justice Dept. to Require Warrants for Some Cellphone Tracking - The New York Times - 0 views

  • The Justice Department will regularly require federal agents to seek warrants before using secretive equipment that can locate and track cellphones, the agency announced Thursday, the first regulations on an increasingly controversial technology.The new policy, which also limits what information may be collected and how long it can be stored, puts a measure of judicial oversight on a technology that was designed to hunt terrorists overseas but has become a popular tool among federal agents and local police officers for fighting crime.Civil libertarians have expressed grave privacy concerns about the technology’s proliferation, but the new Justice Department policies do not apply to local police forces.
  • The device, commonly called a cell-site simulator or StingRay, tricks cellphones into connecting with it by acting like a cell tower, allowing the authorities to determine the location of a tracked phone. In doing so, however, the equipment also connects with all other phones in the area, allowing investigators to collect information on people not suspected of any crime.The device is also capable of capturing calls, text messages, emails and other data. Until Thursday’s regulations, the rules for the use of that information and the duration it could be kept had not been detailed and varied across the department’s offices and agencies.
  •  
    A policy is not a law. DoJ is trying to spread some tanglefoot for civil liberties organizations that are prepping litigation over unfettered abuse of Stingray devices by federal, state, and local officials. Warrantless use of Stingrays has been severely undermined by recent Supreme Court rulings, notably U.S. v. Jones and Riley v. California.
5More

Lethal Israeli - Palestinian Conflict Escalates | nsnbc international - 0 views

  • Conflict between Israel and Palestine escalates as youth throughout Palestine vent their frustrations over decades of illegal occupation and an escalation of Israeli oppression and violence. The renewed round of violence takes its toll on both Israelis and Palestinians. &nbsp;
  • Violent clashes between Israeli occupation forces, settlers and Palestinians have escalated throughout Palestine since the beginning of the intensified Israeli crackdown against Palestinians at the Al-Aqsa mosque in Jerusalem, last month. On Sunday Israeli troops carried out a raid against the International Middle East Media Center (IMEMC). The center disseminates a lot of regional and local news coverage that otherwise only is available in Arab to English-speaking listeners and readers. The raid was carried out Sunday morning at 4.00 o’clock. Over the weekend a rocket was fired into Israeli territory from the Gaza Strip. The rocket landed without causing damage. Sunday at dawn Israel responded by launching air strikes against targets in the Gaza Strip. Israeli military and government sources say that the strikes aimed at targeting militants.
  • One of these air strikes struck a family home in the Zeitoun neighborhood of Gaza City. The air raid killed a five months pregnant Palestinian mother along with her two-year-old child while several other family members were injured. The husband of the deceased 30-year-old Nour Rasmi Hassan told that a “knock on the roof rocket” woke the family from their sleep but that they were confused, shocked and that there was no time to respond and flee their home before the house was struck. Frustrated Palestinian youth are confronting Palestinian police and military in occupied East Jerusalem and other occupied Palestinian territories. Clashes in the interim Palestinian capital Ramallah turned deadly on Sunday evening when a 13-year-old boy succumbed to the his injuries. The 13-year-old Ahmad had been struck in the head by a rubber-coated steel bullet fired by Israeli occupation forces earlier that day. The fatal shooting occurred close to the Beit El settlement northeast of al-Biereh.
  • ...2 more annotations...
  • Last week Israeli undercover agents infiltrated Palestinian protesters near Beit El, grabbing some, beating, kicking and injuring them severely. Meanwhile, some frustrated Palestinian youth have carried out knife attacks against Israeli settlers and citizens, venting their frustrations. Knife attacks began after the willful fatal shooting of an unarmed Palestinian youth by Israeli officers. A video captured the fatal shooting and the cheering words “kill him, kill him” before the fatal shots were fired. Several analysts noted that the latest round of violence has the potential to escalate into a full-scale Palestinian uprising. The Israeli crackdown against Palestinians has further soured Egyptian – Israeli relations. Last week the spokesman for the Egyptian Foreign Ministry,&nbsp;Ahmed Abu Zeid said that&nbsp;Israel as the occupying power must&nbsp;provide Palestinian people the required protection and stop repeating its attacks that lead to more political congestion among the Palestinians and weaken the opportunities of reviving the installed peace talks between Palestinians and Israel,.
  • Notably, Palestinian Authority President Mahmoud Abbas noted at his address at the 70th Session of the UN General Assembly that the PLO may no longer feel obliged to adhere to the Oslo Accords. Mahmoud Abbas stressed that Palestine could not continue to adhere to the accords as Israel continues to violate them. Several of the progressive PLO member factions, including the PFLP and DFLP have called for a renewed uprising. Both factions have repeatedly demanded that the Al-Fatah led Palestinian Authority immediately ends its so-called security cooperation with Israeli police, military, intelligence services and government. The Israeli Cabinet of Prime Minister Benjamin Netanyahu, for its part, has promised a strict response to any “insurrection”. Over 150 Palestinians have been seriously injured over the course of the last week.
4More

US to UN Human Rights Committee: Move Along, Nothing to See Here | American Civil Liber... - 0 views

  • Yesterday the United States gave the U.N. Human Rights Committee its one year follow-up report on progress made to implement four priority recommendations made by the committee a year ago. The independent human rights experts had reviewed the United States' compliance with a major human rights treaty, the International Covenant on Civil and Political Rights (ICCPR). They found the U.S. coming up short in many areas, including accountability for torture, privacy and surveillance, Guantánamo, and gun violence. Yesterday’s disappointing 15-page submission does provide some information on Justice Department investigations regarding police misconduct, including the recent Ferguson report. But, there was nothing on accountability measures taken in the aftermath of the release of the Senate report on the CIA torture program. The need for Attorney General Eric Holder to appoint a special prosecutor remains as glaring as ever.
  • The submission notes that the Senate report’s 500-page executive summary was “declassified with minimal redactions to protect national security,” but it failed to commit to release the entire report (which the ACLU is currently fighting for in a FOIA lawsuit). And while the submission states that the U.S. “supports transparency and has taken steps to ensure that it never resorts to the use of those [harsh interrogation] techniques again,” there is no mention of any concrete actions taken to criminally investigate CIA torture, especially in light of the new information made public in the report about the brutality of the CIA’s methods, and its lies to Congress, the media, and the public about its torture program. Under the ICCPR and the Convention Against Torture, the U.S. has an obligation to effectively, independently, and impartially investigate all cases of unlawful killing or torture, as well as arbitrary detention or enforced disappearance. The U.S. also has an international legal obligation to appropriately prosecute perpetrators – including high-level policymakers.
  • The U.S. submission mentions the investigation by Justice Department prosecutor John Durham, which he closed in 2012 without any charges being filed. But, the submission fails to provide detailed information on the precise scope of Durham’s mandate. We remain concerned that the investigation may have focused on instances in which interrogators overstepped limits set by senior officials, rather than on the culpability of senior officials themselves. It also remains unclear whether investigators interviewed any prisoners who were subjected to the CIA torture program. During the November 2014 review of the United States before the U.N. Committee Against Torture in Geneva, the committee raised concerns, based on letters and accounts from torture victims or their attorneys, indicating that Durham had never interviewed any detainees. The U.S. delegation responded that it had interviewed 96 persons as part of the investigation, but it did not indicate whether any of the prisoners who were subjected to abuse and torture were amongst those interviewed.
  • ...1 more annotation...
  • A comprehensive criminal investigation by the U.S. government would dissuade future government officials from ordering or using torture and abuse. Failure to conduct an independent criminal investigation not only flouts international law but it also undermines America’s ability to advocate for human rights abroad and compromises Americans’ faith in the rule of law at home. The ACLU and other human rights groups have until May 1st to submit “shadow reports” to the Human Rights Committee, which will subsequently assess and grade U.S. implementation of the key priority recommendations.&nbsp; The Obama administration can still avoid a low grade by responding to domestic and international calls to appoint a special prosecutor to conduct a comprehensive criminal investigation of the tactics described in the Senate torture report, including all acts authorizing or ordering acts of torture and other abuses and provide redress to victims of torture. &nbsp;
2More

Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept - 0 views

  • When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept. We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”
  • The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. Hacking Team’s efforts include a visible push into the U.S. Though Remote Control System is sold around the world — suspected clients include small governments in dozens of countries, from Ethiopia to Kazakhstan to Saudi Arabia to Mexico to Oman — the company keeps one of its three listed worldwide offices in Annapolis, Maryland, on the edge of the federal intelligence and law-enforcement cluster around the nation’s capital; has sent representatives to American homeland security trade shows and conferences, where it has led training seminars like “Cyber Intelligence Solutions to Data Encryption” for police; and has even taken an investment from a firm headed by America’s former ambassador to Italy. The United States is also, according to two separate research teams, far and away Hacking Team’s top nexus for servers, hosting upwards of 100 such systems, roughly a fifth of all its servers globally.
2More

Fanatic Israeli Settlers attack Cars of US Diplomats | nsnbc international - 0 views

  • A number of extremist Israeli settlers hurled stones at cars of an American diplomatic delegation who drove along with Israeli police vehicles to an area near the central West Bank city of Ramallah on Friday. The delegation was on its way to inspect vandalism by Israeli settlers that had targeted hundreds of Palestinian olive trees.
  • The police confirmed that the attackers are from the illegal settlements, and that an investigation is underway; no arrests were made. According to Reuters, an Israeli settler told its correspondent that the US delegates, in two cars, came within some 50 yards from the settlement, accompanied by Palestinian civilians, and alleged that a member of the delegation also withdrew his weapon. The settler told the reporter that he and other settlers then began attacking the delegation. But the Israeli police challenged that account, saying that no one from the U.S. delegation had drawn a weapon, and the consular representatives were attacked by the settlers without provocation. The settlement in question, Adi-Ad, is known as a site of frequent attacks by Israeli settlers against Palestinian civilians. It was established by armed Israeli militias on stolen Palestinian land, and is now home to 40 Israeli families, who live under the protection of armed Israeli soldiers and militias, and frequently invade the surrounding Palestinian villages to attack the unarmed Palestinian civilians who live there.
5More

FBI says search warrants not needed to use &quot;stingrays&quot; in public places | Ars Technica - 0 views

  • The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts. The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans. According to the letter, which was released last week: For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.
  • The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones&nbsp;in a single flight, collecting their identifying information and general location." The bureau's position on Americans' privacy isn't surprising.&nbsp;The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move&nbsp;without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position,&nbsp;tossing evidence gathered by the webcam&nbsp;that was operated from afar.
  • In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers,&nbsp;are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use&nbsp;or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.
  • ...1 more annotation...
  • Hanni Fakhoury, an attorney for the Electronic Frontier Foundation, said some states and judges are pushing back against&nbsp;stingrays. "In Tacoma, judges now require police (to) specifically note they plan to use an IMSI catcher and promise not to store data collected from people who are not investigation targets," he said. "The Florida and&nbsp;Massachusetts state supreme courts ruled warrants were necessary for real-time cell phone tracking. Nine states—Colorado, Illinois, Indiana, Maryland, Minnesota, Tennessee, Utah,&nbsp;Virginia, and Wisconsin—passed laws specifically requiring police to use a warrant to track a cell phone in real time."
  •  
    Is there any problem here that couldn't be cured by discharge and public flogging for any government official caught using information derived from a stingray?
« First ‹ Previous 101 - 120 of 440 Next › Last »
Showing 20 items per page