Category Archives: History

InSecurity Watch: Spies, lies, laws, zones, drones


Our latest edition of tales form the dark side begins with a legal question from Wired:

New Ruling Shows the NSA Can’t Legally Justify Its Phone Spying Anymore

The Eleventh Circuit Court of Appeals said no this week to tracking your movements using data from your cell phone without a warrant when it declared that this information is constitutionally protected.

The case, United States v. Davis , is important not only because it provides substantive and procedural protections against abuse of an increasingly common and highly invasive surveillance method. It also provides support for something Christopher Sprigman and I have said before — that the government’s other “metadata” collection programs are unconstitutional.

The Davis decision, in effect, suggests that the U.S. government’s collection of all kinds of business records and transactional data — commonly called “metadata” — for law enforcement and national security purposes may also be unconstitutional.

The Washington Post raises more legal questions:

4 senators worry about NSA collection of Americans’ e-mails, phone calls

Four Democratic senators have sent a letter to the director of national intelligence expressing concerns about the scope of the collection of Americans’ e-mails and phone calls under a National Security Agency program that targets foreigners overseas.

The lawmakers, led by Jon Tester (D-Mont.), told Director of National Intelligence James R. Clapper Jr. that they were concerned by recent reports by The Washington Post and an independent executive branch panel about the surveillance.

The Post examined 160,000 communications intercepted under the program, which was authorized by Section 702 of the Foreign Intelligence Surveillance Act of 2008. The law does not require individualized warrants.

The Post found that “nearly half of the surveillance files . . . contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents.”

And Wired offers opposition:

A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying

The internet is littered with burgeoning email encryption schemes aimed at thwarting NSA spying. Many of them are focused on solving the usability issues that have plagued complicated encryption schemes like PGP for years. But a new project called Dark Mail plans to go further: to hide your metadata.

Metadata is the pernicious transaction data involving the “To”, “From” and subject fields of email that the NSA finds so valuable for tracking communications and drawing connections between people. Generally, even when email is encrypted, metadata is not. Dark Mail ambitiously aims to revamp existing email structures to hide this data while still making the system universally compatible with existing email clients.

The project has made for an interesting pairing between Texas technologist Ladar Levison and convicted hacker Stephen Watt, whom he’s hired to help develop the code. Both have had previous battles with the government in very different ways.

From Social Science Research Network, a research summary raises troubling questions:

Government Surveillance and Internet Search Behavior

This paper uses data from Google Trends on search terms from before and after the surveillance revelations of June 2013 to analyze whether Google users’ search behavior shifted as a result of an exogenous shock in information about how closely their internet searches were being monitored by the U. S. government.

We use data from Google Trends on search volume for 282 search terms across eleven different countries. These search terms were independently rated for their degree of privacy-sensitivity along multiple dimensions.

Using panel data, our result suggest that cross-nationally, users were less likely to search using search terms that they believed might get them in trouble with the U. S. government. In the U. S., this was the main subset of search terms that were affected. However, internationally there was also a drop in traffic for search terms that were rated as personally sensitive. These results have implications for policy makers in terms of understanding the actual effects on search behavior of disclosures relating to the scale of government surveillance on the Internet and their potential effects on international competitiveness.

From The Hill, another agency, another challenge:

Ex-officials demand to see CIA report

Former top officials at the CIA want to make sure that they get a chance to see an upcoming report about the spy agency’s “enhanced interrogation techniques,” according to new reports on Saturday.

Former CIA Directors George Tenet, Porter Goss and Michael Hayden drafted a letter asking to see the Senate’s executive summary of the so-called “torture report,” which they sent to Senate Intelligence Chairwoman Dianne Feinstein (D-Calif.), the New York Times reported.

The three chiefs and two former acing directors, John McLaughlin and Michael Morell, did reportedly get a chance to see the document, which reviews how controversial practices such as waterboarding were used. But many other top staffers did not.

About a dozen former officials who are named in the report were initially promised the chance to read it, according to the Associated Press. That offer was taken back on Friday, however, due to what CIA officials said was miscommunication.

More from Techdirt:

Senator Wyden Toying With The Idea Of Releasing The Senate’s CIA Torture Report

  • from the the-pressure’s-on dept

Senator Ron Wyden is apparently getting tired of waiting for the White House to use up its buckets of black ink in redacting everything important in the Senate’s big torture report. He’s publicly pondering the idea of using Senate privilege to just release it himself.

As you may recall, the Senate Intelligence Committee spent years and $40 million investigating the CIA’s torture program, and the 6,000+ page report is supposedly devastating in highlighting (1) how useless the program was and (2) how far the CIA went in torturing people (for absolutely no benefit) and (3) how the CIA lied to Congress about all of this. The CIA, not surprisingly, is not too happy about the report. At all. Still, despite its protests, the Senate Intelligence Committee voted to declassify the executive summary of the report.

However, the CIA got to take first crack at figuring out what to redact, which seemed like a massive conflict of interest. Either way, the CIA apparently finally ran out of black ink in late June, and asked the White House to black out whatever else was left. The State Department has already expressed concerns that releasing anything will just anger the public (our response: probably should have thought of that before sending the CIA to torture people). And, now it appears the report is being held up due to “security” concerns.

From Motherboard, Look! Up in the sky! It’s a bird! It’s a plane ! It’s Fibbie Drone!:

Do the FBI’s Drones Invade Your Privacy? Sorry, That’s Private

The FBI has been flying drones since 2005, according to a trickle of documents released over the last eight months. Agents called in a small surveillance drone on a hostage situation in Alabama in February 2013, and to monitor a dog-fighting scheme in August 2011.

But despite a mandatory process designed to mitigate privacy concerns, the question of how FBI drones may be impacting Americans’ privacy rights remains unanswered.

Federal law requires the FBI to assess its own surveillance technologies for potential privacy and civil liberties snags. While these technology assessments are typically prepared for public consumption, the FBI has refused to release its privacy reviews on drones.

The E-Government Act of 2002 obliges federal agencies to conduct a privacy impact assessment (PIA) prior to deploying any information technology that collects personal information. Per Department of Justice guidelines, the PIA process ensures that privacy protections “are built into the system from the start—not after the fact,” in order to “promote trust between the public and the Department by increasing transparency of the Department’s systems and missions.”

Meanwhile, another conflict, another sanction from South China Morning Post:

EU hits Russian intelligence chiefs in new round of sanctions over Ukraine

  • European Union announces broadened sanctions on Russia targeting 15 new individuals and 18 entities with asset freezes and visa bans

The European Union announced on Saturday it had widened its sanctions against Russia over Moscow’s role in conflict-torn Ukraine to include the heads of intelligence services.

The Russian foreign ministry responded later on Saturday, saying the measures put at risk international cooperation over security issues

The director of the FSB security service, Alexander Bortnikov, and the head of the Russian Foreign Intelligence Service, Mikhail Fradkov are on the new list of 15 people and 18 entities targeted by an asset freeze and visa bans, the EU’s Official Journal said. Also on the list is Chechen President Ramzan Kadyrov.

And from Bulletin of the Atomic Scientists, mythbusters:

The evidence that shows Iron Dome is not working

In the early weeks of July, the conflict between Palestinians in Gaza and Israel flared up again, resulting in a new round of large-scale rocket attacks, launched by Hamas, operating from Gaza, against Israeli population centers. The last such large-scale rocket attacks occurred in November 2012.

Initially, the Israeli military responded to the rocket attacks with air strikes in Gaza, and with protective measures that include deployment of the Iron Dome rocket-defense system and a civil defense effort that includes an efficient system for early warning and sheltering of citizens. As of this writing, only one Israeli had died from Hamas fire, apparently from a mortar round (although that number increased with the Israeli invasion of the Gaza Strip begun late last week).

During the November 2012 conflict, a detailed review of a large number of photographs of Iron Dome interceptor contrails revealed that the rocket-defense system’s success rate was very low—as low as 5 percent or, perhaps, even less. A variety of media outlets have attributed the low casualty number to the supposed effectiveness of the Iron Dome system, quoting Israeli officials as saying it has destroyed 90 percent of the Hamas rockets it targeted. But close study of photographic and video imagery of Iron Dome engagements with Hamas rockets—both in the current conflict and in the 2012 hostilities—shows that the low casualties in Israel from artillery rocket attacks can be ascribed to Israeli civil defense efforts, rather than the performance of the Iron Dome missile defense system.

From the Associated Press, who do they think they are? The NSA?:

Turkey: 20 police arrested for illegal wiretaps

Turkey’s state-run news agency says an Istanbul court has charged 20 police officers with illegal wiretapping and ordered their arrest pending a trial.

The Anadolu Agency says 49 other officers are still waiting on Saturday to be questioned and face possible charges.

The officers were detained on July 22 in raids to their homes on suspicion of wiretapping officials, including Prime Minister Recep Tayyip Erdogan.

After the jump, off to Asia for the latest installment of the Games of Zones, Google’s persistent cyberstalking, cops in the Klan, and so much more. . . Continue reading

Chart of the day: China’s new navy dwarfs Japan’s


From South China Morning Post, comparisons of the relative sizes at the time of the Sino-Japanese War 120 years ago and today. Click on the image to enlasrge:

BLOG Sino Japan navies

InSecurity Watch: Spooks, hacks, & tensions


Today’s collection of headlines about matters of spooks, soldiers, and privacy privateers begins with the unsurprising but notable, via the Washington Post:

Proliferation of new online communications services poses hurdles for law enforcement

Federal law enforcement and intelligence authorities say they are increasingly struggling to conduct court-ordered wiretaps on suspects because of a surge in chat services, instant-messaging and other online communications that lack the technical means to be intercepted.

A “large percentage” of wiretap orders to pick up the communications of suspected spies and foreign agents are not being fulfilled, FBI officials said. Law enforcement agents are citing the same challenge in criminal cases; agents, they say, often decline to even seek orders when they know firms lack the means to tap into a suspect’s communications in real time.

“It’s a significant problem, and it’s continuing to get worse,” Amy S. Hess, executive assistant director of the FBI’s Science and Technology Branch, said in a recent interview.

From the McClatchy Washington Bureau, Big Brother is watching:

After CIA gets secret whistleblower email, Congress worries about more spying

The CIA obtained a confidential email to Congress about alleged whistleblower retaliation related to the Senate’s classified report on the agency’s harsh interrogation program, triggering fears that the CIA has been intercepting the communications of officials who handle whistleblower cases.

The CIA got hold of the legally protected email and other unspecified communications between whistleblower officials and lawmakers this spring, people familiar with the matter told McClatchy. It’s unclear how the agency obtained the material.

At the time, the CIA was embroiled in a furious behind-the-scenes battle with the Senate Intelligence Committee over the panel’s investigation of the agency’s interrogation program, including accusations that the CIA illegally monitored computers used in the five-year probe. The CIA has denied the charges.

The email controversy points to holes in the intelligence community’s whistleblower protection systems and raises fresh questions about the extent to which intelligence agencies can elude congressional oversight.

Defense One charts spooky trepidation:

The CIA Fears the Internet of Things

The major themes defining geo-security for the coming decades were explored at a forum on “The Future of Warfare” at the Aspen Security Forum on Thursday, moderated by Defense One Executive Editor Kevin Baron.

Dawn Meyerriecks, the deputy director of the Central Intelligence Agency’s directorate of science and technology, said today’s concerns about cyber war don’t address the looming geo-security threats posed by the Internet of Things, the embedding of computers, sensors, and Internet capabilities into more and more physical objects.

“Smart refrigerators have been used in distributed denial of service attacks,” she said. At least one smart fridge played a role in a massive spam attack last year, involving more than 100,000 internet-connected devices and more than 750,000 spam emails. She also mentioned “smart fluorescent LEDs [that are] are communicating that they need to be replaced but are also being hijacked for other things.

And from The Intercept, partners in crime:

The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police

The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters.

The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents.

But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them. The move is part of the Obama Administration’s increasingly close ties with the Saudi regime; beyond the new cooperation with the MOI, the memo describes “a period of rejuvenation” for the NSA’s relationship with the Saudi Ministry of Defense.

IDG News Service covers another partnership:

Dutch spy agencies can receive NSA data, court rules

Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.

The possibility that data received by Dutch intelligence services AIVD and MIVD could have been collected in a way that would not be legal for the Dutch services, doesn’t mean that receiving this data violates international and national treaties, the court said.

The Hague District Court ruled in a civil case file by a coalition of defense lawyers, privacy advocates and journalists who sued the Dutch government last November. They sought a court order to stop the AIVD and MIVD from obtaining data from foreign intelligence agencies that was not obtained in accordance with European and Dutch law.

A tale of dissension from the McClatchy Washington Bureau:

In Kansas, candidates spar over NSA

As a member of the House Select Committee on Intelligence, Kansas Rep. Mike Pompeo had a front-row seat to the brouhaha that erupted in Washington last year over revelations that the government was secretly collecting Americans’ data.

Todd Tiahrt, Pompeo’s challenger in the upcoming Republican primary for Kansas’ 4th Congressional District, has seized on the incumbent’s proximity to the controversy _ and his voting record _ to attack him. Now Pompeo finds himself in the awkward position of defending the National Security Agency’s surveillance program while campaigning as a tea party stalwart who sympathizes with voters’ distrust of the federal government.

Tiahrt is vulnerable on the issue of privacy too. As a former congressman who also served on the intelligence committee, he voted in favor of warrantless wiretapping and the Patriot Act, which expanded the government’s surveillance powers _ facts that the Pompeo campaign is quick to point out.

While the Washington Post covers the not-so-spooky:

CNN’s Diana Magnay is latest reminder that Twitter can be a journalist’s worst enemy

Since the advent of Twitter, Facebook and other instantaneous digital platforms, reporters have lost their jobs, been suspended or been reassigned after posting things deemed inappropriate by readers, viewers and — most important — their bosses. The objectionable posts have usually called into question the journalists’ ability to remain neutral and fair to both sides of any story.

The latest casualty: CNN correspondent Diana Magnay, who last week stirred criticism for a tweet about a group of Israelis who were cheering a missile attack on Gaza. Magnay said in her tweet that members of the group had threatened her. “Scum,” she concluded. Amid an outraged reaction, the network apologized, saying Magnay was referring only to the group’s alleged harassment of her, not to its support of the military action. She was quickly reassigned to Moscow.

The incident echoed CNN’s dismissal in 2010 of Octavia Nasr, a longtime foreign-affairs editor. The network cut Nasr loose after she tweeted her thoughts about the death of a leader of Hezbollah, the Lebanese terrorist organization, calling him “one of Hezbollah’s giants I respect a lot.”

From intelNews, Washington pulls the reins:

Aruba arrests ex-head of Venezuelan intelligence, after US request

The former director of Venezuela’s military intelligence, who was a close associate of the country’s late president Hugo Chavez, has been arrested in Aruba following a request by the United States. Authorities in the Dutch-controlled Caribbean island announced on Thursday the arrest of Hugo Carvajal Barrios, former director of Venezuela’s Dirección General de Inteligencia Militar (DGIM), which is Venezuela’s military intelligence agency. A close comrade of Venezuela’s late socialist leader, Carvajal was accused by the US Department of the Treasury in 2008 of weapons and drugs smuggling. According to the US government, Carvajal was personally involved in illegally providing weapons to the Revolutionary Armed Forces of Colombia (FARC), a leftwing guerrilla group involved in a decades-long insurgency war against the government of Colombia.

It also accused the Venezuelan official of helping the FARC smuggle cocaine out of the country, in a bid to help them raise funds to support their insurgency against Colombian authorities. But the government of Venezuela rejects all charges and has been sheltering Carvajal. In January of this year it appointed him consul-general to Aruba, a Dutch colony in the Caribbean located just 15 miles off Venezuela’s coast.

Bloomberg raises the terror alert:

Norway on High Alert Amid Warnings of Attack Next Week

Police in Norway are on high alert after receiving intelligence that nationals returning from Syria may be plotting a terrorist attack within days against the Scandinavian country.

Information obtained by Norway’s security service, PST, suggests an attack could be imminent, the unit’s chief, Benedicte Bjoernland, said July 24. Authorities have strengthened their presence at Norway’s borders, airports and train stations, and police in all districts are at a heightened state of preparedness.

Police officers in Norway’s capital, Oslo, have been stationed at focal points in the city including parliament and the royal palace as well as at shopping centers, spokesman Kaare Hansen said by phone yesterday. Authorities have followed up on a number of tips received since yesterday, the police said, without providing more details.

More from TheLocal.no:

Statoil tightens security amid terror threat

Statoil, Norway’s biggest energy company, has ‘increased’ security after this week’s terror warning announcement, said the firm’s CEO on Friday.

Helge Lund, Statoil’s CEO, said to NTB that: “The security level of Statoil has increased as a consequence of the terror threat.”
“We are following the situation very closely. We have close contact with Norwegian authorities and are taking the measures we think are necessary, based on their threat evaluations.”

One-and-a-half year ago the company was struck by the worst terror action that has ever been directed towards a Norwegian company, when terrorists attacked the gas facility Tigantourine in In Aménas in Algeria. Five Norwegian Statoil employees were killed during the four days the hostage drama lasted.

Meanwhile, the Toronto Globe and Mail covers consequences of aggression:

The Gaza war has done terrible things to Israeli society

Earlier this month, one of Israel’s most famous writers announced in his weekly newspaper column that he was packing up his family and moving to the United States – permanently. Sayed Kashua, an Arab-Palestinian citizen of Israel who resides in Jerusalem, is the author of critically acclaimed novels and a popular television series, all written in Hebrew with wit and insight into the complex, conflicted society of Arabs and Jews living uneasily side-by-side. But after more than two decades of believing that ultimately Arabs and Jews would find a way to co-exist as equals, he wrote, something inside him “had broken.” He no longer believed in a better future.

Mr. Kashua’s decision to emigrate came in response to a series of events that were marked by violence and incitement against the Arab population, from the government to the street. One member of the Knesset, Israel’s parliament, called for a war against the Palestinian people on her Facebook page. Another called an Arab legislator a “terrorist” during a parliamentary committee session, while still another, the leader of an ostensibly centrist party, submitted a proposal to ban an established Arab nationalist party with sitting members of the Knesset. The editor of a right-wing newspaper suggested that now was the time to transfer the Arab population out of the occupied West Bank. In Jerusalem, mobs of hyper nationalist youth rampaged through the cafe-lined downtown streets chanting “death to Arabs,” assaulting random passersby because they looked or sounded Palestinian.

Most horrifically of all, a 17 year-old Palestinian boy from East Jerusalem was abducted from the street by six young Jewish men, three of them minors. The police found Mohammed Abu Khdeir’s corpse in the nearby Jerusalem Forest shortly after CCTV cameras recorded some young men forcing him into a car. He had been doused with gasoline and burned alive. Three of the six boys confessed to the crime and re-enacted it for the police.

On to the latest developments in the trans-Pacific Game of Zones, via China Daily:

Confessions of Japanese war criminals online

The State Archives Administration started releasing a large number of files on major Japanese war criminals on its website on Thursday to offer a clearer picture of history.

“The confessions written by all the war criminals and the detailed trial records contained in the archived files are irrefutable evidence of the heinous crimes committed by the Japanese militarist aggressors against the Chinese people,” Li Minghua, deputy director of Central Archives of China, said on Thursday.

Since the Abe Cabinet came to power in Japan, it has openly confused right and wrong to mislead the public on history, he said at a news conference of the State Council Information Office.

With the upcoming 77th anniversary of the Marco Polo Bridge Incident – an incident that marked the start of Japan’s full aggression against the nation – the release of such materials can prove their crimes during the Japanese War of Aggression against China, experts said.

Pressure from Foggy Bottom, via the Japan Daily Press:

U.S. Senators seek Obama’s help to resolve issue of ‘comfort women’

With Japan’s announcement last week that it has begun reviewing the accounts of former “comfort women,” a euphemistic term for those forced into sexual labor by the Japanese Imperial Army during the Second World War, former victims and their supporters have expressed outrage over the development. Three senators from the United States are urging President Barack Obama to keep its interest and exert more effort in addressing the matter.

The letter calling for Obama’s actions was signed and sent by Senators Martin Heinrich, Tim Johnson and Mark Begich. The trio called upon the US president’s passionate statement regarding the atrocities done to the women. In his recent trip to Asia, Obama called what was done to the comfort women as a “terrible and egregious violation of human rights.” The trio of senators echoed his statement, noting “We affirm your statement that the ‘women were violated in ways that even in the midst of war was shocking.” They further went on to describe the women’s plight as deserving “to be heard and respected.” The letter closed by expressing their request that he continue to help resolve this particular issue.

The senators believe that finding a resolution to the issue of comfort women will be vital in further improving trilateral ties of the United States with Japan and South Korea. While both Asian countries are known U.S. allies, the two remain at odds with each other because of their wartime history that has prevented them from fostering cordial ties in recent years.

The Asahi Shimbun raises the heat:

NHK governor’s remarks on prewar Koreans in news show may violate law

A conservative Japan Broadcasting Corp. (NHK) governor complained about comments made on prewar Korean immigrants to Japan in a news program, possibly violating the Broadcast Law that forbids governors from interfering with shows, according to insiders.

Naoki Hyakuta questioned and disputed NHK newscaster Kensuke Okoshi’s remarks at a July 22 meeting of the NHK Board of Governors.

Hyakuta, handpicked for the 12-member board by Prime Minister Shinzo Abe, is a writer who has generated controversy over his conservative stance on historical issues, such as calling the Nanking Massacre a fabrication crafted to cancel out U.S. atrocities.

Haruo Sudo, a professor emeritus of Hosei University whose specialty is media theory, said Hyakuta’s latest outburst was an obvious violation of the Broadcast Law.

Nextgov covers insecurity closer to home:

Virtual Border Fence Project Halted After Raytheon Protest

A major border security project involving the deployment of 50 surveillance towers across southern Arizona is temporarily on hold, following a protest by Raytheon that the government improperly awarded the work to a rival.

In a protest decision released Thursday afternoon, the Government Accountability Office ruled the Department of Homeland Security should reevaluate the competitors’ proposals. Among other things, it is possible Raytheon was “prejudiced by the agency’s errors” during an evaluation of proposals, the ruling stated.

U.S. Customs and Border Protection — part of DHS — had planned to initially build seven towers during the first year of a potentially 8 and 1/2 year, $145 million deal with vendor EFW, of Fort Worth, Texas. The contract was awarded in February, after a two-year competition among 14 companies.

PandoDaily resets the WABAC  Machine:

Report: Google has removed around 50,000 links thanks to Europe’s “right to be forgotten”

Europeans have asked Google to remove more than 91,000 links from its search results, and the company has granted more than half of those requests, according to a Bloomberg report. Combined, the requests are said to apply to more than 328,000 Internet addresses. The majority of removal requests have come from people who are living in France and Germany.

Google is thought to have revealed these numbers to privacy watchdogs and the press to show that it’s taking the right to be forgotten, which it has criticized in the past for being too broad and difficult to implement, more seriously than it seems. As the Wall Street Journal reports:

Google’s disclosure could also soothe tensions with privacy regulators, who called Thursday’s meeting and have been critical of how the search company has implemented the ruling. Some have been demanding that Google end its notifications to websites that have been the subject of right to be forgotten requests, which have in some cases made it possible to identify the person making the request.

From IDG News Service, a familiar plea, this time from Moscow:

Russian government offers money for identifying Tor users

The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.

The Tor software anonymizes Internet traffic by encrypting it and passing it through several random relays in order to prevent potential network eavesdroppers from identifying the traffic’s source and destination. The software was originally developed as a project of the U.S. Naval Research Laboratory, but is now being maintained by a nonprofit organization called The Tor Project.

The Tor network is popular with journalists, political activists and privacy-conscious users in general, but has also been used by pedophiles and other criminals to hide their tracks from law enforcement.

Four our final items, we focus on another cause for insecurity, at least for half the population. First, this from Newswise:

Link Between Ritual Circumcision Procedure and Herpes Infection in Infants Examined by Penn Medicine Analysis

A rare procedure occasionally performed during Jewish circumcisions that involves direct oral suction is a likely source of herpes simplex virus type 1 (HSV-1) transmissions documented in infants between 1988 and 2012, a literature review conducted by Penn Medicine researchers and published online in the Journal of the Pediatric Infectious Diseases Society found. The reviewers, from Penn’s Center for Evidence-based Practice, identified 30 reported cases in New York, Canada and Israel.

The practice—known as metzitzah b’peh—and its link to HSV-1 infections have sparked international debate in recent years, yet no systematic review of the literature has been published in a peer-reviewed journal examining the association and potential risk. During metzitzah b’peh, the mohel, a Jewish person trained to perform circumcisions, orally extracts a small amount of blood from the circumcision wound and discards it.

Lead author Brian F. Leas, MS, MA, a research analyst in the Center for Evidence-based Practice at the University of Pennsylvania Health System, identified six relevant studies for the systematic review. All six studies were descriptive case reports or case series that documented neonatal HSV-1 infections after circumcision with direct oral suction.

And it’s not just babes in arm with cause for concern. Form the Independent:

US patient Johnny Lee Banks sues doctors over circumcision that ended up as amputation

Something was absent without leave when Johnny Lee Banks came out of the anaesthetic after what should have been a routine circumcision at a hospital in Birmingham, Alabama, last month. That, at least, is the claim in a medical malpractice suit filed this week that has men across the state, if not America, clenching their midriffs in horror.

“When the plaintiff … woke from his aforesaid surgical procedure, his penis was amputated,” the lawsuit states. It goes on to contend that no one at the Princeton Baptist Medical Centre in Birmingham has been able to explain why it had become necessary to remove the entire organ rather than just the foreskin as he had expected.

“My client is devastated,” said John Graves, a lawyer for Mr Banks. The lawsuit names two doctors as defendants in the suit as well as the facility attached to the hospital that was responsible for the procedure. It was filed jointly by Mr Banks, who is 56, and his wife, who is claiming the marvellously legalistic “loss of consortium”.

Chart of the day II: Running deadly numbers


From MintPress News. Whatever happened to “proportional response”? Click on the image to enlarge:

BLOG Kill4Peace

Which reminds us of a favorite song of ours from back when the U.S. was doing pretty much the same thing to a place called Vietnam.

From the late, great rock band, the Fugs, “Kill for Peace”:

Map of the day II: Looming water apocalypse


The Colorado River Basin, where groundwater is being extracted at levels certain the lead of a catastrophic water failure for the American West in the the near-term future.

Via the Jet Propulsion Laboratory [JPL]. Click on the image to enlarge:

BLOG Groundwater

More from the JPL:

A new study by NASA and University of California, Irvine, scientists finds more than 75 percent of the water loss in the drought-stricken Colorado River Basin since late 2004 came from underground resources. The extent of groundwater loss may pose a greater threat to the water supply of the western United States than previously thought.

This study is the first to quantify the amount that groundwater contributes to the water needs of western states. According to the U.S. Bureau of Reclamation, the federal water management agency, the basin has been suffering from prolonged, severe drought since 2000 and has experienced the driest 14-year period in the last hundred years.

The research team used data from NASA’s Gravity Recovery and Climate Experiment (GRACE) satellite mission to track changes in the mass of the Colorado River Basin, which are related to changes in water amount on and below the surface. Monthly measurements in the change in water mass from December 2004 to November 2013 revealed the basin lost nearly 53 million acre feet (65 cubic kilometers) of freshwater. That’s almost double the volume of the nation’s largest reservoir, Nevada’s Lake Mead. More than three-quarters of the total — about 41 million acre feet (50 cubic kilometers) — was from groundwater.

“We don’t know exactly how much groundwater we have left, so we don’t know when we’re going to run out,” said Stephanie Castle, a water resources specialist at the University of California, Irvine, and the study’s lead author. “This is a lot of water to lose. We thought that the picture could be pretty bad, but this was shocking.”

Read the rest.

H/T to Ignacio Chapela.

Breaking the Set: The madness of watchlisting


Abby Martin of RT’s Breaking the Set hosts a discussion on the new revelations about Uncle Sam’s terrorism watchlists and the absurdly arbitrarily rules [or lack of them] for designation ordinarily folks as potentially extraordinary criminals.

Particularly chilling is the case of a man told by the FBI that they knew he wasn’t a terrorist, but they wouldn’t get him off the list unless he turned snitch and informed on fellow members of his community.

Can you say “Joe McCarthy,” kiddies?

From Breaking the Set:

The Absurd Criteria Needed to Put You on a Terror Watchlist Will Shock You

Program notes:

Abby Martin speaks with Susan Hu, Fellow at the Center for Constitutional Rights and Kevin Gosztola, journalist at Firedoglake, discussing a recent article on the intercept that exposes the National Counterterrorism Center’s criteria for adding individuals to the government’s terrorism watchlist, highlighting the arbitrary nature of the guidelines and how over the last 5 years nearly 1.5 million people have been added to the list.

Map of the day: Global heat hits all-time record


Click on the image to enlarge. . .BLOG Weather

From the National Climatic Data Center, which reports:

According to NOAA scientists, the globally averaged temperature over land and ocean surfaces for June 2014 was the highest for June since record keeping began in 1880. It also marked the 38th consecutive June and 352nd consecutive month with a global temperature above the 20th century average. The last below-average global temperature for June was in 1976 and the last below-average global temperature for any month was February 1985.

Most of the world experienced warmer-than-average monthly temperatures, with record warmth across part of southeastern Greenland, parts of northern South America, areas in eastern and central Africa, and sections of southern and southeastern Asia. Similar to May, scattered sections across every major ocean basin were also record warm. Notably, large parts of the western equatorial and northeastern Pacific Ocean and most of the Indian Ocean were record warm or much warmer than average for the month. A few areas in North America, Far East Russia, and small parts of central and northeastern Europe were cooler or much cooler than average.

Slay for pay: The rise of the mercenary


Way back when, in the days when esnl was but a mere high school student, he was told by his Latin and World History teachers that one clear symptom of the decline of ancient Rome was the transformation of the empire’s formidable citizen army into a force increasingly manned by mercenaries, hired swords with allegiance not to the distant imperial seat but to their own financial gain — or, in other words, always open to a better offer.

The words that begin this Vice documentary thus struck a resonant chord:

At the start of the Iraq War in 2003, for every ten U.S. military servicemembers, there was one private military contractor.

By 2007, there were more contractors than actual U.S. military.

From Vice:

Superpower for Hire: Rise of the Private Military

Program notes:

Vice takes an unprecedented look into the shadowy industry of Private Military Companies. For the past two decades these private companies, like Black Water, Aegis and G4S have silently consumed military operations around the world, doing everything from back end logistics, protection of government VIP’s and diplomats to actual combat duties. In this documentary we explore the origins of this industry, their rise in the war on terror and their future operations around the world.

InSecurity Watch: Spooks, woes, and dirty deals


While we’re unsure what’s to become of our blog, we remain committed to pointing out developments likely to impinge on the future of folks, both those alive today and the yet-to-be-born.

Developments in the realm of technology and their potential to shred the last remaining vestiges of privacy in the interests of corporations and their symbiotes in the National Security State in an era of enforced globalization — and thus creating a new context for the human experience in which all our vulnerabilities become transparent to folks with a powerful interest in exploiting them in the interests of deep politics and corporate profiteering.

And with that preamble, on with the shoe, starting with deplorable military action in a perennial tinderbox. Via The Independent:

Israel-Gaza conflict: UN school shelled by Israeli tanks, leaving 15 dead and 200 wounded

  • Doctors and officials described the strike as a ‘massacre’ mostly impacting children

While the Israeli Defence Forces (IDF) had no immediate comment on the incident, news agency photographers reported seeing pools of blood on the ground in the courtyard of the school near the apparent impact mark of a shell.

Israeli Radio, without citing a source, said that most of those killed at the UN compound were children.

It comes after the UN’s humanitarian chief drew attention to the “major concern” of child fatalities in the conflict, which has seen one child killed every hour over the past three days.

On Tuesday, a spokesperson for the UN’s Office for the Coordination of Humanitarian Affairs (OCHA) said: “There is literally no safe place for civilians [in Gaza].”

From The Hill, the ornamental fruits of ornamental umbrage:

Senate NSA compromise likely to come next week

Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) is close but not yet ready to unveil a negotiated measure to rein in government surveillance.

Despite reports that the bill could be revealed this week, people familiar with the discussions said Leahy will actually release the compromise legislation as early as Tuesday.

Leahy has been working with the administration on a compromise.

Earlier this week, an aide said conversations had turned a corner and they were “within inches” of an agreement. Leahy said Tuesday that he was “far more encouraged that we can finally come up with some legislation that will do two things.”

Whilst the Guardian adds critical context:

US warned: surveillance reform hinges on change to Reagan executive order

  • John Napier Tye, a former State Department official, says Americans’ data remains vulnerable until executive order that provides NSA with a path to collect data is reformed

John Napier Tye is not Edward Snowden. He says he has no surveillance documents to disclose to journalists. He takes a nuanced position on Snowden’s disclosures.

Yet the 38-year old former State Department official has raised a Snowden-like alarm that Americans’ communication data remains highly vulnerable to surreptitious collection by the National Security Agency – and will remain vulnerable despite the legislative fixes wending through Congress to redress the bulk domestic phone data collection Snowden revealed.

Like Snowden, Tye means to spark a debate on the proper boundaries of NSA authorities. His focus is on an obscure, Reagan-era executive order that serves as a foundational set of rules for the intelligence apparatus. The order, known as Executive Order 12333, renders the current surveillance debate hollow, he said, even as it shows signs of traction in the Senate.

Next up, a critical Washington ally grows increasingly pissed, via intelNews:

Up to 20 US spies inside German government: media reports

German counterintelligence has intensified its surveillance of “certain employees of the United States embassy” in Berlin, after internal reports suggested that “up to 20″ agents of the American government are operating inside the German federal bureaucracy.

Citing information “from American security circles”, German newspaper Bild am Sonntag said on Sunday that the agents are German citizens who are secretly employed by a variety of American civilian and military intelligence agencies in return for money.

The Berlin-based tabloid noted that at least a dozen such agents have infiltrated four departments of the German federal government, namely the Ministries of Defense, Finance, Interior, as well as the Ministry for Economic Cooperation and Development. The paper said that the latter has been targeted by the US Central Intelligence Agency because it is routinely employed by the BND, Germany’s main external intelligence organization, as a cover for clandestine activities.

From The Independent again, a response:

Germany begins spying on Britain and America for the first time since 1945

  • Government responds to a series of spy scandals which began last year with revelations that the NSA had bugged Chancellor Angela Merkel’s mobile phone

Chancellor Angela Merkel has ordered her counter-espionage services to begin surveillance of British and American intelligence gathering in Germany for the first time since 1945 in response to a series of US spy scandals which have badly soured relations between Berlin and Washington.

The Süddeutsche Zeitung and two-state funded German TV channels, WDR and NDR, quoted an unnamed Berlin government source who said Ms Merkel’s Chancellery and her interior and foreign ministries had agreed to launch counter-espionage measures against Britain and the US for the first time.

“Right now we need to send a strong signal,” the Süddeutsche Zeitung quoted the source as saying. The extraordinary measures are a direct response to a series of embarrassing US and British spying scandals in Germany which began last year with revelations that the US National Security Agency had bugged Ms Merkel’s mobile phone.

More from Spiegel:

Keeping Spies Out: Germany Ratchets Up Counterintelligence Measures

  • Officials in Berlin were long in denial that their closest allies were spying on Germany. Now, ministries are undertaking measures to improve security and counterintelligence. They’re anticipating frosty relations with the US for some time to come.

Last Wednesday, German Interior Minister Thomas de Maizière paid a visit to his colleague in the Foreign Ministry, Frank-Walter Steinmeier for a strictly confidential conversation about the currently tense relationship with the United States. Specifically, they planned to address the latest spying revelations and accusations. Before the meeting began, both ministers turned in their mobile phones. Foreign Minister Frank-Walter Steinmeier has a small side room he uses for this purpose; part of the Foreign Ministry is in the former Nazi Reichsbank and has very thick walls. The room is now used to store smartphones and tablet computers when sensitive discussions take place.

The precaution reflects the significant disquiet and anxiety in Berlin’s ministries and in the Chancellery as the summer holidays get underway. Slowly, ministry officials are starting to grapple with the true meaning of “360 degree” counterintelligence. It means defending yourself not just usual suspects like Russia or China. But also against Germany’s closest allies, particularly the United States.

A few days ago, Chancellor Merkel reportedly told US President Barack Obama in a telephone conversation that anger over the US spying activities in Berlin’s government quarter as well as the recruitment of an informant inside Germany’s Bundesnachrichtendienst (BND) foreign intelligence service has in no way subsided. Because Obama apparently expressed little understanding for the commotion in Germany, Merkel is now taking action.

From the McClatchy Washington Bureau, a Washington diplomatic blitzkrieg:

Top Obama aides fly to Berlin to talk about spying allegations

Two weeks after Germany demanded that the top U.S. intelligence official stationed in its country leave, President Barack Obama has dispatched two top aides to Berlin.

White House Chief of Staff Denis McDonough and Lisa Monaco, assistant to the president for counterterrorism and homeland security, met with their German counterparts in Berlin Tuesday “for intensive talks on the state of bilateral relations and future cooperation,” according to the White House.

The meeting came after German authorities said they were investigating new instances of spying, including one that targeted the parliamentary committee probing National Security Agency eavesdropping. Last year, reports indicated that the NSA was monitoring the communications of millions of Germans, including listening in on Merkel’s cellphone.

Meanwhile, from the Washington Post’s David Ignatius, meet that old Foggy Bottom familiar, Rosy Scenario:

Germany, U.S. rebuild a spy partnership

Given recent German indignation about the National Security Agency, it has been easy to overlook the fact that for decades the German government has cooperated extensively with the NSA on surveillance activities. But after a high-level meeting in Berlin this week, this long-standing but veiled cooperation may have a firmer legal and political base.

The two countries’ past partnership became so extensive that they even developed a special logo for their joint signals—intelligence activity, known by its initials, “JSA.” It shows an American bald eagle against the colors of the German flag, next to the words Der Zeitgeist, or “the spirit of the age.”

Like so much else we know about the NSA, the details about its activities in Germany come from Edward Snowden, the former NSA contractor now living in Moscow. He provided a trove of secret documents to Der Spiegel, which published more than 50 online last month.

German anger about American spying boiled over recently with the expulsion of the CIA station chief in Berlin. The Germans were furious when they discovered that the CIA was paying a “walk-in” German agent, adding to their anger that the NSA had tapped Chancellor Angela Merkel’s cellphone.

From the New York Times, more fallout from the Dark Side:

European Court Censures Poland Over C.I.A. Rendition Program

The European Court of Human Rights ruled Thursday that Poland had violated the rights of two terrorism suspects by allowing their transfer to a secret detention center run by the C.I.A. in Poland, where the two men were tortured.

The ruling says Poland failed to prevent the two men — Abu Zubaydah, born in Saudi Arabia, and Abd al-Rahim al-Nashiri, a Saudi citizen — from being subjected to “torture and inhuman or degrading treatment” after they were brought to a clandestine prison in northeast Poland. It ordered Poland to pay 100,000 euros, about $135,000, to Mr. Nashiri and $175,000 to Abu Zubaydah. Both are being held at the American detention center in Guantánamo Bay, Cuba.

Abu Zubaydah is believed to have overseen the operation of guesthouses in Pakistan where terrorism recruits arrived; he vetted them and provided letters of recommendation allowing them to be accepted for training at a paramilitary camp in Afghanistan, a former Guantánamo detainee said in a military court filing, for example. Mr. Nashiri is accused of plotting the 2000 bombing of the American destroyer Cole.

While The Intercept covers the Kafkaesque:

The Secret Government Rulebook For Labeling You a Terrorist

The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept.

The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted.

Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases—though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In an affidavit, Holder called them a “clear roadmap” to the government’s terrorist-tracking apparatus, adding: “The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed … could cause significant harm to national security.”

From Newser, the War on Photography continues, this time with violence [as well as another touch of Kafka]:

Border Official Points Gun… at Boy Scout: Troop Leader

  • Another scout gets threatened with 10 years in prison

A couple weeks ago, a US border patrol official held a gun to the head of … a Boy Scout. A troop leader explains what happened now that the scouts and adult volunteers from Mid-Iowa Scout Troop 111 have returned from their 23-day trip: Ten days into the trip, their four vans attempted to cross from Canada into Alaska. One scout made an innocent error: He snapped a photo of a US border official. Troop Leader Jim Fox tells KCCI that officials detained everyone in that van and searched them and their luggage, and one agent confiscated the boy’s camera, telling him “he would be arrested, fined possibly $10,000 and 10 years in prison.” But it didn’t end there.

When another scout removed some luggage to comply with the search, Fox says the boy heard “a snap of a holster, and here’s this agent, both hands on a loaded pistol, pointing at the young man’s head.” No one was ultimately hurt or arrested—just scared—and after a four-hour ordeal, the group was allowed to enter Alaska. A Boy Scout official says the scouts learned an important lesson about being a “good citizen” and following rules. But as for that cited rule against photographing federal agents? It’s not exactly true. According to Reason.com, the American Civil Liberties Union says that photographing “things that are plainly visible from public spaces,” including government officials, “is a constitutional right.”

From ZDNet, suspicions confirmed!:

Forensic scientist identifies suspicious ‘back doors’ running on every iOS device

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.

The HOPE conference started in 1994 and bills itself as “one of the most creative and diverse hacker events in the world.”

Zdziarski, better known as the hacker “NerveGas” in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is the author of five iOS-related O’Reilly books including “Hacking and Securing iOS Applications.”

And from Military & Aerospace Electronics, there’s more than angels looking over our shoulders:

U.S. UAV spending to triple over next 5 years

The U.S. market for unmanned aerial vehicles (UAVs) will triple in size over the next five years, and should grow from $5 billion in 2013 to $15 billion in 2020, predict analysts at market researcher Information Gatekeepers Inc. (IGI) in Boston.

The IGI study entitled 2014 UAV Market Research Study takes a look at the total UAV market from large military UAVs to do-it-yourself (DIY) UAVs for amateurs, company officials say.

The study includes the following major market sectors including the U.S. Department of Defense (DOD), civil, commercial, small UAVs, amateur and hobby UAVs, and radio-controlled UAVs.

TechWeekEurope covers another private sector initiative:

European Central Bank Held To Ransom Over Stolen Data

  • Hackers steal partially encrypted records from an events website that belongs to the bank

Hackers have breached the public website of the European Central Bank (ECB) and made off with names, email addresses and other personal details of people who had registered for events there.

The attack came to light on Monday, after the organisation received an anonymous email which demanded an unspecified amount of money for the data.

The ECB said most of the stolen information was encrypted, and no sensitive market data has been compromised in the breach. It didn’t indicate whether it was going to pay the ransom.

The institution, which administers the monetary policy of the 18 members of the Eurozone who chose to adopt the single currency, was established by the Treaty of Amsterdam in 1998 and is one of the world’s most important central banks.

After the jump, the latest on the ever-escalation Sino-American trans-Pacific confrontation [including Latin American plays],  Britain goes all Orwell, why some Spanish cops have to pee in a bottle daily [and not for te reasons you might expect], and Rob Ford falls prey top a Sharknado. . . Continue reading

Edward Snowden tackles critics, the panopticon


The world’s most famous leaker offers an illuminating discussion the the reasons why he leaked, and his take on the sate of surveillance in today’s world in tis fascinating interview for The Guardian.

Snowden denies that we live in a 1984 world, not because Orwell was wrong about the critical role omnipresent surveillance in a totalitarian state, but because Orwell’s portrayal of spooky methodology is both “unimaginative and quaint.”

And for the record, he neither Googles nor Skypes.

Note also that, despite his portrayal as a Vladimir Putin lackey and sycophant by both Obama administration officials and the Usual Suspects, Snowden is scathing in his critique of the Russian crackdown on media and dissent.

From The Guardian:

Program notes:

The NSA whistleblower Edward Snowden’s full interview 2014 with the Guardian.

The 31-year-old former intelligence analyst discusses whether he is a Russian spy, his likely fate if he returns to the US and the relevance of George Orwell’s Nineteen Eighty-Four in the age of Google.
Get the whole picture, the whole time.

Mr Snowden talked exclusively with Alan Rusbridger, editor-in-chief of the Guardian, and reporter Ewen MacAskill in Moscow.

Headlines II: Spies, pols, threats, hacks, zones,


Lotsa ground to cover, so straight ahead, first with the Washington Times:

Greenwald to publish list of U.S. citizens NSA spied on

Glenn Greenwald, one of the reporters who chronicled the document dump by National Security Agency leaker Edward Snowden via the U.K. press, now said he’s set to publish his most dramatic piece yet: The names of those in the United States targeted by the NSA.

“One of the big questions when is comes to domestic spying is, ‘Who have been the NSA’s specific targets?’ Are they political critics and dissidents and activists? Are they genuinely people we’d regard as terrorists? What are the metrics and calculations that go into choosing those targets and what is done with the surveillance that is conducted? Those are the kinds of questions that I want to still answer,” Mr. Greenwald told The Sunday Times of London.

And a video report from RT America:

Greenwald to reveal Americans targeted by NSA

Program Notes:

Journalist Glenn Greenwald will end his National Security Agency series by revealing the names of American citizens targeted for surveillance by the agency. Documents provided to Greenwald by whistleblower Edward Snowden have been central to his series, revealing the massive extent of the government’s surveillance on international and domestic populations. The journalist promises his last reveal will be similar to a fireworks display; the best and most impressive portion of the show is the finale. RT’s Ameera David has more information on the tantalizing tease by Greenwald.

From the McClatchy Washington Bureau, there’s a deeper story here:

Spy whistleblower advocate stays put

Less than two months ago, a high-profile government whistleblower advocate found himself under scrutiny — ironically in an investigation of an alleged leak to Congress.

The Pentagon’s inspector general was trying to suspend and possibly revoke the top secret access of Dan Meyer, that office’s former director of whistleblowing. At the time, the news triggered concerns in Congress that he was being retaliated against for doing his job. But Meyer, who is now executive director for intelligence community whistleblowing, doesn’t appear to be going anywhere.

Although he won’t comment on the specifics, he did say his security badge “had been restored.” Asked if he had any concerns about his future, he was cryptic, but upbeat. “I have been treated very well by the intelligence community,” he said.

From NBC News, both spook and eavesdropper:

Edward Snowden Tells Brian Williams: ‘I Was Trained as a Spy’

Edward Snowden, in an exclusive interview with “Nightly News” anchor Brian Williams, is fighting back against critics who dismissed him as a low-level hacker — saying he was “trained as a spy” and offered technical expertise to high levels of government.

Snowden defended his expertise in portions of the interview that aired at 6:30 p.m. ET on Nightly News. The extended, wide-ranging interview with Williams, his first with a U.S. television network, airs Wednesday at 10 p.m. ET on NBC.

“I was trained as a spy in sort of the traditional sense of the word, in that I lived and worked undercover overseas — pretending to work in a job that I’m not — and even being assigned a name that was not mine,” Snowden said in the interview.

From New Europe, politically inconvenient:

Austria constant partner of NSA: journalist

American journalist Glenn Greenwald has said in an interview with newspaper Der Standard on Monday that Austria “constantly” works together with the American National Security Agency (NSA).

This came despite recent claims from Austrian Minister for Defence Gerald Klug that the two work together only “occasionally.”

The confidant for NSA whistleblower Edward Snowden said the cooperation is discreet and aimed at specific goals, though added the NSA sees countries such as Austria — which it puts in a “Tier B” category — primarily as a monitoring target, and as a partner “only secondarily.”

He said further documents on the cooperation between Austria and the NSA would “probably” be released as he understood the Austrian public is interested in the information, and added that “we” are currently deciding the best way to distribute the documents amongst journalists to speed up their reporting.

From intelNews.org, raising curious questions:

Alleged CIA spy seeks retrial after Iranian court slashes his sentence

A United States citizen held in Iran since 2011 on spy charges has appealed for a retrial after an Iranian court quashed his earlier death sentence for espionage. Amir Mirzaei Hekmati, a former Marine born in the US state of Arizona, was arrested in August of 2011 in Iran and charged with carrying out a covert mission for the Central Intelligence Agency.

In December of 2011, Hekmati appeared on Iranian state television and acknowledged that he was an operative of the CIA. He said in an interview that he had been trained “in languages and espionage” while in the US Army and that, in 2009, after nearly a decade of intelligence training, he was recruited by the CIA and specifically prepared to carry out what intelligence operatives sometimes refer to as a ‘dangling operation’ in Iran.

The aim of the mission, said Hekmati, was to travel to Tehran, contact Iran’s Ministry of Intelligence and National Security, and pose as a genuine American defector wishing to supply the Iranians with inside information about American intelligence. His immediate task was to gain the trust of Iranian authorities by giving them some correct information in order to set the stage for a longer campaign of disinformation aimed at undermining a host of Iranian intelligence operations.

From the New York Times, street level spookery:

In Complaint, Activists Seek Audit of New York Police Surveillance

Several groups plan to file a formal complaint on Tuesday seeking an audit of the New York Police Department’s intelligence gathering operations, after recent revelations that the department had been monitoring political activists, sending undercover officers to their meetings and filing reports on their plans.

The groups said the complaint would be the first over surveillance to be filed with the department’s new office of inspector general; it is likely be a closely watched test for the office, whose duty is to oversee the tactics and the policies of the police.

The City Council, despite opposition from former Mayor Michael R. Bloomberg, created the office last year after complaints about the overuse of stop-and-frisk tactics and surveillance of Muslim communities.

From Homeland Security News Wire, repudiating another form of domestic “security”:

U.S. recalibrating Secure Communities

As more and more municipalities across the country refuse to hold undocumented immigrants in jail on behalf of DHS’ Secure Communities program, President Barack Obama is adopting a strategy to limit deportations to undocumented immigrants who have been convicted of violent crimes. The new strategy would help relieve political pressure on the White House as immigrant rights activists continue to label Obama as the “deporter in chief” for his administration’s aggressive enforcement of immigration laws.

Secure Communities began under the George W. Bush administration to coordinate enforcement of federal immigration laws with local communities. The FBI collects the fingerprints of individuals arrested by local and state police, to identify fugitives or individuals wanted in other jurisdictions. With Secure Communities, Immigration and Customs Enforcement (ICE) officials review the fingerprints against immigration databases to see whther arrested individuals are deportable.

Secure Communities requires that local law enforcement agencies hold detainees until an ICE agent arrives, but police chiefs say that the law has made undocumented immigrants less likely to report crimes when they have been victims or witnesses. “The immigrant community are the prey; they are not the predators,” said Ron Teachman, chief of police in South Bend, Indiana. “We need them to be the eyes and ears. They are exploited in their workplace, in their neighborhoods and in their own homes with domestic violence.”

From the Guardian, revelations assessed:

Privacy under attack: the NSA files revealed new threats to democracy

Thanks to Edward Snowden, we know the apparatus of repression has been covertly attached to the democratic state. However, our struggle to retain privacy is far from hopeless

The 20th-century question was how many targets could be simultaneously followed in a world where each of them required hack, tap, steal. But we then started to build a new form of human communication. From the moment we created the internet, two of the basic assumptions began to fail: the simplicity of “one target, one circuit” went away, and the difference between home and abroad vanished too.

That distinction vanished in the United States because so much of the network and associated services, for better and worse, resided there. The question “Do we listen inside our borders?” was seemingly reduced to “Are we going to listen at all?”

At this point, a vastly imprudent US administration intervened. Their defining characteristic was that they didn’t think long before acting. Presented with a national calamity that also constituted a political opportunity, nothing stood between them and all the mistakes that haste can make for their children’s children to repent at leisure. What they did – in secret, with the assistance of judges appointed by a single man operating in secrecy, and with the connivance of many decent people who believed themselves to be acting to save the society – was to unchain the listeners from law.

And from RT, a curious blacklisting:

Snowden, Greenwald, Appelbaum, WikiLeaks ‘blacklisted’ from Stockholm Internet Forum

Key digital rights activists – including Edward Snowden and hacker Jacob Appelbaum – have been blacklisted from the Stockholm Internet Forum (SIF) on internet openness and freedom. The move has caused a stir at the gathering and outraged Twitter users.

The third annual European meeting of internet activists kicked off in Sweden on May 26, with its main theme being “Internet– privacy, transparency, surveillance and control.”

But strangely enough, those whose names immediately spring to mind when it comes to the issue of surveillance are not allowed to attend the event.

And a video report from RT, focusing on the waffling of program organizations when put to the question:

Where’s Ed? Stockholm web summit slammed as Snowden, Greenwald ‘blacklisted’

Program note:

Blacklisting Edward Snowden, Glenn Greenwald, hacker Jacob Appelbaum and others by the Stockholm Internet Forum (SIF) on internet freedom provoked strong criticism from participants and outrage on Twitter.

From the New York Times, rewards for switching sides:

Hacker Who Helped Disrupt Cyberattacks Is Allowed to Walk Free

The New York man who helped the authorities infiltrate the shadowy world of computer hacking and disrupt at least 300 cyberattacks on targets that included the United States military, courts and private companies was given a greatly reduced sentence on Tuesday of time served, and was allowed to walk free.

Federal prosecutors had sought leniency for the hacker, Hector Xavier Monsegur, citing what they called his “extraordinary cooperation” in helping the Federal Bureau of Investigation take down an aggressive group of hackers who were part of the collective Anonymous, of which he was a member, and its splinter groups, which had taken credit for attacking government and corporate websites.

Mr. Monsegur’s information, the authorities said, led to the arrest of eight “major co-conspirators,” including Jeremy Hammond, whom the F.B.I. had called its top “cybercriminal target” and who was sentenced to 10 years in prison in November.

The Washington Post covers an equally spooky form of everyday espionage:

Brokers use ‘billions’ of data points to profile Americans

Are you a financially strapped working mother who smokes? A Jewish retiree with a fondness for Caribbean cruises? Or a Spanish-speaking professional with allergies, a dog and a collection of Elvis memorabilia?

All this information and much, much more is being quietly collected, analyzed and distributed by the nation’s burgeoning data broker industry, which uses billions of individual data points to produce detailed portraits of virtually every American consumer, the Federal Trade Commission reported Tuesday.

The FTC report provided an unusually detailed account of the system of commercial surveillance that draws on government records, shopping habits and social media postings to help marketers hone their advertising pitches. Officials said the intimacy of these profiles would unnerve some consumers who have little ability to track what’s being collected or how it’s used — or even to correct false information. The FTC called for legislation to bring transparency to the multi-billion-dollar industry and give consumers some control over how their data is used.

From the New York Times, caught in the crossfire:

Technology Companies Are Pressing Congress to Bolster Privacy Protections

A law that allows the government to read email and cloud-stored data over six months old without a search warrant is under attack from technology companies, trade associations and lobbying groups, which are pressing Congress to tighten privacy protections. Federal investigators have used the law to view content hosted by third-party providers for civil and criminal lawsuits, in some cases without giving notice to the individual being investigated.

Nearly 30 years after Congress passed the law, the Electronic Communications Privacy Act, which government officials have interpreted to cover newer technologies, cloud computing companies are scrambling to reassure their customers, and some clients are taking their business to other countries.

Ben Young, the general counsel for Peer 1, a web hosting company based in Vancouver, British Columbia, said his customers were keeping their business out of the United States because the country “has a serious branding problem.”

Defense One asks for spare change:

Are Paychecks the Problem? Senate Considers Bonuses for Pentagon’s Cyber Workforce

Current and aspiring Defense Department personnel with cyber skills could see a boost in pay under a Senate 2015 defense policy bill that lawmakers detailed on Friday.

Defense is up against the private sector’s lucrative salaries as it endeavors to boost cyber mission forces. Pentagon Secretary Chuck Hagel recently said these forces, expected to include 1,800 personnel by year’s end, should number 6,000 professionals in 2016.

The Senate Armed Services Committee on Thursday approved a measure that directs each military service to determine “whether recruiting, retention, and assignment of service members with cyber skills requires bonuses or special and incentive pays,” according to the new details. The services would have to report their decisions to Congress by Jan. 31, 2015.

BBC News hacks you pocket pal:

Apple devices ‘hijacked for ransom’ in Australia

Several users of Apple devices in Australia have reported that their gadgets have been “hijacked” – with a message demanding money.

Experts believed the hack had targeted users by exploiting the Find my iPhone feature.

A message appeared on some targeted phones asking for “$100 USD/EUR” to be sent to a PayPal account.

Mobile networks have advised affected users to contact Apple, which has not yet commented on the problem.

And it’s not just Down Under, as the London Telegraph reports:

iPhones frozen by hackers demanding ransom

  • People around the world have found their iPads and iPhones frozen by hackers who are demanding cash ransoms to unlock their devices

Owners of iPhones and iPads have been targeted by a hacker who is freezing iOS devices and demanding a ransom of up to £55 to unlock them.

The majority of the attacks have taken place in Australia although there are also reports of Britons being affected.

It appears that the hacker, who goes by the name Oleg Pliss, has managed to exploit the Find My iPhone feature which can track and remotely lock stolen devices.

Reuters covers another hack attack:

Spotify to ask users to re-enter passwords after cyberattack

Music streaming service Spotify AB will ask some of its 40 million users to re-enter their passwords and upgrade their software in coming days after detecting unauthorized access to its internal systems and data.

Chief Technology Officer Oskar Stal said in a blogpost on Tuesday that it has found evidence of attackers accessing just one user’s data, which did not include payment or password information. But as a precaution, it intends to ask “certain Spotify users” to re-enter their log-in credentials, and upgrade their Google (GOOGL.O) Android app.

Spotify said it is not recommending any action yet for users of Apple Inc (AAPL.O) iPhones or devices based on Microsoft’s (MSFT.O) Windows.

From CBC News, a spy in the bedroom, and for a good cause:

Spy cam nabs care worker stealing from 82-year-old Winnipegger

  • ‘What you did is despicable,’ Manitoba judge says in giving thief 2 years probation, community work

Viola Dufresne said she noticed money vanishing from her wallet starting last January, totalling nearly $1,100 over six months.

“My dad taught us morals, and all of a sudden I’m in my home and somebody rips me off. It made me mad,” she told CBC News on Monday.

Winnipeg police told Dufresne there wasn’t much they could do without evidence, so she went online and bought a spy camera. The camera, which resembles a clock radio, showed the home-care aide taking $25 from Dufresne’s wallet.

Techdirt laments:

Former CIA Director And Defense Secretary Says CIA Tried, But Failed, To Do Economic Espionage

  • from the this-doesn’t-make-the-us-look-any-better dept

US intelligence officials still seem to think that there’s some big distinction between the kind of intelligence work the US does versus the kind that other countries do. US officials time and time again claim that they don’t do “economic espionage” — even though it’s pretty clear that they do it, just through indirect means (i.e., while they don’t hand trade secrets over to companies, they’re certainly using economic information to impact policy and trade discussions).

Former Defense Secretary and CIA boss Robert Gates continued this sort of tone deaf line of thinking from US intelligence defenders by claiming that French intelligence downloads the contents of laptops from businessmen visiting Paris:

“There are probably a dozen or 15 countries that steal our technology in this way,” Gates said in an interview the Council on Foreign Relations posted online Thursday. “In terms of the most capable, next to the Chinese, are the French — and they’ve been doing it a long time.”

After the jump, the latest developments in the ongoing, ever-transforming Asian Game of Zones, including the latest American plans for Afghanistan, Sino-American cyberwar gambits, allegations of ramming, corporate targeting, the relentless push for Japanese militarization, and Pyongyang blusters belicosely. . . Continue reading

Video reports: As seen from overseas


First up, from China’s CCTV America, a report on America’s record rate of people needed helping putting food on the table:

U.S. is at [Greater] Risk of Hunger Than Ever Before

Next up, a report from RT America on weekend global protests targeting an American corporate giant:

Anti-Monsanto protests hit streets around the world

Program notes:

Protesters from 52 countries and 436 cities participated in Anti-Monsanto, Anti-Genetically Modified Foods rallies over the weekend. Activists rallied, marched and held speeches to demand for GM foods to be labeled or banned altogether. RT Correspondent Meghan Lopez was at the March Against Monsanto in Washington, D.C. over the weekend and brings us her report.

Finally, from Britain’s Channel 4 News, a move to exclude American authors from reading lists in the nation’s school system:

Michael Gove vs American literature

Program notes:

The Education Secretary Michael Gove had said he wanted to see more British authors studied. It’s meant Harper Lee’s ‘To Kill and Mockingbird’ and Arthur Miller’s ‘The Crucible’ are now excluded.

Quote of the day: Confronting the conundrum


From George Monbiot, writing in the Guardian:

Let us imagine that in 3030BC the total possessions of the people of Egypt filled one cubic metre. Let us propose that these possessions grew by 4.5% a year. How big would that stash have been by the Battle of Actium in 30BC? This is the calculation performed by the investment banker Jeremy Grantham.

Go on, take a guess. Ten times the size of the pyramids? All the sand in the Sahara? The Atlantic ocean? The volume of the planet? A little more? It’s 2.5 billion billion solar systems. It does not take you long, pondering this outcome, to reach the paradoxical position that salvation lies in collapse.

To succeed is to destroy ourselves. To fail is to destroy ourselves. That is the bind we have created. Ignore if you must climate change, biodiversity collapse, the depletion of water, soil, minerals, oil; even if all these issues miraculously vanished, the mathematics of compound growth make continuity impossible.

>snip<

The inescapable failure of a society built upon growth and its destruction of the Earth’s living systems are the overwhelming facts of our existence. As a result, they are mentioned almost nowhere. They are the 21st century’s great taboo, the subjects guaranteed to alienate your friends and neighbours. We live as if trapped inside a Sunday supplement: obsessed with fame, fashion and the three dreary staples of middle-class conversation: recipes, renovations and resorts. Anything but the topic that demands our attention.

Is The South China Sea On The Brink Of War?


A documentary from ABC Australia on the increasing tension in the oil-rich region of the Pacific where a host of nations are struggling to control potentially vast undersea petroleum and gas reserves — the struggle we’ve dubbed the Game of Zones.

Shot from a Philippine perspective and reported by Eric Campbell, the documentary gives the viewer an excellent first-hand view of the daily jockeying for possession consuming the politicians and military of a half-dozen Asian nations, hungry for the potential riches below.

Via Journeyman Pictures:

Is The South China Sea On The Brink Of War?

Program notes:

The Spratly Islands are an unremarkable scattering of reefs and sandbars in the South China Sea. But, rich in resources and claimed by six countries, could they be the trigger for the world’s next major conflict?

“We call our Kalayaan Island group the submerged Saudi Arabia of the Philippines.” Eugenio Bito-Onon is mayor of a seemingly innocuous islet municipality, home to just 150 residents.

But with the region crosshatched by important shipping lanes, the undersea bed replete with oil and gas, and the marine life furnishing vast fishing grounds, the surrounding waters are simmering with tension. China, the Philippines,

Vietnam, Malaysia, Taiwan and Brunei all lay claim to a portion of the territory, in a little-known diplomatic contest that for decades has regularly brought the area to the brink of war, and put it firmly off-limits to Western media.

“China is doing a lot of things besides bullying our fishermen and small navies,” explains the mayor as he points out a Chinese development on a small atoll known as ‘Mischief Reef’. Here, the only way to secure the land is to occupy it. So as competing claimants continue to build, could this high-stakes game of island Monopoly erupt into a fully fledged conflict?

Chart of the day: A century makes a difference


In this case, a difference in the source of immigrants to the U.S. From the Pew Research Center:

BLOG Immigrants

Headlines II: Spies, laws, lies, zones & more


And lots of ground to cover in today’s tales from the dark side, including political shenanigans, spooky revelations, and all the latest from the ongoing and ever-escalating Asian Game of Zones.

For our first headline, the Buenos Aires Herald covers a major Obama security breach:

The White House blows top CIA official cover in Afghanistan

The White House inadvertently included the name of the top CIA official in Afghanistan on a list of participants in a military briefing with President Barack Obama that was distributed to reporters yesterday, the Washington Post reported.

The newspaper said the official, identified as “Chief of Station” in Kabul, was named as being among those at a briefing with Obama during the president’s trip to Bagram Air Base near the Afghan capital.

The list of names was sent by email to reporters traveling with Obama on his surprise Afghanistan visit and included in a “pool report” shared with correspondents and others not on the trip.

The Post said the White House issued a revised list deleting the CIA official’s name after it recognized the mistake.

From the Guardian, guess who helped in the cover-up?:

White House staff tried to ‘un-ring the bell’ after revealing CIA chief’s identity

  • White House press office unaware it had circulated name
  • Washington Post journalist sounded alert after filing report

The White House blew the cover of the top CIA agent in Afghanistan on Sunday, when the person’s name was included on a list given to reporters during a visit to the country by President Barack Obama.

The name was then emailed by the White House press office to a distribution list of more than 6,000 recipients, mostly members of the US media.

The agent in question, listed as chief of station, would be a top manager of CIA activity in Afghanistan, including intelligence collection and a drone-warfare programme under which unmanned aerial vehicles mount cross-border attacks into Pakistan.

From IDG News Service, a snitch in time saves nine [years?]:

US seeks leniency for ‘Sabu,’ Lulzsec leader-turned-snitch

  • Prosecutors contend the seven months time he has served is enough for Hector Xavier Monsegur

U.S. prosecutors say a hacking group’s mastermind should be spared a long prison sentence due to his quick and fruitful cooperation with law enforcement.

The man, Hector Xavier Monsegur of New York, is accused of leading a gang of international miscreants calling themselves “Lulzsec,” short for Lulz Security, on a noisy hacking spree in 2011, striking companies such as HBGary, Fox Entertainment and Sony Pictures.

Lulzsec, an offshoot of Anonymous, led a high-profile campaign that taunted law enforcement, released stolen data publicly and bragged of their exploits on Twitter. Their campaign touched off a worldwide law enforcement action that resulted in more than a dozen arrests.

From intelNews.org, they shall be released:

Spain shelves charges against French alleged ‘assassin’ spies

A court in Spain has quietly shelved charges against two French spies who were caught in Barcelona with a custom-designed sniper rifle. The two men were detained in the Catalonian town of Manresa in April of 2002. The Audi car in which they were riding was stopped at a checkpoint manned by members of the Mossos d’Esquadra, the Catalan regional police, who promptly searched it.

In the back of the car, police officers found a large PVC tube that contained a sniper rifle complete with a laser telescopic light and a silencer. The two men carried French travel documents identifying them as “Christian Piazzole” and “Rachid Chaouati”. Piazzole’s documents were found to be false, and there were suspicions that Chaouati’s may also have been forged.

Spanish authorities concluded that the two men, who admitted they were officers of France’s General Directorate for External Security (DGSE), were in Spain to conduct an assassination. In a words of a state prosecutor in Barcelona, the DGSE spies had come to Spain “to kill”. Their arrest prompted an emergency visit to Madrid of a high-level French government delegation headed by General Philippe Rondot, a former senior intelligence officer at the DGSE. Rondot told Spanish officials that the two men were “on a training exercise”.

Feelin’ insecure theatrically Down Under, via RT:

Security stunt: Australian politician brings pipe bomb into parliament

An Australian senator stunned fellow politicians after bringing explosives into a session, saying he had “brought this through security: a pipe bomb,” which brought gasps from stunned onlookers.

Senator Bill Heffernan wanted to make a point about relaxed security in the building. The 71-year-old wheat farmer has been warning for months about a rising security risk facing the $1 billion building.

Under a 12-month trial, hundreds of MPs, senators, political and departmental staff no longer need to be scanned by metal detectors or have their bags checked.

And the stunt itself, via the Liberal [i.e., conservative] senator who serves on the Legal and Constitutional Affairs Legislation Committee. From the Australian Senate video feed via ABC News [Australia]:

Liberal Senator brings fake pipe bomb into Parliament

Program notes:

Senator Bill Heffernan presents a fake pipe bomb he has smuggled into Australian Parliament House to demonstrate the potential risks of reduced security arrangements.

From Ars Technica, woe to esnl:

Unsafe cookies leave WordPress accounts open to hijacking, 2-factor bypass

  • Accounts accessed from Wi-Fi hotspots and other unsecured networks are wide open.

Memo to anyone who logs in to a WordPress-hosted blog from a public Wi-Fi connection or other unsecured network: It’s trivial for the script kiddie a few tables down to hijack your site even if it’s protected by two-factor authentication.

Yan Zhu, a staff technologist at the Electronic Frontier Foundation, came to that determination after noticing that WordPress servers send a key browser cookie in plain text, rather than encrypting it, as long mandated by widely accepted security practices. The cookie, which carries the tag “wordpress_logged_in,” is set once an end user has entered a valid WordPress user name and password. It’s the website equivalent of a plastic bracelets used by nightclubs. Once a browser presents the cookie, WordPress servers will usher the user behind a velvet rope to highly privileged sections that reveal private messages, update some user settings, publish blog posts, and more. The move by WordPress engineers to allow the cookie to be transmitted unencrypted makes them susceptible to interception in many cases.

Cause for insecurity in Africa, via Antiwar.com:

Sisi Is Torture and Suffering, Confirms Sisi

Orchestrating a military coup against a demcoratically elected government, leading a junta that killed thousands of protesters and has sentenced many more to death for organizing those protests, Egypt’s incoming president Abdel Fattah el-Sisi is worried people think he’s “too soft,” and gave a harsh statement on his incoming regime in a television interview and leaked comments associated with it.

“I’m not leaving a chance for people to act on their own,” Sisi declared, going on to promise he would forcibly turn Egypt into a “first-class nation.”

“People think I’m a soft man. Sisi is torture and suffering,” declared Sisi, who among other things, vowed to send troops to people’s houses to install energy efficient lightbulbs as a way of solving the nation’s fuel shortage.

After the jump, the latest developments in the ever-accelerating, ever expanding Asian Game of Zones, including claims of a new top dog, hacks, exclusion threats, a ship sinking, threats, warnings, and the latest moves in the Washington-pushed Japanese remilitarization drive. . . Continue reading

Soybeans and indigenous culture destruction


Soybeans have been hailed as a miracle crop, and they’ve certainly made miraculous millions for UC Berkeley “bioentrepreneur” Chris Somerville [he of the $500 million BP-funded Energy Biosciences Institute], who sold his soy breeds to Monsanto before coming to Berkeley to head the BP program.

But what of those most impacted by the wonder crop, the Third World peoples whose lands are seized or purchased by Big Agra multinationals?

Deutsche Welle looks at one people deeply impacted by the corporate soy culture, the Aché of Parguay:

From Deutsche Welle:

Paraguay: The Downside of Soybean Consumption

Program notes:

Paraguay’s Atlantic Rainforest is home to the Aché. The indigenous people live from and with the forest as traditional hunters and gatherers. But pressure is growing on them: large-scale soya producers are offering them money for their land.

Only 13 percent of their original habitat in the Atlantic Rainforest remains. An Aché community of 40 families lives in the southern part of the forest. They still own 500 hectares of land. They’re surrounded by soybean plantations, but they, too, have to farm land to survive. A team from the World Wide Fund for Nature is helping the Aché preserve their habitat and way of life. They are encouraging the revival of yerba maté cultivation. The plant regenerates the forest floor, resulting in greater biodiversity.

Headlines II: Spies, laws, pols, zones, drones


For today’s tales from the dark side, we begin with this from MintPress News:

Will The House’s Gutted USA Freedom Act Really Stop The NSA?

“While it represents a slight improvement from the status quo, it isn’t the reform bill that Americans deserve,” says a staff attorney with the ACLU.

In a Thursday op-ed for Hays Post, Kansas Rep. Tim Huelskamp explained his reasoning for not voting for the USA Freedom Act, which cleared the House earlier in the day in a 303-121 vote.

“[The] bill presented on the House floor today does not address many of privacy and constitutional concerns expressed by Kansans over the warrantless bulk collection of Americans’ personal information,” wrote Huelskamp.

Huelskamp was an original sponsor to the bill. Originally meant to end the National Security Agency’s bulk collection of metadata from Americans’ phone records, the bill was initially heralded as the first serious attempt to bring balance to the way the nation handles electronic surveillance.

From the Guardian, the obvious conclusion:

The year of living more dangerously: Obama’s drone speech was a sham

  • We were promised drone memos. And a case for legal targeted killing. And no more Gitmo. We’re still waiting

Twelve months ago today, Barack Obama gave a landmark national security speech in which he frankly acknowledged that the United States had at least in some cases compromised its values in the years since 9/11 – and offered his vision of a US national security policy more directly in line with “the freedoms and ideals that we defend.” It was widely praised as “a momentous turning point in post-9/11 America”.

Addressing an audience at the National Defense University (NDU) in Washington, the president pledged greater transparency about targeted killings, rededicated himself to closing the detention center at Guantánamo Bay and urged Congress to refine and ultimately repeal the Authorization for the Use of Military Force, which has been invoked to justify everything from military detention to drones strikes.

A year later, none of these promises have been met. Instead, drone strikes have continue (and likely killed and wounded civilians), 154 men remain detained at Guantanamo and the administration has taken no steps to roll back the AUMF. This is not the sort of change Obama promised.

Coming up with a drone report the old-fashioned way with RT:

Over 60% of US drone targets in Pakistan are homes – research

The CIA has been bombing Pakistan’s domestic buildings more than any other targets over the past decade of the drone war launched by the US, says the latest research by the Bureau of Investigative Journalism.

Almost two thirds, or over 60 percent, of all US drone strikes in Pakistan targeted domestic buildings, says joint research conducted by the Bureau of Investigative Journalism (BIJ), a London-based non-profit news group, along with Forensic Architecture, a research unit based at Goldsmiths University, London, and Situ Research in New York.

The authors of the paper analyzed thousands of media reports, witness testimonies and field investigations to obtain the data on drone strikes in Pakistan’s Federally Administered Tribal Areas (Fata).

According to the study, at least 132 houses have been destroyed in more than 380 strikes over the past decade with at least 222 civilians being among the 1,500 or more people killed.

Security checks and no security, from Quartz:

You should fear background checks even if you’ve done nothing wrong

  • 41% error rate

This issue matters not only because innocent people and employers who hire screening companies are getting ensnared by a digital dragnet; it also matters because 65 million Americans have criminal records, and those who want to turn their lives around are hurt by background check mistakes. Maybe you don’t care that employers end up screening out deserving applicants. Maybe you scoff at liberals like me who worry that background screening has a discriminatory impact on people of color.  At least you should care that the mistakes cut both ways: employers can end up hiring applicants whose full criminal records are not showing up on background screens.

You can find a litany of common screw-ups in this report by the National Consumer Law Center (NCLC). It’s impossible to quantify the extent of the errors, partly because the industry has no registration requirements and any fly-by-night operation with web access can set up shop. But the NCLC says “tens of millions of workers may pay for these third-party errors with their jobs.” One screening company studied federal corrections databases and found a “41% error rate.”

If you got arrested 30 years ago for selling a little weed but were never charged, or if you went to trial but were never convicted, you still might be tagged with a criminal record. That’s because too many screeners don’t bother to check original court records to verify the status of cases, according to Welby. These screening companies often rely only on bulk databases that aren’t properly updated.

Techdirt covers another reason for insecurity:

Another Bogus Hit From A License Plate Reader Results In Another Citizen Surrounded By Cops With Guns Out

  • from the verification-to-be-performed-at-gunpoint dept

We recently covered a story about a lawyer who found himself approached by cops with guns drawn after an automatic license plate reader misread a single character on his plate as he drove by. The police did make an attempt to verify the plate but were stymied by heavy traffic. Unfortunately, it appears they decided to force the issue rather than let a potential car thief escape across the state line.

As I pointed out then, the increasing reliance on ALPRs, combined with the one-billion-plus records already in storage and the millions being collected every day, means the number of errors will only increase as time goes on — even as the technology continues to improve. This person was lucky to escape with nothing more than an elevated heart rate. Others won’t be so lucky… like Denise Green of San Francisco.

Green’s civil rights lawsuit has just been reinstated by Ninth Circuit Court of Appeals, which overturned an earlier decision that granted summary judgment in favor of the San Francisco Police Department. The lower court found that the officers had made a “good faith, reasonable mistake” when they performed a felony stop of Green, which included being ordered out of her vehicle and onto the ground at gunpoint and held in cuffs for nearly 20 minutes while officers verified the plates and filled out paperwork.

From the Christian Science Monitor, righting wrongs:

Dallas targets wrongful convictions, and revolution starts to spread

The Conviction Integrity Unit formed in Dallas to correct wrongful convictions has become a national model that is slowly changing prosecutors’ willingness to reopen the books nationwide.

Some of these units are window dressing created mostly for public relations, critics say. But the Dallas CI Unit has had a profound impact in the city and has come at a time when concerns about wrongful convictions are rippling through the American justice system.

Indeed, as exonerations nationwide force prosecutors to reconsider their role in public safety, Mr. Watkins has cast himself as a leading reformer, taking on the insular culture within district attorneys’ offices and challenging the credo that the most effective district attorney is the one who wins the most convictions.

“One overriding truth is that the prosecutor is by far the most important and powerful actor in the criminal justice system,” says Samuel Gross, editor of the National Registry of Exonerations.

RT covers a curious possibility:

Snowden ‘considers’ returning to US – report

American whistleblower Edward Snowden is “considering” returning home to the USA under certain conditions, his lawyer told German news magazine Der Spiegel.

“There are negotiations,” Snowden’s German lawyer Wolfgang Kaleck told Der Spiegel. “Those who know the case are aware that an amicable agreement with the US authorities will be most reasonable.”

All efforts are now focused on finding a solution acceptable for Edward Snowden, at least in the medium term, according to Kaleck, who is also secretary-general for the European Center for Constitutional and Human Rights.

From Medill News Service, snitchin’ in the kitchen?:

With ‘Internet of Things,’ your fridge will know when milk is low

Americans are adapting to a world in which virtually everything _ from cellphones and cars to washing machines and refrigerators _ is going to be connected to the Internet or networks. Many of these devices will _ and do _ “talk” to one another via tiny sensors that function almost like human senses, logging information such as temperature, light, motion and sound.

Theoretically, the sensors could allow a new refrigerator, for example, to send an alert to a homeowner’s smartphone whenever the fridge is running low on milk. This concept of device conversation is known as the Internet of Things. The technology will make life easier, but it also means more people are vulnerable to device malfunction or hacking.

Experts and government officials acknowledge the transformative power of the Internet of Things. But the authors of a White House report in May on the effects of big data _ including all the information that devices collect _ are also concerned about the potential for privacy abuses that comes with the technology.

Getting censorious with the New York Times:

Twitter Agrees to Block ‘Blasphemous’ Tweets in Pakistan

At least five times this month, a Pakistani bureaucrat who works from a colonial-era barracks in Karachi, just down the street from the former home of his country’s secularist founder, Mohammed Ali Jinnah, asked Twitter to shield his compatriots from exposure to accounts, tweets or searches of the social network that he described as “blasphemous” or “unethical.”

All five of those requests were honored by the company, meaning that Twitter users in Pakistan can no longer see the content that so disturbed the bureaucrat, Abdul Batin of the Pakistan Telecommunications Authority: crude drawings of the Prophet Muhammad, photographs of burning Qurans, and messages from a handful of anti-Islam bloggers and an American porn star who now attends Duke University.

The blocking of these tweets in Pakistan — in line with the country-specific censorship policy Twitter unveiled in 2012 — is the first time the social network has agreed to withhold content there. A number of the accounts seemed to have been blocked in anticipation of the fourth annual “Everybody Draw Muhammad Day” on May 20.

Digital Alzheimer’s from the Associated Press:

Europe’s move to rein in Google would stall in US

Europe’s moves to rein in Google — including a court ruling this month ordering the search giant to give people a say in what pops up when someone searches their name — may be seen in Brussels as striking a blow for the little guy.

But across the Atlantic, the idea that users should be able to edit Google search results in the name of privacy is being slammed as weird and difficult to enforce at best and a crackdown on free speech at worst.

“Americans will find their searches bowdlerized by prissy European sensibilities,” said Stewart Baker, former assistant secretary for policy at the U.S. Department of Homeland Security. “We’ll be the big losers. The big winners will be French ministers who want the right to have their last mistress forgotten.”

Mountain View, California -based Google says it’s still figuring out how to comply with the European Court of Justice’s May 13 ruling, which says the company must respond to complaints about private information that turns up in searches. Google must then decide whether the public’s right to be able to find the information outweighs an individual’s right to control it — with preference given to the individual.

After the jump, the latest developments from the Asian Game of Zones, including Chinese strategy, bonding afloat with Moscow and Beijing, playing chicken over the China Seas, nukes afloat, Chinese domestic insecurity, and Japan’s relentless remilitarization push. . . Continue reading

Headlines II: Spies, hacks, zones, militarism


The latest tales from the dark side covers everything from deceptive legislation in Washington to the Games of Zones in Asia, plus lots more sandwiched in between.

First up, from MintPress News, listing the veil at an American concentration camp:

Judge Orders Release Of Guantanamo Force-Feeding Videos

  • For Guantanamo detainees, their last bargaining chip is the U.S. government’s determination to keep them alive. But their hunger strikes come at a cruel, painful cost: force-feeding.

U.S. District Judge Gladys Kessler has lifted the temporary restraining order which blocked federal officials from force-feeding Mohammed Abu Wa’el Dhiab.

“Thanks to the intransigence of the Department of Defense, Mr. Dhiab may well suffer unnecessary pain from certain enteral feeding practices and forcible cell extractions,” wrote Kessler. “However, the court simply cannot let Mr. Dhiab die.”

Dhiab has indicated that he would submit to being force-fed by tube if it was done at a hospital at Guantanamo Bay, adding that he wished to “be spared the agony of having the feeding tubes inserted and removed for each feeding, and…the pain and discomfort of the restraint chair.”

According to Kessler, the Department of Defense has declined this request.

Al Jazeera America lifts another veil ever so slightly:

The unexpected way Congress is making the drone program more transparent

  • The confirmation process for Obama nominees has turned up some of the only disclosures about the US drone program

The Senate confirmed David Jeremiah Barron to the 1st U.S. Circuit Court of Appeals on Thursday, but only after Barack Obama’s administration agreed to make public a controversial secret memo about the U.S. targeted killing program it has long sought to keep secret.

The administration’s decision is a revealing look at how nomination hearings have become an effective new weapon in the fight for more transparency in the government’s covert counterterrorism policies.

Though the president nominated the Harvard Law professor in September, several influential senators from both sides of the aisle — including Mark Udall of Colorado and Ron Wyden of Oregon — threatened to block the nomination unless key memos written by Barron while he was acting head of the Office of Legal Counsel in 2009 and 2010 were disclosed.

From The Hill, belated gumption:

Tech companies: FBI ‘gag orders’ violate Constitution

  • Four tech companies claim that the FBI is ignoring their First Amendment rights by barring them from revealing what types of information they turn over to the government

In court documents unsealed on Friday, Google, Yahoo, Microsoft and Facebook claimed that the national security letter (NSL) orders are a “prohibition on speech [that] violates the First Amendment.”

“The government has sought to participate in public debate over its use of the NSL statute,” the companies wrote in a friend-of-the-court brief. “It should not be permitted to gag those best suited to offer an informed viewpoint in that debate; the parties that have received NSLs.”

The FBI uses the letters to get information from banks, Web companies and others about their customers. Under the terms of the letters, though, companies are prevented from disclosing details about having received the request and handed over information.

Al Jazeera America covers a half-measure:

Anti-spy phone firm gets major funding boost

  • Silent Circle’s Blackphone received $30 million this week and is slated to ship this summer

The smartphone encryption startup Silent Circle announced a boost in funding Wednesday, grabbing $30 million in investment capital ahead of the June shipping of its signature Blackphone, which the company says can deflect cybersnooping.

The announcement came a day before the House of Representatives on Thursday approved a bill that would end mass spying by the National Security Agency (NSA). It also comes in the wake of charges against more than 100 people announced this week for unleashing a sophisticated malware that has infected half a million computers in more than 100 countries.

Silent Circle’s founder, however, warned that Blackphone still wouldn’t deter the most determined efforts of the National Security Agency to monitor mobile phones.

From China Daily, corporate blowback from NSA spooks:

Cisco weighs in on new Chinese cyber security policy

Cisco Systems Inc said it will take “active measures” to safeguard product safety and reliability after a Chinese government announcement to impose tighter cyber security checks on overseas information technology providers.

The California-based IT firm was the first overseas company to directly respond to a government decision that IT products, services and suppliers related to national security and key public interest should submit to a review program before being put into use.

Cisco is planning to work with the US government and industry contacts to learn more about the new regulation and any implications for IT companies in China, the company said in an e-mail reply to China Daily.

From the Guardian, muzzling the inconvenient press:

Scotusblog loss of Senate press credentials fuels media uproar

  • Website to mount appeal of press gallery decision on Friday
  • Legendary reporter Lyle Denniston may be affected

It is widely praised for doing what no other news organisation can. But now Scotusblog may lose what hundreds of other publications take for granted: access to the Senate.

Scotusblog, a website dedicated to coverage of the US supreme court, is preparing to mount an appeal Friday morning to a decision last month by the Senate press gallery not to renew its press credentials. The gallery granted Scotusblog credentials in 2013.

The blog’s reporters appear likely to retain access to the supreme court through temporary arrangements. The court has traditionally honored Senate credentials but is currently reviewing its press procedures.

The London Daily Mail, crusading Pee Tardies:

Three more Tea Party activists arrested over photo taken of Mississippi Senator Thad Cochran’s ailing wife in a nursing home

  • Mark Mayfield, a Tea Party board member, school teacher Richard Sager and John Mary were arrested Thursday
  • The activists were hoping to use the picture of Rose Cochran in an ad claiming Thad Cochran is having an affair
  • Mrs Cochran has been suffering from dementia for 13 years and is in hospice care
  • The men were hoping to support the campaign of Tea Party challenger Chris McDaniel

International Business Times covers the latest vileness from a household name:

Facebook Microphone Update: Electronic Surveillance Experts React To Smartphone Mic Data Collection

  • Digital Privacy Experts React To Facebook’s Intentions To Collect Data Through Smartphone Mics

On Thursday, the International Business Times reported that Facebook will use a forthcoming mobile app update to save and collect data captured by your smartphone’s microphones–a development that privacy experts found worrisome.

Though Facebook guaranteed users that “no sound is stored” by the new feature, the social media giant confirmed to the IBTimes that “data is saved, but all data is anonymized and aggregated.”

The social networking company declined to comment on how it planned to use the data once they were gleaned.

A hack attack from TechWeekEurope:

Pro-Russian Hackers Attack Central Election Commission Of Ukraine

  • CyberBerkut steals a huge archive of emails three days before the elections, sends it to the media agencies

Ukrainian hacker outfit CyberBerkut, which was previously spotted defacing at least 40 local media websites and carrying out a DDoS attack against NATO infrastructure, has struck again.

This time, the group has managed to break into the systems of the Central Election Commission (CEC) of Ukraine – an independent body of the Ukrainian government. The hackers have stolen large archive of emails, as well as the technical documentation of the CEC system administrators.

They refer to the current government of the country as a “junta” – a word which describes the ruling council of a military dictatorship.

After the jump, it’s on to Asia and the last chapter in the Games of Zones, including an Iranian stand-down, Sino-Russian exercises afloat, Japanese remilitarization, and more. . . Continue reading

Charts of the day: More U.S. polarization defined


Stunning evidence of the radical disparities afflicting the U.S. workforce are two chartrs from a new report [PDF] from the Federal Reserve Bank of New York, “Job Polarization and Rising Inequality in the Nation and in the New York-Northern New Jersey Region”:

First up, evidence of polarization in the form of new jobs over a four-decade span:

Job Polarization and Rising Inequality
And a parallel devlopment in the form of polarizing salary differentials:

Job Polarization and Rising Inequality
From the bank’s webpage leading to the PDF:

Since the 1980s, employment opportunities in both the UnitedStates and the NewYork–northern NewJersey region have become increasingly polarized. While technological advances and globalization have created new jobs for workers at the high end of the skill spectrum and largely spared the service jobs of workers at the low end, these forces have displaced many jobs involving routine tasks—traditionally the sphere of middle-skill workers. Moreover, these same forces have pushed up wages for high-skill workers disproportionately, contributing to increased wage inequality. The rise in inequality has been especially sharp in downstate NewYork and northern New Jersey, where the wage gap is now markedly larger than in the nation.