Category Archives: Privacy

Veteran spook probers call for a Snowden deal


For those of us old enough to remember it, the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, known as the Church Committee for its chair, Idaho Democratic Sen. Frank Church, marked a watershed moment in American politics.

Charged with investigating abuses by U.S. intelligence agencies, the committee rocked the nation and the globe with its reports of epic wrongdoing by the CIA, NSA, and the FBI.

The committee investigated on a massive and illegal mail-opening operation and secret drug experiments on American citizens by the CIA, the FBI’s illegal efforts to thwart the civil rights movement [including efforts to smear the Rev. Martin Luther King Jr. and incite murderous violence among black radicals], and the illegal use of the NSA to monitor prominent activists opposed to the Vietnam war.

The committee’s efforts lead to the first major reforms to the nation’s massive spy apparatus in the form of the Foreign Intelligence Surveillance Act of 1978, banning mass surveillance of American citizens.

Directing the investigative efforts was a notable staff, headed by Frederick A.O. Scwharz Jr., a Harvard-educated lawyer and the great-grandson of the founder of New York City’s most famous toy store.

And now Schwarz, who now serves as chief counsel for New York University’s Brennan Center for Justice, and other members of the Church Committee staff have issued a call for the Obama Administration to negotiate a plea bargain with America’s most famous whistleblower, who, they say, has done us all a great service.

From the Brennan Center for Justice:

As former professional staff members of the U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities [the “Church Committee”], we are writing to urge that the White House and the Justice Department negotiate a settlement of the charges against Edward Snowden that both sides can accept.

There is no question that Edward Snowden’s disclosures led to public awareness which stimulated reform. Whether or not these clear benefits to the country merit a pardon, they surely do counsel for leniency.

In the American political system, bipartisan government reforms are generally regarded as the most legitimate and durable. Recently, however, our government has all but stopped making bipartisan reforms. There is one big exception: the surveillance reforms inspired by Edward Snowden’s revelations.

It was Snowden who supplied journalists with evidence that our government had, for many years, been collecting information about the domestic phone calls of millions of Americans. As a result, a bipartisan coalition in Congress formed to amend the Patriot Act to prohibit the practice. In the Senate, Mike Lee, a conservative Republican from Utah, joined with Patrick Leahy, a liberal Democrat from Vermont, to sponsor the reform. In the House, the move toward reform started with two Michigan Congressmen, Justin Amash, a junior Tea Party Republican from Grand Rapids, and John Conyers, a veteran liberal Democrat from Detroit. Republican Congressman James Sensenbrenner, a primary author of the Patriot Act and its extensions, also backed the reforms saying he and his colleagues had not intended to permit the NSA’s widespread scooping up of data about Americans’ communications.

It was also Snowden’s material that showed the extent to which the National Security Agency intercepts and filters international electronic communications from undersea fiber optic cables, and taps internal links connecting data centers for Internet companies like Yahoo! and Google. All this was in pursuit of former NSA Director Keith Alexander’s directive to “collect it all.” Untold millions of Americans’ communications are swept up in these programs, where they are available for perusal by the FBI and CIA through what has become known as the “backdoor” search loophole. Republican Reps. Ted Poe and Tom Massie have joined with Democratic Rep. Zoe Lofgren in sponsoring legislation to ban this practice.

Snowden’s documents also revealed the broad scope of NSA spying on foreigners including eavesdropping on close allies in addition to potential adversaries like Russia and China. While some have argued that leaking such “legal” surveillance activities disqualifies Snowden from any mercy, President Barack Obama has acknowledged that stronger controls were necessary. He implemented the first-ever reforms to afford privacy protection for foreigners from surveillance unless it is necessary to protect our national security.

The NSA, CIA, and Defense Department maintain that harm resulted from the disclosures, particularly with respect to our efforts overseas, where they say relationships with intelligence partners have been damaged and our adversaries may know more about our capabilities. No one is asking that these claims be ignored, only that they be checked, and then weighed against the benefits.

America clearly did benefit from Snowden’s disclosures. Former Attorney-General Eric Holder said that Snowden “performed a public service by raising the debate that we engaged in and by the changes that we made.” President Obama has said that the public debate regarding surveillance and accountability that Snowden generated “will make us stronger.” The President also issued an executive order recognizing that foreigners have privacy interests –– an acknowledgement no previous President had ever made –– and also asked the intelligence community to find ways to provide foreigners with some protections previously provided only to Americans.

Without Snowden, it would have been decades, if ever, until Americans learned what intelligence agencies acting in our name had been up to. We know first hand that lack of disclosure can cause just as many, if not more, harms to the nation than disclosure. When intelligence agencies operate in the dark, they often have gone too far in trampling on the legitimate rights of law-abiding Americans and damaging our reputation internationally. We saw this repeated time and time again when serving as staff members for the U.S. Senate Select Committee, known as the Church Committee, that in 1975-76 conducted the most extensive bipartisan investigation of a government’s secret activities ever, in this country or elsewhere.

Continue reading

Get ready for soaring cable, Internet, phone bills


Yep, a key Trump administration official wants the abolish the agency that regulates the prices of the nation’s communications system.

And that means there wouldn’t be anyone setting caps on the prices telephone, satellite, and cable companies could charge.

So prepare for slower connection speeds unless you pay premium prices, and prepare for downgraded service to rural areas and actual blocking of some web sites that offer views service providers don’t like.

And privacy? Security from unfettered government and corporate snooping?

Fuggedaboudit!

From the Los Angeles Times:

A top advisor to Donald Trump on tech policy matters proposed all but abolishing the nation’s telecom regulator last month, foreshadowing possible moves by the president-elect to sharply reduce the Federal Communications Commission’s role as a consumer protection watchdog.

In an Oct. 21 blog post, Mark Jamison, who on Monday was named one of two members of Trump’s tech policy transition team, laid out his ideal vision for the government’s role in telecommunications, concluding there is little need for the agency to exist.

“Most of the original motivations for having an FCC have gone away,” Jamison wrote. “Telecommunications network providers and [Internet service providers] are rarely, if ever, monopolies.”

The FCC declined to comment for this story, but its current leadership has disagreed strongly with that analysis. Its Democratic chairman, Tom Wheeler, has spoken of an Internet service “duopoly” in much of the country that limits competition. And he has compared telecommunications to the rail and telegraph networks of the 19th century, calling for new rules of the road as the Internet becomes the dominant communications platform of the 21st century.

Wheeler has used his agency to go after allegedly misbehaving companies, proposing record-setting fines against companies for slowing down “unlimited” data plans and for billing customers for content and services they didn’t ask for. He passed proactive regulations such as net neutrality to prohibit anticompetitive behavior. And, in an unprecedented step, Wheeler made Internet providers obey the same privacy rules that legacy phone companies must abide by when handling customer data.

French Big Brother database plans generate anger


A Big Brotherish panopticon plan announced on Halloween weekend by the government of increasingly unpopular French President François Hollande has generated strong and growing opposition.

From TheLocal.fr:

French government plans to create a new database containing details of almost the entire population suffered fresh blows on Monday as criticism grew of the controversial project.

The Socialist government announced a decree to create the database, which would contain personal information of 60 million people, on a public holiday weekend at the end of October.

It has led to fears that hackers might target the information as well as anxiety that so much personal data could be misused in the future by the security forces or other government agencies.

The stealthily issued decree, published two days after Halloween, led opposition MP Lionel Tardy to accuse the government last week of “treating the French people like pumpkins”.

On Monday, the French Digital Council, a state watchdog that looks at the impact of technology on society and the economy, said the database should be suspended.

Abby Martin tackles John Podesta and his emails


In one of her most important efforts yet, Abby Martin digs beneath the rhetoric to show the real importance of the cache of Wikileaked emails from the account of Democratic National Committee chair John Podesta.

What she reveals is the heart of darkness beating beneath the skin of the American political system, the same system that has given us a presidential race pitting the two most unpopular candidates since polling began.

In an attempt to discredit the emails and what they reveal, the mainstream media have presented without questioning claims that the hack was executed at the behest of the Russian government without offering any verification for their assertion.

But no less than James Bamford, a former U.S. Navy intelligence analyst and attorney who became the most distinguished journalist ever to cover and blow the lid off illegal spying programs by the National Security Agency, Bamford questioned the government’s claims in an incisive essay for Reuters, where he writes:

The problem with attempting to draw a straight line from the Kremlin to the Clinton campaign is the number of variables that get in the way. For one, there is little doubt about Russian cyber fingerprints in various U.S. campaign activities. Moscow, like Washington, has long spied on such matters. The United States, for example, inserted malware in the recent Mexican election campaign. The question isn’t whether Russia spied on the U.S. presidential election, it’s whether it released the election emails.

Then there’s the role of Guccifer 2.0, the person or persons supplying WikiLeaks and other organizations with many of the pilfered emails. Is this a Russian agent? A free agent? A cybercriminal? A combination, or some other entity? No one knows.

There is also the problem of groupthink that led to the war in Iraq. For example, just as the National Security Agency, the Central Intelligence Agency and the rest of the intelligence establishment are convinced Putin is behind the attacks, they also believed it was a slam-dunk that Saddam Hussein had a trove of weapons of mass destruction.

Consider as well the speed of the political-hacking investigation, followed by a lack of skepticism, culminating in a rush to judgment.

But what is certain, beyond question, is that John Podesta represents everything that’s wrong about American politics, where claims of democratic openness are belief by secret deals in which big banks and powerful corporations, not workers and their families, are the real beneficiaries.

And Abby Martin is on the story.

From teleSUR English:

The Empire Files: Abby Martin Exposes John Podesta

Program notes:

With the Wikileaks release of thousands of emails belonging to John Podesta, very little is known in US society about Podesta himself. While he’s maintained a low profile, John Podesta is actually considered one of Washington’s biggest players, and one of the most powerful corporate lobbyists in the world.

In this episode of The Empire Files, Abby Martin explores John Podesta’s political rise, his vast network of corporate connections and his think tank “Center for American Progress.” Learn why the Podestas and the Clintons are a match made in ruling class heaven.

Quote of the day: A Clinton team email response


From Wikileaks, an email from a longtime Hillary advisor, transition team co-chair and likely chief of staff in a Hillary White House Neera Tanden, asking the logical question of the Democratic National Committee chair and offering a solution of her own:

blog-email

Making someone very, very happy

Meanwhile, The Donald has a response of his own to the latest development, the reopening of the FBI investigation to determine if crimes were committed in using that private email server to send classified information thanks to a new discovery of emails on the computers of habitual sexter Anthony Weiner and his now-estranged spouse and top Clinton advisor best buddy Huma Abudin.

From the editorial cartoonist of the Atlanta Journal-Constitution:

Mike Luckovich: With tongue

blog-lucko

Ma Bell sells spooky data; Internet attack probed


Two major stories on the cybersecurity front to report.

AT&T sells your data, for a fortune

The first item comes from Ma Bell, who’s been helping folks spy on you and pocketing a fortune for doing.

From the Guardian:

Telecommunications giant AT&T is selling access to customer data to local law enforcement in secret, new documents released on Monday reveal.

The program, called Hemisphere, was previously known only as a “partnership” between the company and the US Drug Enforcement Agency (DEA) for the purposes of counter-narcotics operations.

It accesses the trove of telephone metadata available to AT&T, who control a large proportion of America’s landline and cellphone infrastructure. Unlike other providers, who delete their stored metadata after a certain time, AT&T keeps information like call time, duration, and even location data on file for years, with records dating back to 2008.

But according to internal company documents revealed Monday by the Daily Beast, Hemisphere is being sold to local police departments and used to investigate everything from murder to Medicaid fraud, costing US taxpayers millions of dollars every year even while riding roughshod over privacy concerns.

Internet of things becomes a federal priority

After last week’s massive attackj on online services, carried out through baby monitors, security cameras, and other devices connected to the Internet of Things, Uncle Sam is getting busy.

From Reuters:

Obama administration officials sought on Monday to reassure the public that it was taking steps to counter new types of cyber attacks such as the one Friday that rendered Twitter, Spotify, Netflix and dozens of other major websites unavailable.

The Department of Homeland Security said it had held a conference call with 18 major communication service providers shortly after the attack began and was working to develop a new set of “strategic principles” for securing internet-connected devices.

DHS said its National Cybersecurity and Communications Integration Center was working with companies, law enforcement and researchers to cope with attacks made possible by the rapidly expanding number of smart gadgets that make up the “internet of Things.”

Such devices, including web-connected cameras, appliances and toys, have little in the way of security. More than a million of them have been commandeered by hackers, who can direct them to take down a target site by flooding it with junk traffic.

You have to wonder if another federal agency, the NSA, is busy exploiting these same devices to pry into our lives.

Just a thought. . .

Marshall McLuhan: Still prescient, 49 years later


Back when esnl was a budding journalist, no name was better known in media theory than Marshall McLuhan of the University of Toronto School of Communication Theory.

McLuhan’s theories about the role of mass media in shaping the consciousness of the 20th Century sparked endless hours of coffee house conversation.

But McLuhan has largely dropped out of sight, enduring mainly on DVD’s of Annie Hall, in one of most memorable movie cameos ever:

But McLuhan’s theories prove remarkably resilient, most notably his prescient understanding of the computer-enabled panopticon and the power of television to shape and mobilize emotions on behalf of corporate agendas.

He also grasped that the dramatic first-person journalistic reports and prime network coverage by the free-roving reporters of the Vietnam War would lead to draconian restrictions liked the “embedded reporters” who covered the two Bush Wars in the Middle East and North Africa.

Indeed, he even foreshadowed the rise of the presidential candidacy of a creature such as Donald Trump.

And that brings us to today’s video, a remarkably documentary aired on NBC 19 March 1967:

blog-mcluhan

And now for the video. . .

Aired 49 years ago, yet remarkably timely, it comes from from Marshall McLuhan Speaks:

This is Marshall McLuhan: The Medium is the Massage

Program note:

Featuring Marshall McLuhan, and narrated by Edward Binns.

U.K. spooks waged spy campaign on own citizens


Who do they think they are?

The NSA?

From the Guardian:

The UK’s security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on British citizens for more than a decade, top judges have ruled.

The investigatory powers tribunal, which is the only court that hears complaints against MI5, MI6 and GCHQ, has ruled that the security services operated secret regimes to collect vast amounts of personal communications data tracking individual phone and web use and large datasets of confidential personal information without adequate safeguards or supervision for more than 10 years.

The IPT ruling includes the disclosure from an unpublished 2010 MI5 policy statement that the “bulk personal datasets” include material on the nation’s personal financial activities. “The fact that the service holds bulk financial, albeit anonymised, data is assessed to be a high corporate risk, since there is no public expectation that the service will hold or have access to this data in bulk. Were it to become widely known that the service held this data, the media response would most likely be unfavourable and probably inaccurate,” it says.

The ruling comes as the House of Lords debates the final stages of the investigatory powers bill – the snooper’s charter – which will put mass digital surveillance activities on a clear legal footing for the first time since the disclosure by Edward Snowden of the extent of state surveillance in 2013.

Companies gave California cops your media posts


Big Brother is has been watching your social media posts in the Golden State, especially if you’ve been Tweeting, Facebooking of Instragramming about protests, cops in many California cities [including Oakland, Sacramento, and San Diego] are reading what you write and looking at your pictures and videos.

From the American Civil Liberties Union:

The ACLU of California has obtained records showing that Twitter, Facebook, and Instagram provided user data access to Geofeedia, a developer of a social media monitoring product that we have seen marketed to law enforcement as a tool to monitor activists and protesters.

We are pleased that after we reported our findings to the companies, Instagram cut off Geofeedia’s access to public user posts, and Facebook has cut its access to a topic-based feed of public user posts. Twitter has also taken some recent steps to rein in Geofeedia though it has not ended the data relationship.

Further steps are required if these companies are to live up to their principles and policies by protecting users of all backgrounds engaging in political and social discourse. So today the ACLU of California, the Center for Media Justice, and Color of Change are calling on Twitter, Facebook and Instagram to commit to concrete changes to better protect users going forward. Read our letters here and here.

We first learned about these agreements with Geofeedia from responses to public records requests to 63 California law enforcement agencies. These records revealed the fast expansion of social media surveillance with little-to-no debate or oversight.

But as we continued to comb through thousands of pages of documents, we saw emails from Geofeedia representatives telling law enforcement about its special access to Twitter, Facebook, and Instagram user data.

In one message, a Geofeedia representative tells police that the company has arrangements with Twitter and Instagram for user data. Right after that, the representative promotes a product feature that “covered Ferguson/Mike Brown nationally with great success.

Read the rest.

Headline of the day: More Hillary lies exposed


From the McClatchy Washington Bureau:

Contradicting FBI view, Clinton’s leaked speeches portray her as computer savvy

Contrary to views collected by the FBI that Hillary Clinton was a technophobe unsophisticated in the use of computers, her paid speeches indicate that she was well aware of the dangers of computer hacking and penetration and that diplomats would be “totally vulnerable” without extreme precautions.

Yahoo’s Yahoos & a major case of buyer’s remorse


In his seminal 1726 satire, Gulliver’s Travels, Jonathan Swift coined a word to describe a loathsome creature spawned by his imagination.

The word was Yahoo, and here’s Wikipedia’s definition of the nature of the beast:

Swift describes them as being filthy and with unpleasant habits, resembling human beings far too closely for the liking of protagonist Lemuel Gulliver, who finds the calm and rational society of intelligent horses, the Houyhnhnms, greatly preferable. The Yahoos are primitive creatures obsessed with “pretty stones” they find by digging in mud, thus representing the distasteful materialism and ignorant elitism Swift encountered in Britain. Hence the term “yahoo” has come to mean “a crude, brutish or obscenely coarse person.”

Why anyone would want to name a company after disgusting a critter is something of a mystery, although the name may be apt given that the company was letting both the NSA and FBI root around in its emails searching for “pretty stones,” the jewels of intelligence.

And now a would-be buyer of the company is finding that they’re about to wind up with a mess of their hands.

From the New York Post:

Verizon is pushing for a $1 billion discount off its pending $4.8 billion agreement to buy Yahoo, several sources told The Post exclusively.

The request comes on the heels of the web giant getting bludgeoned by bad news in the past few days.

Yahoo revealed two weeks ago that it had been hacked in 2014 and that usernames and passwords for 500 million accounts were swiped. Then, earlier this week, it was learned that Yahoo had been ordered by a secret Foreign Intelligence Surveillance Court to scan emails for terrorist signatures.

“In the last day we’ve heard that [AOL boss] Tim [Armstong] is getting cold feet. He’s pretty upset about the lack of disclosure and he’s saying, ‘Can we get out of this or can we reduce the price?’” said a source familiar with Verizon’s thinking.

But it gets worse, as the Intercept reports:

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Despite this week’s differing media accounts, this much isn’t disputed: In 2015, Yahoo provided the U.S. government with the means to scan every single email that landed in every single Yahoo Mail inbox. The scanning was kept an absolute secret — and as this ex-Yahoo source describes, that meant keeping it a secret from security personnel who came to believe it endangered Yahoo’s hundreds of millions of unwitting customers.

The employee, who worked at Yahoo before, during, and after the installation of the email-scanning program, requested anonymity because of a nondisclosure agreement formed when the individual quit several months after the program was discovered internally last summer. The source declined to share certain specific names for fear of violating that same NDA or the NDA of others, but The Intercept has confirmed details of the source’s employment at Yahoo, which would have put the then-employee in a position to know this information.

Yep Yahoo is precisely the right name, no?

Headline of the day: The snitch in your in-box


Another gem from the London Daily Mail:

REVEALED: Yahoo ‘secretly scanned the incoming emails of hundreds of millions of customers for the FBI and NSA’ while Edward Snowden urges people to delete their accounts

  • Sources say company complied with classified U.S. government directive
  • They scanned hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI 
  • Intelligence officials wanted Yahoo to search for a set of characters
  • Yahoo Chief Executive Marissa Mayer’s decision to obey the directive roiled senior executives, former employers claim
  • It also led to the departure of Chief Information Security Officer Alex Stamos, who now holds the top security job at Facebook, in June 2015
  • Not known what data – if any – was handed over
  • Raises questions about whether intelligence officials approached other email providers with the same kind of request
  • Microsoft, Google, Apple and Twitter have all issued statements denying similar activity within their companies

Quote of the day: A matter of perspective. . .


From From Naureen Shah, director of Amnesty International USA’s Security and Human Rights Program, writing for Medium:

It’s deeply disturbing that, 15 years after the 9/11 attacks, the U.S. government’s sense of justice is so skewed that while not a single person has been prosecuted for torture or unlawful drone killings, it is Edward Snowden who faces decades behinds bars.

So, while we witness the vilification of Edward Snowden, this is happening:

  • The architects of CIA torture celebrate their abuses, safe in the knowledge they likely won’t ever be prosecuted.
  • 61 men languish at Guantanamo, many locked away without charges for more than a decade, and they may die there.
  • Drone strikes have killed scores, including a woman struck by Hellfire missiles and blown to bits before the eyes of her grandchildren, and yet her death has never even been acknowledged by the U.S. government.

Wednesday September 14th marked the 15th year that U.S. intelligence and defense agencies have used the 2001 Authorization of the Use of Military Force, a law passed in the immediate aftermath of 9/11, as a permission slip for human rights abuses.

These out of control agencies, unchecked by the courts and Congress, violating human rights with impunity — this is why Edward Snowden had to speak out, why it’s ludicrous to suggest he could have worked within this desperately broken system, a system where human rights abuses are systematically ignored and sometimes covered up.

Headline of the day II: He spies on you, but. . .


Facebook, the most popular social media platform in history, requires users to let the software spy on their most intimate habits.

But don’t you day try to do the same to the guy who runs it, because he’ll spend millions to stop you.

Irony, anyone?

From the London Daily Mail:

Palo Alto REJECTS Mark Zuckerberg’s bid to demolish neighboring homes and create a family compound after he spent $30m on properties next to his house

  • Facebook founder filed paperwork with the city of Palo Alto in May, stating his intentions to tear down and rebuild four neighboring homes
  • Architectural review board rejected the plans saying a giant compound will violate zoning codes and ideal land use 
  • Plans shows that Zuckerberg will tear down the four homes and rebuild them as smaller properties
  • Zuckerberg bought the four properties in 2013, after a developer threatened to build a house with views right into the billionaire’s bedroom

New studies reveal extent of corporate power grab


Corporations have replaced nation-state’s as the globes real sources of power. But unlike governments, which are nominally responsible to their citizens, corporations answer to nothing other than the bottom line.

While governments, at least in theory, evaluate their success by the extent to which they meet the needs of the public for security and survival, corporations see those same citizens as simply resources to be mind for profit.

The measures corporations take to extract that wealth aren’t limited by the need to ensure the well being of the public. Indeed, the only limits on their avarice are imposed by the governments they increasingly control both by their capture of the electoral process and their ability to demand those governments implement international agreements ceding state sorverignty to corporate boards.

Two new studies point to the success of the corporate agenda, first in capturing global wealth, and, second, in seizing the instruments of state used to monitor and control the citizenry.

The corporate capture of global wealth

First, from Global Justice Now, a report on the dramatic rise of corporate financial power, a power that exceeds that of the world’s nation states:

10 biggest corporations make more money than most countries in the world combined

  • 69 of top 100 economic entities are corporations not countries
  • Walmart, Apple, Shell richer than Russia, Belgium, Sweden
  • British government told: stop supporting your corporations, support your people

Corporations have increased their wealth vis-à-vis countries according to new figures released by Global Justice Now. The campaign group found that 69 of the world’s top economic entities are corporations rather than countries in 2015*. They also discovered that the world’s top 10 corporations – a list that includes Walmart, Shell and Apple – have a combined revenue of more than the 180 ‘poorest’ countries combined in the list which include Ireland, Indonesia, Israel, Colombia, Greece, South Africa, Iraq and Vietnam.

The figures are worse than last year, when 63 of the top economic entities were corporations. When looking at the top 200 economic entities, the figures are even more extreme, with 153 being corporations.

Global Justice Now released the figures in order to increase pressure on the British government ahead of a UN working group, led by Ecuador, established to draw up a binding treaty to ensure transnational corporations abide by the full range of human rights responsibilities. Campaigners are calling for the treaty to be legally enforceable at a national and global level. Britain doesn’t support the process, and has repeatedly vetoed and opposed such proposal in the past.

Nick Dearden, director of Global Justice Now, said:

“The vast wealth and power of corporations is at the heart of so many of the world’s problems – like inequality and climate change. The drive for short-term profits today seems to trump basic human rights for millions of people on the planet. These figures show the problem is getting worse.

Corporations captures government’s secret functions

And the second instance of the corporate seizure of government power, this time focusing on the power to set the most secret agendas of the exercise of power in the secret exercise of power and the ability to invade the most intimate areas of privacy.

From an enlightening essay by veteran journalist Tim Shorrock for The Nation:

The recent integration of two military contractors into a $10 billion behemoth is the latest in a wave of mergers and acquisitions that have transformed America’s privatized, high-tech intelligence system into what looks like an old-fashioned monopoly.

In August, Leidos Holdings, a major contractor for the Pentagon and the National Security Agency, completed a long-planned merger with the Information Systems & Global Solutions division of Lockheed Martin, the global military giant. The 8,000 operatives employed by the new company do everything from analyzing signals for the NSA to tracking down suspected enemy fighters for US Special Forces in the Middle East and Africa.

>snip<

Leidos is now the largest of five corporations that together employ nearly 80 percent of the private-sector employees contracted to work for US spy and surveillance agencies.

This is incredibly risky for a country so dependent on intelligence to fight global wars and prevent domestic attacks.

Yes, that’s 80 percent. For the first time since spy agencies began outsourcing their core analytic and operational work in the late 1990s, the bulk of the contracted work goes to a handful of companies: Leidos, Booz Allen Hamilton, CSRA, SAIC, and CACI International. This concentration of “pure plays”—a Wall Street term for companies that makes one product for a single market—marks a fundamental shift in an industry that was once a highly diverse mix of large military contractors, small and medium technology companies, and tiny “Beltway Bandits” surrounding Washington, D.C.

[T]hese developments are incredibly risky for a country more dependent than ever on intelligence to fight global wars and prevent domestic attacks. “The problem with just five companies providing the lion’s share of contractors is that the client, the U.S. government, won’t have much alternative when a company screws up,” says David Isenberg, the author of Shadow Force: Private Security Contractors in Iraq.

Moreover, the fact that much of this privatized work is top secret—and is generally underreported in the press—undermines the accountability and transparency of our spy agencies. That should deeply concern the American public.

What’s the source of that power?

We close with a quote from a 20 April 2015 essay or Harper’s by New America Foundation scholar Lee Drutman:

Something is out of balance in Washington. Corporations now spend about $2.6 billion a year on reported lobbying expenditures—more than the $2 billion we spend to fund the House ($1.18 billion) and Senate ($860 million). It’s a gap that has been widening since corporate lobbying began to regularly exceed the combined House-Senate budget in the early 2000s.

Today, the biggest companies have upwards of 100 lobbyists representing them, allowing them to be everywhere, all the time. For every dollar spent on lobbying by labor unions and public-interest groups together, large corporations and their associations now spend $34. Of the 100 organizations that spend the most on lobbying, 95 consistently represent business.

Add in the disastrous corporate agenda set by the U.S. Supreme Court and we are looking at nothing less than a de facto and de jure coup in the most powerful nation the planet has ever seen.

The only question is whether or not it will take a second American revolution to restore the balance we have lost.

Quote of the day II: Barack Obama, Biggest Brother


From James Bamford, America’s preeminent journalist of the world of government eavesdropping, writing for Foreign Policy:

Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. Although other leaders may have created more oppressive spying regimes, none has come close to constructing one of equivalent size, breadth, cost, and intrusiveness. From 22,300 miles in space, where seven Advanced Orion crafts now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009.

The effort to wire the world — or to achieve “extreme reach,” in the NRO’s parlance — has cost American taxpayers more than $100 billion. Obama has justified the gargantuan expense by arguing that “there are some trade-offs involved” in keeping the country safe. “I think it’s important to recognize that you can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience,” he said in June 2013, shortly after Edward Snowden, a former contractor with the National Security Agency (NSA), revealed widespread government spying on Americans’ phone calls.

Since Snowden’s leaks, pundits and experts (myself included) have debated the legality and ethics of the U.S. surveillance apparatus. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. What’s more, in trying to right the ship, America’s intelligence culture has grown frenzied. Agencies are ever seeking to get bigger, move faster, and pry deeper to keep pace with the enormous quantity of information being generated the world over and with the new tactics and technologies intended to shield it from spies.

This race is a defining feature of Obama’s legacy — and one that threatens to become never-ending, even after he’s left the White House.

Quote of the day: Was NSA ‘hack’ an inside job?


The posting of a catalog offering the supersecret National Security Agency’s hacking tools has been blamed on Russia by the Obama administration, but America’s most respected journalist covering the NSA beat writes that rather than a Russia hack, the raid on the NSA’s family jewels was more likely an inside job.

From James Bamford, writing for Reuters:

Like a bank robber’s tool kit for breaking into a vault, cyber exploitation tools, with codenames like EPICBANANA and BUZZDIRECTION, are designed to break into computer systems and networks. Just as the bank robber hopes to find a crack in the vault that has never been discovered, hackers search for digital cracks, or “exploits,” in computer programs like Windows.

The most valuable are “zero day” exploits, meaning there have been zero days since Windows has discovered the “crack” in their programs. Through this crack, the hacker would be able to get into a system and exploit it, by stealing information, until the breach is eventually discovered and patched. According to the former NSA officials who viewed the Shadow Broker files, they contained a number of exploits, including zero-day exploits that the NSA often pays thousands of dollars for to private hacking groups.

The reasons given for laying the blame on Russia appear less convincing, however. “This is probably some Russian mind game, down to the bogus accent,” James A. Lewis, a computer expert at the Center for Strategic and International Studies, a Washington think tank, told the New York Times. Why the Russians would engage in such a mind game, he never explained.

Rather than the NSA hacking tools being snatched as a result of a sophisticated cyber operation by Russia or some other nation, it seems more likely that an employee stole them. Experts who have analyzed the files suspect that they date to October 2013, five months after Edward Snowden left his contractor position with the NSA and fled to Hong Kong carrying flash drives containing hundreds of thousands of pages of NSA documents.

So, if Snowden could not have stolen the hacking tools, there are indications that after he departed in May 2013, someone else did, possibly someone assigned to the agency’s highly sensitive Tailored Access Operations.

>snip<

[W]e now have entered a period many have warned about, when NSA’s cyber weapons could be stolen like loose nukes and used against us. It opens the door to criminal hackers, cyber anarchists and hostile foreign governments that can use the tools to gain access to thousands of computers in order to steal data, plant malware and cause chaos.

It’s one more reason why NSA may prove to be one of Washington’s greatest liabilities rather than assets.

Japan focuses on saving your privacy on the IoT


And what, pray tell, is the IoT?

It’s the Internet of Things, all those devices in your home with wireless connections to the Internet.

And to protect your privacy, only a Trumpian solution seems to work.

In other words, you’ll have to build a wall.

From the Yomiuri Shimbun:

BLOG Wall

More from the Yomiuri Shimbun:

In preparation for the spread of the internet of things [IoT], the Internal Affairs and Communications Ministry will develop a “protective wall” to safeguard home electronics connected to the internet from cyber-attacks, The Yomiuri Shimbun has learned.

There has been an increasing number of cases in which IoT devices at home are hacked and used as a base for cyber-attacks. The ministry plans to build a system, or protective wall, on the internet to prevent unauthorized operation of devices and stop them being infected with viruses, according to sources.

Development expenses totaling several hundred million yen will be incorporated in the second supplementary budget for fiscal 2016. In cooperation with electronics makers and telecommunications carriers, the ministry aims to put the system into practical use within a year or two.

It is difficult to improve the security of home electronics such as televisions, security cameras and routers by upgrading their software. While industrial IoT devices and personal computers are guarded with a protective wall or software, many consumer IoT devices are vulnerable to cyber-attacks.

The ministry plans to build a system on the internet in which access to all consumer IoT devices via the internet must go through a protective wall. Any unauthorized communication will be blocked. If there is a security problem with a consumer IoT device, a warning will be issued. The ministry aims to have the system protect existing IoT products as well.

Clinton Foundation may have been hacked, too


And if they were, we can’t wait to see what’s revealed.

From Reuters:

Bill and Hillary Clinton’s charitable foundation hired the security firm FireEye to examine its data systems after seeing indications they might have been hacked, according to two sources familiar with the matter.

So far, no message or document hacked from the New York-based Clinton Foundation has surfaced in public, the sources said.

One of the sources and two U.S. security officials said that like hackers who targeted the Democratic National Committee, Hillary Clinton’s presidential campaign and the Democrats’ congressional fundraising committee, the hackers appear to have used “spear phishing” techniques to gain access to the foundation’s network.

These techniques include creating bogus emails or websites in an effort to gain access to Clinton Foundation staffers’ emails and then to the foundation itself.

With elections called Iceland’s Pirates may reign


Logo of Iceland's Pirate Party.

Logo of Iceland’s Pirate Party.

Iceland’s Pirate Party is drawing closer to the summit of power, as scandals sparked by the release of the Panama Papers have forced the resignations of the prime minister and forced a Panama Papered president to call elections for 29 October.

The Pirate Party, founded on a platform of digital privacy rights, has been the big winner, as Icelanders show rising discontent with traditional parties.

From the Guardian:

The Pirate party, whose platform includes direct democracy, greater government transparency, a new national constitution and asylum for US whistleblower Edward Snowden, will field candidates in every constituency and has been at or near the top of every opinion poll for over a year.

>snip<

“It’s gradually dawning on us, what’s happening,” Birgitta Jónsdóttir, leader of the Pirates’ parliamentary group, told the Guardian. “It’s strange and very exciting. But we are well prepared now. This is about change driven not by fear but by courage and hope. We are popular, not populist.”

The election, likely to be held on 29 October, follows the resignation of Iceland’s former prime minister Sigmundur Davið Gunnlaugsson, who became the first major victim of the Panama Papers in April after the leaked legal documents revealed he had millions of pounds of family money offshore.

The party’s popularity rises with scandals

A succession of scandals involving government leaders has spurred the rise of a party premised on transparency and participatory democracy.

The Iceland Monitor has been tracking the numbers:

With just three MPs in Iceland’s current parliament, support for the Pirate party in Iceland rocketed from 13% to 30% in the space of nine weeks in February-April 2015.

They peaked at 38.6% in February this year, and have been Iceland’s most popular political party for an almost unbroken period of seventeen months (all figures: MMR).

People who have been a member of the Pirate Party for at least thirty days are eligible to vote in elections and over 100 potential candidates have come forward for the constituencies of Greater Reykjavik and South Iceland.

According to the last MMR opinion poll, the Pirates could get somewhere in the region of 18-20 MPs in the next election – compared to just three currently – and be in a commanding position to try and form a government.

Here’s a look at the latest numbers in graphic form:

BLOG Iceland

The party’s leader says they’re ready for power

RT covers self-described poetician and the party’s leading figure and founder, Birgitta Jónsdóttir [previously], a former Wikileaks activist who has been a leading European advocate of privacy rights and a passionate advocate for Chelsea Manning:

Jonsdottir, a former member of the WikiLeaks team, says the Pirate Party, founded four years ago, is ready to form a government with any coalition partner that supports its agenda to bring about a “fundamental system change.”

“I look at us and I think, we are equipped to do this,” she told the Guardian.

“Actually, the fact we haven’t done it before and that we won’t have any old-school people telling us how, means we’ll do it more carefully. We will be doing things very differently.

“…we are well prepared now. This is about change driven not by fear, but by courage and hope. We are popular, not populist,” she added.

Icelanders’ distrust of politicians reached a boiling point when the Panama Papers revealed that then-Prime Minister Sigmundur David Gunnlaugsson had once owned an offshore company (now controlled by his wife) that held debt from failed Icelandic banks. Thousands of people, outraged by their PM’s alleged offshore accounts, took to the streets of Iceland’s capital in what appeared to be the largest protest in the country’s history. The scandal prompted Gunnlaugsson to resign in early April, with early general elections likely to be held in October.

More after the jump. . . Continue reading