More Federal Agencies using Undercover Operations; NSA Bullrun program
breaks encryption
Newsletter published on 15 November 2014
(1) More Federal Agencies Are Using Undercover
Operations
(2) NSA Bullrun program breaks encryption, despite false
perception of
security
(3) Bullrun gives NSA access to email, telephone
calls, commerce and
banking
(4) NSA works covertly with IT companies to
insert weaknesses into products
(5) U.S. spy agencies decry latest Snowden
revelations
(6) A House Divided over NSA Spying on Americans
(7) FISA
Court consistently agrees to federal Surveillance requests
(8) Will Snowden
Come Between the U.S. and Latin America? - CFR
(9) Edward Snowden's fear of
flying is justified - Geoffrey Robertson
(10) Paul Craig Roberts: Role
Reversal - How the US Became the USSR
(11) Phone Hacking Scandal: big London
companies implicated - Eamonn
Fingleton
(12) The 102 top firms who hired
hackers... but the police won't name them
(1) More Federal Agencies Are
Using Undercover Operations
http://www.nytimes.com/2014/11/16/us/more-federal-agencies-are-using-undercover-operations.html
By
ERIC LICHTBLAU and WILLIAM M. ARKINNOV. 15, 2014 Inside
Photo Protests at
the Supreme Court over issues such as abortion, like
this one in January,
often draw undercover officers. Credit Gabriella
Demczuk/The New York Times
Continue reading the main story Continue
reading the main story Continue
reading the main story Share This Page
Continue reading the main story
Continue reading the main story
WASHINGTON -- The federal government has
significantly expanded
undercover operations in recent years, with officers
from at least 40
agencies posing as business people, welfare recipients,
political
protesters and even doctors or ministers to ferret out wrongdoing,
records and interviews show.
At the Supreme Court, small teams of
undercover officers dress as
students at large demonstrations outside the
courthouse and join the
protests to look for suspicious activity, according
to officials
familiar with the practice.
At the Internal Revenue
Service, dozens of undercover agents chase
suspected tax evaders worldwide,
by posing as tax preparers or
accountants or drug dealers or yacht buyers,
court records show.
At the Agriculture Department, more than 100
undercover agents pose as
food stamp recipients at thousands of neighborhood
stores to spot
suspicious vendors and fraud, officials
said.
Undercover work, inherently invasive and sometimes dangerous, was
once
largely the domain of the F.B.I. and a few other law enforcement
agencies at the federal level. But outside public view, changes in
policies and tactics over the last decade have resulted in undercover
teams run by agencies in virtually every corner of the federal
government, according to officials, former agents and documents.
Continue reading the main story Plainclothes Forces in the
United States
Agencies across the federal government have
undercover teams to monitor
threats, fraud, theft and other illegal
activity.
Supreme Court Police
Monitor activists and detect
possible terrorist attacks or criminal
activity during protests near the
Supreme Court building.
National Aeronautics and Space
Administration
Focus on counterintelligence of NASA employees and
contractors, as well
as theft or illicit trafficking of
technology.
Small Business Administration
Identify organizations
involved in committing fraud and abuse of federal
lending and contracting
programs.
Department of Energy
Protect the movement of nuclear
materials within the United States.
Government Accountability
Office
Verify vulnerability assessments of government agencies, airports,
borders, railroads and other related sectors.
Internal Revenue
Service
Investigate money laundering, identity theft and also bank, mail
and tax
fraud.
Department of Agriculture
Root out illegal food
stamp transactions by individuals and businesses
or any financial fraud
involving U.S.D.A. programs. Source: New York
Times analysis
Some
agency officials say such operations give them a powerful new tool
to gather
evidence in ways that standard law enforcement methods do not
offer, leading
to more prosecutions. But the broadened scope of
undercover work, which can
target specific individuals or categories of
possible suspects, also raises
concerns about civil liberties abuses and
entrapment of unwitting targets.
It has also resulted in hidden
problems, with money gone missing,
investigations compromised and agents
sometimes left largely on their own
for months or even years.
"Done right, undercover work can be a very
effective law enforcement
method, but it carries serious risks and should
only be undertaken with
proper training, supervision and oversight," said
Michael German, a
former F.B.I. undercover agent who is a fellow at New York
University's
law school. "Ultimately it is government deceitfulness and
participation
in criminal activity, which is only justifiable when it is
used to
resolve the most serious crimes."
Some of the expanded
undercover operations have resulted from heightened
concern about domestic
terrorism since the Sept. 11, 2001, attacks.
But many operations are not
linked to terrorism. Instead, they reflect a
more aggressive approach to
growing criminal activities like identity
theft, online solicitation and
human trafficking, or a push from
Congress to crack down on more traditional
crimes.
At convenience stores, for example, undercover agents, sometimes
using
actual minors as decoys, look for illegal alcohol and cigarette sales,
records show. At the Education Department, undercover agents of the
Office of Inspector General infiltrate federally funded education
programs looking for financial fraud. Medicare investigators sometimes
pose as patients to gather evidence against health care providers.
Officers at the Small Business Administration, NASA and the Smithsonian
do undercover work as well, records show. Continue reading the main
story
Part of the appeal of undercover operations, some officials say, is
that
they can be an efficient way to make a case.
"We're getting the
information directly from the bad guys -- what more
could you want?" said
Thomas Hunker, a former police chief in Bal
Harbour, Fla., whose department
worked with federal customs and drug
agents on hundreds of undercover
money-laundering investigations in
recent years.
Mr. Hunker said
sending federal and local agents undercover to meet with
suspected money
launderers "is a more direct approach than getting a tip
and going out and
doing all the legwork and going into a court mode."
"We don't have to go
back and interview witnesses and do search warrants
and surveillance and all
that," he added.
But the undercover work also led federal auditors to
criticize his
department for loose record-keeping and financial lapses, and
Mr. Hunker
was fired last year amid concerns about the operations.
'A
Critical Tool'
Most undercover investigations never become public, but
when they do,
they can prove controversial. This month, James B. Comey, the
director
of the F.B.I., was forced to defend the bureau's tactics after it
was
disclosed that an agent had posed as an Associated Press reporter in
2007 in trying to identify the source of bomb threats at a Lacey, Wash.,
high school. Responding to criticism from news media advocates, Mr.
Comey wrote in a letter to The New York Times that "every undercover
operation involves 'deception,' which has long been a critical tool in
fighting crime."
Just weeks before, the Drug Enforcement
Administration stoked
controversy after disclosures that an undercover agent
had created a
fake Facebook page from the photos of a young woman in
Watertown, N.Y.
-- without her knowledge -- to lure drug
suspects.
And in what became a major political scandal for the Obama
administration, agents from the Bureau of Alcohol, Tobacco, Firearms and
Explosives allowed guns to slip into Mexico in 2011 in an undercover
operation known as Fast and Furious.
In response to that episode, the
Justice Department issued new
guidelines to prosecutors last year designed
to tighten oversight of
undercover operations and other "sensitive"
investigative techniques,
officials said. Before prosecutors approve such
tactics, the previously
undisclosed guidelines require that they consider
whether an operation
identifies a "clearly defined" objective, whether it is
truly necessary,
whether it targets "significant criminal actors or
entities," and other
factors, the officials said.
Peter Carr, a
department spokesman, said that undercover operations are
necessary in
investigating crime but that agents and prosecutors must
follow safeguards.
"We encourage these operations even though they may
involve some degree of
risk," he said.
Those guidelines apply only to the law enforcement
agencies overseen by
the Justice Department. Within the Treasury Department,
undercover
agents at the I.R.S., for example, appear to have far more
latitude than
do those at many other agencies. I.R.S. rules say that, with
prior
approval, "an undercover employee or cooperating private individual
may
pose as an attorney, physician, clergyman or member of the news media."
Continue reading the main story Continue reading the main story
An
I.R.S. spokesman acknowledged that undercover investigators are
allowed to
pose in such roles with approval from senior officials. But
the agency said
in a statement that senior officials "are not aware of
any investigations
where special agents have ever posed as attorneys,
physicians, members of
the clergy or members of the press specifically
to gain information from a
privileged relationship."
The agency declined to say whether I.R.S.
undercover agents have posed
in these roles in an effort to get information
that was not considered
"privileged," meaning the type of confidential
information someone
shares with a lawyer or doctor.
José Marrero, a
former I.R.S. supervisor in Miami, said he knew of
situations in which tax
investigators needed to assume the identity of
doctors to gain the trust of
a medical professional and develop evidence
that is tightly
held.
"It's very rare that you do that, but it does happen," Mr. Marrero,
who
has a consulting firm in Fort Lauderdale, Fla., and continues to work
with federal agents on undercover investigations, said in an interview.
"These are very sensitive jobs, and they're scrutinized more closely
than others."
Oversight, though, can be minimal. A special committee
meant to oversee
undercover investigations at the Bureau of Alcohol,
Tobacco, Firearms
and Explosives, for instance, did not meet in nearly seven
years,
according to the Justice Department's inspector general. That inquiry
found that more than $127 million worth of cigarettes purchased by the
bureau disappeared in a series of undercover investigations that were
aimed at tracing the black-market smuggling of cigarettes.
In one
investigation, the bureau paid an undercover informant from the
tobacco
industry nearly $5 million in "business expenses" for his help
in the case.
(The agency gained new authority in 2004 allowing it to
take money seized in
undercover investigations and "churn" it back into
future operations, a
source of millions in revenue.)
Financial oversight was found lacking in
the I.R.S.'s undercover
operations as well. Detailed reviews of the money
spent in some of its
undercover operations took as long as four and a half
years to complete,
according to a 2012 review by the Treasury Department's
inspector general.
Wires Crossed
Across the federal government,
undercover work has become common enough
that undercover agents sometimes
find themselves investigating a
supposed criminal who turns out to be
someone from a different agency,
law enforcement officials said. In a few
situations, agents have even
drawn their weapons on each other before
realizing that both worked for
the federal government.
"There are all
sorts of stories about undercover operations gone bad,"
Jeff Silk, a
longtime undercover agent and supervisor at the Drug
Enforcement
Administration, said in an interview. "People are always
tripping and
falling over each other's cases."
Mr. Silk, who retired this year, cited
a case that he supervised in
which the D.E.A. was wiretapping suspects in a
drug ring in Atlanta,
only to discover that undercover agents from
Immigration and Customs
Enforcement were trying to infiltrate the same ring.
The F.B.I. and the
New York Police Department were involved in the case as
well. Continue
reading the main story
To avoid such problems,
officials said, they have tightened
"deconfliction" policies, which are
designed to alert agencies about one
another's undercover operations. But
problems have persisted, the
officials said.
It is impossible to tell
how effective the government's operations are
or evaluate whether the
benefits outweigh the costs, since little
information about them is publicly
disclosed. Most federal agencies
declined to discuss the number of
undercover agents they employed or the
types of investigations they handled.
The numbers are considered
confidential and are not listed in public budget
documents, and even
Justice Department officials say they are uncertain how
many agents work
undercover.
But current and former law enforcement
officials said the number of
federal agents doing such work appeared to
total well into the
thousands, with many agencies beefing up their ranks in
recent years, or
starting new undercover units. An intelligence official at
the
Department of Homeland Security, who spoke on condition of anonymity to
discuss classified matters, said the agency alone spent $100 million
annually on its undercover operations. With large numbers of undercover
agents at the F.B.I. and elsewhere, the costs could reach hundreds of
millions of dollars a year.
In a sampling of such workers, an
analysis of publicly available résumés
showed that since 2001 more than
1,100 current or former federal
employees across 40 agencies listed
undercover work inside the United
States as part of their duties. More than
half of all the work they
described is in pursuit of the illicit drug trade.
Money laundering,
gangs and organized crime investigations make up the
second-largest
group of operations.
Significant growth in undercover
work involves online activity, with
agents taking to the Internet, posing as
teenage girls to catch
predators or intercepting emails and other messages,
the documents
noted. The F.B.I., Department of Homeland Security and
Pentagon all have
training programs for online undercover
operations.
Defendants who are prosecuted in undercover investigations
often raise a
defense of "entrapment," asserting that agents essentially
lured them
into a criminal act, whether it is buying drugs from an
undercover agent
or providing fraudulent government services.
But the
entrapment defense rarely succeeds in court.
In terrorism cases -- the
area in which the F.B.I. has used undercover
stings most aggressively --
prosecutors have a perfect record in
defeating claims of entrapment. "I
challenge you to find one of those
cases in which the defendant has been
acquitted asserting that defense,"
Robert S. Mueller III, a former F.B.I.
director, said at an appearance
this year.
The Times analysis showed
that the military and its investigative
agencies have almost as many
undercover agents working inside the United
States as does the F.B.I. While
most of them are involved in internal
policing of service members and
defense contractors, a growing number
are focused, in part, on the general
public as part of joint federal
task forces that combine military,
intelligence and law enforcement
specialists. Continue reading the main
story Continue reading the main story
At the Supreme Court, all of the
court's more than 150 police officers
are trained in undercover tactics,
according to a federal law
enforcement official speaking on condition of
anonymity because it
involved internal security measures. At large protests
over issues like
abortion, small teams of undercover officers mill about --
usually
behind the crowd -- to look for potential disturbances.
The
agents, often youthful looking, will typically "dress down" and wear
backpacks to blend inconspicuously into the crowd, the official
said.
At one recent protest, an undercover agent -- rather than a
uniformed
officer -- went into the center of a crowd of protesters to check
out a
report of a suspicious bag before determining there was no threat, the
official said. The use of undercover officers is seen as a more
effective way of monitoring large crowds.
A Supreme Court spokesman,
citing a policy of not discussing security
practices, declined to talk about
the use of undercover officers. Mr.
German, the former F.B.I. undercover
agent, said he was troubled to
learn that the Supreme Court routinely used
undercover officers to pose
as demonstrators and monitor large
protests.
"There is a danger to democracy," he said, "in having police
infiltrate
protests when there isn't a reasonable basis to suspect
criminality."
Michael S. Schmidt contributed reporting.
A version
of this article appears in print on November 16, 2014, on page
A1 of the New
York edition with the headline: More Agencies Are Using
Undercover
Operations .
(2) NSA Bullrun program breaks encryption, despite false
perception of
security
http://securityaffairs.co/wordpress/17577/intelligence/nsa-Bullrun-program-false-perception-security.html
NSA
Bullrun program, encryption and false perception of security
by Pierluigi
Paganini on September 7th, 2013
Revelations on Bullrun program
demonstrated that NSA has capabilities
against widely-used online protocols
such as HTTPS and encryption standards.
The latest nightmare for US
Administration is named Bullrun, another US
program for massive
surveillance. Snowden‘s revelations represented a
heartquake for IT
security, the image of NSA and US IT companies are
seriously compromised
such the trust of worldwide consumers.
The extension of US surveillance
activities seems to have no limits
neither borderlines, every communication
and data despite protected with
sophisticated encryption mechanisms were
accessible by US Intelligence
and its partners like Britain’s
GCHQ.
The New York Times and The Guardian newspapers and the journalism
non-profit ProPublica revealed details of the new super secret program,
codenamed Bullrun, sustained by the NSA to have the possibility to
bypass encryption adopted worldwide by corporates, governments and
institutions. The Bullrun program is considered the second choice of
U.S. Government to the failure in place a backdoor, the so-called
Clipper chip, into encryption that would have allowed it to eavesdrop on
communications.
Be aware we are not speaking of cracking algorithms,
Snowden warned that
NSA bypass encryption targeting end point of
communications:
“Properly implemented strong crypto systems are one of
the few things
that you can rely on,” Snowden said to the
Guardian.
The Intelligence Agency has inducted vendors and manufactures
to include
backdoors in their products or to disclose related encryption
keys to
allow the access data, this is the core of the Bullrun program.
Snowden
revelations are causing the collapse of many certainties, last in
order
of time is the integrity of encryption standards, according the
popular
newspapers NSA has worked to undermine the security of those
standards.
Following an image of classification guide to the NSA’s
Bullrun
decryption program
The repercussions are critical, the
diffusion of the defective
encryption standard has exposed the same data
accessed by NSA to the
concrete risk of stealing operated by third party
actors such as foreign
state-sponsored hackers and
cybercriminals.
“The encryption technologies that the NSA has exploited
to enable its
secret dragnet surveillance are the same technologies that
protect our
most sensitive information, including medical records, financial
transactions, and commercial secrets,” “Even as the NSA demands more
powers to invade our privacy in the name of cybersecurity, it is making
the internet less secure and exposing us to criminal hacking, foreign
espionage, and unlawful surveillance. The NSA’s efforts to secretly
defeat encryption are recklessly shortsighted and will further erode not
only the United States’ reputation as a global champion of civil
liberties and privacy but the economic competitiveness of its largest
companies.”commented Christopher Soghoian, principal technologist of the
ACLU’s Speech, Privacy and Technology Project.”
Suddenly the IT world
discovered that has perceived a false sense of
security, the repercussion on
the global security market are enormous,
customers have put their trust in
the wrong companies, too often they
have been deceived by false myths and
new paradigms (e.g. Cloud
computing) designed to facilitate the surveillance
operated by
intelligence agencies.
Bullrun program is the last
revelation on a nefarious policy conducted
by one of the major security
agencies, ironically because of its
willingness to supervise each and every
date of the largest Internet has
made it unsafe. Chasing the concept of
security NSA has actually opened
loopholes in the global information systems
that could have benefited
powers such as China or terrorist
groups.
The surveillance programs such as Prism and Bullrun are certainly
questionable, as well as the conduct of major American companies that
have gone along with his demands.
NSA and other agencies siphoned
data from land and undersea cables, just
after the revelations on PRISM
program intelligence has started a
misinformation campaign sustaining that
US authorities was working to
find the way to crack encrypted traffic, in
reality the agency has no
reason to do it and the Bullrun program is the
proof. Misinformation as
a pure diversion to influence the global sentiment
and keep the lights
of the media far from the dirty collusions of
governments and private
companies.
“None of methods used to access to
encryption keys involve in cracking
the algorithms and the math underlying
the encryption, but rely upon
circumventing and otherwise undermining
encryption.”
The newspapers sustains that NSA maintains an internal
database, dubbed
“Key Provisioning Service”, of encryption keys for each
commercial
product. Using the Key Provisioning Service the NSA is able to
automatically decode communications and access to encrypted data. Every
time the agency needs a key for a new product it formalizes a request to
obtain it, the request is so-called Key Recovery Service.
Other news
reported that in one circumstance the US government learned
that a foreign
intelligence had ordered new computer hardware and after
pressure of NS A
the US vendor agreed to insert a backdoor into the
product before it was
deployed.
Keys are provided by vendors or obtained by the intelligence
with
hacking campaign against infrastructures of product
providers.
“How keys are acquired is shrouded in secrecy, but independent
cryptographers say many are probably collected by hacking into
companies’ computer servers, where they are stored,” “To keep such
methods secret, the N.S.A. shares decrypted messages with other agencies
only if the keys could have been acquired through legal means.” states
NYT.
The most disturbing revelation involves the NSA’s efforts to
deliberately weaken international encryption standards developers use to
make their encryption secure, according to a classified NSA memo
obtained by NYT the fatal weakness discovered by two Microsoft
cryptographers in 2007 in a 2006 standard was intentionally engineered
by the NSA.
“Basically, the NSA asks companies to subtly change their
products in
undetectable ways: making the random number generator less
random,
leaking the key somehow, adding a common exponent to a public-key
exchange protocol, and so on,”“If the backdoor is discovered, it’s
explained away as a mistake. And as we now know, the NSA has enjoyed
enormous success from this program.” said cryptographer Bruce
Schneier.
“Some of the methods involved the deployment of custom-built,
supercomputers to break codes in addition to collaborating with
technology companies at home and abroad to include backdoors in their
products. The Snowden documents don’t identify the companies that
participated.”
The Bullrun program, according to the documents,
“actively engages the
U.S. and foreign IT industries to covertly influence
and/or overtly
leverage their commercial products’ designs” to make them
“exploitable.”
By this year, the Times reports, the program had found ways
“inside some
of the encryption chips that scramble information for
businesses and
governments, either by working with chipmakers to insert back
doors or
by surreptitiously exploiting existing security flaws.”
We
are therefore assuming that the U.S. Government has deliberately
prompted to
enter bugs in software solutions sold worldwide, the
knowledge of those
flaws could then have been sold in the black market
of zero-day
vulnerabilities about which so much has been discussed. At
that point,
probably the same U.S. Intelligence would offer big bucks to
buy back the
zero-day to cover traces of the shocking activities.
Which are the
targets of the NSA?
Everyone! The imperative is global monitoring, ISP,
Internet phone call
and text services and mobile operators are privileged
targets according
the paper, and I add social media platforms. Of course
now every
internet users desire to stay far from prying eyes, the use of
anonymizing network and secure messaging system is exploding, Tor
metrics data revealed an incredible increase of total number of Tor
users.
The unique certainties are that the surveillance program will
continue
and the expense of monitoring activities will increase
exponentially,
there is another consideration to do related to the global
commerce for
security solutions. The global market will be seriously
impacted, fall
of trust in US security vendors could advantage other
players, the
equilibrium is jeopardized when trust is broken and open source
software
will live a new peak of popularity waiting for the next
incident.
Pierluigi Paganini
(3) Bullrun gives NSA access to
email, telephone calls, commerce and
banking
http://www.smh.com.au/technology/technology-news/whistleblower-reveals-australias-spy-agency-has-access-to-internet-codes-20130906-2tand.html
Whistleblower
reveals Australia's spy agency has access to internet codes
Date:
September 07 2013
Sean Nicholls
Australia's electronic spy agency
reportedly has access to a top secret
program that has successfully cracked
the encryption used by hundreds of
millions of people to protect the privacy
of their emails, phone calls
and online business
transactions.
Documents disclosed by US intelligence whistleblower Edward
Snowden
reveal the program run by the US National Security Agency, codenamed
Bullrun, has been used to secretly descramble high-level internet
security systems globally.
They show the NSA and British Government
Communications Headquarters
(GCHQ) have successfully cracked the encryption
used in personal
communications such as email and telephone calls as well as
global
commerce and banking systems. [...]
In May, Mr Snowden, a
former contractor for the NSA, disclosed documents
revealing efforts by the
US agency to track telephone conversations and
internet traffic
globally.
(4) NSA works covertly with IT companies to insert weaknesses
into products
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
Revealed:
how US and UK spy agencies defeat internet privacy and security
• NSA and
GCHQ unlock encryption used to protect emails, banking and
medical
records
• $250m-a-year US program works covertly with tech companies to
insert
weaknesses into products
• Security experts say programs
'undermine the fabric of the internet'
James Ball, Julian Borger
and Glenn Greenwald
* Guardian Weekly, Friday 6 September 2013
US
and British intelligence agencies have successfully cracked much of
the
online encryption relied upon by hundreds of millions of people to
protect
the privacy of their personal data, online transactions and
emails,
according to top-secret documents revealed by former contractor
Edward
Snowden.
This story has been reported in partnership between the New York
Times,
the Guardian and ProPublica based on documents obtained by the
Guardian.
The files show that the National Security Agency and its UK
counterpart
GCHQ have broadly compromised the guarantees that internet
companies
have given consumers to reassure them that their communications,
online
banking and medical records would be indecipherable to criminals or
governments.
The agencies, the documents reveal, have adopted a
battery of methods in
their systematic and ongoing assault on what they see
as one of the
biggest threats to their ability to access huge swathes of
internet
traffic – "the use of ubiquitous encryption across the
internet".
Those methods include covert measures to ensure NSA control
over setting
of international encryption standards, the use of
supercomputers to
break encryption with "brute force", and – the most
closely guarded
secret of all – collaboration with technology companies and
internet
service providers themselves.
Through these covert
partnerships, the agencies have inserted secret
vulnerabilities – known as
backdoors or trapdoors – into commercial
encryption software.
The
files, from both the NSA and GCHQ, were obtained by the Guardian,
and the
details are being published today in partnership with the New
York Times and
ProPublica. They reveal:
• A 10-year NSA program against encryption
technologies made a
breakthrough in 2010 which made "vast amounts" of data
collected through
internet cable taps newly "exploitable".
• The NSA
spends $250m a year on a program which, among other goals,
works with
technology companies to "covertly influence" their product
designs.
•
The secrecy of their capabilities against encryption is closely
guarded,
with analysts warned: "Do not ask about or speculate on sources
or
methods."
• The NSA describes strong decryption programs as the "price of
admission for the US to maintain unrestricted access to and use of
cyberspace".
• A GCHQ team has been working to develop ways into
encrypted traffic on
the "big four" service providers, named as Hotmail,
Google, Yahoo and
Facebook.
(5) U.S. spy agencies decry latest
Snowden revelations
http://www.reuters.com/article/2013/09/06/net-us-usa-security-snowden-intelligence-idUSBRE9850RU20130906
WASHINGTON
| Fri Sep 6, 2013 6:00pm EDT
(Reuters) - U.S. spy agencies said on Friday
that the latest media
revelations based on leaks from former National
Security Agency
contractor Edward Snowden will likely damage U.S. and allied
intelligence efforts.
On Thursday, the Guardian, the New York Times
and journalistic nonprofit
ProPublica published stories saying the security
agency has secretly
developed the ability to crack or circumvent commonplace
Internet
encryption used to protect everything from email to financial
transactions. The stories were based on documents made public by
Snowden, now a fugitive living under asylum in Russia.
The reports
also said the NSA had worked with Government Communications
Headquarters,
its British partner, and had used a variety of means,
ranging from the
insertion of "back doors" in popular tech products and
services, to
supercomputers, secret court orders and the manipulation of
international
processes for setting encryption standards.
In a statement on Friday, the
Office of the U.S. Director of National
Intelligence, which said it was
speaking on behalf of all U.S. spy
agencies, did not confirm details of the
media reports.
The statement did acknowledge that the U.S. intelligence
community
"would not be doing its job" if it did not try to counter the use
of
encryption by such adversaries as "terrorists, cybercriminals, human
traffickers and others."
The statement said, however, that the
stories published on Thursday
revealed "specific and classified details
about how we conduct this
critical activity." It claimed that anything that
the news stories added
to public debate about government surveillance was
"outweighed by the
road map they gave to our adversaries" about specific
eavesdropping methods.
(Reporting by Mark Hosenball; Editing by Karey Van
Hall and Jackie Frank)
From: "FJA" <fja0527@bellsouth.net> Date: Sun, 28
Jul 2013 19:46:59 -0400
(6) A House Divided over NSA Spying on
Americans
http://ronpaulinstitute.org/archives/featured-articles/2013/july/28/a-house-divided-over-nsa-spying-on-americans.aspx
Congressman
Ron Paul's Weekly Column for July 29, 2013
Sunday July 28,
2013
Last week’s House debate on the Defense Appropriations bill for 2014
produced a bit more drama than usual. After hearing that House
leadership would do away with the traditional “open rule” allowing for
debate on any funding limitation amendment, it was surprising to see
that Rep. Justin Amash’s (R-MI) amendment was allowed on the Floor. In
the wake of National Security Agency (NSA) whistleblower Edward
Snowden’s revelations about the extent of US government spying on
American citizens, Amash’s amendment sought to remove funding in the
bill for some of the NSA programs.
Had Amash’s amendment passed, it
would have been a significant symbolic
victory over the administration’s
massive violations of our Fourth
Amendment protections. But we should be
careful about believing that
even if it had somehow miraculously survived
the Senate vote and the
President’s veto, it would have resulted in any
significant change in
how the Intelligence Community would behave toward
Americans. The US
government has built the largest and most sophisticated
spying apparatus
in the history of the world.
The NSA has been
massively increasing the size its facilities, both at
its Maryland
headquarters and in its newly built (and way over-budget)
enormous data
center in Utah. Taken together, these two facilities will
be seven times
larger than the Pentagon! And we know now that much of
the NSA’s capacity to
intercept information has been turned inward, to
spy on us.
As NSA
expert James Bamford wrote earlier this year about the new Utah
facility:
“The heavily fortified $2 billion center should be up
and running
in September 2013. Flowing through its servers and routers and
stored in
near-bottomless databases will be all forms of communication,
including
the complete contents of private emails, cell phone calls, and
Google
searches, as well as all sorts of personal data trails—parking
receipts,
travel itineraries, bookstore purchases, and other digital “pocket
litter.” It is, in some measure, the realization of the “total
information awareness” program created during the first term of the Bush
administration—an effort that was killed by Congress in 2003 after it
caused an outcry over its potential for invading Americans’
privacy.”
But it happened anyway.
Over the last week we have seen
two significant prison-breaks, one in
Iraq, where some 500 al-Qaeda members
broke out of the infamous Abu
Ghraib prison, which the US built, and another
1,000 escaped in a huge
break in Benghazi, Libya – the city where the US
Ambassador was killed
by the rebels that the US government helped put in
power. Did the US
intelligence community, focused on listening to our phone
calls, not see
this real threat coming?
Rep. Amash’s amendment was an
important move to at least bring attention
to what the US intelligence
community has become: an incredibly powerful
conglomeration of secret
government agencies that seem to view Americans
as the real threat. It is
interesting that the votes on Amash’s
amendment divided the House not on
party lines. Instead, we saw the
votes divided between those who follow
their oath to the Constitution,
versus those who seem to believe that any
violation of the Constitution
is justified in the name of the elusive
“security” of the police state
at the expense of liberty. The leadership –
not to my surprise -- of
both parties in the House voted for the police
state.
It is encouraging to see the large number of votes crossing party
lines
in favor of the Amash amendment. Let us hope that this will be a
growing
trend in the House – perhaps the promise that Congress may once
again
begin to take its duties and obligations seriously. We should not
forget, however, that in the meantime another Defense Appropriations
bill passing really means another “military spending” bill. The
Administration is planning for a US invasion of Syria, more military
assistance to the military dictatorship in Egypt, and more drones and
interventionism. We have much work yet to do.
Permission to reprint
in whole or in part is gladly granted, provided
full credit is
given.
(7) FISA Court consistently agrees to federal Surveillance
requests
http://www.cfr.org/intelligence/has-fisa-court-gone-too-far/p31095
Interview
Has
the FISA Court Gone Too Far?
Interviewee: Matthew C. Waxman, Adjunct
Senior Fellow for Law and
Foreign Policy
Interviewer: Jonathan Masters,
Deputy Editor
July 12, 2013
In the wake of the Snowden leaks, the
Foreign Intelligence Surveillance
Court (FISC) has come under intense public
scrutiny for its central, but
often little understood, role in determining
how the government collects
and examines information on its citizens. Some
legal scholars have
criticized the top secret court for providing
intelligence agencies
overly expansive authority to monitor Americans as
well as consistently
signing off on federal surveillance requests. CFR's
Matt Waxman says
it's difficult to assess the court's interpretations of the
law because
its opinions are classified. He says that while he understands
the
court's demands for secrecy, he is "very concerned about the idea of
secret law." However, he believes "the characterization of the FISA
process as a 'rubber stamp' is inaccurate," explaining that U.S.
officials rarely go to a FISC judge without a strong case.
The
Foreign Intelligence Surveillance Court operates out of the E.
Barrett
Prettyman U.S. Courthouse near Capitol Hill in Washington, DC.
(Photo:
Courtesy Wikimedia)
For starters, how does the Foreign Intelligence
Surveillance Court fit
into the U.S. national security apparatus, and how
has it evolved since
September 11?
The Fourth Amendment to the
Constitution, which prohibits unreasonable
searches and seizures, has been
interpreted to generally require a
warrant from a judge--backed up by
probable cause--before the government
can listen in on calls in the United
States. Until the late 1970s, the
prevailing legal view was that this
warrant requirement did not apply to
so-called foreign intelligence
collection, meaning things like espionage
or collecting military secrets or
many other kinds of national security
information. But after the abuses of
domestic spying came to light in
the 1970s, Congress passed the Foreign
Intelligence Surveillance Act,
which established a special court, the
Foreign Intelligence Surveillance
Court (FISC), to regulate many kinds of
foreign intelligence
surveillance conducted in the United States.
For
example, rather than having to show a regular judge that there was
probable
cause to believe that the target of surveillance has committed
a crime, the
government would have to show a FISC judge that there was
probable cause to
believe that the target was working on behalf of a
foreign power, which
includes international terrorist organizations.
However, several reforms
to the law occurred after 9/11. The first was
that Congress made it easier
in some ways for the government to get FISA
warrants. So we've seen an
increase in the workload of the Foreign
Intelligence Surveillance Court,
more requests for FISA warrants, and
more of them being issued. The second
major change was that Congress
required FISC to review not just these sorts
of individual warrant
applications that are specific to particular people or
places, but also
in some cases to review the legality of entire surveillance
programs.
Many legal scholars have recently criticized the court for its
interpretations of surveillance law, which underpin some of these
controversial NSA programs leaked by Snowden. What's your sense of
this?
It's hard to know for sure because the court's opinions are secret,
but
the FISC has probably interpreted some terms of congressional
surveillance authorization very broadly. For example, the authority to
collect certain types of records that are "relevant" to a terrorism
investigation--that has reportedly been interpreted to allow for
collection of vast data sets.
However, there seems to be a split in
views. Some members of Congress
are saying that when they passed the statute
authorizing these
surveillance powers, they never intended something so
broad. On the
other hand, government officials point out that many members
of Congress
have known for a long time what's going on and they haven't
raised
complaints.
Why are there different legal standards for search
and surveillance in
the national security context versus the criminal
justice context?
Historically, this started with some distinctions that
the executive
branch had been asserting that, outside of the criminal
justice context,
the government had a very broad authority to conduct
warrantless
surveillance in the name of national security or foreign
intelligence. A
number of courts in the United States agreed over the years
with the
executive branch that when it comes to foreign intelligence
surveillance, the normal warrant requirements of the Fourth Amendment
don't apply.
But following the Church Committee in the 1970s,
Congress tried to fill
that gap, effectively saying that "even if the
Constitution doesn't
require a warrant, we Congress are going to establish a
special court
and require that the executive branch get a warrant for at
least some of
these foreign intelligence surveillance activities." So it is
really a
product of [FISA] and successive amendments to that statute that
have
created different types of court review and different substantive
standards for different kinds of intelligence and surveillance
activities.
Is it fair to say that constitutional protections are weaker
in this
national security context?
As in many areas of the law, when
it comes to dealing with national
security threats, especially foreign
threats, the executive branch is
given more constitutional latitude to take
action.
Some critics have characterized FISC as a rubber stamp, citing
the fact
that the overwhelming majority of surveillance requests by the
Justice
Department have been approved; reportedly all requests were approved
last year. Given that this is a non-adversarial system--no one arguing
the other side--do you think this is balanced, workable?
I don't
think the characterization of the FISA process as a "rubber
stamp" is
accurate for several reasons. First of all, warrant requests
are always ex
parte (i.e., non-adversarial), and most regular warrants
are approved in the
criminal justice context as well. The reason being
that government agents
don't usually go to a judge at all unless they
are quite confident that they
have solid grounds for a warrant.
Second, most of the scrutiny of FISA
warrant requests occurs well before
they even go to the Foreign Intelligence
Surveillance Court, in the form
of intense and high-level vetting within the
executive branch and the
Justice Department. And third, the government is
able to maintain a high
success rate of approvals in the Foreign
Intelligence Surveillance Court
because it protects its credibility with
that court by not bringing weak
applications.
Do you think that the
court's proceedings, which are classified, should
be opened up to the public
so that people like yourself, others in the
legal community, and the general
public can debate the merits of the
court's actions?
"I'm very
sympathetic to the government's need to protect the secrecy of
intelligence
sources, methods, targets, etc., but I'm also very
concerned about the idea
of secret law."
This is a tough issue. I'm very sympathetic to the
government's need to
protect the secrecy of intelligence sources, methods,
targets, etc., but
I'm also very concerned about the idea of secret law.
It's not always
possible to pry those things apart--to be transparent about
the details
of legal interpretations without also exposing information about
intelligence activities themselves. There is a middle ground here, which
is to ensure that Congress has adequate information to know how its own
laws and statutes are being interpreted so it can make adjustments to
them as necessary or impose new legal protections if
desired.
What, if any, reforms would you recommend?
The
Foreign Intelligence Surveillance Court is only one of several
checks on
government surveillance power. It's better to think of
oversight in this
area as layered. In addition to FISC, you have, for
example, internal
executive branch legal oversight, you have inspectors
general from the
various departments and agencies, and you have
congressional oversight, all
operating together.
In terms of reform, we need to focus heavily on some
of these other
forms of oversight, especially inspectors general and
congressional
oversight, because those mechanisms, those bodies, can take a
broader
view of not just the legality but the policy effectiveness of
surveillance programs and because they can audit intelligence programs
to assess how they have been operating and practiced.
Where do you
see this debate headed, if you were to prognosticate? Do
you think there
will be procedural changes? Statutory changes?
"Over time, I do think we
will see some legislative reform in this area,
and we may see courts
intervening as well. But it's going to be a while
before law in this area is
in any way settled."
This is very hard to predict, and the American
public has been somewhat
fickle when it comes to its views of surveillance
powers and the
appropriate balance of privacy and security. In some ways,
the latest
disclosures of vast surveillance powers are just a slice of a
much
broader issue. New communication technologies, information analysis
technologies, etc., provide the government with very powerful
intelligence and surveillance tools, and, not just in the coming months,
but in the coming years and decades, we are going to see efforts to try
to strike new balances between security and privacy in order to adjust
to some of these new technologies. Over time, I do think we will see
some legislative reform in this area, and we may see courts intervening
as well. But it's going to be a while before law in this area is in any
way settled.
Is there a component of this debate that you think
deserves more attention?
Assessing the efficacy of these programs is
often very difficult because
they rarely operate in isolation. These
surveillance programs are one
among a number of different intelligence
instruments, counterterrorism
tools, and policies that the government
employs. So it is very difficult
to try to assess the effectiveness of any
one particular program. That's
often overlooked by people on both sides of
this debate. Opponents of
these kinds of programs don't always take adequate
account of how
important they may be when used in combination with other
counterterrorism tools. Meanwhile, proponents of these programs
sometimes exaggerate the degree to which any one program can be deemed
responsible or critical to having thwarted a plot.
(8) Will Snowden
Come Between the U.S. and Latin America? - CFR
http://www.cfr.org/latin-america-and-the-caribbean/snowden-come-between-us-latin-america/p31109
Will
Snowden Come Between the U.S. and Latin America?
Interviewee: Christopher
Sabatini, Senior Director of Policy, Americas
Society/Council of the
Americas
Interviewer: Brianna Lee, Senior Production Editor
July 16,
2013
U.S.-Latin American relations have hit a bump after leaked National
Security Agency documents revealed that covert U.S. surveillance
operations allegedly extended into Central and South America. The leaks
came shortly after a plane transporting Bolivian president Evo Morales
from Moscow was grounded on suspicions he was transporting NSA leaker
Edward Snowden. The event prompted Bolivia, Venezuela, and Nicaragua to
offer asylum to Snowden, and Latin American leaders have collectively
denounced both the grounding of the plane and the NSA
programs.
Christopher Sabatini, senior director of policy at the Americas
Society/Council of the Americas, says that for many of these countries,
the wide scope and nature of the alleged U.S. surveillance activities
have "triggered an understandable reaction"—though he acknowledges that
some responses have been disproportionate. In the end, he says, the
practical implications for U.S. relations in the region "will be
minimal, in part because the United States has such a multifaceted
relationship with these countries."
Presidents Evo Morales,
Cristina Kirchner, Jose Mujica, Dilma
Rousseff, and Nicolas Maduro attend
the Mercosur summit in July 2013.
(Photo: Courtesy Reuters)
Recent
leaks reveal that U.S. surveillance programs extended into Latin
America,
going beyond security and military affairs into commercial
enterprises as
well. How surprising is this?
It's surprising that in most of the cases,
the United States was spying
on some of its closest allies in the region.
Mexico, Colombia,
Brazil—these weren't places that were hotbeds of terrorism
or where we
were even spying or gathering information on matters of
terrorism. If
proven true, [the allegations] reveal that we were gathering
information
that extended beyond the supposed justification for the NSA
program.
Second, while all countries spy on each other, what's different
is the
type of spying. We were massively collecting information, potentially
even on their citizens communicating with each other. That has triggered
an understandable reaction from these governments for the United States
to explain what it was doing. This isn't government-to-government
spying, or even government spying on people they suspect could place our
national interests at risk. This is casting a very wide net both in
terms of the people whose information is being collected and also the
topics around which it's being collected. If proven to be true, this
surveillance may very much violate the U.S. congressional justification
under which a lot of this had occurred. A third surprising element, if
proven true, is that the United States was doing this with the
complicity of telecom companies in Brazil—though the U.S. ambassador to
Brazil denies these reports.
Some critics have accused some of these
countries of hypocrisy for
denouncing the United States, because they have
their own domestic
wiretapping programs. So to what extent is this about
privacy, or are
the reactions more about sovereignty?
First, there
was a lot of heated rhetoric from some leaders even before
the allegations
came out—about the asylum-seeking, about the unfortunate
grounding of
President Morales's plane—that goes far beyond the
legitimate concerns of
what the spying actually entailed. That rhetoric
spilled over in ways that
are not very constructive, to the point where
you even had Mercosur, a trade
association, promise to pull its
ambassadors out of Europe—a move that goes
far beyond the actual
functions of a supposed customs
union.
Additionally, two presidential summits have been dedicated to this
in
Latin America—the Unasur summit that brought together [Rafael] Correa,
[Nicolas] Maduro, and [Cristina] Kirchner to denounce the grounding of
Evo Morales's plane, and then Mercosur. It seems disproportionate that
so much of these presidents' time, especially in countries that are
facing very severe economic news, would be dedicated to this at a summit
level. That's unprecedented when compared to other regions.
Second,
it is largely a sovereignty issue. For a number of these
countries, the
memories of authoritarian regimes spying on citizens,
rounding up activists
and opposition, are still very fresh. [Brazilian
president] Dilma Rousseff
was tortured and detained during the military
regime. Mexico dissidents and
leaders were also spied on by the PRI
[Institutional Revolutionary Party]
before 2001. The reactions need to
be understood in that sense.
The
other thing is, yes, the United States has helped some of these
countries
set up surveillance programs. Washington was instrumental in
helping
Colombia set up the programs it uses to monitor FARC
[paramilitary group
Revolutionary Armed Forces of Colombia], but the
United States has always
tried to separate those efforts from spying on
citizens for political
reasons. But once the equipment and know-how has
been turned over, anything
can happen. That's what we've seen in the
case of Panama, for example, where
it became known fairly early on that
the government has a tendency to
eavesdrop on perceived political
opponents. That's where we do need to
understand that the alleged NSA
revelations are a different kettle of fish.
In some ways, it's "they're
our citizens; we get to spy on them, but you
don't."
Are there clear distinctions in the ways that Latin American
countries
have reacted?
There is a range of differences: some
reactions are serious, some are
performative, and some are simply taking
advantage of this. In countries
that have taken this as a serious
matter—Mexico, Colombia, and
Chile—there has been that level of "let's get
to the bottom of it,"
couched within a legitimate sense of national
sovereignty and protecting
their citizens. And the responses have been
delivered [to the United
States] through diplomatic channels.
In
between, you have countries like Brazil, which, for reasons perhaps
very
much tied to recent history, has made moves outside the realm of
typical
diplomatic activity, and has called the U.S. ambassador to
testify before
the Brazilian congress.
Countries on the other end of this spectrum
[Venezuela, Bolivia, and
Nicaragua] were already trying to make hay even
before the revelations,
by offering asylum to Snowden, which, in some ways,
has become somewhat
of a red herring. Oddly enough, with the exception of
Venezuela, those
are not the countries where most of the alleged spying
occurred. So it's
completely out of proportion to their level of legitimate
victimization—with the exception of Morales's plane getting
grounded.
"[P]olitical leaders may use this for domestic political
advantage,
[but] it certainly doesn't play as well as many
think."
Having said that, most citizens of these countries—and we see
this in
surveys—retain very positive views of the United States. As much as
political leaders may use this for domestic political advantage, it
certainly doesn't play as well as many think. Popular opinions hinge
much more on domestic issues. A classic example right now is that
Rousseff's popularity went from 57 percent to about 30 percent—that has
to do with protests and unmet economic demands; that has nothing to do
with spying. These reactions make for good political theater, but I'm
not sure they make for good political campaigns.
Are there any
concrete consequences for U.S.-Latin American relations?
Rousseff recently
said the leaks would not affect her planned October
trip to
Washington.
The practical implications will be minimal, in part because
the United
States has such a multifaceted relationship with these countries
on
everything from immigration to education, cultural exchanges, and
economic ties. Those things reflect a very diverse relationship that
goes far beyond the diplomatic government-to-government
activities.
But there are two implications for U.S. relations in the
region that are
important. One is that the U.S. is currently negotiating the
Trans-Pacific Partnership in Latin America that will bring together
economies from most of the Asia-Pacific region with Latin America,
except for Colombia and Central America. When telecommunications comes
down as one of the areas they are talking about, a lot of those
negotiating parties are going to take a very close look at what's in
there and that there are safeguards that protect potential intervention
and the flow of communication.
The second is that the United States'
moral standing on being able to
talk about issues like freedom of expression
and access to information
has taken a serious hit at a time when a number of
countries are
challenging domestic laws and regional norms concerning these
very
issues. That's clearly why we see leaders like Correa, Maduro, Morales,
[Nicaragua's Daniel] Ortega—none of whom are paragons of freedom of
expression—suddenly become these champions of transparency. It's ironic,
and it also means that the ability of the United States, and in some
cases U.S.-based organizations, to speak out in some of these cases is
going to be a little more difficult.
On the asylum requests from
Venezuela, Bolivia, and Nicaragua, it does
appear Snowden is trying to get
to Latin America. What are realistic
possibilities for him as far as ending
up there?
I may be proven wrong on this, but I still find it to be a very
difficult practical matter that he can find his way to these countries.
As much as these leaders have been saying out loud that he is welcome if
he can get there, none of them are actually offering to lend their
presidential jets to fly him down. For now, it just remains an empty
gesture.
[Furthermore,] these governments are elected, however
imperfectly. Let's
imagine Snowden has a good, healthy lifespan. I find it
hard to believe
that a chavista government is going to stay in power in
Venezuela for
fifty years—the same goes for the Morales and Ortega
governments. So
[asylum in these countries] may provide him a temporary
respite, but
it's no permanent guarantee. Sadly, he is being manipulated for
international public opinion by these leaders, and who knows when he
himself could become a bargaining chip?
What can the United States
can do to ease tensions in the coming weeks?
This is going to be resolved
quietly and diplomatically, as a couple of
leaders have said—[Colombian
president Juan Manuel] Santos has said
this; [Mexican president Enrique]
Pena Nieto implied the same.
Explanations and sharing of details as to the
extent of the
[surveillance] program and the like hopefully will be
addressed. Rather
than engage in megaphone diplomacy with the generally
aggrieved
countries, the United States is handling this quietly. On the
other
matters of asylum and other things, I think the United States is just
letting these countries engage in their own megaphone diplomacy, and
when the dust settles, their rantings will probably not have amounted to
much.
(9) Edward Snowden's fear of flying is justified - Geoffrey
Robertson
http://www.guardian.co.uk/commentisfree/2013/jul/23/snowden-asylum-america-international-law
Edward
Snowden's fear of flying is justified
Snowden is a refugee, not a spy.
But America has history when it comes
to forcing down planes in defiance of
international law
Geoffrey Robertson
The Guardian, Wednesday 24
July 2013 04.30 AEST
As Edward Snowden sits in an airside hotel, awaiting
confirmation of
Russia's offer of asylum, it is clear that he has already
revealed
enough to prove that European privacy protections are a delusion:
under
Prism and other programmes, the US National Security Agency and
Britain's GCHQ can, without much legal hindrance, scoop up any
electronic communication whenever one of 70,000 "keywords" or "search
terms" are mentioned. These revelations are of obvious public interest:
even President Obama has conceded that they invite a necessary debate.
But the US treats Snowden as a spy and has charged him under the
Espionage Act, which has no public interest defence.
That is despite
the fact that Snowden has exposed secret rulings from a
secret US court,
where pliant judges have turned down only 10
surveillance warrant requests
between 2001 and 2012 (while granting
20,909) and have issued clandestine
rulings which erode first amendment
protection of freedom of speech and
fourth amendment protection of
privacy. Revelations about interception of
European communications (many
leaked through servers in the US) and the
bugging of EU offices in
Washington have infuriated officials in Brussels.
In Germany, with its
memories of the Gestapo and the Stasi, the protests are
loudest, and
opposition parties, gearing up for an election in September,
want him to
tell more.
So far Snowden has had three offers of asylum
from Latin America, but to
travel there means dangerous hours in the air.
International law (and
the Chicago Convention regulating air traffic)
emphatically asserts
freedom to traverse international airspace, but America
tends to treat
international law as binding on everyone except America (and
Israel).
Thus when Egypt did a deal with the Achille Lauro hijackers and
sent
them on a commercial flight to Tunis, US F-14 jets intercepted the
plane
in international airspace and forced it to land in Italy, where the
hijackers were tried and jailed. President Mubarak condemned the action
as "air piracy contrary to international law" and demanded an apology,
to which Reagan replied: "Never." The UK supported the action as
designed to bring terrorists to trial.
In 1986 Israel forced down a
Libyan commercial plane in the mistaken
belief that PLO leaders were among
its passengers, and the US vetoed UN
security council condemnation. So there
must be a real concern,
particularly after Nato allies collaborated in
forcing down the Bolivian
president's jet, that the US will intercept any
plane believed to be
carrying Snowden to asylum, either because he is
tantamount to a
terrorist (Vice-President Biden has described Julian Assange
as a
"hi-tech terrorist") or simply because they want to put him on trial as
a spy.
That, no doubt, is why Snowden cancelled his ticket to Cuba a
few weeks
ago, fearing the flight would end in Florida. Russia has, in
effect,
provided him with temporary asylum (there is no legal magic about
staying airside – he is in Russia) so he might be best advised to accept
the gag and enjoy Moscow's hospitality. Until, perhaps, a new government
in Germany after its September elections offers him a platform if he
turns up as a refugee, whereupon he could take a tramp steamer to
Hamburg.
In the meantime, states should start considering the impact of
the
information he has revealed so far. It was, ironically, the White House
that last year called for an international convention to regularise
"consumer data privacy in a networked world". There is no international
standard for permissible periods of data retention, for what data can be
retained or to whom data can be released. Western democracies differ in
modes of protection. Canada, Germany and Australia require warrants from
independent judges; the US from judges in a secret security court whose
record shows them to be rubber stamps. In Britain ministers lack the
time or ability to assess the warrants they routinely sign. France is
even worse – the prime minister's office can authorise "national
security" interceptions with no oversight.
Does this mean that the
possibility intelligence services might find a
terrorist needle in a data
haystack justifies abandoning any hope of
effective privacy regulation?
Foreign secretary William Hague, who is in
political charge of GCHQ, seems
to think so: "Law-abiding citizens have
nothing to fear." But it is
precisely law-abiding citizens who have had
careers ended by dissemination
of secret state surveillance. Ironically,
it has been suggested that one
victim of the NSA's metadata search
machine was none other than the CIA
director General Petraeus – guilty,
at least in American eyes, of
adultery.
Snowden is not a "traitor", and nor does he deserve to be
prosecuted as
a "spy". These laws have no public interest defence, and until
they do
any European country that surrenders him to end his life in an
American
supermax prison would be in breach of the free speech guarantee of
the
European convention of human rights, which is meant to protect those who
release information of importance to democratic debate.
(10) Paul
Craig Roberts: Role Reversal - How the US Became the USSR
From: Paul de
Burgh-Day <pdeburgh@harboursat.com.au>
Date:
Thu, 25 Jul 2013 15:40:17 +1000
Subject: Paul Craig Roberts:- Role Reversal:
How the US Became the USSR
Role Reversal: How the US Became the
USSR
By Paul Craig Roberts
July 24, 2013
http://www.paulcraigroberts.org/2013/07/23/role-reversal-how-the-us-became-the-ussr-paul-craig-roberts/
http://www.opednews.com/articles/Role-Reversal-How-the-US-by-Paul-Craig-Roberts-130723-676.html
I
spent the summer of 1961 behind the Iron Curtain. I was part of the
US-USSR
student exchange program. It was the second year of the program
that
operated under auspices of the US Department of State. Our return
to the
West via train through East Germany was interrupted by the
construction of
the Berlin Wall. We were sent back to Poland. The East
German rail tracks
were occupied with Soviet troop and tank trains as
the Red Army concentrated
in East Germany to face down any Western
interference.
Fortunately,
in those days there were no neoconservatives. Washington
had not grown the
hubris it so well displays in the 21st century. The
wall was built and war
was avoided. The wall backfired on the Soviets.
Both JFK and Ronald Reagan
used it to good propaganda effect.
In those days America stood for
freedom, and the Soviet Union for
oppression. Much of this impression was
created by Western propaganda,
but there was some semblance to the truth in
the image. The communists
had a Julian Assange and an Edward Snowden of
their own. His name was
Cardinal Jozef Mindszenty, the leader of the
Hungarian Catholic Church.
Mindszenty opposed tyranny. For his efforts he
was imprisoned by the
Nazis. Communists also regarded his as an undesirable,
and he was
tortured and given a life sentence in 1949.
Freed by the
short-lived Hungarian Revolution in 1956, Mindszenty
reached the American
Embassy in Budapest and was granted political
asylum by Washington. However,
the communists would not give him the
free passage that asylum presumes, and
Mindszenty lived in the US
Embassy for 15 years, 79% of his remaining
life.
In the 21st century roles have reversed. Today it is Washington
that is
enamored of tyranny. On Washington’s orders, the UK will not permit
Julian Assange free passage to Ecuador, where he has been granted
asylum. Like Cardinal Mindszenty, Assange is stuck in the Ecuadoran
Embassy in London.
Washington will not permit its European vassal
states to allow
overflights of airliners carrying Edward Snowden to any of
the countries
that have offered Snowden asylum. Snowden is stuck in the
Moscow airport.
In Washington politicians of both parties demand that
Snowden be
captured and executed. Politicians demand that Russia be punished
for
not violating international law, seizing Snowden, and turning him over
to Washington to be tortured and executed, despite the fact that
Washington has no extradition treaty with Russia.
Snowden did United
States citizens a great service. He told us that
despite constitutional
prohibition, Washington had implemented a
universal spy system intercepting
every communication of every American
and much of the rest of the world.
Special facilities are built in which
to store these
communications.
In other words, Snowden did what Americans are supposed
to do--disclose
government crimes against the Constitution and against
citizens. Without
a free press there is nothing but the government’s lies.
In order to
protect its lies from exposure, Washington intends to
exterminate all
truth tellers.
The Obama Regime is the most
oppressive regime ever in its prosecution
of protected whistleblowers.
Whistleblowers are protected by law, but
the Obama Regime insists that
whistleblowers are not really
whistleblowers. Instead, the Obama Regime
defines whistleblowers as
spies, traitors, and foreign agents. Congress, the
media, and the faux
judiciary echo the executive branch propaganda that
whistleblowers are a
threat to America. It is not the government that is
violating and raping
the US Constitution that is a threat. It is the
whistleblowers who
inform us of the rape who are the threat.
The
Obama Regime has destroyed press freedom. A lackey federal appeals
court has
ruled that NY Times reporter James Risen must testify in the
trial of a CIA
officer charged with providing Risen with information
about CIA plots
against Iran. The ruling of this fascist court destroys
confidentiality and
is intended to end all leaks of the government’s
crimes to
media.
What Americans have learned in the 21st century is that the US
government lies about everything and breaks every law. Without
whistleblowers, Americans will remain in the dark as “their” government
enserfs them, destroying every liberty, and impoverishes them with
endless wars for Washington’s and Wall Street’s hegemony.
Snowden
harmed no one except the liars and traitors in the US
government. Contrast
Washington’s animosity against Snowden with the
pardon that Bush gave to
Dick Cheney aide, Libby, who took the fall for
his boss for blowing the
cover, a felony, on a covert CIA operative, the
spouse of a former
government official who exposed the
Bush/Cheney/neocon lies about Iraqi
weapons of mass destruction.
Whatever serves the tiny clique that rules
america is legal; whatever
exposes the criminals is illegal.
That’s
all there is to it.
Paul Craig Roberts was Assistant Secretary of the
Treasury for Economic
Policy and associate editor of the Wall Street
Journal. He was columnist
for Business Week, Scripps Howard News Service,
and Creators Syndicate.
He has had many university appointments. His
internet columns have
attracted a worldwide following. His latest book, The
Failure of Laissez
Faire Capitalism and Economic Dissolution of the West is
now available.
(11) Phone Hacking Scandal: big London companies
implicated - Eamonn
Fingleton
http://www.forbes.com/sites/eamonnfingleton/2013/07/25/phone-hacking-scandal-goes-nuclear-blue-chips-law-firms-and-insurers-caught-in-the-crosshairs/
Phone
Hacking Scandal Goes Nuclear: Blue Chips, Law Firms And Insurers
Caught In
The Crosshairs
Eamonn Fingleton
Forbes 7/25/2013 @
10:19AM
The London phone hacking affair began as a local controversy
involving a
few rogue British news organizations. Now, in a highly explosive
development, it emerges that blue-chip corporations, law firms,
insurers, and even wealthy private individuals are suspected of similar
crimes. Yet in a remarkable contrast with how they dealt with the press,
the British authorities are actively shielding these new suspects — 102
of them — and are withholding their names.
The policy is said to be
justified in the UK’s national interest. An
intelligent inference is that
many of the suspects are not British and
the authorities fear that if names
were named this would undermine
London’s attractiveness as an international
financial center. It is also
a reasonable bet that some of the phones
allegedly hacked were not
British. The nearest thing the UK has to an
industrial policy these days
is to promote London as an “anything-goes”
international financial and
business center. If the only entities in the
dragnet were British, the
authorities probably wouldn’t hesitate to throw
the book at them. The
calculations are different, however, if non-British
entities are
involved. The entire British way of life has been turned upside
down in
the last three decades to provide foreign entities with a
“favorable”
regulatory environment. The red carpet has been rolled out for
all sorts
of foreign geese, provided only they lay golden eggs. In a
parallel with
Swiss banking secrecy, the London establishment affords a
haven where
foreign entities are free to do much that would never pass
muster at
home. Basically it hardly seems a stretch to say that the British
are
engaged in a regulatory race to the bottom and that London these days
aspires to do for financial and business ethics what Macau has done for
sexual mores. (Is that a bit harsh? Perhaps but only the most obvious
evidence of London’s amoral approach to finance is its resistance to the
proposed EU “Tobin tax,” which would discourage overly frequent trading
and impose some long-term discipline on investment houses. The losers
would be a handful of stockbroking firms which profit from short-term
trading. The UK also stands alone in the EU in refusing to countenance
any regulation that might curb the abuse of stock options.)
Principal
credit for bringing all this to light goes to the London-based
Daily Mail,
which has been doggedly pressing the issue for months. For
the Mail’s
account of latest developments, click here.
What follows is based largely
on the Mail’s reporting. The list of 102
suspects has been compiled by the
UK’s so-called Serious Organised Crime
Agency. After previously balking,
this agency, known familiarly as Soca,
has finally handed over the suspects
list to the House of Commons’s Home
Affairs Committee – but only on
condition that the names be kept
strictly secret.
It turns out that
some of the evidence Soca has compiled dates back as
far as 2008. Soca’s
objective seems to have been to focus on private
investigators acting for
various deep-pocketed clients.
These investigators broke the law in
obtaining sensitive information
including mobile phone records, bank
statements and other personal data.
However, an official inquiry into phone
hacking by media organizations
chose to exclude from its purview any
investigation of other
perpetrators of hacking.
The Mail comments:
“Lawyers, insurers, money exchanges and high-profile
individuals fuelling
the trade for sensitive information were never
prosecuted. But journalists
were dragged out of their beds at dawn,
arrested, and questioned over
allegations of phone hacking and bribing
public officials.”
What in
the world can these new suspects have been interested in? The
mind boggles.
For an unscrupulous investment bank (is there such a thing
– just asking!),
it would be interesting to gain advance knowledge of,
for instance, a
corporation’s quarterly earnings. For a law firm , it
might be useful to
glean an advance look at the other side’s case. For a
takeover bidder, it
would be nice to know how united a target company’s
board is in holding out
for its price.
Viewed in purely economic terms, the stakes here would be
vastly larger
than they were for newspapers trying to gain a beat on, for
instance,
how criminal investigations were going or who is sleeping with
whom. And
the best part of it is that by “contracting out the contracting
out”
(using an array of intermediaries to engage private investigators),
they
could surround themselves with a cordon sanitaire proof against legal
action. Of course, all this reckons without their names being revealed
in public.
(12) The 102 top firms who hired hackers... but the police
won't name them
http://www.dailymail.co.uk/news/article-2375572/The-102-firms-hired-hackers--police-wont-MPs-furious-told-report-locked-safe.html
Saturday,
Jul 27 2013 3AM
The 102 top firms who hired hackers... but the police
won't name them:
MPs furious after being told to 'keep this report locked in
a safe'
The Serious Organised Crime Agency compiled the list as far
back as 2008
But report was suppressed even as the media was
investigated over hacking
By CHRIS GREENWOOD, JAMES SLACK and JACK
DOYLE
PUBLISHED: 22:42 GMT, 23 July 2013 | UPDATED: 06:30 GMT, 24 July
2013
The true extent of the ‘secret’ phone-hacking scandal involving law
firms, insurers and high-profile business people was laid bare last
night.
More than 100 companies and individuals are suspected of fuelling
the
trade in illicit information obtained by hacking, blagging and
theft.
The Serious Organised Crime Agency finally handed an explosive
list
containing 102 names to MPs yesterday.
But, to the fury of
members of the Commons Home Affairs Committee, it
insisted that it remain
secret to protect those involved.
Last month it emerged that as long ago
as 2008 Soca compiled a dossier
outlining how firms and individuals hired
‘unscrupulous’ private
investigators.
They broke the law to obtain
sensitive information including mobile
phone records, bank statements and
other personal data.
However, the report – which showed the practices
went far wider than the
media – was suppressed and did not form part of Lord
Justice Leveson’s
inquiry. He refused to admit the documentation, saying it
was outside
his narrow terms of reference.
Critics question why the
media has been the subject of a public inquiry
and multi-million-pound
criminal investigation while others ‘got away
with it’.
Lawyers,
insurers, money exchanges and high-profile individuals fuelling
the trade
for sensitive information were never prosecuted.
But journalists were
dragged out of their beds at dawn, arrested and
questioned over allegations
of phone hacking and bribing public officials.
No one at Soca appeared to
push the report forward as three Scotland
Yard inquiries focused almost
entirely on the media.
Last night, after weeks of demands from MPs for
the identities of
businesses and individuals involved to be published, Soca
finally agreed
to let the Home Affairs Committee see the list – but only
under strict
rules of confidentiality.
It demanded the list be ‘kept
in a safe in a locked room, within a
secure building and that the document
should not be left unattended on a
desk at any time’.
Initially, Soca
wanted only committee chairman Keith Vaz to have access
to the
documents.
Officials claimed that publishing the names could harm the
commercial
interests of those involved and even ‘breach their human
rights’.
In theory, the move prevents the committee from making public
the names
or referring to them in any subsequent report.
But last
night Mr Vaz, who has led questioning of Soca’s shortcomings,
said he would
try to find a way of releasing the names.
He said: ‘Those companies or
individuals who either instructed private
investigators to break the law or
did nothing to stop them must be held
to account.’
Mr Vaz said police
had claimed any publicity could undermine ongoing or
future criminal
investigations, but added: ‘These events took place up
to five years ago. I
will be writing to the police to ask in how many
cases their investigations
are ongoing.’
Committee member James Clappison attacked the secret
arrangements,
saying: ‘I do not believe the full extent of phone hacking has
been
brought out.
‘We need complete transparency and the public needs
to know what has
been going on. The public were very concerned about the
original
phone-hacking revelations. There is no reason they should not be
concerned about these new revelations.’
Pressure is now mounting on
Soca to explain why, at the height of the
phone-hacking scandal in 2011, it
made no attempt to alert ministers
that lawyers, insurance companies and
other blue-chip firms were also
involved.
In an exchange with Tory MP
Nicola Blackwood, Soca director general
Trevor Pearce admitted the Home
Office had not been contacted to
highlight the 2008 report. He said it had
been passed to then Home
Secretary Jacqui Smith, and that had been
considered sufficient. But Mrs
Smith and the Labour government had departed,
and the current Home
Secretary, Theresa May, had no way of knowing what had
been going on.
It meant that when the Leveson terms of reference were
being drawn up,
ministers were in the dark about the activities of legal
firms, insurers
and others.
Last night Miss Blackwood said: ‘In a
separate report in 2010, Soca
identified private investigators as one of
four key sources of police
corruption.
‘I cannot understand why they
did not make these points to the Home
Office when the Leveson Inquiry terms
of reference were being set.’
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.