Aletho News

ΑΛΗΘΩΣ

Norway may ban non-medical circumcision of boys

RT | November 13, 2013

Norway’s Health Ministry is considering a proposal on regulating the circumcision of boys. Some political parties are calling on a complete ban of the practice on minors, a possibility that would affect Jewish and Muslim communities.

Two years ago, the ministry was tasked with reviewing circumcision and how it should be practiced in Norway. It is yet to finalize its stance, but intends to submit its legislative proposal before Easter next year, Health Minister Bent Hoie told Aftenposten, Norway’s largest newspaper.

The issue was brought to public attention after the recent call by Norway Children’s Ombudswoman Anne Lindboe to ban circumcision of boys before age 16, unless the procedure is warranted by medical needs.

“This is not due to any lack of understanding of minorities or religious traditions, but because the procedure is irreversible, painful and risky,” she argued.

Lindboe’s position is shared by some members of the Labor Party, which currently holds the largest share of 55 seats in Norway’s 169-strong legislative and is in opposition to the ruling Conservative-Progress coalition.

“As a modern society, we should work to eliminate practices that expose children and people to unnecessary suffering,” said Labor’s Ruth Mari Grung, who is a member of the parliamentary Committee on Health and Care Services.

A ban is also supported by the Center Party, which has 10 seats in the parliament.

Other parliamentary parties are yet to formulate their official position on the issue. Hoie, a Conservative member, who used to chair the Health Committee before getting his ministerial appointment, voiced concerns that a ban would force the groups practicing ritual circumcision underground, where the procedure would be performed by non-medics and pose greater health risks to the children.

The Norwegian lawmakers also disagree on whether circumcision should be covered by the budget under the national healthcare system. Some parties insist that ritual circumcision should be paid for by parents.

According to the newspaper, an average of about 2,000 Muslim and seven Jewish newborns are circumcised in Norway each year.

Regulation of ritual circumcision in Europe made the headlines in June, when a German court ruled that the procedure constitutes a minor bodily harm and outlawed performing it on minors. The decision sparked nationwide debate on the conflict between religious freedoms and protection of children.

The issue was further stressed in early October, when the Council of Europe branded the practice “a violation of the physical integrity of children” and called on EU members to protect children. The latter should include a ban on performing circumcision on those who cannot consent to it, the non-binding resolution said.

Sweden, Finland, Denmark, Iceland and Greenland are among the European countries where public debate on ritual circumcision of boys is hotly debated.

November 13, 2013 Posted by | Aletho News | , , , , , , | Leave a comment

Bystanders Hit by Police Bullets in New York City Get Little Sympathy and No Compensation

By Noel Brinkerhoff and Danny Biederman | AllGov | November 13, 2013

Getting shot has been made that much worse in New York City, where officials have taken a hard-line with bystanders caught in the line of fire of police officers.

Sixteen bystanders have been struck by police bullets in the city since 2011. Time and again, city lawyers have fought lawsuits brought by those wounded in these incidents. They adamantly refuse to settle cases and aggressively act to have them thrown out prior to trial.

NYC’s legal defense is rooted in a 2010 State Court of Appeals ruling that tossed a lawsuit by a bystander shot by police.

“The state’s highest court has recognized that police officers’ split-second decisions to use deadly force must be protected from this kind of second-guessing,” Michael A. Cardozo, who is in charge of the city’s Law Department, said in a statement, after a woman wounded outside the Empire State Building sued.

That incident took place on August 24, 2012, when nine pedestrians were shot by police trying to take down a gunman outside the famed building.

The most recent bystander shooting occurred in September, when two officers near Times Square fired at a man they mistakenly believed had a gun. The man was not wounded, but two female bystanders were, one of whom is now preparing to file a lawsuit.

The lawsuits that are filed by innocent bystanders as a result of officer shootings are referred to by New York City as “no-pay cases,” an indication of how black-and-white city lawyers view these incidents.

Cities across the U.S. handle such cases differently, according to the The New York Times. In Philadelphia in 2008, a $1.8 million dollar settlement was reached after a bystander was fatally wounded as police shot at an armed suspect. A 2010 police shooting of unarmed individuals in Harlem brought about several settlements, including one for $850,000 due to a fatality. The city of Chicago spent six years battling a 13-year-old girl who was hit in the shoulder by police gunfire, before her case made it to trial in 2010.

Legal experts say the cases present a challenge for police trying to protect the public, while not causing more harm than good.

“On the one hand they’re trying to protect people,” Jeffrey L. Seglin, an ethicist and lecturer on public policy at the John F. Kennedy School of Government at Harvard, told the Times. “On the other hand, you think they would try to take care of people who get hurt in that process. The legal thing isn’t always the right thing.”

To Learn More:

Bystanders Shot by the Police Face an Uphill Fight to Win Lawsuits (by J. David Goodman, New York Times)

Five City Officers Cleared In Shootings of Bystanders (by Ray Rivera, New York Times)

November 13, 2013 Posted by | Aletho News | , , , | Leave a comment

The House Intelligence Committee’s Misinformation Campaign About the NSA

By Mark M. Jaycox | EFF | November 12, 2013

Rep. Mike Rogers, Chair of the House Permanent Select Committee on Intelligence (HPSCI), is a busy man. Since June, he (and HPSCI) have been all over the media with press statements, TV appearances, and tweets, relentlessly trying to persuade the public that the National Security Agency (NSA) is merely doing its job when it collects innocent Americans’ calling records, phone calls, and emails.

One such release is a “Myths v. Facts” page tackling the fact and fiction of the NSA’s activities. In addition to collecting phone calls and emails, we now know these practices include deliberately weakening international cryptographic standards and hacking into companies’ data centers, but, unfortunately, the page is misleading and full of NSA talking points. And one statement is downright false.

Wrong Information

In the “Myths v. Facts” page, HPSCI touts company cooperation with the spying programs, writing: the NSA is not stealing data from tech companies without their knowledge. But two weeks ago, the Washington Post reported the exact opposite: the NSA secretly broke into the main links connecting data centers within Yahoo! and Google. Time for an update?

HPSCI is supposed to be informed of significant intelligence activities—and given Rep. Rogers’ wellpublicized concerns over cybersecurity (he introduced a bill called CISPA), we’d expect him to ensure the committee knew of such an attack if he’d been informed. Members of Congress must find out whether HPSCI knew about the attacks on private companies, and if they did, why they published such misinformation.

Word Games

The document also uses two different word games. First, it sets up a straw man by focusing on how the phone records program using Section 215 of the Patriot Act doesn’t collect the content of Americans’ communications. But NSA is using Section 215 to collect “metadata” that reveals every American’s calling records—calls to your doctor, your church, your partner, etc.—which severely chills core Constitutional freedoms.

HPSCI’s site neglects to note that the ongoing leaks provide evidence that, while spying on foreigners, the NSA collects Americans’ phone calls, emails, and other content using Section 702 of the Foreign Intelligence Surveillance Act. Instead of discarding emails belonging to innocent Americans’, the NSA keeps the communications. The Intelligence Committee document completely ignores this point by focusing on Section 702’s prohibition of “targeting” Americans. That’s a red herring: regardless of “targeting,” the NSA is still collecting and storing the content of Americans’ phone calls and emails without a warrant.

The “Facts” Continue

HPSCI also tells us that members of Congress were fully aware of the programs. But freshmen members of Congress have noted that that they were not shared important documents before key votes in December 2012 reauthorizing the Patriot Act and the Foreign Intelligence Surveillance Amendments Act. More generally, senior members of Congress have decried briefings by the intelligence community as playing a game of “20 questions.” Just last week, Sen. Dianne Feinstein, Chair of the Senate Select Committee on Intelligence (SSCI, the Senate counterpart to HPSCI), admitted how hard it is to get straight answers. In a recent article, she noted: “Once it gets started in one administration or two administrations back, it just continues on. They grow, they mutate, whatever it may be. You wouldn’t know to ask, that’s the thing. I wouldn’t have known to ask.”

Lastly, HPSCI says that the NSA isn’tusing the ‘[Business Records]’ program to do extensive data mining on Americans’ phone records.” The Business Records program may not be doing the actual data mining, but as we noted in our recent post on Executive Order 12333, there are secret guidelines that supposedly allow NSA to use the metadata collected under Section 215 and Section 702 to map out social networks. Essentially, the data mining is occurring under a different program that is still secret, and unknown, to the American public.

The Intelligence Committees’ Role in Oversight and Information

HPSCI, like SSCI, was originally created in the 1970s after the Church and Pike committees investigated the activities of the intelligence community, found systemic abuses of privacy and civil liberties, and recommended reforms to prevent those abuses from happening again. Its primary responsibility is to oversee the intelligence community and to inform the public and Congress about the intelligence community’s activities. We need HPSCI to tell the truth. That’s clearly not the case with the supposed “Myths v. Facts” website. And it’s sad to see a committee originally created to rein in the abuses of the intelligence community—as when NSA collected every single telegram leaving the country—tout incorrect or misleading talking points.

Congress Must Investigate

It’s one of the many reasons why Congress must establish a special investigatory committee into the spying as a result of the Intelligence Committee’s inability to release factual information about the spying. A special investigatory committee could look into the NSA’s activities and perform a review of the current oversight regime—paying particular attention to what other information the NSA is collecting about innocent users and how Congress can be better informed. As this document shows, members of Congress and the general public should not rely solely on HPSCI for facts about the NSA’s activities. It also forces us to ask: How much do these intelligence committees really know about what the intelligence community is doing? Do they understand enough about what they don’t know to be able to avoid unwittingly misinforming us?

November 13, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

Brazil and Germany Proposed UN Resolution Against Mass Surveillance

By Katitza Rodriguez | EFF | November 12, 2013

On November 7th, Brazil and Germany jointly proposed a preliminary version of a resolution on online privacy at the UN General Assembly. At a time when public outrage over the reach and scope of U.K. and U.S. mass surveillance is at an all time high, the draft resolution is the first official recognition by the UN of the threat that mass surveillance poses to human rights. The draft resolution is significant in many respects but particularly because it condemns “human rights violations and abuses that may result from the conduct of any surveillance of communications, including extraterritorial surveillance of communications… in particular massive surveillance.”

The draft resolution calls upon all states:

  • To end privacy violations and prevent further privacy incursions and ensure that national laws, practices and procedures conform to existing international human rights obligations,
  • To establish independent national oversight mechanisms capable of maintaining transparency and accountability for state surveillance of communications,
  • Requests the United Nations High Commissioner for Human Rights to submit a report to the General Assembly on the protection of the right to privacy.

If adopted, this will be the first General Assembly resolution on the right to privacy since 1988. This represents an excellent opportunity for states to update their understanding of international human rights law in the context of the massive technological developments that have taken place over the last 25 years.

While introducing the draft resolution, the Permanent Mission of Germany to the United Nations New York drew attention to the 24th session of the U.N. Human Rights Council (HRC) side event organized last September by Germany and Norway. During this meeting, member states engaged in a robust debate of online surveillance. EFF, Privacy International, Human Rights Watch, Access, APC, Article 19 and a coalition of 290 NGOs presented formally the International Principles on the Application of Human Rights to Communications Surveillance, a set of principles that provide States with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights. These principles have been cited in the new Mexican telecom reform bill, in op-eds and editorials in different countries, refered by policy makers in Sweden and the United Kingdom, and translated in more than 31 languages. During the 24th HRC, we also submitted an official statement calling on states to ensure that advances in technology do not lead to disproportionate increases in states’ interference with the private lives of individuals.

A few weeks earlier, during the opening of the 68th session of the United Nations General Assembly, the Brazilian President, Dilma Rousseff, made clear the indignation and repudiation in public opinion around the world regarding the revelations of a global network of electronic espionage:

“In Brazil, the situation was even more serious, as it emerged that we were targeted by this intrusion. Personal data of citizens was intercepted indiscriminately. Corporate information – often of high economic and even strategic value – was at the center of espionage activity. Also, Brazilian diplomatic missions, among them the Permanent Mission to the United Nations and the Office of the President of the Republic itself, had their communications intercepted.”

We hope that member states join Brazil and Germany in explicitly condemning mass surveillance by supporting the draft resolution as is currently written, and stay vigilant against watering-down of the text by countries who would continue their ubiquitous spying. Now is the time for all concerned citizens to call upon their governments to conform to the principles signed by 290 NGOs. If your organization hasn’t signed it yet, it can do so  here. It’s time to defend the Necessary and Proportionate Principles at the United Nations, and in every other regional or national policy space.

November 13, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , | Leave a comment

Cell Phone Manufacturers Offer Carefully Worded Denials To Question Of Whether NSA Can Track Powered-Down Cell Phones

By Tim Cushing | Techdirt | November 13, 2013

Back in July, a small but disturbing detail on the government’s cell phone tracking abilities was buried inside a larger story detailing the explosive expansion of the NSA post-9/11. Ryan Gallagher at Slate pulled this small paragraph out and highlighted it.

By September 2004, the NSA had developed a technique that was dubbed “The Find” by special operations officers. The technique, the Post reports, was used in Iraq and “enabled the agency to find cellphones even when they were turned off.” This helped identify “thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq,” according to members of the special operations unit interviewed by the Post.

Ars Technica reports that some security researchers are calling this statement into question and have contacted cell phone providers for statements on the NSA’s claim. Only a few have responded at this point, and their denials have been worded very specifically.

Google had this to say:

When a mobile device running the Android Operating System is powered off, there is no part of the Operating System that remains on or emits a signal. Google has no way to turn on a device remotely.

Google may not have a way, but that doesn’t mean the NSA doesn’t.

Nokia:

Our devices are designed so that when they are switched off, the radio transceivers within the devices should be powered off. We are not aware of any way they could be re-activated until the user switches the device on again. We believe that this means that the device could not be tracked in the manner suggested in the article you referenced.

Once again, we’re looking at words like “should” and “not aware.” This doesn’t necessarily suggest Nokia does know of methods government agencies could use to track phones that are off, but it doesn’t entirely rule it out either.

Samsung’s response is more interesting. While declaring that all components should be turned off when the phone is powered down, it does acknowledge that malware could trick cell phone users into believing their phone is powered down when it isn’t. Ericsson, which is no longer in the business of producing cell phones (and presumably has less to lose by being forthright), was even more expansive on the subject.

The only electronics normally remaining in operation are the crystal that keeps track of time and some functionality sensing on-button and charger connection. The modem (the cellular communication part) cannot turn on by itself. It is not powered in off-state. Power and clock distribution to the modem is controlled by the application processor in the mobile phone. The application processor only turns on if the user pushes the on-switch. There could, however, be potential risks that once the phone runs there could be means to construct malicious applications that can exploit the phone.

On the plus side, the responding manufacturers seem to be interested in ensuring a powered down phone is actually powered down, rather than just put into a “standby” or “hibernation” mode that could potentially lead to exploitation. But the implicit statement these carefully worded denials make is that anything’s possible. Not being directly “aware” of something isn’t the same thing as a denial.

Even if the odds seem very low that the NSA can track a powered down cell phone, the last few months of leaks have shown the agency has some very surprising capabilities — some of which even stunned engineers working for the companies it surreptitiously slurped data from.

Not only that, but there’s historical evidence via court cases that shows the FBI has used others’ phones as eavesdropping devices by remotely activating them and using the mic to record conversations. As was noted by c|net back in 2006, whatever the FBI utilized apparently worked even when phones were shut off.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the “roving bug” was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect’s cell phone.

Kaplan’s opinion said that the eavesdropping technique “functioned whether the phone was powered on or off.” Some handsets can’t be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

Short of pulling out the battery (notably not an option in some phones), there seems to be little anyone can do to prevent the device from being tracked and/or used as a listening device. The responding companies listed above have somewhat hedged their answers to the researcher’s questions, most likely not out of any deference to government intelligence agencies, but rather to prevent looking ignorant later if (or when) subsequent leaks make these tactics public knowledge.

Any powered up cell phone performs a lot of legwork for intelligence agencies, supplying a steady stream of location and communications data. If nothing else, the leaks have proven the NSA (and to a slightly lesser extent, the FBI) has an unquenchable thirst for data. If such exploits exist (and they seem to), it would be ridiculous to believe they aren’t being used to their fullest extent.

November 13, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , , , , | Leave a comment

US govt intel researchers to ‘radically expand’ facial recognition capabilities

RT | November 13, 2013

The United States intelligence community’s research arm is set to launch a program that will thoroughly broaden the capabilities of biometric facial recognition software in order to establish an individual’s identity.

The Janus program of the Intelligence Advanced Research Projects Agency (IARPA) will begin in April 2014 in an effort to “radically expand the range of conditions under which automated face recognition can establish identity,” according to documents released by the agency over the weekend.

Janus “seeks to improve face recognition performance using representations developed from real-world video and images instead of from calibrated and constrained collections. During daily activities, people laugh, smile, frown, yawn and morph their faces into a broad variety of expressions. For each face, these expressions are formed from unique skeletal and musculature features that are similar through one’s lifetime. Janus representations will exploit the full morphological dynamics of the face to enable better matching and faster retrieval.”

Current facial recognition relies mostly on full-frontal, aligned facial views. But, in the words of Military & Aerospace Electronics, Janus will fuse “the rich spatial, temporal, and contextual information available from the multiple views captured by security cameras, cell phone cameras, news video, and other sources referred to as ‘media in the wild.’”

In addition, Janus will take into account aging and incomplete or ambiguous data for its recognition assessment goals.

IARPA was created in 2006 and is a division of the Office of the Director of National Intelligence. The intelligence agency is modeled after DARPA, the Pentagon’s notorious research arm that fosters technology for future military utilization.

In-Q-Tel, a not-for-profit venture capital firm run by the Central Intelligence Agency, invests in companies that develop facial recognition software.

In an age of ubiquitous surveillance video amid a severe lag of legal protections for privacy, civil liberties advocates are expressing concern.

IARPA’s effort to significantly boost facial recognition capabilities “represents a quantum leap in the amount of surveillance taking place in public places,” said Jay Stanley, a senior policy analyst with the American Civil Liberties Union’s Speech, Privacy and Technology Project, as quoted by USA Today.

Stanley noted that law enforcement and the like could easily run random facial recognition programs over surveillance video to assess the identities of crowds in public places without oversight.

IARPA gave industry representatives a solicitation briefing on the program in June, according to media reports.

Late last month, the Federal Bureau of Investigation published a request for information in developing “a roadmap for the FBI’s future video analytics architecture” as the agency prepares to make its high-tech surveillance abilities all the more powerful.

In September, the Department of Homeland Security tested its Biometric Optical Surveillance System (BOSS) at a junior hockey game in Washington state. When it’s fully operational, BOSS could be used to identify a person of interest among a massive crowd in just seconds.

Over the summer, the state of Ohio admitted it had access to a facial recognition database that included all state-wide driver’s license photos and mug shots without the public’s knowledge.

November 13, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , | Leave a comment

Australia Spies On its Own Citizens

The Australian security state is collecting intelligence on a scale never seen before

Through rapid technology advances the Australian security apparatus has grown to an Orwellian scale. This has not necessarily been at the design of any elected government but something the Australian bureaucracy was forthright in promoting.

The executive government has only superficial control over the Australian surveillance system. It is fully integrated with the NSA apparatus which immediately brings up an issue about sovereignty. This is not about a country’s sovereignty over land, but knowledge. The international exchange of security information is a challenge to human rights of Australian citizens that has to be grappled with.

Consequently, it is not in the interests of the Australian or US intelligence community for any public or even parliamentary discussion. The idea that the parliament and executive are in total control of government is a myth.

Through technology and its innovative applications, the concept of privacy has been reframed to the point of anything a person does outside of the home or on a computer is public domain, captured through any of the large array of assets that can be utilized for surveillance.

This has allowed the creation of a new premise that has grown up through the administrative arm of the Australian Government, one of compliance. Australia seems to have adopted an almost fanatical compliance culture where the administrators believe that they are the natural custodians of Australia’s security interests, over the temporarily elected politicians of the day.

Some of the methods the Australian security state utilizes for intelligence gathering, storing, and collation are well documented and summarized below:

  • The Australian Government database is a highly sophisticated group of electronic document and records management system(s) (EDRMS) for collating, storing, and matching data between various agencies and levels of governments. Consequently data collected by the Australian Taxation Office (ATO), social security (Centrelink), Medicare, immigration, customs, and police enforcement agencies are integrated with relational databases and query systems. This is supplemented by individual agency databases with extremely detailed information on citizens. They carry an almost complete personal history of residential details going back decades, income, occupation, spouses, children, social security benefits, medical, and travel information, etc. These systems can be accessed by almost anybody within the public service. Every agency within the government has become part of the intelligence collection network.  According to academics Paul Henman and Greg Marston of the University of Queensland, these systems that enable agencies to determine client eligibility for services are highly intrusive and used with a prevailing deep suspicion of citizens in regards to their continuing eligibility for services.
  • The most recent revelations in the news about the ‘five eye’ countries eavesdropping on their citizens phone conversations, emails, and other electronic communications has been astounding. Through meta-data collection systems like PRISM and ECHELON are highly likely to be also operating within Australia due to the close relationship between the NSA and Australian intelligence community. According to AFP assistant commissioner Neil Gaughan, Australian intelligence has a much better relationship with the telecommunications companies than the US intelligence agencies. However, this doesn’t appear to be a new occurrence. A reliable source working within one of the Australian telephone companies when manual exchanges were operating confirmed that ASIO and state special branches had secret rooms within the exchanges to run phone tapping operations.
  • The NSW police are using an Automated Number Plate Recognition (ANPR) system which takes continuous snapshots of car number plates. This is supplemented by tracking cars when they go through tolls.
  • Law enforcement agencies have announced that they are preparing to utilize drones for crime surveillance in the not too distant future.
  • State and Federal Governments have been encouraging citizens to inform on other citizens they suspect of breaking the law. Government campaigns have been very successful in achieving all-time high numbers of informants in crime, social security, and taxation related matters.

The incredible power of the above described databases are exponentially enhanced when coupled with recent developments in cellular, RFID, internet, and other computer technologies. When private data in retail, banking, travel, health and insurance, etc., is linked to Intelligence collected by government, the value of data becomes massively enriched. Data collected by private organizations and utilized by security services include:

  • The internet domain is under constant surveillance. Companies like Google, Yahoo, Facebook, and Twitter utilize tracking cookies to gather data on users. Australian security agencies employ private contractors like the National Open Source Intelligence Centre (NOSIC) to monitor, collate, and report on publically accessible information about individuals and organizations.
  • Many business organizations such as shopping centres and banks now utilize CCTV. These assets can be utilized by security organizations to track and monitor individuals. This is now being supplemented with media access control (MAC) systems which can track smartphones. This technology is already being used in three Westfield shopping centres.
  • Numerous private databases like electronic tenancy database which has detailed information. These include tenancy history, insurance company records that detail individuals insured assets, bank records, and university records. These can all be accessed by security agencies.
  • Mobile phones can be used as a means to track people through inbuilt GPS on smartphones, triangulation, or through electronic data-collectors designed to identify individual mobile phones in public places.
  • People’s purchase history and movements can be tracked through the use of credit, debit, and loyalty card purchases.

Emails, phones calls, places people go, and purchase history, in the context of other data collected has the latent potential to build up a profile on anybody. Data from social media like Facebook can enhance these profiles greatly by adding thought and behavior information. It’s the collection of small bits of information that can be collated into big pictures. Australian intelligence can retro-actively analyse anybody with the data they have access to.

Since 2007, when amendments to the Telecommunications (Interception & Access) Act 1974 were made during the last days of the Howard Government, government agencies have the power to search meta-data without the individual’s knowledge or any warrant.

CCTV cameras have been installed in many communities without the development of privacy policies on how they should be used. The law has yet to catch up with the ability to collect data.

Up until the 1980s most intelligence gathering was targeted monitoring of specific groups where ‘persons of interest’ were identified for intensive surveillance. ASIO and state special branches were videotaping activists primarily from the ‘left’. Surveillance was undertaken by ASIO and state special branches, where operatives used electronic means for eavesdropping, keeping index cards and files on ‘persons of interest’, recording mainly hearsay information.

Even then, red flags emerged. Peter Grabosky of the Australian Bureau of Criminology pointed out that ‘thought and discussion of public issues may be suppressed……and….excess use of (surveillance) may inhibit democratic and political freedom more subtly’. In addition, he believed that malicious accusations made from erroneous records produce false information which made innocent people suffer at the hands of the security agencies.

This problem can’t be corrected as these records are not assessable to be corrected for errors. The Mohamed Haneef arrest by the AFP in July 2007 where it was alleged he was connected with a terrorist cell in the UK, but later exonerated, hints at the security services being very territorial and ‘out of control’, where ASIO knew of Dr. Haneef’s innocence but didn’t advise the APF.

Faceless bureaucrats are the ones defining who were the enemies of the state. There appears to be a general inability to discriminate between healthy dissent in a political democracy and subversion.

Where no tangible threats existed to national security, lesser ones were perceived to be grave threats or even invented – remember “weapons of mass destruction” in Iraq.

The rise of surveillance should not be understood as purely a technological development. It should be seen as a broader economic, social, and political paradigm shift within society where the balance of power has shifted away from the people and towards the state. There also appears to be a shift of power away from executive government towards an unelected bureaucracy. What makes this even more perplexing is that we don’t even know who these people really are.

The Sydney Morning Herald just ran a story that intelligence data was passed on to assist the mining giant BHP. Moreover, the human rights website WEBMOBILIZE alleges in a recent article that the Australian security apparatus is being used to steal intellectual property from companies and passing it over illegally to competitors. Some of the organizations that have been alleged to receive unlawfully gained IP include the University of Melbourne, Ageis Media, Telstra, Sensis, Deakin University, Belgravia Health and Business Group, Channel Nine, Nine Entertainment, Nine MSN, Corporate health management, Fairfax media, the Herald Sun, The Guardian, Nintendo, and the Australian Labor Party (ALP)and Liberal National Party (LNP).

There has been little in the way of public debate, nor much concern shown by the major political parties.

The powers to detain anyone under section 34D of the Australian Security Intelligence Organization Act 1979 for up to seven days without the right to reveal their detention, resembles the mechanisms of a police state.

With an annual growth rate of more than 20% and budget of over $4 Billion p.a., ASIO has a new $500 Million building in Canberra and a secret data storage facility is being built at the HMAS Harman Naval Base, near Canberra, where details are except from public account committees. When other government programs are being cut, the deep philosophical question of why there is a need to continue the increase of funding for surveillance of the nation’s citizens requires national discussion.

Mass surveillance doesn’t seem to have much to do with terrorism as it has to do with keeping check on what people are doing. It seems to be more of an intimidating compliance mechanism, aimed at protecting public revenue, preventing and detecting crime, tax evasion, and fraud.

The rapid increase in staff within ASIO from 618 in 2000 to 1860 in 2010 has meant that the organization now primarily relies upon young and inexperienced analysts in their 20s and 30s. This means that Australia is at the mercy of a “Gen Y” culture that has grown up connected to the cyber world where a sense of privacy is very different to generations before them. Newly uncovered evidence suggests that ASIO has gone to great lengths to spy on people who have broken no laws.

Through Australia’s history Australian Security Agencies have blundered in the assessments they have made on many issues. The 2004 Flood report commenting on the “failure of intelligence” on Iraq stated that these weaknesses included “a failure to rigorously challenge preconceptions”, and the absence of a “consistent and rigorous culture of challenge to and engagement with intelligence reports”. Flood found an inconsistency in assessments and very shallow analytical abilities within the security agencies he examined. On many occasions, particularly during the Howard years, intelligence analysis was ‘bastardized” by political agenda. Those who criticized the political agenda ran the risk of being reframed from dissidents and classed as deviants who come under security surveillance.

The question here, can government with a long history of cover-ups be trusted?

The dream of a fair, just, and equitable Australian society where sovereignty is in the hands of its citizens may be one of the greatest myths. Australia’s surveillance on its own has eaten into and taken away many of the rights and liberties of Australians, turning society into one of mistrust.

This cannot be really satisfactorily answered relying only on public domain knowledge. We can only make guesses. However one undeniable fact is that there is presently a hidden and totally unaccountable part of government that is changing the nature of society. It is here where no media organizations are asking any questions.

We have entered into a new period of governance. We are now in an age of governance by surveillance of the masses by a few unknown elite and unaccountable people. Communist totalitarianism may have collapsed in Europe in 1991 with the fall of the Soviet Union, but the “free world’s” version of surveillance and intelligence would have made Stalin, Honecker, and Ceauşescu very jealous.

The lack of transparency is becoming indefensible. Without scrutiny the Australian security apparatus is the loose cannon of the Bureaucracy which will cause many reverberations like the destruction of peoples’ livelihoods through IP theft, or the ruining of peoples’ reputations through persecution.

There has never been a public mandate for the development of such an extensive surveillance program. Is the money being spent justified?

November 12, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , | Leave a comment

House Votes to Protect Citigroup if It Gambles and Loses

By Noel Brinkerhoff and Danny Biederman | AllGov | November 12, 2013

One of the nation’s leading banks wants Congress to amend federal law adopted in the wake of the 2008 financial crisis so it and other Wall Street institutions can go back to gambling with risky investments and have taxpayers cover the losses again if they bet wrong.

Under the Dodd-Frank Act of 2010 (pdf), banks can no longer use monies backed by the Federal Deposit Insurance Corporation (FDIC) to invest in high-risk derivatives, such as “swaps.” This prohibition was adopted because derivatives crippled numerous key players on Wall Street five years ago, including Countrywide Mortgages, Bear Stearns, AIG, Lehman Brothers, Washington Mutual, Wachovia and others.

One of those “others” was Citigroup, which had to be bailed out by the federal government to the tune of $45 billion. A Citigroup lobbyist, though, was primarily responsible for authoring the Swaps Regulatory Improvement Act, which was approved by the U.S. House of Representatives two weeks ago.

The bill would wipe out Section 716 (pdf) of Dodd-Frank that requires banks to use a non-bank entity for trading commodity, energy and other swaps. In other words, if the legislation becomes law, financial institutions could return to conducting high-risk trading with funds that are backed by the FDIC (i.e. the taxpayer).

Dennis Anderson, who’s running for Congress from Illinois, says “to propose an easing of the controls on such behavior is irresponsible.”

“The behavior of these large banks and financial institutions cost all of us in loss of value in our retirement accounts, in lowered property values and, most importantly, in the general and deep recession that followed the failure of their gambling,” Anderson wrote at Daily Kos. “The idea of ‘too big to fail’ is still with us, and has grown even more threatening as these institutions have continued to grow.”

Citigroup was responsible for recommendations made in 70 lines of the 85-line bill, according to Eric Lipton and Ben Protess of The New York Times. In fact, reported the writers, a couple key paragraphs in the bill had been copied word for word from Citigroup’s submitted draft, which it had developed in conjunction with other Wall Street banks.

The legislation cleared the House on a 292-122 vote that saw 70 Democrats join all but three Republicans. Republicans voting against the measure were Representatives John Duncan of Tennessee, Walter Jones of North Carolina and Thomas Massie of Kentucky.

One of the Democrats supporting the change was Representative Carolyn Maloney of New York, the second-ranking Democrat on the House Financial Services Committee. She told The Hill that the bill would “protect safety and soundness,” per Federal Reserve Chairman Ben Bernanke.

“Even Federal Reserve Chairman Ben Bernanke opposed Section 716 as written, stating that the way it forces these activities out of insured depository institutions ‘would weaken both the financial stability and strong regulation of the derivatives activities,’” she said.

Bernanke has supported certain changes to the law, but never backed the Citigroup bill, according to the Times.

The White House said it opposes the bill, noting that the law is still being implemented by regulators. Legislation to amend it is “premature and could be disruptive and harmful to the implementation of these reforms,” it added.

Only about 40% of the rules required by the law have been implemented to date. Whether the Citigroup bill passes or not, such attempted legislation has “a chilling effect on regulators,” according to the Times.

“After inflicting so much pain and suffering on the American people, now is not the time to let the largest banks back into the casino,” Representative Maxine Waters (D-California) said in a statement.

Why are so many other Democrats supporting a bill that the Obama administration opposes? House aides interviewed by the Times theorized that “Republicans have enough votes to pass it themselves, so vulnerable House Democrats might as well join them, and collect industry money for their campaigns,” wrote Lipton and Protess.

Indeed, lawmakers who currently support bills advocated by big banks have, this month, received double the amount of donations from Wall Street firms as those who opposed such bills, according to MapLight, a nonprofit group that analyzes campaign financial records.

Additionally, Wall Street has, in the past few weeks, hosted special fundraisers for the bills’ co-sponsors.

A Democrat who supports the industry bills and is a top cash recipient of Wall Street—Representative Jim Himes of Connecticut, who was once a Goldman Sachs banker—confessed that the “system” has “problems.” “It’s appalling, it’s disgusting, it’s wasteful and it opens the possibility of conflicts of interest and corruption,” he told the Times. “It’s unfortunately the world we live in.”

To Learn More:

Heard about the Swaps Regulatory Improvement Act (H.R.992 – 113th Congress)? (by Dennis Anderson, Daily Kos)

House Votes for Bipartisan Change to Dodd-Frank on Bank Swaps (by Pete Kasperowicz, The Hill)

House, Set to Vote on 2 Bills, Is Seen as an Ally of Wall St. (by Eric Lipton and Ben Protess, New York Times)

Banks’ Lobbyists Help in Drafting Financial Bills (by Eric Lipton and Ben Protess, New York Times)

November 12, 2013 Posted by | Corruption, Economics | , , , , | Leave a comment

French starting to see Zionist lobby pull: Analysis

334228_France-Zionism

By Tahmineh Bakhtiari | Press TV | November 11, 2013

Since the formation of Israel and even before that, Tel Aviv has always resorted to lobbying to pursue its illegitimate objectives, including efforts to earn recognition for its so-called government.

Israel’s most active lobby is in the US, but it is also highly active in European countries such as Britain, Germany, France and even Italy and Spain.

This article seeks to discuss the influence of the Zionist lobby and France-Israel ties.

After a book by John Mearsheimer and Stephen Walt about the influence of the Israeli lobby on US foreign policy was published in 2007, French daily Le Monde published an article in October that year describing the Zionist lobby in France as a non-transparent and deceitful group. From that point, the issue of the Zionist lobby in France and its influence on the country’s foreign and domestic policy has been taken into consideration.

The Zionist lobby in France has extensive influence in three areas: A: Media and their affiliate companies, including Eutelsat; B: Political parties who receive campaign funding and media sponsorship from the Zionist lobby; C: Oil and arms companies.

The history of Zionist lobby in France

The Zionist movement led by Joseph Fisher started its activities in France between the first and second World Wars. Later in 1949, Fisher became Israel’s ambassador to Belgium. France had incurred heavy losses during World War II and that laid the groundwork for the presence of affluent Jews in different economic, social, judicial, cultural, religious and political arenas of the country.

At present, there are over 100 Jewish organizations and societies in France and all of the active Israeli parties have offices in Paris. In 1977, different Jewish groups in France merged and formed the Representative Council of French Jewish Institutions (Le Conseil Representatif des Institutions Juives de France (CRIF)).

The group is tasked with pursuing the interests of Israel inside France and its foreign policy. The group which owns a myriad of newspapers, magazines, TV networks and satellite service providers, has extensive influence in France’s political and legal bodies. Moreover, the Zionist lobby has a lot of lucrative businesses and financial institutions under its control.

The Zionist lobby in Israel has also formed certain groups for defaming, suing and even bringing to trial the individuals and groups which do not assert Israel’s interests. The French Union of Jewish students, the union of Jewish merchants in France, the SOS Racisme (established by the French Socialist Party to curry favor with Israel), the Organization of Lawyers without Borders France and the Anti-Defamation League are some examples.

French parties and the Zionist lobby

In domestic politics, some of the political parties are in competition with each other to forge friendly ties with Israel due to their need of pro-Israeli funds for victory in elections.

One of the examples of the Zionist Lobby’s sway in France is the naming of one the key roundabouts in Paris as David Ben-Gurion by the council of the city, which is comprised of rightist and socialist parties. Interestingly, the socialist mayor of Paris performed the ceremony with Shimon Peres.

Moreover, there are other Parisian squares named after the Zionist leaders such as Theodor Herzl and Yitzhak Rabin.

In 2012, around 112 French lawmakers, both rightists and leftists, held a festival in support of Israel. The move was aimed at opposing Palestine’s UN membership. The French parliamentarians stood up singing Israel’s national anthem.

The influence of the Zionist lobby in France reaches its peak during the election campaign in the country where each candidate competes with the others to ingratiate itself with Israel.

Among the French parties, the Socialist party has the closest ties with Israel and it adjusts most of its work plans, particularly vis-à-vis foreign policy, with the officials in Tel Aviv. The recent stance of Socialist French Foreign Minister Laurent Fabius regarding the nuclear talks with Iran was aligned with his illogical compliance with Tel Aviv’s policies towards Tehran.

Israel-France intelligence and security cooperation

Apart from the poisoning of Yaser Arafat, the former president of the Palestinian National Authority, and his hospitalization at a military hospital in Paris — which was a sort of French-Israeli intelligence and security coordination – the history of Paris-Tel Aviv ties is fraught with such cooperation.

From the outset of the fake Israeli regime, the French government authorized its intelligence apparatus to cooperate with the Mossad elements in assassinations of Arab and Palestinian fighters.

In 1965, under the presidency of Charles De Gaulle, Mossad abducted Mehdi Ben Barka, an opponent to King Hassan II, in cooperation with the French intelligence service. In 1972, Mossad killed Palestine Liberation Organization’s Representative to Paris, Mahmoud Al-Hamshri in cooperation with French intelligence elements.

Moreover, in the judiciary section, the French government has always acted in accordance with the interests of the Zionist lobby, the trial of Roger Garaudy, the writer of The Founding Myths of Israeli Politics, being an example.

Most of the world media are under the Zionist lobby’s sway and, using this powerful tool, they have managed to control world public opinion. That’s why when a media outlet moves in the path of actually informing the public, they spare no effort to prevent its activities.

The Zionist lobby in France puts pressure on the companies which provide services to the anti-Zionist satellite networks. The pressures by the Zionist lobby on the French Satellite service provider Eutelsat to stop the broadcasting of al-Manar, al-Alam, Press TV, Sahar and other networks is another example of such media sway.

Generally speaking, the Zionist lobby in France is enormously powerful in different spheres, despite its unpopularity among the French public. It has tried hard to portray Israelis as oppressed people. However, given the growth in public awareness, the information revolution and expansion of information dissemination tools, Zionism can no longer dominate public opinion.

The domineering and greedy nature of the Zionist regime and the futility of its claims about its opponents are being unmasked on a daily basis. This will lead to mounting pressure of public opinion’s pressure on the politicians. Nonetheless, for the time being, the majority of French politicians need the money and economic leverage of the Zionist lobby for the achievement of their objectives and the French media have to keep silent in order to survive and avoid the anti-Semitism tag.

In other words, at present France is under the domination of Zionists and their supporters, but the French public is gradually becoming aware of the fact.

~

Tahmineh Bakhtiari is an Iranian journalist and an expert on the Middle East and Latin America. Her writings have appeared in many print and online journals and newspapers including The Khorassan Daily, Jam-e Jam, Jomhuri Islami and Aftrab-e Yazd. Her book ‘The Genealogy of Zionism’ was published in 2001. Bakhtiari has a master’s degree in international relations.

November 12, 2013 Posted by | Corruption, Deception, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Mainstream Media, Warmongering, Timeless or most popular | , , , , | Leave a comment

Russia: Iran Not to Blame for Geneva Talks Failure

Al-Manar | November 12, 2013

Russia said the Islamic Republic of Iran was not to blame for the failed outcome of nuclear talks in Geneva last week, hinting at cracks in what had previously appeared to be a relatively united international front on the issue.

A source in the Russian Foreign Ministry said Tuesday that the account of the talks given by US Secretary of State John Kerry this week was an oversimplification of events, according to Ria Novosti.

“The draft of the joint document readied by the Americans was agreeable to the Iranians, but as decisions at the negotiations in this format are adopted by consensus, it was unfortunately not possible to come to a final agreement. This was not the fault of the Iranians,” the source said.

Kerry on Monday accused Tehran of backing away from a deal to limit its nuclear program in exchange for relief from sanctions that have stifled its economy. He said though that a deal could be reached in the coming months.

Tehran has pointed the finger at France for the failure to reach consensus in Geneva.

French Foreign Minister Laurent Fabius told French media during the talks on Saturday morning that his delegation did not agree with the draft under discussion.

“There are some points on which we are not satisfied,” Fabius was quoted as saying by Agence France-Presse news agency. AFP quoted Fabius as citing the “extremely prolific” Arak nuclear reactor and the issue of uranium enrichment.

November 12, 2013 Posted by | Wars for Israel | , | Leave a comment

Two Broken Cameras

By Yossi Gurvitz | November 11, 2013

Israeli soldiers try to arrest Activestills photographer Yotam Ronen, as Palestinian and international activists block 443 highway, which connects Tel Aviv and Jerusalem through the West Bank, during a protest against the violence of the Israeli settlers, October 16, 2012.

One morning last September, Nadel Shafiq Taher Shatiya heard the loudspeakers of the mosque in his village, in the Nablus region, announce that settlers were approaching the village’s land. Shatiya, a photojournalist by trade, grabbed two cameras and raced to the scene.

Based on his account, it turns out that when he arrived, several tractors and settlers – who, according to the reports received by Shatiya, came from thenearby Elon Moreh settlement – were trying to plough the village’s lands while several dozen Palestinian farmers tried to expel them. A settlement security vehicle showed up, and two settlers stepped out of it (Shatiya believes he can identify them), and started shooting live ammo at the farmers. Some of them took cover; Shatiya kept taking photos. That’s his job.

About ten minutes later, a large IDF force arrived at the scene, and did what it usually does: joined the settlers. The soldiers fired tear gas canisters and stun grenades at the farmers, and as the area is full of dry thorns, a fire broke out. The Palestinian farmers tried to put it out, and the two armed settlers demanded that the troops stop them (Yours truly was present for another incident, in which IDF soldiers fired at Palestinians who tried to put out a fire which had erupted after a demonstration due to canister fire.) The soldiers confronted the Palestinians, and Shatiya saw – and documented – one of the soldiers pull out a knife and threaten one of the farmers.

Our brave troops don’t know how to deal with nonviolent resistance. Major General (res.) ‘Amon Gilad became famous abroad when he told the American embassy “we don’t do Ghandi very well.” In such cases, the IDF’s instinct is to use excessive force. It makes for bad publicity, and the soldiers know that – so they try to suppress the evidence.

Shortly after Shatiya photographed the knife-wielding soldier, other soldiers assaulted him and took his cameras and camera bag from him. He witnessed another soldier tearing a phone out of the hands of a farmer, who was using it to document the incident; the farmer was beaten and detained.

So far, no surprises. Anyone who has either served in the West Bank or demonstrated there is familiar with the loving care the soldiers lavish on photographers. But in Shatiya’s case, the story underwent an unusual twist: the soldiers took his cameras to an officer, who turned them over, along with his camera bag, to a settler. Shatiya protested to the officer, saying “you’re in charge of security, and if, as part of your duty, you want to confiscate the cameras, keep them; why do you give them to the settler?” In return, the officer blamed Shatiya for the fire. Later on, Shatiya saw a settler moving among the detained Palestinians, telling the soldiers who should be kept in detention.

Turning the cameras over to the settler caused some fuss, with Israeli DCO officers telling the army it had no authority to detain journalists or confiscate their cameras, that only policemen may do so. This is inaccurate, by the way: in the West Bank soldiers have the same authority as cops, until the latter reach the scene. The Military Commander is the sovereign in the West Bank, as it is legally considered to be held under belligerent occupation;  the police only act in the West Bank because they have been delegated that authority by the Military Commander. In the end, several officials promised Shatiya he’d get his cameras back, but afterwards they simply ignored and then began avoiding him.

Some 12 days after the incident, the Israeli DCO contacted the Palestinian DCO, and informed the latter Shatiya could come and retrieve his cameras. He found them broken and rubbed with sand. The damage to the cameras is estimated at 21,000 NIS (about 6,000 USD). That’s what happens when you try to document the most moral army between the Jordan and the Mediterranean while it fails to move into Ghandi mode.

So, to sum it up, we’ve had settler violence, immediately backed up by the army; the destruction of evidence by soldiers, using a settler for this purpose; yet another example of problematic cooperation between soldiers and settlers, where a settler tells soldiers who to detain and they obey, and, finally, another example of the security forces in the West bank misunderstanding their role. There’s a strain of thinking in Israel, particularly among the center and on the left, which says that the problem in the West Bank is the settlers, and that the soldiers are not at fault.

But the soldiers know full well that they are at fault – Had they felt no guilt, they wouldn’t have felt the need to destroy evidence, and they would neither have broken the farmer’s cell phone nor given Shatiya’s cameras to a settler, in order to rid themselves of responsibility for taking the cameras away from him.  In the West Bank, the soldiers and the settlers are part of the same pattern, the pattern of an occupation whose inner logic is annexation by a quiet population transfer of the Palestinians.

Yizhak Shamir, an Israeli prime minister, once said that one is allowed to lie for Eretz Israel (the ‘Land of Israel”). The IDF soldiers take this one step further: in the name of Eretz Israel, they destroy evidence and intimidate journalists and innocent civilians.

November 12, 2013 Posted by | Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance | , , , , , , , | Leave a comment

RELEASE US – a short film on police brutality

By Charles Shaw | October 28, 2013

500 innocent Americans are murdered by police every year (USDOJ). 5,000 since 9/11, equal to the number of US soldiers lost in Iraq.

In 1994 the US Government passed a law authorizing the Pentagon to donate surplus Cold War era military equipment to local police departments.

In the 20 years since, weaponry designed for use on a foreign battlefield, has been handed over for use on American streets… against American citizens.

The “War on Drugs” and the “War on Terror” replaced the Cold War with billions in funding and dozens of laws geared towards this new “war” against its own citizens.

This militarization of the police force has created what is being called an “epidemic of police brutality” sweeping the nation.

RELEASE US
a short film by Charles Shaw
featuring the track ‘RELEASE” by Random Rab
and excerpts from the films
“THE EXILE NATION PROJECT” by Charles Shaw

& “NO JUSTICE , NO PEACE” by Krissana Limlamai & Brett Huff
https://www.youtube.com/watch?v=MSHuW…
http://www.LiberationNews.org

P.A.T.R.I.O.T. Act I, II & III (2001, 2004, 2010)
Homeland Security Act (2002)
Enhanced Border Security, Visa Entry Reform and
Immigrant Deportation Act (2002)
The Intelligence Reform and Terrorism Prevention
Act (2004)
Military Commissions Act (2006, 2009)
The FISA Amendments Act (2008)
The National Defense Authorization Act (NDAA)

ExileNation.org
RandomRab.net

November 12, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Subjugation - Torture, Timeless or most popular, Video | , , , , , | Leave a comment