Aletho News

ΑΛΗΘΩΣ

We could use more rebels

By Charles Davis | false dichotomy | June 13, 2013
What should you do if you uncover wrongdoing and the people responsible are the same ones who are supposed to investigate it? The way our politicians and elite media figures talk, you would think there’s something honorable about tipping them off (or shutting your mouth). In the political arena, the bold person of conscience – the rebel, the maverick, the damn-the-costs truth-teller – is the bad guy, not the action hero; the company man is played by Bruce Willis.

When Edward Snowden gave up a lucrative career in an island paradise to blow the whistle about the US government’s staggeringly broad spying operations – revealing what thousands of others with access to the same information wouldn’t – he was going up against a system that values loyalty to those who sign your paychecks over loyalty to principle or the public. A columnist for The New York Times, which is very much a part of that system, denounced him in terms one would think would be reserved for our leaders, declaring that Snowden had “betrayed the Constitution” and “the privacy of us all” by leaking evidence of the Obama administration doing just that.

 
Snowden need not be the world’s greatest human being for us to recognize the courage it took to do what he did. When compliance with a system makes one an accomplice to wrongdoing, there’s no virtue in being compliant. There’s no virtue in abiding by the “honor codes of all those who enabled [one] to rise,” as the Times columnist put it, when that code doesn’t respect the rights of everyone else. We recognize that when we go to the movies. Maybe we should stop condemning it in real life?
 
Instead of getting caught up in media attempts to pathologize a whistle-blower, we should also probably look more closely at what the whistle was blown on, because what Snowden revealed should be concerning, even if you don’t have relatives in Yemen.
This Matters
 
According to leaked classified documents, the US National Security Agency (NSA) is collecting data on nearly every call made by nearly every American, from the time it was placed, who was called and from where it originated. The NSA also has relationships with nearly every major Internet company, from Facebook to Google, granting the agency streamlined access to your user history. Everything you email or post to your wall could end up on an NSA server somewhere. That’s a lot of data, which is why the agency is building a 1.5 million square feet server farm in Utah to hold it, at a cost of $1.2 billion.
 
The Obama administration claims the information it belatedly admits it collects is only later accessed with a court order. But then, those court orders are classified, granted by judges in a secret court in front of which only the government can appear. Meanwhile, the White House has refused to release its legal rationale for the spying program, which senators from the president’s own party suggest is both illegal and unnecessary. It has, however, publicly credited the program with breaking up terrorist plots, though those claims – like its earlier denials that the spying program existed – have proven false.
 
But while it’s intrusive, sure, if you have nothing to hide, you have nothing to fear, right? Well, no. Even if you don’t have grandparents in Yemen, you should be concerned about any agency – that is, a collection of fallible human beings – that claims the right and has the power to know pretty much everything you’ve ever done on your iPhone. Go ahead and assume the best motives on the part of those in power, just don’t forget that even the most honorable people have ex-lovers too. Even saints can be seduced by power.
 
Most spooks aren’t saints, either. They’re like us: fallen. And what would you do if you were invisible? For some NSA employees, listening to your phone calls is the equivalent of sneaking into the locker room, several of them telling ABC News that the agency routinely eavesdrops on the phone calls of Americans abroad as they call friends and family back home.
 
“Hey, check this out,” the agents would tell each other, according to one whistle-blower. “There’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out.” Not exactly the model of professionalism one would hope for in someone who has god-like eavesdropping powers.
 
“These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones,” said another military whistleblower. Journalists and aid workers had their communications intercepted on a regular basis.
 
That was a decade ago.
 
It’s Gotten Worse
 
These days, the NSA is now known to be intercepting a much broader range of communication. Revelations to The Guardian show it claims the ability to tap into not just email communication, but live Skype calls. Basically everything you do on the Internet could potentially be viewed by a US government agent. There’s no need for black helicopters when you voluntarily divulge your life secrets with the help of a black box made by Sony. Or a white one by Apple.
 
You should be especially concerned if you have opinions about things going on in our world. When a group of Pennsylvanians began working to stop a natural gas fracking project in their community, they found themselves listed on a state Department of Homeland Security bulletin. “We want to continue providing this support to the Marcellus Shale Formation natural gas stakeholders while not feeding those groups fomenting dissent against those same companies,” the Secretary of Homeland Security, a Democrat, stated in an email.
 
If you oppose corporate America’s destruction of your community, you could end up being lumped in with actual terrorist threats. And once the word “terrorism” is invoked, all bets are off, potentially leading to a government agent, working on behalf of their corporate stakeholders, going through every ill-considered email you ever sent.
 
Sometimes, simply stating one’s political beliefs is enough to grab the state’s attention. In Seattle, the NSA’s partners in surveillance at the FBI tracked a group of young anarchists to a May Day demonstration, not because they were wanted for any crimes, but because they called themselves anarchists.
 
“Although many anarchists are law-abiding,” an FBI agent explained, “there is a history in the Pacific Northwest of some anarchists participating in property destruction and other criminal activity in support of their political philosophy.” And so we track them. And with the surveillance capabilities we have today, it’s not hard to make even the most innocent acts seem sinister, particularly when one has unpopular political beliefs or presents a challenge to corporate or state power.
 
It Could Be You
 
Combined with expansive terrorism laws, that could be a nightmare for those who fall in the arbitrary crosshairs of a government prosecutor looking to make a name for themselves. In 2010, the Supreme Court ruled that humanitarian groups can be convicted of “material support” for terrorism even if that support consists solely of helping seek conflict resolution. As former president Jimmy Carter said at the time, “the vague language of the law leaves us wondering if we will be prosecuted for our work to promote peace and freedom.”
 
Others don’t have to wonder. Since 2010, antiwar activists across the country have been subpoened and forced to testify before grand juries into a “material support” for terrorism investigation that has succeeded in scaring those who do humanitarian work in Palestine and Colombia, but as of yet yielded no convictions. Perhaps our broad spying and terrorism laws are working, just not in the way our leaders tell us. And, as these activists can attest: you don’t need to be convicted of anything to be constantly spied on.
 
As another NSA whistle-blower, William Binney, recently told journalist Amy Goodman, “if you’re doing something that irritates or is against what the government wants to be expressed to the American public, then you can become a target.” It’s as easy as that. And whenever you call a friend, keep in mind that you’re calling every friend your friend has ever called. Are you absolutely sure you have nothing to hide?
 
In Washington, most politicians seem annoyed that you now know this. They wish you didn’t. As Senator Al Franken explained, “Anything that the American people know, the bad guys know so there’s a line here, right?”
 
That’s how those in Washington often view those they claim to represent in our representative democracy: lumped in with the bad guys. Indeed, aiding us in our knowledge of what the government is doing in our name, as Bradley Manning and now Edward Snowden have done, is often likened with aiding the enemy.
 
“I don’t look at this as being a whistle-blower,” Senator Dianne Feinstein said of the NSA leaks. “I think it’s an act of treason.”
 
Feinstein voted for a war in Iraq that she and her husband personally profited from, so she knows a thing or two dozen about treachery. But she’s off base here. The American public is not the enemy, nor should informing them about the things being done to them with their own money be construed as the act of a traitor. Edward Snowden may not be the world’s greatest human being; who reading this has met him? What we do know is that his act did a lot of good by exposing a lot of wrong and took a lot more courage than it takes to criticize him on Capitol Hill. Since they don’t see that very often there, no wonder they mistake it as treason.

June 14, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Progressive Hypocrite | , , , , , | Leave a comment

US firms in bed with intelligence agencies in info swap – report

RT | June 14, 2013

Thousands of US tech, finance, and manufacturing firms have secret agreements with national security agencies to trade sensitive information in return for classified intelligence, Bloomberg’s sources revealed.

The firms involved are referred to as ‘trusted partners’ by US intelligence organizations such as the National Security Agency (NSA), Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI) and branches of US military.

In fact, thousands of US companies voluntarily provide US agencies with data (i.e. equipment specifications), Bloomberg’s four sources, who either worked for the government or in companies that have these agreements, said. And the information received can be used to gain access to computers of America’s rivals.

Cooperation between companies and intelligence agencies is legal, reported Bloomberg. And the fact that the companies provide information voluntarily means there is no need for US agencies to get court orders and no oversight is required under the Foreign Intelligence Surveillance Act, one out of four sources said.

Also, some of the companies’ executives are guaranteed immunity from civil actions related to transfer of information.

For example, Microsoft passes on information about bugs in its software before it publicly releases a fix to the problem, two sources confirmed. This kind of information can protect US government computers, as well as help to infiltrate those used by foreign governments by exploiting vulnerabilities in the Microsoft’s system.

Microsoft is reportedly not told how the US government uses the information passed on down to it, according to one official. Spokesman for Microsoft Frank Shaw confirmed such releases and stated that they give the government a chance to get “an early start: on risk assessment and mitigation.”

McAfee, America’s global computer security software company, is another ‘trusted partner’ and is known for its cooperation with the NSA, CIA, and FBI. It can share valuable data including malicious internet traffic, one of the sources said.

The company’s worldwide chief technology officer, Michael Fey, rebuffed the claim that the company does not share any personal information with the government.

“McAfee’s function is to provide security technology, education, and threat intelligence to governments … [including] emerging new threats, cyber-attack patterns and hacker group activity,” he stated.

Due to the sensitivity of information being traded, these kinds of agreements are usually made strictly between companies’ chief executive officers and heads of the US agencies. At times the chief executives could clear a few trusted people to work directly with the agencies.

Sharing info: Out of ‘patriotism’ or for ‘classified’ info?

In return for their cooperation, companies are showered with attention and gratitude.

“If I were the director and had a relationship with a company who was doing things that were not just directed by law, but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful”, Michael Hayden, former director of the NSA and the CIA said.

One of the sources said that public would be surprised how much help the government is seeking in terms of collecting information. Reportedly, it is currently implementing a new expensive program called Einstein 3. The program was developed by the NSA to protect the government from hackers by analyzing billions of emails being sent to the government computers.

Five of America’s major internet companies, including AT&T and Verizon, have agreed to install the program on their servers and have received immunity guarantees, which specify that they would not be held liable under US wiretap laws, one of the sources revealed.

In the past companies like AT&T, Verizon and BellSouth were already reportedly involved for eavesdropping on behalf of the NSA. In 2006 sources revealed that the companies collected call records of tens of millions of Americans and shared them with NSA.

US companies are willing to participate in these kinds of agreements because they either believe they are helping to protect the nation and/or helping to advance their own interests by receiving classified information in return, sources said.

Google’s co-founder Sergey Brin, for example, was given sensitive government information a year into its data sharing agreement with NSA. The info provided linked the 2010 attack on Google to a specific unit within the Chinese military – the People’s Liberation Army – one of the sources confirmed. Brin was even given a classified clearance to attend a secret briefing on the subject.

Google was reportedly one of the participants in the secret NSA PRISM program that was revealed by ex-CIA staffer and whistleblower Edward Snowden. The program uses data mining surveillance to access emails, videos, chats, photos and search queries from nine worldwide tech giants.

Snowden also disclosed a secret NSA program called Blarney, which gathers metadata on computers and devices that send emails or browse the Internet through principal data routes, known as a backbone.

The whistleblower was last seen Monday, checking out of his hotel in Hong Kong, where he stayed for three weeks after leaving the US.

Snowden is hoping that staying in Hong Kong would help him avoid any extradition attempts on behalf of the US. In terms of the US-Hong Kong Extradition Treaty, both Hong Kong and Beijing have the power to stymie Snowden’s extradition. China for its part has no extradition treaty with the United States.

China has thus far refrained from making statements on the Snowden case. But a popular Chinese Communist Party-backed newspaper has printed an article demonstrating the benefits of not sending Snowden back to US, arguing that his knowledge of US surveillance programs are key to China’s national interest.

The article comes after Snowden resurfaced and gave an exclusive interview to the South China Morning Post, revealing top-secret US government records that show dates and IP addresses of computers in Hong Kong and on the mainland that were hacked by the NSA over a four-year period.

In the meantime, the FBI has launched an investigation into Snowden leaking US top secret surveillance tactics and has promised to hold the whistleblower accountable.

June 14, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance, Timeless or most popular | , , , , , , , , , , | Leave a comment

Northern Ireland all set for G8 police state

rasouli_amir20130614073546173

Press TV – June 14, 2013

British police are preparing one of their most unprecedented security operations, involving water cannons and summary hearings, for next week’s G8 summit in Northern Ireland.

Police Service of Northern Ireland district commander Chief Superintendent Pauline Shields said more than 8,000 officers are being dispatched to Northern Ireland to help local police in the security operations.

The arrangements include a daunting four-mile security fence around the Lough Erne Golf Resort that will host the summit on Monday and Tuesday next week, while another barbed wire barrier is being set up outside the area.

The police have also deployed several mobile water cannons to frighten off potential protesters with a seven-mile area of the Lough Erne lake itself being closed down and patrolled by police boats.

“I would say the scale of the G8 in Northern Ireland is the biggest operation that the Police Service of Northern Ireland has ever had to deal with and probably as big as any police service throughout the UK would have dealt with,” Shields said.

This comes as she dismissed concerns that the police are gearing up a heavy-handed response to any protests outside the summit venue.

Police say they have made 260 extra prison cells available in nearby Omagh, Country Tyrone, and in the Northern Irish capital of Belfast, while sixteen judges will be on standby to hold summary hearings for arrested demonstrators.

But Shields claimed the measures are only meant to “facilitate” peaceful protests.

“We will have a policing operation in place that will facilitate peaceful protest…. We believe there may be a small minority of people who may be intent on causing disorder – we would ask people to abide by the law and if they break the law, then we will be in a position to deal robustly with them,” she said.

June 14, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , | Leave a comment

Obama Speaks with Forked Tongue on Surveillance

By Sheldon Richman | FFF | June 11, 2013

It’s bad enough the federal government spies on us. Must it insult our intelligence too?

The government’s response to Edward Snowden’s leaks about the National Security Agency’s secret monitoring of the Internet and collection of our telephone logs is a mass of contradictions. Officials have said the disclosures are (1) old news, (2) grossly inaccurate, and (3) a blow to national security. It’s hard to see how any two of these can be true, much less all three.

Can’t they at least get their story straight? If they can’t do better than that, why should we have confidence in anything else that they do?

Snowden exposed the government’s indiscriminate snooping because, among other things, it violates the Fourth Amendment protection against unreasonable searches and he had no other recourse.

Director of National Intelligence James Clapper says Snowden should have used established channels to raise his concerns, but there are no effective channels. Members of the congressional intelligence committees are prohibited from telling the public what they learn from their briefings. Two members of the Senate committee, Ron Wyden and Mark Udall, for years have warned — without disclosing secrets — that the Obama administration is interpreting the Patriot Act and related laws far more broadly than was ever intended by those who voted for those pieces of legislation. Their warnings have made no difference.

A court challenge wasn’t open to Snowden either. Glenn Greenwald, who published Snowden’s leaks in the Guardian, notes that for years the ACLU has tried to challenge the surveillance programs in court on Fourth Amendment grounds, but the Obama administration has blocked the effort by arguing that the ACLU has no standing to bring the suit. It’s a classic Catch-22. Since the surveillance is secret, no one can know if he has been spied on. But if no one knows, no one can go into court claiming to be a victim, and the government will argue that therefore the plaintiff has no standing to challenge the surveillance. Well played, Obama administration.

The administration should not be allowed to get away with the specious claim that telling its secrets to a few privileged members of Congress is equivalent to informing the people. It is not. It’s merely one branch of government telling some people in another branch. Calling those politicians “our representatives” is highly misleading. In what sense do they actually represent us?

Equally specious is the assertion that the NSA can’t monitor particular people without court authorization. The secret FISA court is a rubber stamp.

When Obama ran for president in 2008, he said Americans shouldn’t have to choose between privacy and security. Now he says that “one of the things that we’re going to have to discuss and debate is how are we striking this balance between the need to keep the American people safe and our concerns about privacy? Because there are some tradeoffs involved.”

What do you take us for, Mr. President? Do you say whatever serves your momentary interest?

It’s outrageous for Obama to say he welcomes this debate — when his regime is plotting to capture and prosecute the heroic whistleblower who made it possible.

The debate would be bogus anyway. No one has a right to make a security/privacy tradeoff for you. Our rights should not be subject to vote, particularly when a ruling elite ultimately will make the decision — out of public view!

Americans have learned nothing from the last 40 years if they have not learned that the executive branch — regardless of party — will interpret any power as broadly as it wishes. Congressional oversight is worse than useless; it’s a myth, especially when one chamber is controlled by the president’s party and the other chamber’s majority embraces big government as long as it carries a “national security” label.

Obama says, “If people can’t trust not only the executive branch but also don’t trust Congress and don’t trust federal judges to make sure that we’re abiding by the Constitution, due process and rule of law, then we’re going to have some problems here.”

That’s wrong. If the politicians’ only response to revelations that they’re violating our privacy is to ask for trust, then we already have problems.

June 12, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , | Leave a comment

Germany slams US for ‘Stasi methods’ ahead of Obama visit

RT | June 12, 2013

Germans are expressing outrage as details of a US internet spy program – revealed by a former CIA employee-turned-whistleblower – are prompting comparisons with that of former communist East Germany’s Ministry for State Security.

Unfortunately for Obama’s upcoming trip to Berlin, it was revealed that Germany ranks as the most-spied-on EU country by the US, a map of secret surveillance activities by the National Security Agency (NSA) shows.

German ministers are expressing their outrage over America’s sweeping intelligence-gathering leviathan, with one parliamentarian comparing US spying methods to that of the communist East Germany’s much-dreaded Ministry for State Security (Stasi).

Washington is using “American-style Stasi methods,” said Markus Ferber, a member of Chancellor Angela Merkel’s Bavarian sister party and member of the European Parliament.

“I thought this era had ended when the DDR fell,” he said, using the German acronym for the disposed German Democratic Republic.

Clearly, enthusiasm for the American leader’s upcoming visit will be much more tempered than it was in 2008 when 200,000 people packed around the Victory Column in central Berlin to hear Obama speak of a world that would be dramatically different from that of his hawkish Republican predecessor, George W. Bush.

Merkel will question Obama about the NSA program when he visits in Berlin on June 18, government spokesman Steffen Seibert told reporters on Monday. Some political analysts fear the issue will dampen a visit that was intended to commemorate US-German relations on the 50th anniversary of John F. Kennedy’s famous “Ich bin ein Berliner” speech.

Bush excesses, Obama digresses

One year into his second term, Barack Obama seems powerless to roll back the military and security apparatus bolted down by the Bush administration in the ‘War on Terror.’

One consequence of this failure of the Obama administration to reign in Bush-era excesses emerged last week when former National Security Agency employee Edward Snowden, 29, blew the whistle on a top-secret intelligence system named Prism, which collects data on individuals directly from the servers of the largest US telecommunications companies.

According to documents leaked to the Washington Post and Guardian newspapers, PRISM gave US intelligence agencies access to emails, internet chats and photographs from companies like Google, Facebook, Twitter, Verizon and Skype.

Justice Minister Sabine Leutheusser-Schnarrenberger said leaked reports that US intelligence services are able to track virtually all forms of Internet communication demanded an explanation.

“The more a society monitors, controls and observes its citizens, the less free it is,” she wrote in a guest editorial for Spiegel Online on Tuesday. “The suspicion of excessive surveillance of communication is so alarming that it cannot be ignored. For that reason, openness and clarification by the US administration itself is paramount at this point.”

All of the facts must be put on the table, the minister added.

Obama has defended the intelligence-gathering system as a “modest encroachment” that Americans should be willing to accept on behalf of security.

“You can’t have 100 per cent security and also then have 100 per cent privacy and zero inconvenience,” he said. “We’re going to have to make some choices as a society. There are trade-offs involved.”

The United States, however, is not legally restricted from eavesdropping on the communications of foreigners, meaning in theory that Washington could be listening to and collecting the private communications of individuals anywhere in the world.

Peter Schaar, Germany’s federal data protection commissioner, said the leaked intelligence was grounds for “massive concern” in Europe.

“The problem is that we Europeans are not protected from what appears to be a very comprehensive surveillance program,” he told the Handelsblatt newspaper. “Neither European nor German rules apply here, and American laws only protect Americans.”

Meanwhile, German opposition parties hope to gain from the scandal, especially with parliamentary elections approaching in September, and Merkel looking to win a third term.

“This looks to me like it could become one of the biggest data privacy scandals ever,” Greens leader Renate Kuenast told Reuters.

Obama is scheduled to hold talks and a news conference with Merkel on Wednesday followed by a speech in front of the Brandenburg Gate, the 18th triumphal arch that is one of Germany’s most recognizable landmarks.

June 12, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , , , , , , , | Leave a comment

Why Did Edward Snowden Go to Hong Kong?

By Dave Lindorff | This Can’t Be Happening | June 11, 2013

A lot of people in the US media are asking why America’s most famous whistleblower, 29-year old Edward Snowden, hied himself off to the city state of Hong Kong, a wholly owned subsidiary of the People’s Republic of China, to seek at least temporary refuge.

Hong Kong has an extradition treaty with the US, they say. And as for China, which controls the international affairs of its Hong Kong Special Administrative Region, while granting it local autonomy to govern its domestic affairs, its leaders “may not want to irritate the US” at a time when the Chinese economy is stumbling.

These people don’t have much understanding of either Hong Kong or of China.

As someone who has spent almost seven years in China and Hong Kong, let me offer my thoughts about why Snowden, obviously a very savvy guy despite his lack of a college education, went where he did.

First of all, forget about Hong Kong’s extradition treaty. When it comes to deciding whether someone will be extradited, particularly for a political crime, as opposed to a simple murder or bank heist, the decision will be made in Beijing, not in a Hong Kong courtroom. Second, Hong Kong has a long history of providing a haven to dissidents — even to dissidents wanted by the Chinese government. Consider, for example, the Chinese labor movement activist Han Dongfang, who was the subject of a massive dragnet after the Tiananmen protests, but who successfully fled to Hong Kong before the handover of the place from Britain to China, and is continuing to monitor Chinese labor strife and protest from his home on Hong Kong’s Lamma Island. Hong Kong also has a public that is very supportive of democratic values — certainly more so than the majority of American citizens. Hong Kong people may not be paying too much attention to Snowden’s situation right now, but if the US were to actively seek to extradite him, I am confident that the place would erupt in support for him, including the local media.

As for China, while the issue that has Snowden on the run — exposing an Orwellian spying program targeting the American people and run by the super-secret National Security Agency — is certainly not one that the Chinese like to discuss in terms of their own locked-down society, you can bet that the folks in the Propaganda Bureau in Beijing, and in the inner circle of the government, are rubbing their hands with glee both at the incredible embarrassment their harboring of Snowden causes the hypocritical US, and at the trove of intelligence information he has, which they may be able ultimately to lure him into disclosing if they treat him well.

Then too, there is the matter of the Confucian concept of gift-giving and mutual obligations. It was, I am sure, no accident that Snowden chose the weekend that President Obama was hosting a summit in California with China’s new president Xi Jinping to disclose his identity as the NSA whistleblower who exposed the national spying program to the Guardian and the Washington Post. In doing that, he gave President Xi an incredible gift — the chance to hold the upper hand in his negotiations with a hugely embarrassed and compromised Obama over issues like Chinese computer hacking of US corporate and government secrets, and theft of intellectual property. For of course it is clear that the NSA is at least as active in hacking Chinese computers and spying on Chinese communications.

Such a gift as that is not easily ignored or forgotten in Chinese culture. President Xi owes Snowden a lot, and I believe he will honor that debt by seeing that Snowden is protected from any threat that might be posed to him by a vindictive or frightened US government.

But Snowden isn’t relying solely on Chinese cultural values to protect himself.

He was also careful to send a powerful message of warning to the US officials in the videoed public interview he gave outing himself. As he told interviewer Glenn Greenwald, “I had access to the full rosters of everyone working at the NSA, the entire intelligence community, and undercover assets all over the world. The locations of every station, we have what their missions are and so forth. If I had just wanted to harm the US? You could shut down the surveillance system in an afternoon.”

That one line at the end had to make the folks in Langley and at NSA headquarters sit up straight or to head to the bar for a stiff one! And indeed he could. And I will guarantee you, Snowden being as smart as he is, that he has already taken that information and dispersed it to a number of trusted people, perhaps including Greenwald, with instructions that they should put it all out on the Web if anything happens to him, such as his being kidnapped or disappeared or terminated. It’s a wonderful insurance policy and one that would not have escaped him. Nor would he have bothered to discover that he had all that information available to him if he hadn’t thought that he might need it.

It would be a relatively easy matter for the high-tech spooks at the NSA to retrace Snowden’s electronic trail to see if he really did download all that super-secret information and really could blow up the entire US spy machine. If they find out that he really has that information, he’s basically untouchable.

The real question is not what they are going to do to Snowden. It’s what we Americans are going to do now that we know how truly insane and totalitarian our government has become.

Will we go back to watching our sports teams and our reality TV programming, and forget about the fact that we no longer have any privacy in our lives, that our elected leaders and our judges are operating on the assumption that if they get out of line the fascist machine at the NSA that works in service of the corporate elite will blackmail or destroy them with its access to all their communications. Or will we rise up and demand an end to this high-tech tyranny in the name of a fraudulent “War” on Terror?

Snowden exiled himself and gave up a great job in Hawaii in the hope that we would rise up when we learned that our democracy has been hijacked.

Let’s hope he’s right.

June 11, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Timeless or most popular | , , , , , | Leave a comment

No Canadian NSA connection, but very own data snooping program

RT | June 11, 2013

Canada does not use the US NSA’s top secret surveillance PRISM program, officials revealed. Instead, it has a spying platform of its own that it claims manages to distinguish between domestic and international telephone and internet data collected.

The Communication Security Establishment (CSE) spokesman separated the National Security Agency and the Canadian surveillance program.

“The Communications Security Establishment does not have access to data in PRISM”, Ryan Foreman told Reuters, confirming that the “CSE uses metadata to isolate and identify foreign communications,” as CSEC is prohibited by law from directing its activities at Canadians.

Officials admitted that CSEC “incidentally” intercepts Canadian communications, but removes such data after it is obtained, according to the Globe and Mail.

Secret spying programs have come under scrutiny this week as whistleblower and former technical assistant for the CIA Edward Snowden leaked information about the NSA’s PRISM project, describing it as a massive data mining surveillance program which gave the agency backdoor access to emails, videos, chats, photos and search queries from nine worldwide tech giants, including Google and Facebook.

A secret electronic spying program was approved in 2011 by Canada’s Defense Minister Peter MacKay. It searches through international and domestic telephone records and internet data for suspicious activity, Canada’s newspaper Globe and Mail revealed.

Despite the reports, the government’s metadata surveillance program remains a mystery with little information available publicly. The records obtained from the Access to Information requests by the Globe had many pages blacked out, citing national security.

The program was first passed in a secret decree signed in 2005 by Bill Graham, the defense minister at the time then put on hold in 2008 for more than a year due to privacy concerns. On November 21, 2011, it was once again renewed, along with other top-secret espionage programs. And currently it is headed by the Communications Security Establishment Canada (CSEC), part of the Department of National Defense.

It is still not known how the data is being collected. Mining metadata can reveal who knows who and help the authorities to map out social networks and even terrorist cells.

“Metadata is information associated with a telecommunication … And not a communication,” according to a PowerPoint briefing sent to MacKay in 2011.

The Canadian surveillance program has been authorized by ministerial decrees, bypassing the parliament, and is under the sole oversight of the Office of the CSE Commissioner.

Opposition MPs have questioned MacKay about the surveillance reports, to which he replied that Canada’s surveillance initiative “is specifically prohibited from looking at the information of Canadians” and that “this program is very much directed at activities outside the country, foreign threats, in fact. There is rigorous oversight, there is legislation in place that specifically dictates what can and cannot be examined.”

Canada’s privacy commissioner admitted a lack of clarity on the subject.

“When it comes to the metadata program, we know very little specific information at this point – but we want to find out more”, Scott Hutchinson, of the Office of the Privacy Commissioner of Canada, told the Globe and Mail.

The Canadian program was criticized 2008 by a retired Supreme Court judge Charles Gonthier, who questioned whether CSEC could be passing any data collected to other partner agencies such as Royal Canadian Mounted Police (RCMP) and Canadian Security Intelligence Service (CSIS).

Gonthier’s biggest fear was that the data collection would lead to unlawful surveillance.

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , | Leave a comment

Ron Paul Blasts NSA Defenders On Piers Morgan: ‘You’re Justifying Dictatorship!’

Former Republican presidential candidate Ron Paul appeared on CNN tonight to tell Piers Morgan why he objects to the NSA surveillance program. Morgan directly asked Paul if he would have actually ended surveillance programs if he were president. Paul said he would still want intelligence gathering, but it would be done in a more transparent way, maintaining that the current surveillance program are unquestionably unconstitutional. He directly told NSA defenders that they are simply “justifying dictatorship.”

Paul dismissed the use of a FISA court as a significant enough of a check on the executive branch. He said this program is undeniably “destroying the Constitution,”, and posed a question to anyone who defends the widespread surveillance.

“What should the penalty be for the people who destroy the Constitution? They’re always worrying about how they’re going to destroy the American citizens who tell the truth, to let us know what’s going on, but we ask the question: what is the penalty for people who deliberately destroy the Constitution and rationalize and say, ‘Oh, we have to do it for security.’ Well, frankly, you end up losing–you lose your security and you lose your freedoms too.”
He told NSA defenders that the nation is on a “very dangerous course,” and when they try to say there’s nothing wrong with such massive intelligence gathering, “you’re justifying dictatorship!”

Courtesy of CNN: Video

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular, Video | , , , , , | Leave a comment

NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System

By Lee Rogers | Blacklisted News | June 10, 2013

The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.

In some ways this is not really a new story. This is just confirmation of what many people involved in the alternative research community have known for years. Going as far back as the 1990s there were reports revealing how Microsoft provided the NSA with back door access to their Windows operating system. Google’s cozy relationship with the NSA has also been discussed off and on over the past decade. There have even been other whistleblowers that have come forward previously detailing a number of unconstitutional and unlawful abuses conducted by the agency. This includes revelations of how the NSA was spying on American service members stationed overseas. The only difference with this is that these newly leaked documents provide definitive details on just how wide reaching the NSA’s activities have become.

It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.

At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.

Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism then all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.

Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that, when completed, the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.

The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.

At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it. A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based on this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.

The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be … removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.

June 11, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , , , , , | Leave a comment

Israeli “Anti-Terror Bill” to Legalize Administrative Detention

dtnz

File – moheet.com
IMEMC & Agencies | June 11, 2013

The Israeli Government passed Sunday [June 9, 2013] the “Anti-Terror Bill”, authorizing harsher punishment against individuals suspected or convicted of aiding armed groups in the country, and anywhere in the world.

Several human rights groups in Israel and around the world voiced serious concerns regarding direct human rights violations, especially since this law strengthens and “legalizes” Administrative Detention orders confining hundreds, and even thousands, behind bars for extended periods without charges or trial.

The bill passed during a vote at the Israeli Ministerial Committee for Legislation, headed by Israeli Justice Minister, Tzipi Livni.

It not only targets those “convicted of terror attacks”, but also those who express support, emphasize and “incite terror activities” in addition to those believed to be engaged in preparations to carrying out violent acts.

Part of the penalties that this bill proposed include sentencing individuals for a life term without the possibility of parole, and allows the Police, the Security Services and all related agencies to confine “suspects” up to 30 days without granting them the right to any legal representation.

The passed bill also allows Israel to seize property of armed groups and individuals, in addition to preventing them from traveling abroad when there are no arrest warrants against them.

Israeli daily Haaretz has reported that the new legislation, would replace the “national state of emergency regulations” that Israel enforced after its establishment in the historic land of Palestine in 1948. Those regulations affect civil, security and economic issues.

The law particularly targets Palestinians and the indigenous Arab population in Israel, as those facing charges of “security or criminal violations”, whether in civil or military courts, would be facing very harsh sentences.

Head of the Meretz opposition party, Zahava Gal-On, said that Israel is denying human rights under the guise of combating terror.

She said that the emergency law applied in the country since the British occupation of Palestine, “cannot just be replaced with legislation that is anti-democratic”.

Also, the Association for Civil Rights in Israel (ACRI) slammed the bill, described it as anti-democratic, and warned that its provisions could turn legal organizations and law-abiding persons into terrorists just because they are suspected of aiding or practicing terror.

The Arabs48 news website reported that, under the new law, persons who even express support for groups labeled by Israel as “hostile” or “terrorist” could be imprisoned up to three years. It also considers financial support to these organizations as an “act of terror”.

Arabs48 added that the new bill increases the years of life-terms from 30 to 40 years.

It stated that the Israeli Prosecutors Office said that Price Tag attacks have not been labeled as acts of terror, as the Office believes that boosting intelligence activity and adequate training to police officers dealing with those attacks could put an end to those attacks.

The Israeli Government Legal Advisor stated that, legally, there is nothing stopping the government from describing and declaring Price Tag attacks as acts of terror.

In an Editorial Published on June 9, Haaretz said that the core of this bill has serious and extremely wide definitions for a terrorist organization, or terrorist acts, and added that once an organization, including a charity group, is labeled as a terrorist group, the moral base and all legal measures are destroyed.

June 11, 2013 Posted by | Civil Liberties, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Timeless or most popular | , , , , , | Leave a comment

US security officials said NSA leaker, journalist should be ‘disappeared’ – report

RT | June 10, 2013

A US editor has alleged he overheard security officials saying that the NSA leaker and the Guardian columnist who broke his story should be “disappeared.” Leaker Edward Snowden said that American spies often prefer silencing targets over due process.

“In Dulles UAL lounge listening to 4 US intel officials saying loudly leaker & reporter on #NSA stuff should be disappeared recorded a bit,” the Atlantic’s Washington-based editor-at-large Steve Clemons tweeted on Sunday.

According to Clemons, four men sitting next to him at the airport “were loud. Almost bragging” while discussing an intelligence conference they had just attended hosted by the Intelligence and National Security Alliance.

Clemens said he was unsure of the men’s identities or which agency they worked for, and told the Huffington Post that one of them was wearing “a white knit national counter-terrorism center shirt.” Clemons also recorded part of their conversation and snapped some photos, hoping that “people in that bz will know them.”

“But bad quality,” he noted about the quality of the photos. “Was a shock to me and wasn’t prepared,” he wrote on Twitter.

The source behind the revelation of the top-secret NSA surveillance program, dubbed one of the most significant intelligence leaks in US history, was uncovered late last week. Snowdon, a former CIA technical contractor and NSA consultant, had asked the Guardian to reveal his identity. He has fled to Hong Kong in a bid to escape retaliation by the US.

“The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife’s phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards,” Snowden told the Guardian.

When asked for his reaction to the alleged comments that reporter Glenn Greenwald and the 29-year-old leaker himself should be “disappeared,” Snowden told the newspaper: “Someone responding to the story said ‘real spies do not speak like that.’ Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process – they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general.”

Snowdon earlier explained that he had sacrificed his life and $200,000-a-year career out of his desire to protect “basic liberties” in order to “send a message to government that people will not be intimidated.”

The whistleblower leaked top-secret documents that revealed the existence of the US National Security Agency’s extensive Internet spying program PRISM, which records digital communications and allows for real-time online surveillance of US citizens. PRISM apparently gives US intelligence agencies direct access to files stored on the servers of major Internet companies – including Google and Facebook – in order to identify and target potential terror suspects.

June 10, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Subjugation - Torture, Timeless or most popular | , , , , | Leave a comment

US Gulf allies crack down on Internet freedoms

RT | June 10, 2013

Gulf Arab allies of the US have come under fire for introducing a series of draconian measures that limit Internet freedoms. The measures restrict content on social media sites, making “offending” posts punishable by extensive jail sentences.

Saudi Arabia, Qatar, the United Arab Emirates, Kuwait and Bahrain have tightened controls on Internet freedoms recently, targeting social media and phone applications alike in their communications crackdown.

Across the Gulf, dozens of journalists and social media users have been arrested since the beginning of the year for being in violation of the uncompromising national laws.

Punishments include deportation and lengthy prison sentences for crimes such as making derogatory comments about the government “in bad faith,” and offending religion and family values. In Saudi Arabia last month, top cleric Sheikh Abdul Latif Abdul Aziz al-Sheikh warned citizens against using Twitter, stating that those who use social media sites “have lost this world and the afterlife.”

Saudi Arabia

After threatening to ban messaging applications like Skype and WhatsApp, Saudi Arabia’s telecom regulator has chosen a new target: The web-based communication app Viber. The instant messaging application has been blocked since June 5.

“The Viber application has been suspended… and the [regulator] affirms it will take appropriate action against any other applications or services if they fail to comply with regulatory requirements and rules in force in the kingdom,” the Communications and Information Technology Commission (CITC) said in a statement.

Viber allows its users to text, call and send photos and video messages worldwide using a 3G or Wifi connection, and boasts over 200 million subscribers worldwide.

In March, the CITC warned mobile providers in the Kingdom that if they could not find ways to monitor encrypted messaging and VOIP applications, then they would be blocked, according to local media. The commission then issued a statement saying that “it would take suitable measures against these apps and services,” in its push for greater control over the Internet.

The Saudi government has also begun arresting Twitter users for posts to their accounts. Local media reports that the government is looking into ending anonymity for Twitter users in the country by making users register their identification documents.

Qatar

Despite its status as a regional media hub, the emirate state is considering a new cybercrime law that would widen government control over news websites and online commentaries.

If passed, the law would enable the government to punish websites or social media users for violating “the social principles or values,” or for publishing “news, photos, audio or visual recordings related to the sanctity of the private and familial life of persons, even if they were true, or infringes on others by libel or slander via the Internet or other information technology means,” Qatar News agency reported.

United Arab Emirates

At the end of 2012, the UAE passed a sweeping new cybercrime law: Anyone found guilty of criticizing the country’s rulers or institutions online may be jailed or deported. The law attracted widespread opposition, with legal consultants warning it is broad enough to penalize anyone caught posting allegedly offensive comments against the state.

This law has been used to jail citizens for Twitter posts over the past few months. In May, the UAE appeals court sentenced Abdullah Al-Hadidi to 10 months in jail for tweeting details of the trial of his father.

He was arrested on March 22 on charges of disseminating information on Twitter “in bad faith.” The court ruled that he wrote false details of a public hearing that, along with his father, involved 93 other people accused of plotting to seize power in the Gulf Arab state.

Kuwait

The government has arrested dozens of activists and at least six journalists in 2013 in the constitutional emirate, often described as the most liberal country in the region.

In March, Twitter user Hamed Al-Khaledi was sentenced to two years in prison for allegedly insulting the ruler of the Gulf nation. Others have been accused of “threatening state security” or “offending religion.”

In April, a Kuwaiti court sentenced former parliamentarian and opposition leader Mussallam al-Barrak to five years in prison for remarks deemed critical of the ruler of the state, which he made last year at a public rally.

Kuwait has been a member of the International Covenant on Civil and Political Rights (ICCPR) since 1996, which protects the right to freedom of expression, including peaceful criticism of public officials.

Bahrain

The Bahraini government has been trying to suppress an ongoing uprising by introducing stricter penalties. In April, the government passed a law making it illegal to insult the Gulf state’s King Hamad bin Issa al Khalifa, or its national symbols.

Recently, Bahraini blogger and activist Ali Abduleman was granted asylum in the UK after two years in hiding. Adbuleman claims he was persecuted by the government “for exercising the right to express his opinions” on his website. The Bahraini government claims he was tried for “inciting and encouraging continuous violent attacks against police officers” and conspired to spread “false and inflammatory rumors.”

In May, 62-year-old Bahraini protester Abdulla Sayegh was sentenced to three months in prison for hanging a national flag from his truck during a 2011 rally. The same month, six Twitter users were jailed for allegedly offensive comments about the country’s ruler deemed to be ‘abusing freedom of expression.’ According to prosecutors, they posted comments that undermined “the values and traditions of Bahrain’s society towards the king.”

One of the best-known human rights abuse cases in Bahrain is that of activist Nabeel Rajab, who was sentenced to three years in jail in August 2012 on charges of ‘participating in an illegal assembly’ and ‘calling for a march without prior notification.’ He openly criticized the country’s regime on RT for Julian Assange’s show The World Tomorrow.

The country has witnessed mass protests led by the kingdom’s majority Shiites against the minority Sunni-led government for two years. The Shiite demonstrators call for a transfer to a democratic system, and complain of discrimination in jobs and government. Their loyalty is in turn questioned by the ruling Al Khalifa monarchy, which has been in power for decades.

June 10, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , | Leave a comment