Aletho News

ΑΛΗΘΩΣ

FAA approves spy drones to fly US skies

Press TV – April 23, 2012

US law enforcement agencies have received the approval of the Federal Aviation Administration (FAA) to use unmanned aircraft known as drones for mass surveillance.

More than 50 non-military organizations within the United States have received approval to fly drones, according to documents obtained via the Freedom of Information Act requests by the advocacy group, Electronic Frontier Foundation.

Major agencies like the FBI, the US Department of Homeland Security and the US Department of Justice had been cleared to launch drones, US President Barack Obama administration’s favorite weapon of war which is being used in countries such as Pakistan, Afghanistan and Yemen.

The Electronic Frontier Foundation civil liberty group warned that the use of drones poses a serious threat to personal privacy.

The documents revealed that individual city police forces are also drawing up plans to use the reconnaissance aircraft.

In February, the US Congress passed a bill which approved the government’s deployment of up to 30,000 spy drones in American airspace by 2020.

The Federal Aviation Administration Reauthorization Act, which President Obama is expected to sign, also ordered the FAA to develop regulations for the testing and licensing of drones by 2015.

According to some estimates, the commercial drone market in the United States will be worth hundreds of millions of dollars. Currently almost 50 companies are developing some 150 different drone systems.

The US has been using the unmanned vehicles for its spy operations and assassination missions worldwide and the strikes have intensified since Obama took office three years ago.

April 23, 2012 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite | , , , , | Leave a comment

Secret British Colonial Archive Finally Released

Revealed: Britain’s Orwellian Empire

By GRAHAM MacPHEE | CounterPunch | April 20, 2012

After his death, George Orwell’s terrifying vision in Nineteen Eighty-Four of a future in which the past could be erased and rewritten at will by a faceless bureaucracy was quickly appropriated in the US and Britain for the purposes of Cold War propaganda. The novel was taken as confirmation of a worldview that divided the globe according to an almost ontological opposition, between a ‘free world’ that clung to life, liberty, and the pursuit of happiness, and a ‘them’ who were not only violent and cruel (after all, hadn’t ‘we’ had recourse to massive violence, from the fire-bombing of Dresden to Hiroshima and Nagasaki?), but who offended against the very laws of empirical truth and the sanctity of the historical record. But without in any way detracting from the crimes of the Soviet empire or the Communist Party regime in China, in reality the calculus of violence and horror in the postwar world was never so neatly and cleanly divided, especially once the populations excluded from the Cold War algebra of ‘us’ and ‘them’ begins to be taken into account—namely the populations of the ‘Third World,’ upon whom so much of the bloody Cold War was fought out. The upcoming disclosure of a massive haul of some 8,800 secret files—which one respected British historian has called “the ‘lost’ British Empire archive” (BBC News, 17 April 2012)—may require a rethinking of the whole Cold War narrative. For while the Cold War warriors of the West rightly denounced Stalinist and other regimes for their horrifically cynical and insidious rewriting of the past—airbrushing out not only individuals, but whole institutional structures of criminality, and indeed the fate of whole populations—these archives suggest that the decolonizing British state was also guilty of manipulating the historical record and hiding major crimes against humanity, albeit on a scale that has still to be assessed and fully understood.

The secret colonial archive is comprised of thousands of documents that detail the military and police activities of British colonial administrations in 37 British colonial territories, from Malaya, Kenya, Cyprus, and Aden—the scenes of high profile late-colonial wars—to much less well-known and often overlooked colonial flashpoints, such as the Chagos Islands, Guyana, Botswana, and Lesotho. As the prospect of national liberation loomed in each territory, British officialdom conducted a wholesale program of stripping the colonial archives, extracting incriminating documents that recounted acts of murder, torture, and wide-scale human rights abuses, and ‘repatriating’ them to Britain. Significant instances of crimes that are recorded in these files that have emerged so far include the reported murder and torture of Mau Mau insurgents in Kenya in the 1950s, the alleged operation of a secret torture center in Aden in the 1960s, and the forced removal of Chagos Islanders to make way for the massive US base on Diego Garcia  (Guardian, 18 April 2012). There are indications that documents were also removed that might embarrass British allies, especially the United States.

However, in British law such documents once ‘repatriated’ should have become available for public scrutiny; instead they were hidden, and their existence denied. The secret archive only came to light in 2011 as the result of a court case taken by five elderly Kenyans, who sued the British government claiming that they had been tortured during the Mau Mau Emergency, an uprising led by the Kikuyu people against British rule that lasted from 1952 to 1960, and which resulted in an estimated death toll of between 25,000 and 300,000 (Guardian, 21 July 2011). Historians working for the claimants began to unearth evidence of a secret trove of documents that had been deliberately ‘disappeared’ by the Foreign Office, and which appear to record not only atrocities in Kenya, but also a whole host of criminal state actions across the late-colonial world. According to Professor David Anderson of Oxford University, “the British Government did lie about this,” and as he observes “this saga was both a colonial conspiracy and a bureaucratic bungle” (BBC News, 17 April 2012). Shamed by the revelations in court, the British Government has promised full disclosure, with documents being released incrementally in tranches from this month through to the end of 2013. This is a massive archive, and clearly no firm conclusions can be drawn at present. It will need the scrutiny of activists, civil rights professionals, academics, and civil society groups from across the world to begin to make sense of the material, and to begin to understand its importance not only for the historical record, but also for current political circumstances.

Yet even at this early stage, the revelation of this secret archive offers an important insight into the ways in which the British government cynically and quite deliberately sought to reconstruct the postwar record in order to manipulate wider perceptions of the West’s postwar global role. While sometimes conducted hastily, the winnowing of the colonial archive was calculated and designed with systematic intent. Files that could be left behind after independence were classified as “legacy,” while those considered too sensitive to fall into the hands of post-independence governments were designated as “watch,” and could only be handled by colonial officials who were “British subject[s] of European descent” (BBC News, 17 April 2012).

However, not only was the historical record being quite deliberately edited, but in truly Orwellian fashion the process of censorship was itself carefully concealed. As The Guardian newspaper reports:

Painstaking measures were taken to prevent post-independence governments from learning that the watch files had ever existed. One instruction states: “The legacy files must leave no reference to watch material. Indeed, the very existence of the watch series, though it may be guessed at, should never be revealed.” [Therefore, when] a single watch file was to be removed from a group of legacy files, a “twin file”—or dummy—was to be created to insert in its place. If this was not practicable, the documents were to be removed en masse. (Guardian, 18 April 2012)

Given the complicated and time-consuming nature of the process of combing through the files, it appears that in their haste officials increasingly resorted to the wholesale destruction of sections of the colonial archive. A memo from April 1961 advises: “To obviate a too laborious scrutiny of ‘dead’ files, emphasis is placed on destruction—a vast amount of paper in the Ministry of Defence secret registry and classified archives could be burnt without loss” (BBC News, 17 April 2012). The secret cache of 8,800 files is thus most likely the reduced remnant of a much larger ‘ghost’ archive, comprising files destroyed not only to hide evidence of criminal actions but also to conceal the very program of concealment itself. Although initial indications suggest that this archival destruction was conducted on a massive scale, its full extent may never be known.

The intellectual legacy of the Cold War was the starkly melodramatic opposition of ‘free world’ and ‘evil empire’ so memorably rehearsed by President Ronald Reagan. However, one unacknowledged consequence of the overwhelming focus on the crimes of the Soviet regime was the airbrushing from popular consciousness of the continuing historical role of British colonialism in the postwar period, and its continuity with the emergent US hegemony. The aggressive defense of a late colonial edifice based in the Middle East, East Africa, and the Far East—regions that continue to number among the central battlefields of the US ‘war on terror’—was at the time a serious embarrassment to the Western Cold War vocabulary of ‘freedom’ and ‘democracy.’ But it now transpires that the West’s capacity to win the propaganda battle was not simply a matter of the best arguments winning the day, but depended on the bureaucratic manipulation of the past and the systematic liquidation of extensive sections of the historical record.

Orwell himself was in fact much less convinced by the Cold War’s stark oppositions than his subsequent promoters were willing to concede. As a former colonial policeman in Burma, he wrote about the insidious suppression of independent thinking among European colonial administrators in his 1934 novel Burmese Days. And although routinely read as a straightforward Cold War text, his more famous novel Nineteen Eighty-Four involves a more complex geopolitical vision than it is usually given credit for. As Orwell explained in a letter to Roger Senhouse dated 26 December 1948, rather than focusing exclusively on the critique of totalitarianism, the novel also sought “to discuss the implications of dividing the world up into ‘Zones of influence,’” an insight that had been prompted by the news of the collaboration between Roosevelt, Churchill, and Stalin in organizing the postwar world.1 In Orwell’s mind, the suppression of autonomous political action by the emerging geopolitical power blocs of East and West was intimately bound up with the suppression of individual freedom of thought and the destruction of a historical record that functioned according to shared norms of inclusiveness, accuracy, and fidelity to verifiable data. We might speculate with good reason, then, that Orwell would not only have welcomed the revelation of the secret imperial archive, but might not have been so surprised to learn of it in the first place.

Graham MacPhee is Associate Professor of English at West Chester University. He is the author of Postwar British Literature and Postcolonial Studies (Edinburgh University Press, 2011), and co-editor of Empire and After: Englishness in Postcolonial Perspective (Berghahn, 2007).

Notes

1. George Orwell, In Front of your Nose: Collected Essays, Journalism, and Letters 1946-1950, edited by Sonia Orwell and Ian Angus, Boston: Nonpareil (2000), 460.

April 21, 2012 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Timeless or most popular, War Crimes | , , , , | Leave a comment

Proposed Amendments to #CISPA Don’t Protect Privacy

By Michelle Richardson | ACLU | April 19, 2012

Yesterday, the House Intelligence Committee released proposed changes to the Cyber Intelligence Sharing and Protection Act of 2011, also known as CISPA that, according to its sponsors, represent “huge progress” towards addressing the privacy and internet freedom community’s concerns.

But, many privacy advocates, including the ACLU, and groups including the Center for Democracy and Technology, Free Press, the Electronic Frontier Foundation and the Constitution Project still maintain their opposition. The changes are so underwhelming that even the Obama administration issued a statement yesterday that their privacy concerns persist.

Here are some of the main problems with CISPA:

1. CISPA still allows companies to share lots of sensitive and private information about our internet use with the government. The proposal amended the definition of what could be shared by taking out its explicit reference to stealing “intellectual property.” But it still allows the sharing of Internet use records or the content of emails for “cybersecurity purposes” and unlike proposals drafted by Sens. Joe Lieberman and Dianne Feinstein or the Obama administration, CISPA does not require companies to even make an effort to remove information that could be tied to a specific individual.

2. CISPA still lets military agencies such as the National Security Agency directly collect the Internet records of American citizens who use the public, domestic, civilian Internet. The proposed changes state that the Department of Homeland Security should be cc’d when companies share our private details with the military and others, but this is no substitute for ensuring that a civilian agency is put in charge of collecting Americans’ information.

3. CISPA still lets the government use the private information it collects about us for any purpose it deems fit outside of regulation. For four months, the draft bill has remained the same: the government can use information collected under this broad new program for “any lawful purpose” so long as a “significant purpose” of its use is a cybersecurity or national security one. But as former federal and FISA court judge James Robertson said at a congressional briefing this week, this “significant purpose” limitation is meaningless. The Patriot Act inserted this language into our foreign intelligence surveillance laws, and since then, in Judge Robertson’s words, they’ve had a “hole you could drive a truck through.”

Hard to see the progress here.

CISPA is still expected to hit the House floor for “Cybersecurity Week” next week. You can find out more about the bills in this memo, and more importantly, help us spread the word on Twitter and write to your Member of Congress today. Let Congress know that in spite of the minor changes floated by the House Intelligence Committee, you still oppose CISPA.

April 20, 2012 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , , | Leave a comment

A Picture is Worth a Thousand Words, Including Your Location

By Hanni Fakhoury | EFF | April 20, 2012

At first blush, it seems obvious that a picture could reveal your location. A picture of you standing in front of the Golden Gate Bridge sensibly leads to the conclusion you’re in the San Francisco Bay Area when the photo was taken. But now that smartphones are quickly supplanting traditional digital cameras, and even traditional cameras now have wifi built in, many more pictures are finding their way onto the web, in places like Twitter, Flickr, Google+ and Tumblr. In a span of 10 days, popular photo social network Instagram added 10 million new users as a result of the release of its Android app and its acquisition by Facebook. And the location data hidden in these quick and candid pictures — even when your location isn’t as obvious as “standing in front of the Golden Gate Bridge” — is becoming another easy way for anyone, including law enforcement, to figure out where you are.

Take the case of “w0rmer,” a member of an Anonymous offshoot called “CabinCr3w,” for example. According to the federal government (PDF), “w0rmer” broke into a number of different law enforcement databases and obtained a wealth of sensitive information. In a Twitter post, “w0rmer” provided a link to a website that contained the sensitive information as well as a picture of a woman (NSFW) posing with a sign taunting the authorities. Because the picture was taken with an iPhone 4, which contains a GPS device built in, the GPS coordinates of where the picture was taken was embedded into the picture’s EXIF metadata. The FBI was able to use the EXIF data to determine that the picture was taken at a house in Wantirna South, Australia.

The FBI tracked down other online references to “w0rmer,” with one website containing the name Higinio Ochoa. The feds took a look at Ochoa’s Facebook account, which detailed that his girlfriend was Australian. Combined with the EXIF metadata, the government believed they had corroborated the identity of “w0rmer” as Ochoa, and in turn arrested him.

Even for photos not taken with a smartphone and not embedded with GPS coordinates (for example, point and shoot or SLR cameras that do not geotag), it’s still possible for the police to get location information through EXIF metadata. You can upload a picture here and see the metadata stored in a picture for yourself. Contained within that metadata is the camera’s serial number. Armed with that information, the police can easily scour the internet for other pictures tagged with the same serial number.  In Australia, a man whose camera was stolen was able to track it down using stolencamerafinder.com because the thief had taken a picture with the camera and uploaded it to Flickr, where had had listed his address. But even if the thief’s Flickr site didn’t contain his address, police could have subpoenaed Flickr – like law enforcement have attempted to do with Twitter – for information concerning a user’s temporarily assigned IP address, as well as session times and logs, to eventually determine where a person uploaded a picture from. All of which can be used to piece together a snapshot of not only your movements, but as in the case of “w0rmer,” potentially your identity. In the United States, police are being trained about the broader investigative (PDF) potential of this information.

It might be tempting to say the problem is overblown, because some social media sites, including Facebook and Twitter, strip the metadata out of photos uploaded by their members. But not all do. Twitpic‘s default is to use a picture’s location tag unless you opt out. Flickr gives you the option to hide a photo’s EXIF data, but many casual photographers tempted by the rapid growth of photo sharing may not understand what EXIF data is, and the implication of making it publicly available.

The bigger problem is that courts have been expanding the police’s right to search digital devices without a warrant under the “search incident to arrest” exception of the Fourth Amendment. While many of the cases involve warrantless searches of cell phones, there has been at least one case in California (PDF) where the police used the “search incident to arrest” exception to search a juvenile’s digital camera. And there are other reported incidents of photojournalists having their cameras confiscated and searched when covering political protests and rallies. If the cops have the physical camera (and thus the memory cards that store the photos), whatever scrubbing that happens when a photo is uploaded to the web is no obstacle.

So if you value your privacy, you should take steps to ensure the EXIF metadata in your pictures isn’t an easy way for anyone on the Internet to figure out your location. If you’re using a smartphone to take pictures, disable geotagging from your pictures. If you’re uploading your pictures to a website like Flickr or Twitpic that defaults to automatically include EXIF data and location information, take the steps to turn it off. And if you’re using a traditional SLR or point and shoot camera that doesn’t geotag, but does contain a breadth of EXIF data, the make sure you scrub its metadata before you upload it on the Internet. There are free online tools that will help you do precisely that. These simple steps will help ensure that the thousand words a picture describes doesn’t include your location.

April 20, 2012 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , , , | Leave a comment

Israeli Authorities or Cyber Police? Ola Haniyeh Arrested with no Charges

By Dylan Collins | Palestine Monitor | April 17, 2012

In the early morning hours of Monday March 26th, a large force of Israeli soldiers surrounded the Haniyeh house in Al-Bireh, located in the heart of the West Bank’s capital city of Ramallah. After setting up a perimeter around the house, 12 well-armed soldiers kicked down the Haniyeh’s door and entered the home.

“They broke the door. They didn’t knock. They didn’t ring. They broke the door and we found them in the middle of our bedroom,” says 26 year-old Dima Haniyeh.

After confining Dima’s parents to their bedroom, the soldiers proceeded on to the next bedroom shared by Dima and her 22 year-old sister, Ola.

Right off the bat, Dima recalls, it was clear the soldiers had an apparent interest in her young sister. “They wanted to search us both and they wanted Ola’s mobile phone and laptop.”

A female soldier was brought in to search them both.

Coincidentally, Ola’s phone had been lost several days before but the soldiers didn’t believe her.

“If you don’t give us your phone we are going to destroy the room. We will destroy every room until we find it,” Dima remembers one of the soldiers having said.

They did just that—, emptying every drawer onto the floor, flipping the beds, and clearing the shelves. Eventually, they told Ola to get dressed. They wanted to take her with them for questioning.

Ola remembers her father saying, “Why don’t you ask her here?! You’ve been here an hour and a half and haven’t asked a single question!”

Brushing aside her father’s supplications, and in violation of Fourth Geneva Convention, the soldiers took Ola with them and brought her directly to Israel’s Askalan prison in the Naqab Desert.

Another Detainee Without Charges

Ola has been held in Askalan ever since. Although no charges have been officially filed against her, a review trial held at the Askalan military court on Thursday April 5th ruled in favor of a 7-day extension of Ola’s detention. Ola was given another trial on Wednesday April 4th which resulted in yet another detention extension for the second time, as the prosecutors and Israeli judge did not carry out an investigation as they were on a vacation. Ola’s third court extension date was given this week, with her due to appear in court on Thursday, April 19.

“She is being interrogated daily regarding internet activity. The suspicion is that the internet pages are connected to ‘security activities’”, says Amal Husein of Addameer.

Ola’s detention was up for review on Tuesday April 17th. Her family and friends are confident that she will be released, as she hasn’t been accused or charged of anything as of yet. However, given the Israeli authorities’ administrative detention track record, anything is possible.

“People have said that the Israeli authorities have taken many people because of Facebook,” says Dima. “But everyone has a Facebook. Everyone puts his or her opinion on Facebook. There is nothing serious about it… it is freedom of speech.”

Ola recently graduated with a degree in Media and Political Science from Birzeit University last Fall. “She might go to protests sometimes, as all of us do, to speak out against the occupation and to support people- nothing extraordinary,” says Dima. “All of us participate—its part of being in Palestine and living under occupation.”

“She’s a quiet girl,” continues Dima. “She is a genuine and passionate person. She has friends and is lively, but she is much more the quiet type.”

Ola’s sister Dima says that Ola had perhaps had made comments on Facebook in support of Palestinian prisoners in general and against Israel’s policy of administrative detention but had done nothing out of the ordinary. “She is a journalist. This is her job. She should be able to do that,” argues Dima.

Ola’s sister and friends are quite confident that she was arrested simply because she voiced her opinions—a scary thought in the Facebook age.

“When you don’t have charges against someone—why… how can you keep them detained?” asks Dima. “When you don’t have any serious charges, how can you break down someone’s door in the middle of the night and take them? What happens when they have a serious case? What will they do then? Its scary.”

April 18, 2012 Posted by | Civil Liberties, Full Spectrum Dominance, Subjugation - Torture | , , , , , , | Leave a comment

The cost and consequences of exposing the drone wars

Drone Wars UK – 16/04/2012

As secret and unaccountable US and British drone strikes continue in remote corners of the globe, closer to home (but firmly behind closed doors), the drone industry continues to research and develop a drone-filled future.

Over the past couple of weeks, protesters in the UK and the US have gathered to turn the spotlight on the increasingly secret use and development of armed drones. In Bristol, at the beginning of April, the great and good of the drone industry came together at the Annual International UAV Conference to be met with a good-natured, noisy protest.  Meanwhile, across the Atlantic at the Creech Air Force base, members of the faith-based group Nevada Desert Experience delivered an ‘Indictment for the Violation of Human Rights’ to the commander of the base.  At each demonstration protesters were arrested and jailed.

But it’s not just protesting against the drone wars, that can bring serious trouble.  Pakistani human rights lawyer Shahzad Akbar, who represent victims of US drone strikes in Pakistan is being denied a travel visa  to enter the US to speak at a conference organised by Code Pink and others. Speaking from Pakistan by telephone, Akbar told the Guardian:

“Denying a visa to people like me is denying Americans their right to know what the US government and its intelligence community are doing to children, women and other civilians in this part of the world. The CIA, which operated the drones in Pakistan, does not want anyone challenging their killing spree. But the American people should have a right to know.”


Abdulelah Haider Shaye in court detention cell

However it is Yemeni journalist Abdulelah Haider Shaye who is suffering the most for exposing the drone wars.

In 2010 Shaye revealed that an airstrike that took place in al Majala, Yemen in December 2009 killing 14 women and 21 children was launched by US drones, not the Yemeni air force, thus embarrassing both the Yemeni and US authorities.   Later, Shaye  also interviewed AQAP leaders including Anwar Al-Awlaki challenging them about their methods.

In August 2010, Shaye was kidnapped from his house by Yemeni security forces and disappeared for a month.  He turned up in detention after being beaten and was sentenced to five years imprisonment for associating with terrorists.  Amnesty International and other human rights groups have campaigned for his release, and it looked as though in February 2012 he was about to be freed.  However a few days before Ali Abdullah Saleh, was forced to step down as President,  Obama called him to “express concern” at the news that Shaye was about to be pardoned.  Shaye release was immediately halted and he remains in prison.

April 17, 2012 Posted by | Full Spectrum Dominance, Progressive Hypocrite, Timeless or most popular, War Crimes | , , , , , | Leave a comment

France refuses to give Press TV team visas; no explanation offered

Press TV – April 16, 2012

The French Embassy in Tehran has refused to issue visas for a Press TV team that wanted to participate in the annual MIPTV and MIPDOC film festivals in Cannes, France, Press TV reports.

The Press TV team completed the application procedure on February 15 and was told by the visa section of French Embassy in Tehran that the initial response would come on March 7, 2012.

The embassy, however, gave no clear answer to the application until April 9 when a French Embassy employee contacted Press TV to announce that visa requests for the team had been rejected. No clear explanation was given for the rejection.

Press TV officials also wrote a letter to French Ambassador to Tehran Bruno Foucher asking him to provide them with a proper explanation. The French embassy, however, gave no answer to the letter.

MIPDOC and MIPTV festivals are purely cultural events which were held in the southern French port city of Cannes from March 30 to April 4, 2012.

Press TV has been regularly participating in both festivals since 2008.

In addition to Press TV crews, eyewitnesses said, it has become a habit for the French embassy to refrain from issuing visas to Iranian university professors and even physicians who want to participate in scientific events in France.

Experts believe that the measure is a clear sign that the incumbent French government is not willing to continue cultural and media cooperation with Iran.

This is not the first time that a major member of the European Union has taken hostile positions on Press TV and its staff.

In late January, the British Office of Communications (Ofcom) took a questionable measure and without offering a valid response to the Press TV CEO’s letters, revoked the channel’s broadcasting license and finally removed it from the Sky platform. Before revoking Press TV license, Ofcom had hit Press TV with a fine of 100 thousand pounds.

The British media regulator stepped up pressure on Press TV after the news channel covered British police crackdowns on anti-austerity protesters in London and other British cities.

Also, on April 3, under pressure from the German government, Munich media regulatory office (BLM) made an illegal decision to remove Press TV from the SES Astra satellite platform.

Vice President of the SES Platforms Services Stephane Goebel wrote in an e-mail to the Islamic Republic of Iran Broadcasting officials that the BLM had asked Press TV be immediately removed from the platform claiming that the channel did not have a license for broadcast in Europe.

Experts believe that such moves are clearly part of a scheme orchestrated by the West to silence the voice of the Iranian English-language channel.

April 16, 2012 Posted by | Full Spectrum Dominance | , , , , , , | Leave a comment

The Disturbing Privacy Dangers in CISPA

By Trevor Timm | EFF | April 15, 2012

This week, EFF – along with a host of other civil liberties groups – are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting:

What is “CISPA”?

CISPA stands for The Cyber Intelligence Sharing and Protection Act, a cybersecurity bill written by Rep. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) (H.R. 3523). The bill purports to allow companies and the federal government to share information to prevent or defend from cyberattacks. However, the bill expressly authorizes monitoring of our private communications, and is written so broadly that it allows companies to hand over large swaths of personal information to the government with no judicial oversight—effectively creating a “cybersecurity” loophole in all existing privacy laws.  Because the bill is so hotly debated now, unofficial proposed amendments are also being circulated [link] and the actual bill language is in flux.

Under CISPA, can a private company read my emails?

Yes.  Under CISPA, any company can “use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property” of the company. This phrase is being interpreted to mean monitoring your communications—including the contents of email or private messages on Facebook.

Right now, well-established laws, like the Wiretap Act and the Electronic Communications Privacy Act, prevent companies from routinely monitoring your private communications.  Communications service providers may only engage in reasonable monitoring that balances the providers’ needs to protect their rights and property with their subscribers’ right to privacy in their communications.  And these laws expressly allow lawsuits against companies that go too far.  CISPA destroys these protections by declaring that any provision in CISPA is effective “notwithstanding any other law” and by creating a broad immunity for companies against both civil and criminal liability.  This means companies can bypass all existing laws, as long as they claim a vague “cybersecurity” purpose.

What would allow a company to read my emails?

CISPA has such an expansive definition of “cybersecurity threat information” that many ordinary activities could qualify. CISPA is not specific, but similar definitions in two Senate bills provide clues as to what these activities could be. Basic privacy practices that EFF recommends—like using an anonymizing service like Tor or even encrypting your emails—could be considered an indicator of a “threat” under the Senate bills. As we have stated previously, the bills’ definitions “implicate far more than what security experts would reasonably consider to be cybersecurity threat indicators—things like port scans, DDoS traffic, and the like.”

A more detailed explanation about what could constitute a “cybersecurity purpose” or “cyber security threat indicator” in the various cybersecurity bills can be read here.

Under CISPA, can a company hand my communications over to the government without a warrant?

Yes. After collecting your communications, companies can then voluntarily hand them over to the government with no warrant or judicial oversight whatsoever as long is the communications have what the companies interpret to be “cyber threat information” in them. Once the government has your communications, they can read them too.

Under CISPA, what can I do if a company improperly hands over private information to the government?

Almost nothing. CISPA would affirmatively prevent users from suing a company if they hand over their private information to the government in virtually all cases. A broad immunity provision in the proposed amendments gives companies complete protection from user lawsuits unless information was given to the government:

(I) intentionally to achieve a wrongful purpose;
(II) knowingly without legal or factual justification; and
(III) in disregard of a known or obvious risk that is so great as to make it highly probably that the harm of the act or omission will outweigh the benefit.

As Techdirt concluded, “no matter how you slice it, this is an insanely onerous definition of willful misconduct that makes it essentially impossible to ever sue a company for wrongly sharing data under CISPA.” This proposed immunity provision is actually worse than the prior version of the bill, under which companies could be sued if they acted in “bad faith.”

What government agencies can look at my private information?

Under CISPA, companies are directed to hand “cyber threat information” to the Department of Homeland Security (DHS). Once it’s in DHS’s hands, the bill says that DHS can then hand the information to other intelligence agencies, including the National Security Agency, at its discretion.

Can the government use my private information for other purposes besides “cybersecurity” once they have it?

Yes. When the bill was originally drafted, information could be used for all other law enforcement purposes besides “regulatory purposes.” A new amendment narrows this slightly. Now—even though the information was passed along to the government for only cybersecurity purposes—the government can use your personal information for either cybersecurity or national security investigations. And as long as it can be used for one of those purposes, it can be used for any other purpose as well.

Can the government use my private information to go after alleged copyright infringers and whistleblower websites?

Up until last Friday the answer was yes, and now it’s changed to maybe. In response to the overwhelming protest from the Internet community that this bill would become a backdoor for SOPA 2, the bill authors have proposed an amendment that rids the bill of any reference to “intellectual property.”

The bill previously defined “cyber threat intelligence” and “cybersecurity purpose” to include “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.” Now the text reads:

(B) efforts to gain unauthorized access to a system or network, including efforts to gain such unauthorized access to steal or misappropriate private or government information

But it is important to remember that this proposed amendment is just that: proposed. The House has not voted it into the bill yet, so they still must follow through and remove it completely.

A more detailed explanation of how this provision could be used for copyright enforcement and censoring whistleblower sites like WikiLeaks can be read here.

What can I do to stop the government from misusing my private information?

CISPA does allow users to sue the government if they intentionally or willfully use their information for purposes other than what is described above.  But any such lawsuit will be difficult to bring.  For instance, the statute of limitations for such a lawsuit is two years from the date of the actual violation.  It’s not at all clear how an individual would know of such misuse if it were kept inside the government.

Moreover, suing the government where classified information or the “state secrets privilege” is involved is difficult, expensive, and time consuming. EFF has been involved for years in a lawsuit over Fourth Amendment and statutory violations stemming from the warrantless wiretapping program run by the NSA—a likely recipient of “cyber threat information.” Despite six years of litigation, the government continues to maintain that the “state secrets” privilege prevents the lawsuit from being heard.

Given that DHS is notorious for classifying everything—even including their budget and number of employees—they may attempt to prevent users from finding out exactly how this information was ever used. And if the information is in the hands of the NSA and they claim “national security,” then it would get even harder.

In addition, while CISPA does mandate an Inspector General should issue a report to Congress over the government’s use of this information, its recommendations or remedies do not have to be followed.

Why are Facebook and other companies supporting this legislation?

Facebook and other companies have endorsed this legislation because they want to be able to receive information about network security threats from the government. This is a fine goal, but unfortunately CISPA would do far more than that—it would eviscerate existing privacy laws by allowing companies to voluntarily share users’ private information with the government.

Facebook released a statement Friday saying that they are concerned about users’ privacy rights and that the provision allowing them to hand user information to the government “is unrelated to the things we liked about HR 3523 in the first place.” As we explained in our analysis of Facebook’s response: the “stated goal of Facebook—namely, for companies to receive data about cybersecurity threats from the government—does not necessitate any of the CISPA provisions that allow companies to routinely monitor private communications and share personal user data gleaned from those communications with the government.” Read more about why Facebook should withdraw support from CISPA until privacy safeguards are in place here.

What can I do to stop this bill?

It’s vital that concerned Internet users tell Congress to stop this bill. Use EFF’s action center to send an email to your Congress member urging them to oppose this bill.

April 16, 2012 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , | Leave a comment

Technologies of Control: The Case of Hewlett Packard (HP)

Who Profits | February 2012

The Israeli occupation of the Palestinian territories is maintained and preserved by daily practices of surveillance and control. In recent years, these practices have increasingly relied on technological mechanisms provided by international and local corporations. Hewlett-Packard (HP) is one of the companies that unable this technological supervision and oppression.

Through its subsidiary EDS Israel, HP is the prime contractor of the Basel System, an automated biometric access control system installed and maintained by HP in checkpoints throughout the occupied Palestinian territories (oPt).

Another control mechanism with which HP is involved, is Israel’s ID card system, which reflects and reinforces the state’s political and economic asymmetries as well as its tiered citizenship structure. HP was charged by the Ministry of Interior with the manufacturing of biometric ID cards for the citizens and residents of Israel (Jewish and Palestinians). In addition, HP also provides services and technologies to the Israeli army.

Furthermore, two of HP’s technological service providers in Israel are Matrix and its subsidiary, Tact Testware, which are located in the illegal West Bank settlement of Modi’in Illit. HP further participates in the “Smart City” project, implemented in the illegal West Bank settlement of Ariel, providing a storage system for the settlement’s municipality.

April 16, 2012 Posted by | Civil Liberties, Full Spectrum Dominance, Illegal Occupation, Timeless or most popular | , , , | Leave a comment

Israeli military court sentences Palestinian journalist

Palestine Information Center – 16/04/2012

RAMALLAH — The Israeli military court in Ofer passed a four-month imprisonment term against Suhaib Al-Asa, 26, along with 3000 shekels fine.

Aziz, the father of Suhaib Asa, said that the sentence falls in line with the Israeli occupation authority’s constant attacks on the Palestinian people and journalists.

He said that the sentence also reflects the IOA fears of a free press that defends Palestinian rights.

Israeli occupation forces stormed the home of Asa, who works with Bethlehem 2000 radio station and a correspondent for a website, in Obaidiya to the east of Bethlehem on 5 February and took him away after searching his home and confiscating personal computers.

April 16, 2012 Posted by | Civil Liberties, Full Spectrum Dominance | , , | Leave a comment

Obama’s Drones Threaten World Civilization

By Glen Ford | Black Agenda Report | April 11, 2012

When Barack Obama was running for president, in 2008, he vowed to increase the use of drones against al Qaida elements in Pakistan and Afghanistan. His surrogates roamed the talk shows, advocating a “smarter” and cheaper kind of robotic war, allowing the U.S. to avoid pouring more troops into the “Af-Pak” theater of conflict. Vastly increased deployment of Unmanned Aerial Vehicles (UAVs), the argument went, would jettison George Bush’s “dumb” approach to warfare in favor of a cheaper and more humane use of U.S. technological resources, saving both American and South Asian lives.

What the “peace” candidate was actually proposing, was a qualitative leap in the U.S. drive for “full spectrum dominance” over the planet. The U.S. would elevate to a strategic principle its self-arrogated entitlement to use whatever technical means at its disposal – mainly drones – to target and kill designated adversaries at will, anyplace on the globe, at any time, accountable only to itself. It was a declaration of war against international law, as it has evolved over the centuries.

This administration has expanded the Air Force inventory of active drones to at least 7,500. Drones have joined Special Operations forces as the “tip of the spear” of U.S. power projection in the developing world, the “front lines” of the current imperial offensive.

Virtually all of the drones’ lethal missions are, in legal terms, assassinations, with or without “collateral damage.” They are also acts of terror, certainly in the broad sense of the word, and intended to be so.

As Canadian political scientist David Model points out in a recent article “Assassination by Drones”: “It is clearly evident that for a State to launch an attack by a UAV is a violation of international law and those responsible for such acts become suspects of war crimes.” Drone warfare utterly shreds the very concept of the rule of law. In killing those “suspected” of committing or planning actions against the U.S., Washington “precludes the application of due process,” writes Model.

Therefore, in the quest to make the entire world a free-fire (and law-free) zone, drone warfare requires that due process be destroyed everywhere, including within the borders of the United States.The Obama-shaped preventive detention bill signed into law this past New Years Eve is the logical extension of the international lawlessness called forth by drone warfare, and by the larger aims of full spectrum American dominance. Barack Obama is not just another “war president” – he is a destroyer of world civilization, the terms by which humans deal with one another as states, social groupings and individuals. It is not an exaggeration to describe this leap into depravity as a war against humanity at-large, and against the human historical legacy.

Certainly, it is a war against peace, the highest international crime. If a state can kill individuals and designated (or alleged) organizations by fiat, without due process or any shred of accountability to any authority but the president of the superpower, that state can also “execute” other states at will. Under Obama, the U.S. has articulated an alternative notion of global legality that purports to replace the body of international law accrued over centuries and so elegantly codified after World War Two. “Humanitarian” military intervention is the fraudulent doctrine through which the U.S. seeks to justify its current, desperate offensive against all obstacles to its global dominance.

Where George Bush often spoke in unilateralist terms of a U.S. mission to “spread democracy” as justification for his regime-changing aggression in Iraq and elsewhere, Obama invokes the higher calling of “humanitarian intervention” as a universal, pseudo-legal principle of international conduct. It is a doctrine designed for a Final Conflict for American supremacy on the planet, a doomsday construct that conflates perceived U.S. (corporate) geopolitical interests with the destiny of humankind – unbounded imperial criminality posing as the highest bar of justice!

Since the Vietnam War era, the U.S. has traveled from being the “greatest purveyor of violence in the world today,” in Dr. Martin Luther King’s words, to an existential threat to world order, the rule of law, and the security of the Earth’s inhabitants – to civilization itself. The nation’s first Black President has taken us on the final descent into international barbarity with his drone offensive. It is a joy stick to Hell.

Glen Ford can be contacted at Glen.Ford@BlackAgendaReport.com.

April 11, 2012 Posted by | Full Spectrum Dominance, Militarism, Progressive Hypocrite, Timeless or most popular, War Crimes | , , , | Leave a comment

Nobel academy rejects Israeli demand to revoke poet’s award

Press TV – April 11, 2012

The Swedish Academy in charge of selecting laureates for the Nobel Prize in Literature has rejected a call by an Israeli writers group to revoke the award of German Nobelist Gunter Grass.

“Regarding the current debate over Gunter Grass’ poem “Was gesagt wered muss” (What must be said) I wish to point out that Mr. Grass received his Nobel Prize in 1999 on literary merit and merit alone – this applies to all recipients,” said Peter Englund, the permanent secretary of the Academy, on Tuesday.

“There is and will be no discussion in the Swedish Academy on rescinding the award,” said Englund.

The Hebrew Writers’ Association had earlier on Tuesday condemned Grass for writing a poem in which he expressed concern over the consequences of both a nuclear-armed Israel and a possible Israeli attack on Iran.

“We are struck by the shameful and immoral positions taken by Gunter Grass,” Herzl Hakak, the head of the Israeli association said, adding that they “call on writers worldwide to denounce” the opinions of the German Nobelist.

The controversial poem, which was published in the German daily Suddeutsche Zeitung last week, has also provoked the anger of both Israeli and German officials.

Germany’s Social Democrats, one of the country’s main political parties, announced that Grass was no longer welcomed at their campaign rallies.

Israeli Foreign Minister Avigdor Lieberman, meanwhile, described the poem as “shameful”, saying it was “an expression of the cynicism of some of the West’s intellectuals”.

Despite all the condemnation, Grass has stated that he has received “piles” of supportive messages for speaking out.

In the poem, the Nobelist writes “Why do I say only now … that the nuclear power Israel endangers an already fragile world peace? Because that must be said which may already be too late to say tomorrow.”

“I will be silent no longer, because I am weary of the West’s hypocrisy,” Grass adds.

Grass won the Nobel Prize in 1999. His 1958 novel, The Tin Drum, was an indictment of the German mindset in the Nazi era.

Meanwhile, the Israeli regime remains the only possessor of nuclear weapons in the Middle East and it has never allowed inspections of its nuclear facilities nor has it joined the Non-Proliferation Treaty (NPT) based on its policy of nuclear ambiguity.

According to a survey conducted in 2011 by the Berlin-based Friedrich Ebert Foundation, more than 50 percent of Europeans believe that the Tel Aviv regime is the most serious threat to global security.

April 11, 2012 Posted by | Full Spectrum Dominance, Timeless or most popular, Wars for Israel | , , , | Leave a comment