Former Obama Aide Ben Rhodes Now a Person of Interest in House Intelligence Committee Unmasking Investigation

Sara A. Carter reports: Former Obama White House National Security Adviser Ben Rhodes is now an emerging as a person of interest in the House Intelligence Committee’s unmasking investigation, according to a letter sent Tuesday by the committee to the National Security Agency (NSA). This adds Rhodes to the growing list of top Obama government officials who may have improperly unmasked Americans in communications intercepted overseas by the NSA, Circa has confirmed.

The House Intelligence Committee Chairman Devin Nunes, R-CA, sent the letter to the National Security Agency requesting the number of unmaskings made by Rhodes from Jan. 1, 2016 to Jan. 20, 2017, according to congressional sources who spoke with Circa. Rhodes, who worked closely with former National Security Adviser Susan Rice and was a former deputy national security adviser for strategic communications for President Obama, became a focus of the committee during its review of classified information to assess whether laws were broken regarding NSA intercepted communications of President Trump, members of his administration and other Americans before and after the election, according to congressional officials. The committee is requesting that the NSA deliver the information on Rhodes by August, 21.

Pablo Martinez Monsivais/AP FILE - In this Feb. 16, 2016 file photo Deputy National Security Adviser For Strategic Communications Ben Rhodes speaks in the Brady Press Briefing Room of the White House in Washington. (AP Photo/Pablo Martinez Monsivais, File)

Pablo Martinez Monsivais/AP –  In this Feb. 16, 2016 file photo Deputy National Security Adviser For Strategic Communications Ben Rhodes speaks in the Brady Press Briefing Room of the White House in Washington. (AP Photo/Pablo Martinez Monsivais, File)

Former U.S. Ambassador to the United Nations Samantha Power, Rice and former CIA Director John Brennan have all been named in the House Intelligence Committee’s investigation into the unmasking of Americans. A letter sent last week from Nunes to Dan Coats, the director of National Intelligence, suggested that top Obama aides made hundreds of unmasking requests during the 2016 presidential elections. The story, which was first reported by The Hill last week, stated that the requests were made without specific justifications as to why the unmasking was necessary. Rice and Brennan have confirmed they sought the unredacted names of Americans in NSA-sourced intelligence reports but insisted their requests were routine parts of their work and had no nefarious intentions. Power also has legal authority to unmask officials, though the practice has not reportedly been common for someone in her position. Rhodes also had legal authority to unmask Americans in NSA-source intelligence reports. But intelligence and congressional sources question the extent of the unmasking.

[Read the full story here, at circa.com]

Nunes told Coats in a letter last week that the committee has “found evidence that current and former government officials had easy access to U.S. person information and that it is possible that they used this information to achieve partisan political purposes, including the selective, anonymous leaking of such information.”

Multiple federal law enforcement and intelligence officials told Circa, that requesting an unmasking for intelligence and analytical purposes is something that is done only when the information is absolutely necessary to analyze a specific threat or for other national security purposes. An intelligence source, with direct knowledge of the type of requests made by the Obama aides, said “it’s like hell and high water to fill out and gain approval for these types of unmaskings. It’s something analysts take seriously and could entail filling out 80 pages of paperwork to prove there is a need to unmask. If top officials were unmasking without oversight it’s something everyone should be concerned about and it puts our intelligence community in a very bad place.” Read the rest of this entry »


Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

Matthew Cole, , ,  report: Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept.

The top-secret National Security Agency document, which was provided anonymously to The Intercept and independently authenticated, analyzes intelligence very recently acquired by the agency about a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure. The report, dated May 5, 2017, is the most detailed U.S. government account of Russian interference in the election that has yet come to light.

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based.  Read the rest of this entry »


The Left’s Unilateral Suicide Pact 

After the Manchester bombing, liberals once again avoid the obvious—that Islamic terror in the West is an immigration problem.

Heather Mac Donald writes: Liberal ideology conceives of “safe spaces” in the context of alleged white patriarchy, but there was a real need for a “safe space” in Britain’s Manchester Arena on May 22, when 22-year-old terrorist Salman Abedi detonated his nail- and screw-filled suicide bomb after a concert by teen idol Ariana Grande. What was the “progressive” answer to yet another instance of Islamic terrorism in the West? Feckless calls for resisting hate, pledges of renewed diversity, and little else.

A rethinking of immigration policies is off the table. Nothing that an Islamic terrorist can do will ever shake the left-wing commitment to open borders—not mass sexual assaults, not the deliberate slaughter of gays, and not, as in Manchester last week, the killing of young girls. The real threat that radical Islam poses to feminism and gay rights must be disregarded in order to transform the West by Third World immigration. Defenders of the open-borders status quo inevitably claim that if a terrorist is a second-generation immigrant, like Abedi, immigration policy has nothing to do with his attack. (Abedi’s parents emigrated to Britain from Libya; his immediate family in Manchester lived in the world’s largest Libyan enclave outside Africa itself.) Media Matters ridiculed a comment about the Manchester bombing by Fox News host Ainsley Earhardt with the following headline: FOX NEWS HOST SUGGESTS ‘OPEN BORDERS’ ARE TO BLAME FOR MANCHESTER ATTACK CARRIED OUT BY BRITISH NATIVE.

Earhardt had asked how to prevent “what’s happening in Europe, with all these open borders, they’re not vetting, they’re opening their borders to families like this, and this is how they’re paid back in return.” Pace Media Matters, a second-generation Muslim immigrant with a zeal for suicide bombing is as much of an immigration issue as a first-generation immigrant with a terrorist bent. The fact that second-generation immigrants are not assimilating into Western culture makes immigration policy more, not less, of a pressing matter. It is absurd to suggest that Abedi picked up his terrorist leanings from reading William Shakespeare and William Wordsworth, rather than from the ideology of radical Islam that has been imported into Britain by mass immigration.

The Washington Post, too, editorialized that “defenders of vulnerable immigrants and asylum seekers, who in Britain as elsewhere in the West remain the targets of populist demagogues, could take some comfort from the fact that the assault apparently did not originate with those communities.” Well, where did the assault originate from—Buckingham Palace?

Since liberals and progressives will not allow a rethinking of open borders policy, perhaps they would support improved intelligence capacity so as to detect terror attacks in the planning stages? Nope. Read the rest of this entry »


How Many Members Of The Opposition Party Did The Previous Administration Surveil?

Obama, Trump and Surveillance

 reports: Another day brings another series of tweets from President Trump that have his opponents—and even some of his allies—expressing shock and outrage. In one particularly incendiary missive this morning Mr. Trump wrote, “ James Comey better hope that there are no ‘tapes’ of our conversations before he starts leaking to the press!” It’s no surprise that Mr. Trump is once again dominating the news via Twitter, but reporters might also want to pay attention to presidential use of a much more powerful set of electronic tools.

Mr. Trump’s political skills have been repeatedly underestimated, including by your humble correspondent. But at the risk of being proven wrong again, the prediction here is that Mr. Trump will fail if he thinks he’s going to prevent the former FBI director from conducting effective media relations. This is Mr. Comey’s core competency.

On the other hand, Mr. Trump’s morning tweet has triggered more negative press for the President. The New York Times writes:

Democrats expressed shock. “For a president who baselessly accused his predecessor of illegally wiretapping him, that Mr. Trump would suggest that he, himself, may have engaged in such conduct is staggering,” said Representative Adam Schiff of California, the top Democrat on the House Intelligence Committee. “The president should immediately provide any such recordings to Congress or admit, once again, to have made a deliberately misleading — and in this case threatening — statement.”

Mr. Schiff also took to Twitter on Friday to add: “Mr. President, if there are ‘tapes’ relevant to the Comey firing, it’s because you made them and they should be provided to Congress.”

So the ranking Democrat on the House intel committee clearly seems to be concerned about the possibility that a president would record the conversations of a subordinate in the executive branch. Rep. Schiff also spent years in Congress professing to be deeply concerned about government collection of telephone metadata, which did not even include the content of any conversations. So it would clearly follow that if the executive branch were spying on the Congress and a president’s political opposition, Mr. Schiff would be horrified.

[Read the full story here, at WSJ]

Yet Mr. Schiff’s Twitter followers are still awaiting comment on yesterday’s report from a congressional colleague suggesting that’s exactly what happened. Sen. Rand Paul (R., Ky.) appeared on Fox News Thursday afternoon and said that a Senate colleague “confided to me that he was surveilled by the Obama Administration, including his phone calls.” Read the rest of this entry »


How the CIA Allegedly Turns Everyday Devices into High-Tech Spy Weapons

Some of the computer programs target the iOS software that runs Apple iPhones as well as Google’s Android operating system, which does the same for phones built by Samsung, HTC and Sony, WikiLeaks said.

The “weaponized” software also reportedly provides techniques to defeat the encryption abilities of popular apps including WhatsApp, Signal, Telegram and Wiebo, which claim to supply users with secure and private communications.

One program, known as “Weeping Angel,” can even be used to infect Samsung “smart” TVs and covertly activate their built-in microphones to record conversations and then transmit them over the internet, WikiLeaks said.

[Read the full story here, at New York Post]

The documents also reveal that the CIA as of 2014 was “looking at infecting the vehicle control systems used by modern cars and trucks,” WikiLeaks said.

“The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations,” WikiLeaks suggested.

Although it posted online nearly 9,000 documents and files related to the Orwellian tools — a cache it called “Year Zero — WikiLeaks said it had decided to hold off on releasing the actual software.

“WikiLeaks has carefully reviewed the ‘Year Zero’ disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should be analyzed, disarmed and published,” the hack clearinghouse said in a press release.

There is nothing in the WikiLeaks documents to suggest that the CIA — which is charged with obtaining foreign intelligence for national security purposes — uses any of these devices to spy on American citizens.

The CIA refused to confirm or deny the authenticity of the WikiLeaks information, and White House press secretary Sean Spicer wouldn’t comment, saying it “has not been fully evaluated.”

A retired CIA operative told The Post that the WikiLeaks disclosure could cripple the agency’s high-tech surveillance capabilities.

“This essentially gives our enemies a playbook on how we go about our clandestine cyber-operations,” the former agent said.

“This will be bad for the agency. They will have to re-examine its procedures for doing this type of work.”

Cybersecurity experts said the material appeared genuine.

Jake Williams of Rendition InfoSec, who has experience dealing with government hackers, noted the files’ repeated references to operation security.

“I can’t fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.” Read the rest of this entry »


The Wikileaks CIA Stash May Prove Interesting, But Not Necessarily for the Hacks 

The software tools revealed by the leak are sinister, unsurprising—and potentially politically explosive.

Jamie Condliffe writes: Wikileaks has released a huge number of files that it claims to be the “largest ever publication of confidential documents” from the U.S. Central Intelligence Agency. It includes details of a number of hacking tools, though at first blush they don’t appear to be as incendiary as their potential political ramifications.

“To be sure, such hacks are sinister. But if we learned anything from Snowden’s disclosure of National Security Agency surveillance programs in 2013, it’s that government agencies feel it necessary to hack any technology the public chooses to use.”

The controversial organization published the first tranche of what it says will become a vast collection called Vault 7 on the morning of March 7. The first wave, called Year Zero, contains 8,761 documents and files from between 2013 and 2016.

At this point in time it’s impossible to have scoured the entire database. But Wikileaks claims that it contains descriptions of tools from the CIA’s hacking program. They are said to include malware that can turn Samsung TVs into covert listening posts, tools to remotely control vehicles, and a number of means to render encrypted messaging apps like WhatsApp and Signal redundant.

[Read the full story here, at MIT Technology Review]

None of these approaches are particularly earth-shattering. Samsung had already admitted that its smart TVs could effectively spy on you. Security consultants showed that they could remotely control a Jeep Cherokee two years ago.

“None of these approaches are particularly earth-shattering. Samsung had already admitted that its smart TVs could effectively spy on you.”

And as Edward Snowden points out, the files don’t reveal a problem with encrypted messaging services themselves, though they do reveal that the CIA has a number of targeted exploits that allow them to gain partial remote access to iOS and Android. Read the rest of this entry »


[VIDEO] Krauthammer: Latest WikiLeaks Breach ‘Worse Than Snowden’ 

Charles Krauthammer described the latest leaks at the CIA as more damaging than even those of Edward Snowden, and he casts blame on the vetting procedure for contractors.


[VIDEO] Tucker Carlson’s Bizarre Interview with Demand Protest

“This is a sham, your company isn’t real, your website is fake, the claims you have made are lies, this is a hoax.” Carlson said. “Let me start at the beginning, however, with your name, Dom Tullipso, which is not your real name.

[Also see –  Tucker Carlson versus the fake “Demand Protest” guy – HotAir]

It’s a fake name, we ran you through law enforcement-level background checks and that name does not exist. So let’s start out with the truth. Tell me what your real name is.”

While “Dom” never conceded that anything about Demand Protest was a hoax, he admitted that the group had a change of heart and will be protesting the anti-Trump protesters.

Wait, what?!

“We are greatly, greatly supportive of national treasures such as Julian Assange, Edward Snowden, and Peyton Manning,” Tullipso told Carlson. Read the rest of this entry »


Edward Jay Epstein: The Fable of Edward Snowden

snowden

As he seeks a pardon, the NSA thief has told multiple lies about what he stole and his dealings with Russian intelligence.

Edward Jay Epstein writes: Of all the lies that Edward Snowden has told since his massive theft of secrets from the National Security Agency and his journey to Russia via Hong Kong in 2013, none is more provocative than the claim that he never intended to engage in espionage, and was only a “whistleblower” seeking to expose the overreach of NSA’s Mini-Snowden-Meinformation gathering. With the clock ticking on Mr. Snowden’s chance of a pardon, now is a good time to review what we have learned about his real mission.

Mr. Snowden’s theft of America’s most closely guarded communication secrets occurred in May 2013, according to the criminal complaint filed against him by federal prosecutors the following month. At the time Mr. Snowden was a 29-year-old technologist working as an analyst-in-training for the consulting firm of Booz AllenHamilton at the regional base of the National Security Agency (NSA) in Oahu, Hawaii. On May 20, only some six weeks after his job there began, he failed to show up for work, emailing his supervisor that he was at the hospital being tested for epilepsy.

This excuse was untrue. Mr. Snowden was not even in Hawaii. He was in Hong Kong. He had flown there with a cache of secret data that he had stolen from the NSA.

This was not the only lie Mr. Snowden told. As became clear during my investigation over the past three years, nearly every element of the narrative Mr. Snowden has provided, which reached its final iteration in Oliver Stone’s 2016 movie, “Snowden,” is demonstrably false.

This narrative began soon after Mr. Snowden arrived in Hong Kong, where he arranged to meet with Laura Poitras, a Berlin-based documentary filmmaker, and Glenn Greenwald, a Brazil-based blogger for the Guardian. Both journalists unknownwere longtime critics of NSA surveillance with whom Mr. Snowden (under the alias Citizen Four) had been in contact for four months.

[Order Edward Jay Epstein’s book “How America Lost Its Secrets: Edward Snowden, the Man and the Theft” from Amazon.com]

To provide them with scoops discrediting NSA operations, Mr. Snowden culled several thousand documents out of his huge cache of stolen material, including two explosive documents he asked them to use in their initial stories. One was the now-famous secret order from America’s Foreign Intelligence Surveillance Act court requiring Verizon to turn over to the NSA its billing records for its phone users in the U.S. The other was an NSA slide presentation detailing its ability to intercept communications of non-American users of the internet via a joint program with the FBI code-named Prism.

These documents were published in 2013 on June 5 and 6, followed by a video in which he identified himself as the leaker and a whistleblower.

At the heart of Mr. Snowden’s narrative was his claim that while he may have incidentally “touched” other data in his search of NSA files, he took only documents that exposed the malfeasance of the NSA and gave all of them to journalists.

Yet even as Mr. Snowden’s narrative was taking hold in the public realm, a secret damage assessment done by the NSA and Pentagon told a very different story. According to a unanimous report declassified on Dec. 22 by the House Permanent Select Committee on Intelligence, the investigation showed that Mr. Snowden had “removed” (not merely touched) 1.5 million documents. That huge number was based on, among other evidence, electronic logs that recorded the selection, copying and moving of documents.

[Read the full story here, at WSJ]

The number of purloined documents is more than what NSA officials were willing to say in 2013 about the removal of data, possibly because the House committee had the benefit of the Pentagon’s more-extensive investigation. But even just taking into account the material that Mr. Snowden handed over to journalists, the December House report concluded that he compromised “secrets that protect American troops overseas and secrets that provide vital defenses against terrorists and nation-states.” These were, the report said, “merely the tip of the iceberg.”

The Pentagon’s investigation during 2013 and 2014 employed hundreds of military-intelligence officers, working around the clock, to review all 1.5 million documents. Most had nothing to do with domestic surveillance or whistle blowing. They were mainly military secrets, as Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, testified before the House Armed Services Committee on March 6, 2014. Read the rest of this entry »


House Intelligence Committee Report: Edward Snowden in Contact with Russian Agents 

snowden-screen

The criminal government leaker with the hero complex is now living in Moscow under a 2013 asylum deal granted after Snowden gave the media troves of classified documents that revealed the extent of the U.S. surveillance state.

Eric Geller reports: Former NSA contractor Edward Snowden has been in contact with Russian intelligence agents since he stole troves of classified documents, a House committee alleged on Thursday.

“If the Russian or Chinese governments have access to this information, American troops will be at greater risk in any future conflict.”

— Committee reportMini-Snowden-Me

“Since Snowden’s arrival in Moscow, he has had, and continues to have, contact with Russian intelligence services,” the House Intelligence Committee said in a report on the Snowden leaks released Thursday.

“Most of the material he stole had nothing to do with Americans’ privacy. Its compromise has been of great value to America’s adversaries and those who mean to do America harm.”

— House Intelligence ranking member Adam Schiff

The declassified report, which is heavily redacted, did not offer proof of its serious accusation. It follows the committee’s release in September of an executive summary of the then-classified document.

House Intelligence Chairman Devin Nunes (R-Calif.) said in a statement that the report offers “a fuller account of Edward Snowden’s crimes and the reckless disregard he has shown for U.S. national security, including the safety of American servicemen and women.”

The document casts Snowden as a dishonest miscreant and attempts to refute the portrayal of him as a duty-minded whistleblower.

[Read the full story here, at POLITICO]

The House panel’s report says there is “no evidence that Snowden took any official effort to express concerns about U.S. intelligence activities … to any oversight officials within the U.S. government, despite numerous avenues for him to do so.”

Snowden and his defenders claim that he feared reprisal and have pointed to numerous instances of the intelligence community retaliating against employees who complain about secret programs. Read the rest of this entry »


Snowden’s ‘Proper Channel’ For Whistleblowing Being Booted From The NSA For Retaliating Against A Whistleblower

"THE  SPOOK SHACK" NSA headquarters. Photo: Wikimedia Commons

Tim Cushing reports: NSA oversight and whistleblowing through proper channels: both pretty much worthless.

Members of the intelligence community and members of its supposed oversight have said the same thing repeatedly over the past few years: oh, we’d love to cut Edward Snowden a break, but he should have taken his complaints up the ladder, rather than outside the country.

As if that would have resulted in anything other than Snowden being cut loose from his job and his security clearance stripped. The NSA’s Inspector General — supposedly part of the agency’s oversight — was even more harsh in his assessment of Snowden’s actions.

Report: Snowden impersonated NSA officials to access some files

During a day-long conference at the Georgetown University Law Center, Dr. George Ellard, the inspector general for the National Security Agency, spoke for the first time about the disclosures made by former NSA contractor Edward Snowden.

In addressing the alleged damage caused by Snowden’s disclosures he compared Snowden to Robert Hanssen, a former FBI agent and convicted spy who sold secrets to the Russians.

[…]

“Snowden, in contrast, was manic in his thievery, which was exponentially larger than Hanssen’s. Hanssen’s theft was in a sense finite whereas Snowden is open-ended, as his agents decide daily which documents to disclose. Snowden had no background in intelligence and is likely unaware of the significance of the documents he stole,” Ellard suggested.

These are the words of the “proper channel.” Ellard went on to state that had Snowden approached him with his concerns he would have pointed to the series of judicial rubber stamps that backed up the government’s post-9/11 national security assertions as they approved more and more bulk surveillance.

Francisco Seco/AP - In this October 2013 file photo, a man looks at his cellphone as he walks on the street in downtown Madrid. The NSA’s ability to crack cellphone encryption used by the majority of cellphones in the world offers it wide-ranging powers to listen in on private conversations.

[Read the full story here, at Techdirt]

That Inspector General — the official channels, the oversight — is now (mostly) on his way out of the agency for actions undertaken in direct conflict with his position, as reported by the Project for Government Oversight.

[L]ast May, after eight months of inquiry and deliberation, a high-level Intelligence Community panel found that Ellard himself had previously retaliated against an NSA whistleblower, sources tell the Project On Government Oversight. Informed of that finding, NSA’s Director, Admiral Michael Rogers, promptly issued Ellard a notice of proposed termination, although Ellard apparently remains an agency employee while on administrative leave, pending a possible response to his appeal from Secretary of Defense Ash Carter. Read the rest of this entry »


REWIND: ‘Maybe it was a Bad Idea to Concentrate So Much Power in the Oval Office in the First Place’

Getty Images

If the next president can turn out to be a tyrant, then ‘tyrant-proofing the presidency’ is our most pressing political task.

Gene Healy writes: The prospect of Donald Trump as president is only slightly less ridiculous than the idea of Charlie Sheen with nukes—and possibly more frightening. And yet, it looks as though the verbally incontinent celebreality billionaire has a one in three chance of being elected come Tuesday.

gwbush

Terrifying, yes, but fear can be useful. In this case, it ought to concentrate the mind wonderfully: if someone so manifestly unfit, so transparently likely to abuse power, can come within striking distance of the presidency, then maybe it was a bad idea to concentrate so much power in the Oval Office in the first place.

White-House-w-Fence

“A broad majority of Americans—far more than will end up voting for Trump—distrust Hillary Clinton, the second most reviled candidate in the history of polling. Are they wrong to worry about her having the power to ‘unilaterally change this country to its core’? Should anyone have that kind of power?”

It’s no secret that the “most powerful office in the world” grew even more powerful in the Bush-Obama years. Both presidents stretched the 2001 Authorization for the Use of Military Force into a wholesale delegation of congressional war powers broad enough to underwrite open-ended, globe-spanning war. Bush began—and Obama continued—the host of secret dragnet surveillance programs revealed by Edward Snowden—and others we’re still largely the dark about. And lately, on the home front, Obama has used the power of the pen to rewrite broad swathes of American law and spend billions of dollars Congress never appropriated.

nyt

America’s center-left papers of record have lately begun to notice that the vast powers recent presidents have forged would be available to Trump as well. The New York Times’s Carl Hulse writes that Obama’s assertion of a presidential power of the purse could have ”huge consequences for our constitutional democracy…. How would lawmakers react if a willful new chief executive, unable to win money from Congress for a wall on the Mexican border, simply shifted $7 billion from another account and built it anyway?”

[Read the full story here, at Cato @ Liberty]

And a month ago, the Washington Post kicked off a series of half a dozen editorials warning what would befall the republic should Trump ascend to Real Ultimate Power: “A President Trump could, unilaterally, change this country to its core,” the Post’s editorialists argued, and the other branches won’t be able to stop him: “in the U.S. System, the scope for executive action is, as we will lay out in a series of editorials next week, astonishingly broad.”

110628_washington_post_ap_605-e1314912828580

It was nice to see the Post editorial board, which had called Obama’s recess-appointments gambit “a justifiable power grab,” evince some concern about potential abuses of executive power. Through five more editorials, they’d go on to observe that a President Trump could, among other abuses: “launch wars”; “take the oil”; “assassinate foreigners who opposed him”; issue a secret legal opinion overturning the torture ban; “launch surveillance programs targeting foreigners without informing Congress”; pull out of NAFTA, start a trade war, and “destroy the world economy.” An imposing parade of horribles, all leading up to the limpest of takeaways: “the nation should not subject itself to such a risk.” In other words, don’t vote for Trump. OK, then: Problem solved?

I don’t disagree with the Post’s argument that Trump represents a unique threat to what remains of constitutional government. Read the rest of this entry »


Information Warfare: Communist Takeover of U.S. Entertainment Industry

wang-jianlin

Among the Committee on Foreign Investment in the United States’ duties is to determine the national security impact that the foreign takeover of an American industry could have on the U.S. Congress has expressed concern and has asked its investigative arm, the Government Accountability Office, to probe the national security issues associated with the Chinese acquisitions of American entertainment companies.

A one-time commander in China’s Communist Red Army has launched information warfare with an aggressive plan to invest billions in all six major Hollywood studios, a show business trade publication reports, describing the foreign deal as an unprecedented push into the U.S. entertainment sector. The former People’s Liberation Army (PLA) regimental commander, Wang Jianlin, is China’s richest man and he’s aggressively pursuing a big chunk of one of the world’s most influential industries.

la-apphoto-china-billionaires-jpg-20130923

“The former People’s Liberation Army regimental commander, Wang Jianlin, is China’s richest man and he’s aggressively pursuing a big chunk of one of the world’s most influential industries.”

A few years ago, Wang doled out $2.6 billion to buy the nation’s largest theater chain, AMC Entertainment, and now he’s taking it a huge step further with the studio deals that will have a huge impact on production. Chinese money has been shaping the movie industry for years, mainstream news reports have revealed, and one major newspaper reported earlier this year that China is expected to become the world’s biggest box office by the end of 2017.

“This may cause Americans to wonder what the U.S. government is doing to counter the information warfare. Specifically, a division of the U.S. Treasury, the Committee on Foreign Investment in the United States, is responsible for reviewing transactions that could result in control of a U.S. business by foreigners.”

“This has changed how Hollywood behaves in big ways—like the flood of money coming in to co-finance blockbusters, or sequels that get the green light simply because they performed well in China,” the article states.

[Read the full text here, at Judicial Watch]

An industry expert cited in the article says that very few foreign companies have ever successfully cracked the Hollywood code in a big way, but Chinese buyers are getting closer to that goal.

“Wang doled out $2.6 billion to buy the nation’s largest theater chain, AMC Entertainment, and now he’s taking it a huge step further with the studio deals that will have a huge impact on production.”

This may cause Americans to wonder what the U.S. government is doing to counter the information warfare. Specifically, a division of the U.S. Treasury, the Committee on Foreign Investment in the United States (CFIUS), is responsible for reviewing transactions that could result in control of a U.S. business by foreigners.

“This has changed how Hollywood behaves in big ways—like the flood of money coming in to co-finance blockbusters, or sequels that get the green light simply because they performed well in China.”

Judicial Watch is investigating what this agency is doing to scrutinize the Chinese Communist takeover and is drafting public records requests for the CFIUS and other pertinent agencies.

[Read the full text here, at Judicial Watch]

After all, among the CFIUS’s duties is to determine the national security impact that the foreign takeover of an American industry could have on the U.S. Congress has expressed concern and has asked its investigative arm, the Government Accountability Office (GAO), to probe the national security issues associated with the Chinese acquisitions of American entertainment companies.

“The center of gravity is shifting so rapidly from Hollywood to China,” says Rob Cain, a consultant who runs Chinafilmbiz.com. “And it’s not just that the audience is going to come from China; so is the capital.”

“Judicial Watch is investigating what this agency is doing to scrutinize the Chinese Communist takeover and is drafting public records requests for the CFIUS and other pertinent agencies.”

These disturbing revelations come on the heels of an equally alarming Hollywood story Judicial Watch reported illustrating the Obama administration’s hands off policy when it comes to illegal activities in the powerful entertainment industry. It involves a big-screen movie about traitor Edward Snowden, who has been criminally charged by the U.S. government under the Espionage Act. Read the rest of this entry »


NSA ‘Shadow Brokers’ Hack Shows SpyWar with Kremlin Is Turning Hot 

Russ-Hack

Western intelligence bosses recently have become open about stating what they’ve known for years, that Snowden is a Kremlin pawn designed to inflict pain on Russia’s adversaries in the SpyWar.

 writes: The National Security Agency can’t catch a break. Over three years ago, Edward Snowden, an IT contractor for the agency, defected to Moscow with more than a million classified documents. Since then, Snowden’s vast trove has been used to embarrass NSA about the extent of its global espionage reach.

“Significant questions loom over this new scandal.  In the first place, what really is The Shadow Brokers? They appear to be a transparent front for Russian intelligence. Indeed, they’re not really hiding that fact, given the broken English they used in their online auction notice asking for bitcoin in exchange for NSA information.” 

I’ve been warning from Day One that the Snowden Operation was a Russian propaganda ploy aimed at inflicting pain on NSA, America’s most important spy agency, and its global alliance of espionage partnerships that’s been the backbone of the powerful Western intelligence system since it helped defeat the Nazis and Japan in World War II.

“From his Russian exile, even Snowden admitted on Twitter that this was pretty obviously a Kremlin spy game.”

Western intelligence bosses recently have become open about stating what they’ve known for years, that Snowden is a Kremlin pawn designed to inflict pain on Russia’s adversaries in the SpyWar. There’s no doubt that’s the case, especially since the Kremlin now has admitted that Snowden is their agent.

putin-computer

For more than three years NSA has been subjected to an unprecedented stream of leaks about myriad Top Secret intelligence programs. Although Snowden claimed his motivation was to protect the civil liberties of fellow Americans by exposing secrets, it’s impossible to miss that well over 95 percent of the programs he’s compromised are purely involved with foreign intelligence. The impact of all this on agency morale has been devastating and NSA is in a state of crisis thanks to Snowden.

[Read the full story here, at the Observer]

This week things took a marked turn for the worse, however, with the exposure of highly sensitive NSA hacking tools on the Internet by a murky group calling itself “The Shadow Brokers” which announced it planned to sell programs purloined from the agency. Like clockwork, NSA’s public website crashed and stayed down for almost a full day. Although there’s no indication this was linked to The Shadow Brokers, the optics for NSA were terrible.

hillary-computer

First, some explanation is needed of what’s been compromised. The crown jewel here is a 300-megabyte file containing “exploits”—that is, specialized sophisticated cyber tools designed to burrow through firewalls to steal data. What The Shadow Brokers has, which it claims it stole from an alleged NSA front organization termed the Equation Group, appears to be legitimate.

Here we are, three years after Snowden, dealing with the consequences of allowing Russian moles to run amok inside NSA.

These exploits—or at least some of them—appear to come from NSA’s elite office of Tailored Access Operations, which is the agency’s hacking group. Arguably the world’s most proficient cyber-warriors, the shadowy TAO excels at gaining access to the computer systems of foreign adversaries. TAO veterans have confirmed that, from what they’ve seen of what The Shadow Brokers has revealed, they’re bona fide NSA exploits.

This represents a security disaster for an agency that really didn’t need another one. How this happened, given the enormous security that’s placed on all NSA Top Secret computer systems, raises troubling questions about what’s going on, since the agency instituted much more strenuous online security after Snowden’s defection, which revealed how slipshod NSA counterintelligence really was.

However, significant questions loom over this new scandal.  In the first place, what really is The Shadow Brokers? They appear to be a transparent front for Russian intelligence. Indeed, they’re not really hiding that fact, given the broken English they used in their online auction notice asking for bitcoin in exchange for NSA information. From his Russian exile, even Snowden admitted on Twitter that this was pretty obviously a Kremlin spy game.

hacker-hacking-ddos-keyboard

Pro-Russian sources have pointed to the Equation Group as an NSA front for more than a year. In early 2015, Kaspersky Labs, one of the world’s leading cybersecurity firms, announced the discovery of the Equation Group and fingers were quickly pointed at NSA as being the culprit behind those hackers. It should be noted that Kaspersky Labs has a very cozy relationship with the Kremlin and is viewed by most espionage experts in the West as an extended arm of Russian intelligence. The firm’s founder, Eugene Kaspersky, was trained in codes and ciphers by the KGB in the waning days of the Soviet Union, even meeting his first wife at a KGB resort. Read the rest of this entry »


Japanese Supreme Court Upholds Special Surveillance to Keep Tabs on Muslims

oyytlf2pw9evbivawmdc

Japan has actually done remarkably well in averting terror attacks and has never been the victim of lethal jihadist violence. Some have praised Japan’s effectiveness in forestalling Islamic violence, proposing it as a model for other nations.

The Japanese Supreme Court has affirmed the practice of extensive surveillance of Muslims, rejecting an appeal by 17 plaintiffs who challenged the policy on the grounds that it violated Muslims’ constitutional rights to privacy, equal treatment, and religious freedom.

 “The most interesting thing in Japan’s approach to Islam is the fact that the Japanese do not feel the need to apologize to Muslims for the negative way in which they relate to Islam.”

In 2010, over a hundred Japanese police files were leaked to the public, which revealed widespread monitoring of Muslims across Japan. The files reportedly showed that the Japanese government was keeping tabs on some 72,000 Japanese residents who hailed from member countries of the Organization of Islamic Cooperation.

Tokyo police had also been monitoring places of worship, halal restaurants, and “Islam-related” organizations, according to the documents.

Japan-Muslims-640x480

“Along with surveillance, Japanese authorities also apply tight immigration standards. Muslims seeking a working visa or immigration permit, for instance, are subject to detailed scrutiny, which is credited with preventing the sort of terrorist activity that has plagued Europe. “

Soon after, 17 plaintiffs filed a lawsuit saying that their privacy had been violated, and challenging the extensive monitoring of followers of Islam in Japan.

[Read the full story here, at Breitbart]

After two appeals, the case made it to Japan’s Supreme Court, which on May 31 concurred with a lower court that awarded the plaintiffs a total of ¥90 million ($880,000) in compensation because the leak violated their privacy.

Nonetheless, the high court dismissed the more general charges of police profiling and invasive surveillance practices, which a lower court had upheld as “necessary and inevitable” to guard against the threat of Islamic terrorism. Read the rest of this entry »


‘Chilling Effect’ of Mass Surveillance Is Silencing Dissent Online, Study Says 

censord

A new study shows people may be censoring themselves without realizing it.

Nafeez Ahmed reports: Thanks largely to whistleblower Edward Snowden’s revelations in 2013, most Americans now realize that the intelligence community monitors and archives all sorts of online behaviors of both foreign nationals and US citizens.

But did you know that the very fact that you know this could have subliminally censored-hand-overstopped you from speaking out online on issues you care about?

“What this research shows is that in the presence of surveillance, our country’s most vulnerable voices are unwilling to express their beliefs online.”

Now research suggests that widespread awareness of such mass surveillance could undermine democracy by making citizens fearful of voicing dissenting opinions in public.

paper published last week in Journalism and Mass Communication Quarterly, the flagship peer-reviewed journal of the Association for Education in Journalism and Mass Communication (AEJMC), found that “the government’s online surveillance programs may threaten the disclosure of minority views and contribute to the reinforcement of majority opinion.”

The NSA’s “ability to surreptitiously monitor the online activities of US citizens may make online opinion climates especially chilly” and “can contribute to the silencing of minority views that provide the bedrock of democratic discourse,” the researcher found.

sen-leland-yee-censored

The paper is based on responses to an online questionnaire from a random sample of 255 people, selected to mimic basic demographic distributions across the US population.

[Read the full story here, at Motherboard]

Participants were asked to answer questions relating to media use, political attitudes, and personality traits. Different subsets of the sample were exposed to different messaging on US government surveillance to test their responses to the same fictional Facebook post about the US decision to continue airstrikes against the Islamic State of Iraq and Syria (ISIS).

They were then asked about their willingness to express their opinions about this publicly—including how they would respond on Facebook to the post; how strongly they personally supported or opposed continued airstrikes; their perceptions of the views of other Americans; and whether they supported or opposed online surveillance. Read the rest of this entry »


BLUNT FORCE: Medical Report Reveals Putin Spokesman Mikhail Lesin’s Head Bashed In

putin-spox

‘It was just a little tap on the head, nothing serious’. 

A former spokesman for Russian President Vladimir Putin who co-founded the Kremlin-backed news outlet RT died in a Washington hotel room of blunt force trauma to the head in November, according the office of D.C.’s medical examiner.

The Thursday revelation runs counter to previous reports that Mikhail Lesin‘s November death was due to a heart attack, reigniting accusations that foul play may have been involved.

[Also see – Palace Intrigue: Putin’s Aide Mikhail Lesin Found Dead]

A joint statement from the Washington Office of the Chief Medical Examiner and the Metropolitan Police Department claimed that Lesin, 59, also suffered “blunt force injuries of the neck, torso, upper extremities and lower extremities,” which contributed to his death. Read the rest of this entry »


Reality Check: Americans Say Big Government Is The Biggest Threat To America’s Future 

Obama Big brother

Fear of Terrorism? Nope. A New Survey Phows 69 percent of Americans Listed “Big Government” as the Biggest Threat the Future of the United States.

According to a Gallup poll released Tuesday, 88 percent of Republicans listed the issue followed by 67 percent of independents and 53 percent of Democrats.

Gallup poll.

The number is slightly lower than the 2013 results, the last time the question was posed, which stood at 72 percent, but the polling company said the numbers were significantly lower before 1990.

bigbroposters

“The large increase in the percentage naming big government as the biggest threat in 2013 may have resulted from the rollout of the Affordable Care Act and Edward Snowden’s revelations about government monitoring of communications.” the poll said in its findings. Read the rest of this entry »


Betsy McCaughey: Hillary’s Blindness to Muslim Extremists is Dangerous

U.S. Democratic presidential candidate Hillary Clinton answers a question during a town hall event at Old Brick Church and Community Center in Iowa City, Iowa, December 16, 2015. REUTERS/Mark Kauzlarich

Betsy McCaughey writes: Hillary Clinton chose Minneapolis — with its growing enclave of fundamentalist Muslim refugees — to announce her plan to combat terrorism on Tuesday. That’s like choosing Baskin-Robbins to announce your weight-loss plans.

Clinton offered little more than platitudes like: “We have to do more to address the challenge of radicalization.” Meanwhile, that challenge was right under her nose.

“Clinton saved her scorn for Americans, saying they should be ashamed for demonizing Muslims here. She called for ’empowering Muslim-American communities.’ But which Muslim-Americans is she talking about? Some Muslims are our friends, but others want to kill us. That’s true here — and worldwide.”

The city’s huge Somali refugee population makes it a symbol of the problem, not the solution. Some 30,000 have been placed there by the federal government. Many of them say they would rather live under Islamic religious law — Sharia — than American law, and resist adapting to American ways. Their ideology makes them ripe for jihadization.

Democratic presidential candidates Hillary Rodham Clinton, Bernie Sanders and Martin O'Malley take the stage during a Democratic presidential primary debate, Saturday, Nov. 14, 2015, in Des Moines, Iowa. (AP Photo/Nati Harnik)

Democratic presidential candidates Hillary Rodham Clinton, Bernie Sanders and Martin O’Malley take the stage during a Democratic presidential primary debate, Saturday, Nov. 14, 2015, in Des Moines, Iowa. (AP Photo/Nati Harnik)

“Moderate Muslims here are not a problem. But fundamentalist Muslims pose a high risk. Hillary cheerfully overlooked this distinction.”

Indeed, dozens of young men from this Muslim enclave have left to fight with radical Islamists in Somalia and Syria. “We have a terror recruiting problem in Minnesota,” reports Andy Luger, a federal prosecutor there.

The key to Hillary’s anti-terrorism plan is the empty hope that Muslims in America will self-police. “They are the best positioned to block anything going forward.” Don’t count on it. As the ongoing San Bernardino shooting investigation shows, even Muslims who aren’t stockpiling AK-47s can’t be counted on to report what their family members or acquaintances are doing.

[Read the full story here, at New York Post]

Clinton saved her scorn for Americans, saying they should be ashamed for demonizing Muslims here. She called for “empowering Muslim-American communities.” But which Muslim-Americans is she talking about? Some Muslims are our friends, but others want to kill us. That’s true here — and worldwide.

3-brooklyn-Q13

“A Pew Research report tells us where the danger spots are. A shocking 99 percent of Afghanistan’s Muslims, 91 percent of Iraqi Muslims and 84 percent of Pakistani Muslims identify themselves as fundamentalists who favor Sharia law.”

Clinton took aim at Donald Trump’s proposal to suspend all Muslims from coming to the United States. But Trump’s idea is not as dangerous as Hillary’s insistence that anti-Muslim rhetoric is what incites Muslims to terrorism. That’s delusional.

muslims

“Equally jaw-dropping, 39 percent of Afghanistan’s Muslims say they consider violent acts such as suicide bombings always or sometimes justified ‘in defense of Islam.'”

Moderate Muslims here are not a problem. But fundamentalist Muslims pose a high risk. Hillary cheerfully overlooked this distinction. Read the rest of this entry »


[VIDEO] Hillary Clinton’s Big Lie About Edward Snowden & Whistleblowers

What was Hillary Clinton’s biggest lie during the first Democratic debate?

That NSA whistleblower Edward Snowden could have gone through official channels.

“He broke the laws,” said Clinton. “He could have been a whistleblower, he could have gotten all the protections of being a whistleblower.”

Snowden’s lawyer, Jesselyn Radack of ExposeFacts.org, begs to differ. “For the people out there shouting that Edward Snowden should have gone through proper channels,” she tells Reason TV, “there are not that many channels for national security and intelligence whistleblowers. They are excluded from most avenues available to other whistleblowers.”

More important is the experience of NSA and intelligence whistleblowers who came before Snowden.
“Tom Drake, Bill Binney, Kirk Wiebe, and Ed Loomis DID go through the proper channels,” says Radack. “ALL of them fell under criminal investigations for having done so.” Read the rest of this entry »


Ed Snowden Signed Up for Twitter, Follows One Account: the NSA

gettyimages-478162314crop

Edward Snowden, the world’s most famous whistleblower, has joined Twitter, announcing his presence on the social media platform with a reference to a once ubiquitous Verizon Wireless advertising campaign. In the aftermath of his disclosures, it’s a not so subtle dig at American intelligence collection.

Can you hear me now?

— Edward Snowden (@Snowden) September 29, 2015

After providing a group of journalists with a trove of classified NSA documents in 2013, Snowden initially tried to stay out of the public eye, maintaining a fairly low profile in Moscow. He granted hardly any interviews and kept himself out of the news in an apparent effort to keep public attention focused on the substance of his disclosures.

But in the last year or so, Snowden has taken on a more public profile, appearing frequently at conferences and granting occasional interviews….(read more)

Source: Foreign Policy


The End of the Internet Dream?

internet-dream-blackhat

In 20 years, the Web might complete its shift from liberator to oppressor. It’s up to us to prevent that.

Earlier this month Jennifer Granick was the keynote speaker at Black Hat 2015. This is a modified version of the speech she delivered. A video of the speech is also available.

Jennifer Stisa Granick1*1a9jKrvPw4_bJRN-nafmWw writes: Twenty years ago I attended my first Def Con. I believed in a free, open, reliable, interoperable Internet: a place where anyone can say anything, and anyone who wants to hear it can listen and respond. I believed in the Hacker Ethic: that information should be freely accessible and that computer technology was going to make the world a better place. I wanted to be a part of making these dreams — the Dream of Internet Freedom — come true. As an attorney, I wanted to protect hackers and coders from the predations of law so that they could do this important work. Many of the people in this room have spent their lives doing that work.

“What does it mean for companies to know everything about us, and for computer algorithms to make life and death decisions? Should we worry more about another terrorist attack in New York, or the ability of journalists and human rights workers around the world to keep working? How much free speech does a free society really need?”

For better or for worse, we’ve prioritized things like security, online civility, user interface, and intellectual property interests above freedom and openness. The Internet is less open and more centralized. It’s more regulated. And increasingly it’s less global, and more divided. These trends: centralization, regulation, and globalization are accelerating. And they will define the future of our communications network, unless something dramatic changes.

Twenty years from now,

• You won’t necessarily know anything about the decisions that affect your rights, like whether you get a loan, a job, or if a car runs over you. Things will get decided by data-crunching computer algorithms and no human will really be able to understand why.

• The Internet will become a lot more like TV and a lot less like the global conversation we envisioned 20 years ago.

• Rather than being overturned, existing power structures will be reinforced and replicated, and this will be particularly true for security.

•Internet technology design increasingly facilitates rather than defeats censorship and control.

It doesn’t have to be this way. But to change course, we need to ask some hard questions and make some difficult decisions.

medium-internet

What does it mean for companies to know everything about us, and for computer algorithms to make life and death decisions? Should we worry more about another terrorist attack in New York, or the ability of journalists and human rights workers around the world to keep working? How much free speech does a free society really need?

[Read the full text here, at Medium]

How can we stop being afraid and start being sensible about risk? Technology has evolved into a Golden Age for Surveillance. Can technology now establish a balance of power between governments and the governed that would guard against social and political oppression? Given that decisions by private companies define individual rights and security, how can we act on that understanding in a way that protects the public interest and doesn’t squelch innovation? Whose responsibility is digital security? What is the future of the Dream of Internet Freedom?

internet-freedom-medium

For me, the Dream of Internet Freedom started in 1984 with Steven Levy’s book “Hackers, Heroes of the Computer Revolution.” Levy told the story of old school coders and engineers who believed that all information should be freely accessible. They imagined that computers would empower people to make our own decisions about what was right and wrong. Empowering people depended on the design principle of decentralization. Decentralization was built into the very DNA of the early Internet, smart endpoints, but dumb pipes, that would carry whatever brilliant glories the human mind and heart could create to whomever wanted to listen. Read the rest of this entry »


Better Informed Than Congress: China’s Cyber Spies Reading Emails of Senior Obama Administration Officials Since 2010

President Barack Obama reflects during a meeting with his full Cabinet in the Cabinet Room of the White House, Sept. 10, 2009. (Official White House Photo by Pete Souza)

The email grab — first codenamed ‘Dancing Panda’ by U.S. officials, and then ‘Legion Amethyst’ — was detected in April 2010, according to a top secret NSA briefing from 2014. The intrusion into personal emails was still active at the time of the briefing and, according to the senior official, is still going on. 

Robert Windrem reports: China’s cyber spies have accessed the private emails of “many” top Obama administration officials, according to a senior U.S. intelligence official and a top secret document obtained by NBC News, and have been doing so since at least April 2010.

chinese hackers

The email grab — first codenamed “Dancing Panda” by U.S. officials, and then “Legion Amethyst” — was detected in April 2010, according to a top secret NSA briefing from 2014. The intrusion into personal emails was still active at the time of the briefing and, according to the senior official, is still going on.

In 2011, Google disclosed that the private gmail accounts of some U.S. officials had been compromised, but the briefing shows that private email accounts from other providers were compromised as well.

An NSA slide shows the organization of the Chinese government’s hacking units, with separate operations run by the Chinese military and by state security. NBC News

An NSA slide shows the organization of the Chinese government’s hacking units, with separate operations run by the Chinese military and by state security. NBC News

The government email accounts assigned to the officials, however, were not hacked because they are more secure, says the senior U.S. intelligence official.

The senior official says the private emails of “all top national security and trade officials” were targeted.

[Read the full text here, at NBC News]

The Chinese also harvested the email address books of targeted officials, according to the document, reconstructing and then “exploiting the(ir) social networks” by sending malware to their friends and colleagues.

White-House-Jarret-Axelrod-Oval-Office

The time period overlaps with Hillary Clinton’s use of a private email account while Secretary of State from Jan. 21, 2009 to Feb. 1, 2013. The names and ranks of the officials whose emails were actually grabbed, however, were not disclosed in the NSA briefing nor by the intelligence official. Read the rest of this entry »


Richard Whittle : Military Exercise ‘Black Dart’ to Combat Nightmare Drone Scenario

Three images here of Outlaw G2 made by Griffon Aerospace. Photos provided by JIAMDO. For Sunday PostScript story on drones.

Richard Whittle writes: Sweat the small stuff.

A nuclear power station in France. In October and November, French security officials were investigation a wave of drones that illegally flew over more than a dozen nuclear plants across France.Photo: Reuters

That’s the unofficial motto for this year’s edition of the military exercise Black Dart, a two-week test of tactics and technologies to combat hostile drones that begins Monday on the Point Mugu range at Naval Base Ventura County in California.

Steam rises at night from the cooling towers of the Electricite de France (EDF) nuclear power station in Dampierre-en-Burly, France in this March 8, 2015 file photo. French power utility EDF is expected to hold its AGM this week.   REUTERS/Christian Hartmann/Files   GLOBAL BUSINESS WEEK AHEAD PACKAGE - SEARCH "BUSINESS WEEK AHEAD MAY 18" FOR ALL IMAGES

The military categorizes Unmanned Aircraft Systems (UAS) by size and capability, from Group 5 drones that weigh more than 1,320 pounds and can fly above 18,000 feet like the Reaper, down to Group 1, mini- and micro-drones less than 20 pounds that fly lower than 1,200 feet. Previous Black 51pQLTbdHvL._SL250_Darts have covered threats to troops overseas and targets at home posed by drones of all sizes.

Order Richard Whittle’s book “Predator: The Secret Origins of the Drone Revolution” from Amazon.com

But small drones are this year’s focus, said the director of this 14th edition of Black Dart, Air Force Maj. Scott Gregg, because of worrisome incidents since the last exercise.

Gregg cited the quadcopter that a drunk crashed onto the White House lawn in the wee hours of Jan. 26 and sightings of unidentified small drones flying over nuclear reactors in France. In the wake of those events, he said, “Even though we’ve been looking at [the small drone threat], it’s taken on a new sense of urgency.”

Gregg also could have mentioned how, to protest government surveillance, the Pirate Party of Germany flew a small drone right up to the podium as Chancellor Angela Merkel spoke in Dresden two years ago. Or how in Japan last April, a nuclear-energy foe landed a drone carrying radioactive sand on the roof of the prime minister’s residence. And there was a report last week that British officials are worried ISIS may try to bomb festival crowds using small drones.

Target practice

The drones that Black Dart participants will attempt to shoot down.Photo: Post Illustration

The drones that Black Dart participants will attempt to shoot down.Photo: Post Illustration

The United States enjoyed a near-monopoly on armed drones for much of the past 15 years, but with more than 80 countries now buying or building drones of their own, and with terrorist groups such as Hezbollah, Hamas and ISIS known to have used unarmed drones in the Middle East, that advantage has evaporated.

[Read the full story here, at the New York Post]

Few countries and no terrorist groups are likely to emulate the complex and costly US system of undersea fiber-optic cables and satellite earth terminals in Europe that allows crews in the United States to fly drones carrying missiles and bombs over Africa, the Middle East and South Asia.

The 30-kilowatt Laser Weapon System was successful at Black Dart 2011.Photo: U.S. Navy

The 30-kilowatt Laser Weapon System was successful at Black Dart 2011.Photo: U.S. Navy

But anyone can buy a Group 1 drone for a couple of hundred dollars and put it to nefarious use. Arm it with plastic explosives, radioactive material, biological or chemical agents, and it can be crashed, kamikaze-style, into a target.

“I’d say for the Department of Homeland Security, it’s one of the biggest concerns,” Gregg said.

The threat isn’t imaginary. Former Northeastern University student Rezwan Ferdaus is now serving 17 years in prison for plotting to pack C-4 plastic explosives into 1/10 scale radio controlled models of F-4 and F-86 fighter jets and fly them into the Capitol and Pentagon. Ferdaus also supplied cellphone detonators for IEDs to people he thought were agents of al Qaeda but turned out to be working for the FBI….(read more)

What’s worked

 Innovations that have previously found success at Black Dart.Photo: Post Illustration

Innovations that have previously found success at Black Dart.Photo: Post Illustration

This year the surrogate threats will include three Group 1 drones — a Hawkeye 400 hexacopter, a Flanker and a Scout II — and one Twin Hawk drone from the Group 2 category (21 to 55 lbs., slower than 250 knots, lower than 3,500 feet). Six Group 3 drones, all of them 13.5-foot wingspan Outlaw G2s made by Griffon Aerospace, also will be targets. Read the rest of this entry »


Full Scale Non-Stop Global Panic Update: Obama’s Cyber Meltdown Keeps Getting Worse

cyber-meltdown-wsj

When the Administration disclosed the OPM hack in early June, they said Chinese hackers had stolen the personal information of up to four million current and former federal employees. The suspicion was that this was another case of hackers (presumably sanctioned by China’s government) stealing data to use in identity theft and financial fraud. Which is bad enough.

Yet in recent days Obama officials have quietly acknowledged to Congress that the hack was far bigger, and far more devastating. It appears OPM was subject to two breaches of its system in mid-to-late 2014, and the hackers appear to have made off with millions of security-clearance background check files.

These include reports on Americans who work for, did work for, or attempted to work for the panic_300Administration, the military and intelligence agencies. They even include Congressional staffers who left government—since their files are also sent to OPM.

[Read the full text here, at WSJ]

This means the Chinese now possess sensitive information on everyone from current cabinet officials to U.S. spies. Background checks are specifically done to report personal histories that might put federal employees at risk for blackmail. The Chinese now hold a blackmail instruction manual for millions of targets.

These background checks are also a treasure trove of names, containing sensitive information on an applicant’s spouse, children, extended family, friends, neighbors, employers, landlords. Each of those people is also now a target, and in ways they may not contemplate. In many instances the files contain reports on applicants compiled by federal investigators, and thus may contain information that the applicant isn’t aware of.

viv-light-nsa

Of particular concern are federal contractors and subcontractors, who rarely get the same security training as federal employees, and in some scenarios don’t even know for what agency they are working. These employees are particularly ripe targets for highly sophisticated phishing emails that attempt to elicit sensitive corporate or government information. Read the rest of this entry »


Britain Pulls Spies from Russia, China, as Moscow Cracks Snowden Files

Russ-Hack

London (AFP) – Britain has been forced to move some of its spies after Russia and China accessed the top-secret raft of documents taken by former US intelligence contractor Edward Snowden, British media reported.

“We know Russia and China have access to Snowden’s material and will be going through it for years to come, searching for clues to identify potential targets.”

— Intelligence source, to the Sunday Times

The BBC and the Sunday Times cited senior government and intelligence officials as saying agents had been pulled, with the newspaper saying the move came after Russia was able to decrypt more than one million files.

“It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information,” a Downing Street source said, according to the newspaper.

Downing-street-10_c2e90144db7cf5d0687f026174915573f40f3e36

“It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information.”

— Downing Street source

Downing Street told AFP on Sunday that they “don’t comment on intelligence matters” while the Foreign Office said: “We can neither confirm or deny these reports”.

The BBC said on its website, meanwhile, that a government source said the two countries “have information” that spurred intelligence agents being moved, but said there was “no evidence” any spies were harmed.

Report: Snowden impersonated NSA officials to access some files

Snowden fled to Russia after leaking the documents to the press in 2013 to expose the extent of US online surveillance programmes and to protect “privacy and basic liberties”.

The Sunday Times said other government sources claimed China had also accessed the documents, which reveal US and British intelligence techniques, leading to fears that their spies could be identified. Read the rest of this entry »


Congress Passes NSA Phone-Records Bill

 

Rand Paul

The final vote divided Senate Republicans, with 23 voting ‘yes’ and 30 voting ‘no,’ and senators seeking re-election in 2016 split on the issue

WASHINGTON (AP) — Congress approved sweeping changes Tuesday to surveillance laws enacted after the Sept. 11 attacks, eliminating the National Security Agency’s disputed bulk phone-records collection program and replacing it with a more restrictive measure to keep the records in phone companies’ hands.

CGhfyyAUcAIlw7b

“This is a step in the wrong direction…does not enhance the privacy protections of American citizens. And it surely undermines American security by taking one more tool form our warfighters at exactly the wrong time.”

— Senate Majority Leader Mitch McConnell

Two days after Congress let the phone-records and several other anti-terror programs expire, the Senate’s 67-32 vote sent the legislation to President Barack Obama, who said he would sign it promptly.

“This legislation will strengthen civil liberty safeguards and provide greater public confidence in these programs,” Obama said in a statement. The bill signing could happen late Tuesday or early Wednesday, but officials said it could take at least several days to restart the collection.

drudge-watching-you-nsa

The legislation will revive most of the programs the Senate had allowed to lapse in a dizzying collision of presidential politics and national security policy. But the authorization will undergo major changes, the legacy of agency contractor Edward Snowden‘s explosive revelations two years ago about domestic spying by the government.panic-betty

“I applaud the Senate for renewing our nation’s foreign intelligence capabilities, and I’m pleased this measure will now head to the president’s desk for his signature.”

— House Speaker John Boehner

In an unusual shifting of alliances, the legislation passed with the support of Obama and House Speaker John Boehner, R-Ohio, but over the strong opposition of Senate Majority Leader Mitch McConnell. McConnell failed to persuade the Senate to extend the current law unchanged, and came up short in a last-ditch effort Tuesday to amend the House version, as nearly a dozen of his own Republicans abandoned him in a series of votes.

Big-Brother

“This is a step in the wrong direction,” a frustrated McConnell said on the Senate floor ahead of the Senate’s final vote to approve the House version, dubbed the USA Freedom Act. He said the legislation “does not enhance the privacy protections of American citizens. And it surely undermines American security by taking obamaorwellone more tool form our warfighters at exactly the wrong time.”

“Power is not a means, it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship.”

— George Orwell

The legislation remakes the most controversial aspect of the USA Patriot Act — the once-secret bulk collection program that allows the National Security Agency to sweep up Americans’ phone records and comb through them for ties to international terrorists. Over six months the NSA would lose the power to collect and store those records, but the government still could gain court orders to obtain data connected to specific numbers from the phone companies, which typically store them for 18 months.

viv-light-nsa

It would also continue other post-9/11 surveillance provisions that lapsed Sunday night, and which are considered more effective than the phone-data collection program. These include the FBI’s authority to gather business records in terrorism and espionage investigations and to more easily eavesdrop on suspects who are discarding cellphones to avoid surveillance.

In order to restart collection of phone records, the Justice Department will need to obtain a new order from the Foreign Intelligence Surveillance Court. Read the rest of this entry »


BREAKING: Deal to Save NSA Surveillance Programs Senate Deadline Panic FUBAR

no-deal-panic

Key Patriot Act provisions will expire at midnight

In addition to the bulk phone collections provision, the two lesser-known Patriot Act provisions that also lapse at midnight were one, so far unused, to helps track “lone wolf” terrorism suspects unconnected to a foreign power; the second allows the government to eavesdrop on suspects who continually discard their cellphones.

The Senate failed Sunday to strike a deal to extend the NSA’s phone surveillance program before the midnight deadline.

Members of the GOP-controlled chamber returned Sunday to Capitol Hill in a last-ditch effort to extend the National Security Agency’s authority to collect Americans’ phone records in bulk to search for terror connections and to authorize two other programs under the post-9/11 Patriot Act.

stock-footage-animated-angry-cuckoo-clock-bird

“Heaven forbid we’ve got a problem where we could have prevented a terrorist attack or apprehended someone who is engaged in dangerous activity, but we didn’t do so simply because of inaction in the Senate.”

— President Obama

The Senate attempted to either pass a House bill that would have altered the collections of the so-called phone call metadata or simply extend the program.

The 100-member chamber passed the first of two procedure hurdles, known as cloture, to proceed with the House bill. The vote was 77 to 17.

“The sky is not going to fall.”

— Anthony Romero, American Civil Liberties Union executive director

But no final action was expected before Sunday’s midnight deadline after Kentucky GOP Sen. Rand Paul served notice that he would assert his prerogatives under Senate rules to delay a final vote for several days.

“The people who argue that the world will come to an end and we will be over by jihadists (by not passing the bill) are using fear,” Paul, a 2016 presidential candidate, said on the Senate floor.

cuckoo-clock

Still, the program is all but certain to be revived in a matter of days, although it also looks certain to be completely overhauled under the House-passed legislation that Senate Majority Leader Mitch McConnell reluctantly blessed in an about-face Sunday evening.

With most senators opposed to extending current law unchanged, even for a short time, McConnell said the House bill was the only option left other than letting the program die off entirely. The Kentucky Republican preferred extending the current law. Read the rest of this entry »


Magna Carta: Eight Centuries of Liberty

King-John-Magna-Carta

June marks the 800th anniversary of Magna Carta, the ‘Great Charter’ that established the rule of law for the English-speaking world. Its revolutionary impact still resounds today.

Daniel Hannan writes: Eight hundred years ago next month, on a reedy stretch of riverbank in southern England, the most important bargain in the history of the human race was struck. I realize that’s a big claim, but in this case, only superlatives will do. As Lord Denning, the most celebrated modern British jurist put it, Magna Carta was “the greatest constitutional document of all time, the foundation of the freedom of the individual against the arbitrary authority of the despot.”

“We British have, by any measure, been slow to recognize what we have. Americans, by contrast, have always been keenly aware of the document, referring to it respectfully as the Magna Carta. Why? Largely because of who the first Americans were.”

It was at Runnymede, on June 15, 1215, that the idea of the law standing above the government first took contractual form. King John accepted that he would no longer get to make the rules up as he went along. From that acceptance flowed, ultimately, all the rights and freedoms that we inventing-freedomnow take for granted: uncensored newspapers, security of property, equality before the law, habeas corpus, regular elections, sanctity of contract, jury trials.

[Order Daniel Hannan‘s book “Inventing Freedom: How the English-Speaking Peoples Made the Modern World” from Amazon.com]

Magna Carta is Latin for “Great Charter.” It was so named not because the men who drafted it foresaw its epochal power but because it was long. Yet, almost immediately, the document began to take on a political significance that justified the adjective in every sense. The bishops and barons who had brought King John to the negotiating table understood that rights required an enforcement mechanism. The potency of a charter is not in its parchment but in the authority of its interpretation.

“The whole constitutional history of England is little more than a commentary on Magna Carta.”

— Victorian historian William Stubbs

The constitution of the U.S.S.R., to pluck an example more or less at random, promised all sorts of entitlements: free speech, free worship, free association. But as Soviet citizens learned, paper rights are worthless in the absence of mechanisms to hold rulers to account.

United for the first time, the four surviving original Magna Carta manuscripts are prepared for display at the British Library, London, Feb. 1, 2015. Photo: UPPA/ZUMA PRESS

United for the first time, the four surviving original Magna Carta manuscripts are prepared for display at the British Library, London, Feb. 1, 2015. Photo: UPPA/ZUMA PRESS

Magna Carta instituted a form of conciliar rule that was to develop directly into the Parliament that meets at Westminster today. As the great Victorian historian William Stubbs put it, “the whole constitutional history of England is little more than a commentary on Magna Carta.”

“As early as 1637, Maryland sought permission to incorporate Magna Carta into its basic law, and the first edition of the Great Charter was published on American soil in 1687 by William Penn.”

And not just England. Indeed, not even England in particular. Magna Carta has always been a bigger deal in the U.S. The meadow where the abominable King John put his royal seal to the parchment lies in my electoral district in the county of Surrey. It went unmarked until 1957, when a memorial stone was finally raised there—by the American Bar Association.

[Read the full text here, at WSJ]

Only now, for the anniversary, is a British monument being erected at the place where freedom was born. After some frantic fundraising by me and a handful of local councilors, a large bronze statue of Queen Elizabeth II will gaze out across the slow, green waters of the Thames, marking 800 years of the Crown’s acceptance of the rule of law. Read the rest of this entry »


U.S. Court of Appeals for the Second Circuit Declares NSA’s Telephone Dragnet Unlawful

tumblr_inline_no00ufUBZY1ssu7wz_540

In a ruling certain to profoundly shape the ongoing debate over surveillance reform in Congress, the U.S. Court of Appeals for the Second Circuit has ruled that the National Security Agency’s indiscriminate collection of Americans’ telephone calling records exceeds the legal authority granted by the Patriot Act’s controversial section 215, which is set to expire at the end of this month.

Comments Cato scholar Julian Sanchez, “While the court didn’t reach the crucial question of whether the program violates the Fourth Amendment, the ruling gives civil libertarians good reason to hope that a massive and egregious violation of every American’s privacy will finally come to an end.”

[CATO]


Official NSA Telephone Manners Guide

HOW-TO-TALK-TELEPHONE-NSA-BW


Appeals Court Rules NSA Phone Program Not Authorized by Patriot Act

NSA-wsj

ACLU lawsuit argued the data collection should be stopped because it violates Americans’ privacy rights

WASHINGTON — Devlin Barrett and Damian Paletta report: A federal appeals court ruled Thursday the National Security Agency’s controversial collection of millions of Americans’ phone records isn’t authorized by the Patriot Act, as the Bush and Obama administrations have long maintained.

”The text of (Section 215) cannot bear the weight the government asks us to assign to it, and … does not authorize the telephone metadata program.’’ 

Federal appeals court

The NSA has used the Patriot Act to justify collecting records of nearly every call made in the U.S. and entering them into a database to search for possible contacts among terrorism suspects.

US-SECURITY-INTELLIGENCE-OBAMA-PROTEST

The scope of the program was revealed when former NSA contractor Edward Snowden leaked documents describing the program, triggering a national debate over the extent of the data collection.

“I am concerned if we throw out some of these programs, now we are at risk. We’re stupid, I got it, in the press, but we shouldn’t put American people at risk.”

— Recently retired NSA Director Gen. Keith Alexander

The ruling by the three-judge panel in New York comes at a delicate point in the national debate over government surveillance, as Section 215 of the Patriot Act is due to expire next month and lawmakers are haggling about whether to renew it, modify it, or let it lapse.

The court’s ruling was in response to a lawsuit by the American Civil Liberties Union arguing the data collection should be stopped because it violates Americans’ privacy rights. A lower court judge ruled the program was constitutional, and the civil liberties group appealed, leading to Thursday’s decision.

viv-light-nsa

”The text of (Section 215) cannot bear the weight the government asks us to assign to it, and … does not authorize the telephone metadata program,’’ the court wrote.

The court declined to address the issue of whether the program violates Americans’ rights, because, they found, it was never properly authorized by existing law.

The judges didn’t order the collection to stop, noting that the legislative debate and the looming expiration of Section 215 will force action on the issue one way or another. The judges also note that if Congress decides to approve some version of the phone data collection program in coming days, then the privacy issue could be revisited in court. Read the rest of this entry »


Tuesday Morning News Dump

newsdumphtone2

Ben K – Ace of Spades HQ


Twitter Launches Livestreaming App ‘Periscope’ – Its Own Version of Meerkat

periscope-lead-image

Kurt Wagnerkurt-wagner1 writes: Twitter is officially pulling back the curtain on Periscope, a livestreaming video app that’s been in beta since the company acquired it back in January, reportedly for $100 million.

Periscope streams live audio and video from a user’s smartphone that other people can watch and comment on within the app — the link to the livestream can be shared on Twitter as a way to spread the word and boost the audience.

The free app, which is only available on iOS for now, provides immediate competition to Meerkat, a similar livestreaming app that took off at the Southimg_2914 by Southwest Interactive conference in Austin, Texas, earlier his month.

Meerkat, which launched just two weeks before the conference, relies heavily on Twitter’s platform. It uses Twitter login and had used its social graph to help users find people to follow before Twitter cut it off.

Given the relationship between the two products, speculation that Twitter might buy Meerkat made sense, but it bought competitor Periscope instead. Things haven’t been all bad for Meerkat, though. The app has more than 400,000 users, according to CEO Ben Rubin, and it just raised $12 million in a deal that values it at $52 million.

The two apps work in a similar way, but Twitter-owned Periscope is actually more independent from Twitter than Meerkat. Unlike Meerkat, where any Likes and comments are reflected on your Twitter profile, all the engagement on Periscope is kept within the app. Read the rest of this entry »


[VIDEO] The Conservatarian Manifesto: Should Libertarians and Conservatives Unite?

“I think the ‘conservatarian’ term is not a linguistic trick, it is a substantive attempt to describe a certain coterie on the right,” explains Charles C. W. Cooke, a writer for National Review and author of The Conservatarian Manifesto: Libertarians, Conservatives, and the Fight for the Right’s Future. “These are the people who say when they are around libertarians they feel conservative, and when they are around conservatarianconservatives they feel libertarian…(read more)

[Check out Charles C. W. Cooke‘s new book: “The Conservatarian Manifesto: Libertarians, Conservatives, and the Fight for the Right’s Futureat Amazon.com]

Reason TV‘s Nick Gillespie sat down with Cooke to discuss his book…(read more)

Reason.com


Anti-Ship Missile Detection: Navy to Integrate F-35 With Beyond-the-Horizon Technology

F-35

The Navy and Lockheed Martin are planning to demonstrate a beyond-the-horizon anti-ship missile detection and defense technology using an F-35 Joint Strike Fighter.

The system, referred to as Naval Integrated Fire Control-Counter Air, or NIFC-CA, uses Aegis radar, and airborne sensor and SM-6 missile to find, track and destroy approaching threats such as cruise missiles at ranges well beyond the typical radar horizon, Navy officials said.

Alongside Aegis radar and an SM-6 missile, NIFC-CA uses an E-2D Hawkeye aircraft as an airborne sensor to help relay threat information to the ship from beyond its normal radar range.

Lockheed is working closely with Naval Sea Systems Command, or NAVSEA, to plan a NIFC-CA demonstration at White Sands Missile Range, N.M., sometime this year or next year, a Lockheed executive said.

“We are looking at alternative airborne sensors,” the executive said.

The idea with a demonstration, sources indicate, would be to use the F-35 as an airborne relay node or sensor in place of the E-2D Hawkeye. This could allow NIFC-CA to operate against an increasingly complex set of targets such as stealthy targets, the Lockheed executive explained. Read the rest of this entry »


Surveillance-Proof

viv-light-nsa

First Apple and then Google announced that they would use encryption on new phones that wouldn’t permit them to help police execute warrants to examine data on a cell phone or other device.

For City Journal, Judith Miller writes: Law enforcement officials in New York and Washington criticized technology superpowers Google and Apple this week for selling cell phones and other devices that cannot be accessed by the government, warning that such technology jeopardizes public safety.

judith-miller-city-journal

Judith Miller is a contributing editor of City Journal, and an adjunct fellow at the Manhattan Institute

In his first major policy address, FBI director James B. Comey called on Congress and the Obama administration to counter the expanding use of such devices, which he and other law enforcement officials assert endanger efforts to prevent terrorism and fight crime. Without lawful government access to cell phones and Internet devices, Comey warned, “homicide cases could be stalled, suspects could walk free, and child exploitation victims might not be identified or recovered.”

“Law enforcement officials many legitimate ways to obtain the data stored on our devices. Weakening the security of smartphones and trusted communications infrastructure should not be one of them.”

— Nuala O’Connor, president of the Center for Democracy and Technology

Comey, who became FBI director last year, said that he understood Americans’ “justifiable surprise” at former National Security Agency contractor Edward Snowden’s revelations about U.S. government surveillance practices. Read the rest of this entry »


Apple will No Longer Unlock User’s Mobile Devices for Police, Even with Search Warrants

Obama Big brother

The Washington Post reports: Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

big-brother-halfThe move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

As the new operating system becomes widely deployed over the next several weeks, the number of iPhones and iPads that Apple is capable of breaking into for police will steadily dwindle to the point where only devices several years old — and incapable of running iOS 8 — can be unlocked by Apple.

Apple will still have the ability — and the legal responsibility — to turn over user data stored elsewhere, such as in its iCloud service, which typically includes backups of photos, videos, e-mail communications, music collections and more. Users who want to prevent all forms of police access to their information will have to adjust settings in a way that blocks data from flowing to iCloud. Read the rest of this entry »


Yahoo Prevails in Secretive Surveillance Court Battle

Shutterstock

The public is getting a broader glimpse at the still-secretive world of government data collection

Yahoo said Thursday it won release of 1,500 pages of documents filed in a secretive surveillance court. It said the documents stem from an unsuccessful lawsuit it brought in 2008 challenging the government’s right to demand user information.Yahoo Headquarters

“At one point, the U.S. Government threatened the imposition of $250,000 in fines per day if we refused to comply.”

— Ron Bell, Yahoo’s lawyer

The company won a victory last year when portions of previously-closed documents were ordered public. As it noted Thursday, disclosures from the Foreign Intelligence Surveillance Court are “extremely rare.”

The documents are a public relations victory for Yahoo: They show it resisting orders to comply with the surveillance programs.

“Yahoo has not complied with the directives because of concerns that the directives require Yahoo to assist in conducting warrantless surveillance that is likely to capture private communications of United States citizens located in the U.S. and abroad,” Yahoo wrote in a legal document, arguing the orders violated “the privacy of U.S. citizens.”

The government put great pressure on Yahoo to comply with its order, the company said. Read the rest of this entry »


Victor Davis Hanson: World at War

logoFor Defining IdeasVictor Davis Hanson writes: Will the United States in its near future be hit again in the manner of the 9/11 attacks of thirteen years ago? The destruction of the World Trade Center, the suicide implosions of four passenger airliners, and the attack on the Pentagon unfortunately have become far-off memories. They are now more distant from us than was the Vietnam War was from the Korean War.  islamic extremism threat chart

“Drone strikes continue at a vastly accelerated pace under President Obama, but they also raise existential hypocrisies about our approach to terrorism.”

Two questions will determine whether radical Islamic terrorists will attack us once more: one, are the post-9/11 anti-terrorism protocols that have so far stopped major terrorist attacks still viable and effective, and, two, is Al-Qaeda or an analogous Islamic terrorist organization now still as capable as were Osama bin Laden’s henchmen in 2001?

Unfortunately, the answers to those two questions should raise great concern. Take the current status of the so-called war on terror in all of its manifestations. The southern border of the United States is less guarded than at anytime since 9/11.

For all practical purposes, enforceable immigration laws simply no longer exist. The result is that we have no idea who is crossing into the United States or for what purposes.

“The President’s six years of concentrated Islamic outreach has not won over the Muslim Middle East.”

Some of the Bush-Cheney anti-terrorism protocols are still in operation—renditions, preventative detention, the Guantanamo detention center, and the Patriot Act. However, the NSA, IRS, and VA scandals, along with the Edward Snowden and Wikileaks revelations, have created an understandably strong public backlash against government surveillance, which will lead to new protocols limiting our ability to monitor terrorist suspects. Read the rest of this entry »