<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press Servicespying Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/spying/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/spying/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Thu, 07 May 2026 07:22:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>Press Freedom Groups Denounce NSA Spying on AJ Bureau Chief</title>
		<link>https://www.ipsnews.net/2015/05/press-freedom-groups-denounce-nsa-spying-on-aj-bureau-chief/</link>
		<comments>https://www.ipsnews.net/2015/05/press-freedom-groups-denounce-nsa-spying-on-aj-bureau-chief/#respond</comments>
		<pubDate>Tue, 12 May 2015 18:14:45 +0000</pubDate>
		<dc:creator>Kitty Stapp</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Middle East & North Africa]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Al Jazeera]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=140601</guid>
		<description><![CDATA[Ahmad Muaffaq Zaidan doesn’t deny that he’s had contact with terrorist groups. In fact, it would have been rather difficult to do his job otherwise. But the fact that Zaidan is a respected investigative journalist and the Islamabad bureau chief for Al Jazeera didn’t seem to faze the U.S. National Security Agency, which not only [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="188" src="https://www.ipsnews.net/Library/2015/05/intercept-300x188.jpg" class="attachment-medium size-medium wp-post-image" alt="A slide dated June 2012 from a National Security Agency PowerPoint presentation bears Ahmad Muaffaq Zaidan’s photo, name, and a terror watch list identification number, and labels him a “member of Al-Qa’ida” as well as the Muslim Brotherhood. It also notes that he “works for Al Jazeera.” Courtesy of the Intercept" decoding="async" fetchpriority="high" srcset="https://www.ipsnews.net/Library/2015/05/intercept-300x188.jpg 300w, https://www.ipsnews.net/Library/2015/05/intercept.jpg 540w" sizes="(max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">A slide dated June 2012 from a National Security Agency PowerPoint presentation bears Ahmad Muaffaq Zaidan’s photo, name, and a terror watch list identification number, and labels him a “member of Al-Qa’ida” as well as the Muslim Brotherhood. It also notes that he “works for Al Jazeera.” Courtesy of the Intercept</p></font></p><p>By Kitty Stapp<br />NEW YORK, May 12 2015 (IPS) </p><p>Ahmad Muaffaq Zaidan doesn’t deny that he’s had contact with terrorist groups. In fact, it would have been rather difficult to do his job otherwise.<span id="more-140601"></span></p>
<p>But the fact that Zaidan is a respected investigative journalist and the Islamabad bureau chief for Al Jazeera didn’t seem to faze the U.S. National Security Agency, which not only spied on him, but went as far as to brand him a likely member of Al Qaeda and put him on a watch list.“This is the reality under which we live. Government agencies are relatively autonomous and attempts to control them are ludicrous." -- Bob Dietz of CPJ<br /><font size="1"></font></p>
<p>The revelations emerged late last week as part of the thousands of classified documents leaked by former NSA employee Edward Snowden.</p>
<p>&#8220;Given that Pakistan has been consistently ranked as one of the most dangerous countries for journalists, the news of Zaidan&#8217;s surveillance further adds to the fear, restricting press freedom,” said Furhan Hussain, manager of the Digital Rights and Freedom of Expression programme at Bytes for All, a Pakistani human rights group.</p>
<p>“Equally alarming, in this case, is the fact that by compromising the information of respected journalists, such spying also weakens the safety of their sources and media networks,” he told IPS. “Zaidan&#8217;s communications intercept took place through the invasive gathering and analysis of his metadata, a technique which has been frequently responsible for drone-led non-transparent persecution of hundreds of people.</p>
<p>“While it is often claimed that the state of Pakistan has failed to effectively protest against these violations, it may also be important to raise questions about the possible role of the state in facilitating the NSA to access vast amounts of data of those residing within its borders, in the context of its <a href="http://electrospaces.blogspot.com/2014/09/nsas-foreign-partnerships.html">third-party SIGINT partnership</a>.”</p>
<p>Other press freedom groups said the case was just one more in a long-running pattern of civil liberties abuses.</p>
<p>&#8220;Given the flood of disclosures over the past two years about the NSA’s vast range of mass and intrusive surveillance techniques and targets, it is unsurprising, but nevertheless shocking, that the intelligence agency thought it appropriate to use its capabilities to spy on an eminent journalist,” Carly Nyst, Legal Director of Privacy International, told IPS.</p>
<p>“This case is illustrative of the grave dangers of allowing security services to exercise immense powers in the absence of proper scrutiny. By placing members of the media, who themselves play an essential accountability role, particularly in areas of conflict, under surveillance, the NSA has undermined the very values it is charged with promoting &#8211; security, democracy, and free flow of information.</p>
<p>“Without democratic accountability, spy agencies will continue to sacrifice civil liberties in the name of strategic gain, without sparing a thought to the critical journalistic freedom caught in the cross hairs,” she added.</p>
<p>It’s not the first time the NSA has targeted Al Jazeera. Based on leaked documents, the German magazine Der Spiegel reported in 2009 that it had hacked into the news agency’s internal communication system.</p>
<p><a href="https://cpj.org/blog/2013/09/nsa-hack-compromises-al-jazeera-sources-us-credibi.php">According to the Committee to Protect Journalists</a>, NSA whistleblower Russell Tice claimed in 2009 that in fact, the agency makes it a point to target journalists and news agencies.</p>
<p>Zaidan was targeted under the ominously titled SKYNET programme, which monitors bulk call records and searches the metadata for particular patterns.</p>
<p>“It’s this kind of big, sweeping data gathering that worries us the most,” Bob Dietz, Asia programme coordinator for the New York-based Committee to Protect Journalists, told IPS.</p>
<p>“If someone were to track my behavior and all the people I’ve come into contact with over the last 20 years, I imagine I would come up on some sort of chart ranking very high,” he said wryly.</p>
<p>Dietz doesn’t expect the situation to change anytime soon, regardless of who occupies the White House.</p>
<p>“This is the reality under which we live. Government agencies are relatively autonomous and attempts to control them are ludicrous…whether or not there are laws protecting us,” he said.</p>
<p>Thomas Hughes, executive director of the London-based ARTICLE 19, said his group is deeply concerned by the Zaidan spying revelations.</p>
<p>“According to statements from Al Jazeera and colleagues from other networks, Zaidan is a journalist of longstanding professional reputation. Surveillance of journalists has a serious chilling effect on freedom of expression, impeding the crucial role journalists play in uncovering wrongdoing and holding governments to account for their actions,&#8221; he told IPS.</p>
<p>“Compromising the confidentially of sources also seriously undermines the ability of journalists to perform their work and potentially endangers the wellbeing and safety of those sources.”</p>
<p>Indeed, as noted by the Intercept, which broke the allegations, Zaidan’s reporting focused on the Taliban and Al Qaeda, including several high-profile interviews with senior Al Qaeda leaders.</p>
<p>In strenuously denying the allegations, he patiently explained, “For us to be able to inform the world, we have to be able to freely contact relevant figures in the public discourse, speak with people on the ground, and gather critical information.</p>
<p>“Any hint of government surveillance that hinders this process is a violation of press freedom and harms the public’s right to know,” he wrote in a response to the Intercept. “To assert that myself, or any journalist, has any affiliation with any group on account of their contact book, phone call logs, or sources is an absurd distortion of the truth and a complete violation of the profession of journalism.”</p>
<p><em>Edited by Kanya D&#8217;Almeida</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2015/04/media-watchdog-unveils-top-ten-worst-censors/" >Media Watchdog Unveils Top Ten Worst Censors</a></li>
<li><a href="http://www.ipsnews.net/2015/04/israeli-forces-target-journalists-in-west-bank/" >Israeli Forces Target Journalists in West Bank</a></li>
<li><a href="http://www.ipsnews.net/2015/03/my-number-was-six/" >“My Number Was Six”</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2015/05/press-freedom-groups-denounce-nsa-spying-on-aj-bureau-chief/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Obama Curbs Spying on Foreign Nationals Overseas</title>
		<link>https://www.ipsnews.net/2014/01/obama-curbs-surveillance-foreign-nationals-overseas/</link>
		<comments>https://www.ipsnews.net/2014/01/obama-curbs-surveillance-foreign-nationals-overseas/#respond</comments>
		<pubDate>Fri, 17 Jan 2014 21:49:22 +0000</pubDate>
		<dc:creator>Ramy Srour</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[Rand Corporation]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=130405</guid>
		<description><![CDATA[In a highly anticipated speech on Friday, President Barack Obama introduced a series of reforms that will place new limits and safeguards on U.S. intelligence gathering, including additional protections for foreign nationals overseas.  After weathering months of new disclosures and increasingly strident public criticism about the extent of U.S. spying, Obama on Friday recognised that the [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Ramy Srour<br />WASHINGTON, Jan 17 2014 (IPS) </p><p>In a highly anticipated speech on Friday, President Barack Obama introduced a series of reforms that will place new limits and safeguards on U.S. intelligence gathering, including additional protections for foreign nationals overseas. <span id="more-130405"></span></p>
<div id="attachment_130407" style="width: 304px" class="wp-caption alignright"><a href="https://www.ipsnews.net/Library/2014/01/obama_cameron434.jpg"><img decoding="async" aria-describedby="caption-attachment-130407" class="size-full wp-image-130407 " alt="President Barack Obama talks on the phone with British Prime Minister David Cameron in the Oval Office, Jan. 16, 2014. Credit: White House Photo by Pete Souza" src="https://www.ipsnews.net/Library/2014/01/obama_cameron434.jpg" width="294" height="434" srcset="https://www.ipsnews.net/Library/2014/01/obama_cameron434.jpg 294w, https://www.ipsnews.net/Library/2014/01/obama_cameron434-203x300.jpg 203w" sizes="(max-width: 294px) 100vw, 294px" /></a><p id="caption-attachment-130407" class="wp-caption-text">President Barack Obama talks on the phone with British Prime Minister David Cameron in the Oval Office, Jan. 16, 2014. Credit: White House Photo by Pete Souza</p></div>
<p>After weathering months of new disclosures and increasingly strident public criticism about the extent of U.S. spying, Obama on Friday recognised that the country’s National Security Agency (NSA) and other intelligence agencies may have overreached in the aftermath of the Sep. 11, 2001 attacks and the ongoing “war on terror”.</p>
<p>At the same time, Obama also stated that the particularly controversial bulk gathering of Internet and phone records would remain in place.</p>
<p>“We have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals and our Constitution require,” Obama said Friday.</p>
<p>The new directive will “strengthen executive branch oversight of [U.S.] intelligence activities … reform programmes and procedures in place to provide greater transparency to our surveillance activities, and fortify the safeguards that protect the privacy of U.S. persons.”</p>
<p>In an unanticipated attempt to quell loud criticism from foreign governments and U.S. allies, Obama also introduced a series of changes aimed at protecting non-U.S. citizens abroad – the first time that a U.S. president has taken such steps.</p>
<p>“People around the world, regardless of their nationality, should know that the United States is not spying on ordinary people who don’t threaten our national security, and that we take their privacy concerns into account in our policies and procedures,” the president said.</p>
<p>“In this directive, I have taken the unprecedented step of extending certain protections that we have for the American people to people overseas [including] safeguards [that] will limit the duration that we can hold personal information, while also restricting the use of this information.”</p>
<p>In particular, the new directive seeks to ensure that &#8220;information about persons whose activities are not of foreign intelligence or counterintelligence value&#8221; will not be collected, &#8220;whatever their nationality and regardless of where they might reside.&#8221;</p>
<p>It is still unclear how exactly these protections will be implemented, but for now, the directive states that the United States will collect data only for the purposes of detecting espionage, cyber crime, threats to U.S. or allied armed forces, and threats from terrorism, weapons proliferation and sanctions evasion.</p>
<p>Yet there remains wide disagreement about the soundness of extending constitutional protections to foreign nationals.</p>
<p>“Although I agree that we should be sensitive to foreign nationals, the question is whether they have equal protection under the Constitution,” Brian Michael Jenkins, a senior adviser at the RAND Corporation, a think tank here, told IPS. “And the answer is that they really don’t.”</p>
<p>Others note that although foreign nationals may not be protected under the U.S. Constitution, their privacy still needs to be respected as a broader human rights issue.</p>
<p>“It may be the case that foreigners overseas do not enjoy constitutional protections, but they do enjoy basic human rights,” Elizabeth Goitein, the co-director of the Liberty &amp; National Security Programme at the Brennan Centre for Justice at the New York University School of Law, told IPS. “And privacy is one of them.”</p>
<p><b>Distance to go</b></p>
<p>The president’s announcements comes in the midst of a historic public debate that first broke out in June when a former NSA contractor, Edward J. Snowden, publicised documents revealing the intrusiveness of U.S. intelligence gathering. And while many have welcomed Friday’s speech, the new reforms did little to quell all calls for action.</p>
<p>“The president took several steps toward reforming NSA surveillance, but there’s still a long way to go,” Cindy Cohn, the legal director of the Electronic Frontier Foundation (EFF), a digital-rights advocacy group, said following the president’s speech. “Other necessary reforms include requiring prior judicial review of national security letters and ensuring the security and encryption of our digital tools, but the president’s speech made no mention of these.”</p>
<p>Others expressed disappointment at the president’s decision to simply reform, but not eliminate, the government’s bulk collection of telephone records, also known as metadata.</p>
<p>“The president should stop bulk collection, approach Congress and support the USA Freedom ACT,” the Brennan Center’s Goitein says, referring to a legislative proposal that, if approved, would substantially rein in the NSA’s activities through an official act of Congress.</p>
<p>The president did note on Friday that he would include Congress in the new overhaul, either by asking legislators to codify the new changes or by ensuring that lawmakers were part of a rigorous oversight mechanism.</p>
<p>However, Goitein warns that Congress should be included only if this will lead to actual reforms, and not as a way to avoid progress.</p>
<p>“The president should go to Congress to tighten the law and to ensure that no other administration will do this in the future,” she says, noting that if the president had really wanted to end bulk collection, he could have done so during Friday’s speech.</p>
<p>Obama also noted that the bulk collection of telephone records would be substituted by an alternative mechanism, although the details of this remain unclear. The president proposed a two-stepped transition that would initially see a more limited surveillance of phone calls, one that would “pursue phone calls that are two steps removed from a number associated with a terrorist organisation, instead of the current three.”</p>
<p>During this initial period, the attorney-general and the rest of the intelligence community will look for an alternative mechanism to replace the NSA’s storage mechanism. It is still unclear whether this will be a single third party conducting the government’s surveillance or a group of private companies and contractors.</p>
<p>Ultimately, Friday’s speech was a notably public look at some of the United States’ most highly classified programmes, highlighting an already startling distance from the days prior to Snowden’s leaks.</p>
<p>“Intelligence collection is always a delicate business in a democracy, and it should be,” the RAND’s Jenkins told IPS. “Public debate and argument is the only way we have of achieving something that will be more or less acceptable to the public and that will provide the protection to our civil liberties.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/" >U.N. Will Censure Illegal Spying, But Not U.S.</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/" >U.N.’s New Phone Network Vulnerable to Surveillance</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2014/01/obama-curbs-surveillance-foreign-nationals-overseas/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.N. States Unanimously Agree: Even the Walls Have Ears</title>
		<link>https://www.ipsnews.net/2013/12/walls-ears-u-n-s-glass-house/</link>
		<comments>https://www.ipsnews.net/2013/12/walls-ears-u-n-s-glass-house/#respond</comments>
		<pubDate>Fri, 27 Dec 2013 00:18:55 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Government Communications Headquarters (GCHQ)]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[U.N. General Assembly]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=129746</guid>
		<description><![CDATA[When the U.N. Correspondents Association (UNCA) held its annual award ceremony last week, one of the video highlights was a hilarious skit on the clumsy attempts to bug the 38th floor offices of Secretary-General Ban Ki-moon. Three days later, the New York Times ran an updated story about the widespread electronic surveillance by the U.S. [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="200" src="https://www.ipsnews.net/Library/2013/12/banunca640-300x200.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/12/banunca640-300x200.jpg 300w, https://www.ipsnews.net/Library/2013/12/banunca640-629x419.jpg 629w, https://www.ipsnews.net/Library/2013/12/banunca640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Secretary-General Ban Ki-moon speaks at the 2013 Annual Awards Dinner and Dance of the U.N. Correspondents Association (UNCA), honouring winners of prizes for best media coverage of the U.N. Credit: UN Photo/Eskinder Debebe</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Dec 27 2013 (IPS) </p><p>When the U.N. Correspondents Association (UNCA) held its annual award ceremony last week, one of the video highlights was a hilarious skit on the clumsy attempts to bug the 38th floor offices of Secretary-General Ban Ki-moon.<span id="more-129746"></span></p>
<p>Three days later, the New York Times ran an updated story about the widespread electronic surveillance by the U.S. National Security Agency (NSA) and Britain&#8217;s spy agency, the Government Communications Headquarters (GCHQ), which had targeted over 1,000 political leaders, diplomats, and international institutions."Let's hope the spirit of hopeless resignation is finally set aside and serious consideration given to privacy at the U.N." -- James Paul<br /><font size="1"></font></p>
<p>These included the U.N. children&#8217;s agency UNICEF and the Geneva-based U.N. Institute for Disarmament Research (UNIDIR).</p>
<p>At last week&#8217;s award ceremony, the secretary-general was given an unsolicited piece of light-hearted advice: if you want to figure out whether your office is bugged, you only have to sneeze loudly, and a voice from inside the walls would instinctively and courteously respond, &#8220;Bless you.&#8221;</p>
<p>Jokes apart, the 193-member General Assembly last week adopted a unanimous resolution highly critical of electronic surveillance and demanding &#8220;the right to privacy in the digital age.&#8221;</p>
<p>Not surprisingly, the resolution was co-sponsored by Brazil and Germany, whose leaders were wiretapped by the NSA.</p>
<p>Although both countries publicly lambasted the surveillance, the resolution does not single out either the United States or Britain by name.</p>
<p>&#8220;This was due to two reasons,&#8221; a Third World diplomat told IPS. &#8220;One, to ensure the resolution was adopted unanimously, with no negative votes and abstentions, and two, both Brazil and Germany were obviously under strong political pressure not to name names.&#8221;</p>
<p>As a result, he noted, the resolution was &#8220;lamentably weak &#8211; and the culprits got away.&#8221;</p>
<p>Asked for a response, the Brazilian ministry of external relations, through its public relations firm in New York, remained tight-lipped.</p>
<p>James A. Paul, who served for 19 years as executive director of the New York-based Global Policy Forum, told IPS it was long past due for this issue to be addressed at the United Nations.</p>
<p>&#8220;Electronic espionage has been especially abusively practiced in the U.N. environment and cases are very well known,&#8221; he said.</p>
<p>He pointed out that diplomats have been furious about this for years but many have been reluctant to take up the matter and risk the ill-will of the mighty, especially the United States and UK &#8211; &#8220;the prime offenders&#8221;.</p>
<p>&#8220;In addition to the resolution, let&#8217;s hope the spirit of hopeless resignation is finally set aside and serious consideration given to privacy at the U.N., where much needs to be done to bring the powerful into conformity with international law,&#8221; said Paul, who has written extensively on the politics of the world body.</p>
<p>Samir Sanbar, a former assistant secretary-general who was primarily responsible for the U.N. presence on the internet with the 1995 launch of the U.N. website, told IPS, &#8220;My general impression is that while political officials make public statements, security representatives arrange for discreet deals.&#8221;</p>
<p>And that may explain eventual changes in negotiated texts of the resolution, he said.</p>
<p>In certain circles, bugging was so common that a diplomat excluded from monitoring may have felt insulted, said Sanbar, who served under five different U.N. secretaries-general.</p>
<p>He recalled a long telephone conversation once between a former secretary-general and a pivotal head of state in the Middle East on the Arab-Israeli conflict.</p>
<p>After the call, the secretary general wondered with a wry smile: How many countries would have been listening [to our conversation]?&#8221;</p>
<p>He said on occasions even those directly involved resorted to public exposure when it suited them.</p>
<p>Still, Paul told IPS the General Assembly resolution is a very welcome initiative in the worldwide battle over mass electronic information-gathering.</p>
<p>He said recent revelations have made it clear there is an increasing intrusion of states &#8211; particularly the U.S. &#8211; into the private lives of all citizens, not only those within their national jurisdictions but worldwide.</p>
<p>&#8220;This battle involves first and foremost public opinion. Citizens must bring pressure on states to end or at least greatly restrict these practices,&#8221; he said.</p>
<p>Paul pointed out that a U.N. resolution will not have a binding effect but it will be part of a shift of opinion.</p>
<p>A recent open letter by famous authors is also part of this process as is the initiative of top executives in the internet industry, he noted.</p>
<p>&#8220;The resolution may disappoint some who would like to see stronger language. But in fact this resolution is well-crafted to win broad support and thus to have the maximum moral authority,&#8221; he added.</p>
<p>In a statement released last week, the Brazilian ministry of external relations said it was &#8220;greatly satisfied&#8221; with the consensus resolution.</p>
<p>And it &#8220;demonstrates the recognition, within the international community, of universal principles upheld by Brazil, such as protecting the right to privacy and freedom of expression, especially against extraterritorial actions of States in regard to data collection, monitoring and interception of communications.&#8221;</p>
<p>The statement also noted the resolution was &#8220;innovative in affirming the recognition that the rights of citizens must be protected both &#8216;offline&#8217; and &#8216;online&#8217;, and provides for steps to continue the dialogue and to deepen discussions over the coming months, at the United Nations, on the right to privacy in electronic communications.&#8221;</p>
<p>Meanwhile, the resolution requests U.N. High Commissioner for Human Rights Navi Pillay to present a report on &#8220;the protection and promotion of the right to privacy in the context of domestic and extra-territorial surveillance and/or interception of digital communications and collection of personal data, including on a mass scale.&#8221;</p>
<p>This report is to be submitted to the Human Rights Council and to the General Assembly in 2014, &#8220;with views and recommendations, to be considered by Member States.&#8221;</p>
<p>Virtually all of the revelations of electronic spying have been sourced to documents released by NSA contractor Edward Snowden, currently living in exile in Russia, and a fugitive from U.S. law enforcement agencies who have accused him of espionage.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/" >U.N.’s New Phone Network Vulnerable to Surveillance</a></li>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/" >U.N. Will Censure Illegal Spying, But Not U.S.</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/12/walls-ears-u-n-s-glass-house/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.N. Will Censure Illegal Spying, But Not U.S.</title>
		<link>https://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/</link>
		<comments>https://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/#comments</comments>
		<pubDate>Mon, 28 Oct 2013 23:08:18 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[U.N. General Assembly]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=128438</guid>
		<description><![CDATA[When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.’s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping. A draft resolution currently in limited circulation &#8211; a [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="228" src="https://www.ipsnews.net/Library/2013/10/merkel640-300x228.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/10/merkel640-300x228.jpg 300w, https://www.ipsnews.net/Library/2013/10/merkel640-619x472.jpg 619w, https://www.ipsnews.net/Library/2013/10/merkel640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The electronic surveillance of German Chancellor Angela Merkel (left, pictured with U.N. Secretary-General Ban Ki-moon) reportedly goes back to 2002, even before she was elected to office. Credit: UN Photo/Mark Garten</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Oct 28 2013 (IPS) </p><p>When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.’s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping.<span id="more-128438"></span></p>
<p>A draft resolution currently in limited circulation &#8211; a copy of which was obtained by IPS – criticises “the conduct of extra-territorial surveillance” and the “interception of communications in foreign jurisdictions”.</p>
<p>But it refuses to single out the NSA or the United States, which stands accused of spying on foreign governments, including political leaders in Germany, France, Brazil, Spain and Mexico, among some 30 others.</p>
<p>The draft says that while the gathering and protection of certain sensitive information may be justified on grounds of national security and criminal activity, member states must still ensure full compliance with international human rights.</p>
<p>The resolution will also emphasise “that illegal surveillance of private communications and the indiscriminate interception of personal data of citizens constitutes a highly intrusive act that violates the rights to freedom of expression and privacy, and threatens the foundations of a democratic society.”</p>
<p>Additionally, it will call for the establishment of independent oversight mechanisms capable of ensuring transparency and accountability of state surveillance of communications.</p>
<p>And the resolution will request the U.N. High Commissioner for Human Rights, Navi PIllay, to present an interim report on the issue of human rights and &#8220;indiscriminate surveillance, including on extra-territorial surveillance.&#8221;</p>
<p>This report is to be presented to the 69<sup>th</sup> session of the General Assembly next September, and a final report to its 70th session in 2015.</p>
<p>Chakravarthi Raghavan, a veteran Indian journalist who has been reporting on the U.N. and its activities since the 1960s, both in New York and later in Geneva, told IPS the resolution may help start a process under which the national security interests of every state, international security and right to privacy and human rights of people can be discussed and a balance found in some universal forum.</p>
<p>“Otherwise, the U.N. world order will break down, and no one will benefit or emerge unscathed,” he said.</p>
<p>Much will depend on the follow-up action that the General Assembly resolution calls for, and with what tenacity members pursue it.</p>
<p>“Frankly, I am not at all clear that some of the nations raising the issue now are really serious,&#8221; said Raghavan, editor-emeritus of the Geneva-based South-North Development Monitor SUNS. &#8220;If they were, any one of them in Europe would have granted asylum to Edward Snowden, and not play footsie with U.S. in its attempts to have him jailed in the U.S. on espionage charges.&#8221;</p>
<p>The revelations of U.S. spying have come mostly from documents released by Snowden, a former NSA contractor, who sought political asylum in Russia after he was accused of espionage by the United States.</p>
<p>One Third World diplomat, speaking on condition of anonymity, told IPS the draft could undergo changes by the time it reaches the General Assembly mid-November.</p>
<p>But he held out little hope the final resolution will specifically castigate the United States because of the political clout it wields at the United Nations, and Washington’s notoriety for exerting diplomatic pressure on its allies and aid recipients.</p>
<p>Besides which, he said, everybody plays the spying game, including the French, the Germans, the Chinese and the Russians &#8212; and therefore none of them can afford to take a “holier than thou” attitude.</p>
<p>Still, as the New York Times put it last week, “One thing is clear: the NSA’s Cold War-era argument, that everyone does it, seems unlikely to win the day.”</p>
<p>The co-sponsors of the resolution are Germany and Brazil, whose political leaders have already condemned the United States for electronically breaking into their communications networks. According to published reports Monday, the electronic surveillance of German Chancellor Angela Merkel goes back to 2002, even before she was elected to office.</p>
<p>The German magazine Der Spiegel said over the weekend that NSA spying in Germany originated in the U.S. embassy in Berlin.</p>
<p>There has been a longstanding tradition that the “Five Eyes” do not spy on each other, the five being the United States, Britain, Canada, Australia and New Zealand. But the surveillance of European political leaders has triggered a strong rejoinder from the 28-member European Union (EU).</p>
<p>Raghavan told IPS that even if other countries are not publicly feuding with the U.S. over this &#8212; and perhaps their own security apparatuses are secretly collaborating in this global &#8220;surveillance state&#8221; &#8212; the NSA activities at a minimum raise several systemic issues involving basic violations.</p>
<p>These include violations of the U.N. Charter; &#8220;unauthorised&#8221; and blatantly illegal invasions and/or intrusions into national space; World Trade Organisation (WTO) agreements, in particular the Trade-Related Intellectual Property Rights (TRIPS) Agreement and the General Agreement on Trade in Services (GATS); the International Telecommunication Union Treaty and Conventions; treaties and protocols of the World Intellectual Property Organisation (WIPO); the Universal Human Rights Declaration and conventions; and the Vienna diplomatic conventions and codes of behaviour among civilised nations.</p>
<p>“All these strike at the roots of the very basics of international law and international public law,” he said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/10/u-s-spying-worldwide-may-come-under-u-n-scrutiny/" >U.S. Spying Worldwide May Come Under U.N. Scrutiny</a></li>
<li><a href="http://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/" >Cybercrime Treaty Could Be Used to Go After Cyberespionage</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>U.S. Spying Worldwide May Come Under U.N. Scrutiny</title>
		<link>https://www.ipsnews.net/2013/10/u-s-spying-worldwide-may-come-under-u-n-scrutiny/</link>
		<comments>https://www.ipsnews.net/2013/10/u-s-spying-worldwide-may-come-under-u-n-scrutiny/#respond</comments>
		<pubDate>Fri, 25 Oct 2013 23:04:31 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Global Policy Forum]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=128398</guid>
		<description><![CDATA[When Clare Short, Britain&#8217;s former minister for international development, revealed that British intelligence agents had spied on former U.N. Secretary-General Kofi Annan by bugging his office just before the disastrous U.S. invasion of Iraq in March 2003, the U.N. chief was furious that his discussions with world leaders had been compromised. And as she talked [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Thalif Deen<br />UNITED NATIONS, Oct 25 2013 (IPS) </p><p>When Clare Short, Britain&#8217;s former minister for international development, revealed that British intelligence agents had spied on former U.N. Secretary-General Kofi Annan by bugging his office just before the disastrous U.S. invasion of Iraq in March 2003, the U.N. chief was furious that his discussions with world leaders had been compromised.<span id="more-128398"></span></p>
<div id="attachment_128399" style="width: 317px" class="wp-caption alignright"><a href="https://www.ipsnews.net/Library/2013/10/secretariat450.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-128399" class="size-full wp-image-128399" alt="Some say electronic spying at the U.N. is a logical part of the worldwide espionage programme by the U.S. National Security Agency (NSA). Credit: UN Photo/Milton Grant" src="https://www.ipsnews.net/Library/2013/10/secretariat450.jpg" width="307" height="450" srcset="https://www.ipsnews.net/Library/2013/10/secretariat450.jpg 307w, https://www.ipsnews.net/Library/2013/10/secretariat450-204x300.jpg 204w" sizes="auto, (max-width: 307px) 100vw, 307px" /></a><p id="caption-attachment-128399" class="wp-caption-text">Some say electronic spying at the U.N. is a logical part of the worldwide espionage programme by the U.S. National Security Agency (NSA). Credit: UN Photo/Milton Grant</p></div>
<p>And as she talked to Annan on the 38th floor of the U.N. Secretariat building, Short told the British Broadcasting Corporation (BBC), she was thinking, &#8220;Oh dear, there will be a transcript of this, and people will see what he and I are saying.&#8221;</p>
<p>Nearly 10 years later, the accusing finger is now pointed towards the United States, not Britain.</p>
<p>James A. Paul, who monitored the politics of the United Nations for over 19 years as executive director of the New York-based Global Policy Forum, told IPS U.S. electronic spying at the U.N. is a logical part of the worldwide espionage programme by the U.S. National Security Agency (NSA).</p>
<p>The programme has come to light following documents released by Edward Snowden, a U.S. whistleblower who was a NSA contractor, worked for the Central Intelligence Agency (CIA), and is currently living in political exile in Russia.</p>
<p>“It shows us the latest electronic approaches to surveillance &#8216;listening&#8217;, including the reports that the US has cracked into the UN’s encrypted video system and that there is very aggressive monitoring of UN officials and high-ranking diplomats,” he said.</p>
<p>Paul said none of this can be a surprise (though it is no less outrageous) in view of the tapping of the phones of 35 heads of state, including German Chancellor Angela Merkel, and the collection of information from some 70 million calls during one month in France.</p>
<p>“The U.N. has argued that surveillance targeting the organisation is contrary to international law and to the U.S.’s responsibility as the host country, but such claims have been systematically and flagrantly disregarded,” he noted.</p>
<p>Addressing the General Assembly in September, Brazilian President Dilma Rouseff publicly castigated the United States for illegally infiltrating Brazil’s communications network, surreptitiously intercepting phone calls, and electronically breaking into the Brazilian Mission to the United Nations. </p>
<p>As Western Europe expressed its collective outrage Thursday over U.S. spying on governments and political leaders in France, Germany, Italy, Brazil and Mexico, the United Nations was politically cautious in its comments about the large-scale spying.</p>
<p>Asked whether the world body will take a stand on the ongoing charges of U.S. spying, U.N. spokesperson Martin Nesirky told reporters Friday, “These are clearly bilateral matters involving individual member states.”</p>
<p>He said the allegations of spying were a matter for the General Assembly and its 193 member states – not the Secretariat.</p>
<p>And there is growing speculation that some member states may introduce a resolution condemning widespread NSA spying as a violation of national sovereignty,</p>
<p>But one diplomatic source told IPS, the United States, not surprisingly, is lobbying against it.</p>
<p>Asked about the charges of spying inside the United Nations, U.N. Associate Spokesperson Farhan Haq told IPS the United Nations has consistently maintained the inviolability of diplomatic missions, including the United Nations and other international organisations.</p>
<p>According to a statement released by the United Nations, the functions of these organisations are protected by the relevant international conventions like the Vienna Convention and well-established international law.</p>
<p>“Therefore, Member States are expected to act accordingly to protect the inviolability of diplomatic missions,” the U.N. said, in response to an article titled “How America Spies on Europe and the U.N.” in the Germany magazine Der Spiegel last August.</p>
<p>The German magazine also referred to a 29-page U.S. State Department report, titled “Reporting and Collection Needs: The United Nations”, which called on U.S. diplomats to collect information on key players at the United Nations.</p>
<p>According to this document, the diplomats were asked to gather numbers for phones, mobiles, pagers and fax machines. They were called on to amass phone and email directories, credit card and frequent-flier customer numbers, duty rosters, passwords and even biometric data.</p>
<p>Paul told IPS that there were a number of private accounts in 2002-2003 of U.S. bugging of delegations, including surveillance of private meeting rooms where high-level discussions were taking place to plan common action in the Security Council to block a resolution authorising the use of force against Iraq.</p>
<p>“These revelations were connected to very aggressive U.S. efforts to oust diplomats who were opposing the war, several of whom were in fact abusively recalled,” Paul said.</p>
<p>Washington’s electronic spymasters seem to have no sense of restraint, no realisation that they might be destroying the possibility of a civil order on which a democratic future depends, he noted.</p>
<p>Instead, they are rushing to create a world in which they control the ultimate “panopticon” with everyone and everything under their surveillance and control.</p>
<p>“Their counterparts in the UK, France, Russia, China, Israel and other states are rushing in the same direction. It is a frightening future that is before our eyes”.</p>
<p>But can it be stopped? Certainly not by those who cynically say: it has always been thus, Paul said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/" >Cybercrime Treaty Could Be Used to Go After Cyberespionage</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/09/the-oil-is-ours-but-its-secrets-are-the-nsas/" >“The Oil Is Ours” – But Its Secrets Are the NSA’s</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/u-s-spying-worldwide-may-come-under-u-n-scrutiny/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.S. Accused of Unprecedented Assault on Press Freedom</title>
		<link>https://www.ipsnews.net/2013/10/u-s-accused-of-unprecedented-assault-on-press-freedom/</link>
		<comments>https://www.ipsnews.net/2013/10/u-s-accused-of-unprecedented-assault-on-press-freedom/#respond</comments>
		<pubDate>Fri, 11 Oct 2013 00:19:39 +0000</pubDate>
		<dc:creator>Ramy Srour</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Committee to Protect Journalists (CPJ)]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Federation of American Scientists]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Whistleblowers]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=128088</guid>
		<description><![CDATA[Press freedom advocates here charge that the administration of President Barack Obama is engaged in a war on “leaks” of secret information that is without parallel in this country. This aggressive stance is having a chilling effect on U.S. press freedoms, they say. On one hand, government officials are becoming increasingly wary of speaking with [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Ramy Srour<br />WASHINGTON, Oct 11 2013 (IPS) </p><p>Press freedom advocates here charge that the administration of President Barack Obama is engaged in a war on “leaks” of secret information that is without parallel in this country.<span id="more-128088"></span></p>
<p>This aggressive stance is having a chilling effect on U.S. press freedoms, they say. On one hand, government officials are becoming increasingly wary of speaking with journalists. On the other, reporters fear future criminal prosecutions over leaked information.“One of the reasons behind this tense atmosphere is that the scope of national security as currently defined by the government is extremely broad." -- Steven Aftergood of FAS <br /><font size="1"></font></p>
<p>On Thursday, the Committee to Protect Journalists (CPJ), a non-profit organisation promoting press freedoms worldwide, released its first comprehensive <a href="http://cpj.org/reports/us2013-english.pdf" target="_blank">report</a> on the Obama administration’s surveillance practices and their effects on the domestic press. During the time that Obama has been in office, the number of individuals prosecuted by the Department of Justice (DOJ) for leaked information under the 1917 Espionage Act has seen a staggering increase.</p>
<p>“The Obama administration’s war on leaks … is in stark conflict with the president’s goal of increasing the federal government’s transparency,” Leonard Downie, Jr., the vice president at large of The Washington Post, said Thursday at the report’s Washington release.</p>
<p>Since 2009, a total of six government officials, plus two private contractors, have been subject to criminal prosecutions under the Espionage Act. Prior to that, only three officials had been charged in over nine decades. (Because of the government shutdown, the U.S. Department of Justice was unable to comment for this story.)</p>
<p>“The extremely aggressive approach by the current administration has led to an unusually high number of leak prosecutions,” Steven Aftergood, the director of the Government Secrecy Programme at the Federation of American Scientists (FAS), a security-focused non-profit organisation here, told IPS.</p>
<p>“This has created a polarised atmosphere where journalists are simply frightened by the prospect of future prosecution,&#8221; he said.</p>
<p><b>Broad definitions </b></p>
<p>Public outrage here exploded over another recent incident that saw the Department of Justice secretly seizing Associated Press (AP) telephone records. The secret seizures were part of a DOJ investigation over an AP story that had disclosed a covert U.S. intelligence operation in Yemen.</p>
<p>The DOJ informed the AP of the seizures in May, three months after it had seized the material. Following the AP incident, last month the Senate Judiciary Committee approved a new Media Shield Law, legislation that would protect journalists from being forced to reveal confidential material.</p>
<p>Yet critics, including many journalists, have warned that the law offers only a very narrow definition of journalists, as those individuals who are formally associated with a news media organisation.</p>
<p>“What is worrisome about the new shield law is that, for instance, it would restrict online bloggers and journalists who aren’t connected to a news media organisation from carrying out any journalistic act,” Jillian York, the director of the International Freedom of Expression programme at the Electronic Frontier Foundation (EFF), an advocacy group, told IPS.</p>
<p>“Of course, that depends on your definition of a journalistic act. Although it’s not a clear definition, it should be as broad as possible so as to safeguard the free flow of information.”</p>
<p>Indeed, much of the current debate seems to be centred on the breadth or narrowness of definitions.</p>
<p>“One of the reasons behind this tense atmosphere is that the scope of national security as currently defined by the government is extremely broad,” FAS’s Aftergood says. “It includes areas that many people think ought to be subject to public debate.”</p>
<p>So, while the public and the media would like to see a freer environment for the flow of information, the government has so far adopted a broad view of national security that has enabled it to withhold large amounts of information from the public.</p>
<p>This change has come at a high price, critics say.</p>
<p>“What the recent leaks tell us is not just that the government is trying to restrict freedom of expression,” Larry Siems, the director of the Freedom to Write Programme at the PEN American Center, an advocacy group advancing free expression, told IPS. “They’re telling us that our government has been engaging in activities that run counter to our laws and to international humanitarian law.”</p>
<p><b>War on leaks </b></p>
<p>The most recent example of leaked information involves Edward J. Snowden, the former security contractor who was charged under the Espionage Act for leaking classified government information on phone and Internet surveillance by the U.S. and British governments. Snowden was recently granted asylum in Russia, as he faces prosecution here in the United States.</p>
<p>The Obama administration has also implemented a series of surveillance practices that have made it increasingly troublesome for government officials to approach the press.</p>
<p>The Insider Threat Programme, for instance, aims to eliminate leaks by government officials, ordering federal employees to report any suspicious behaviour by their colleagues. Forced to spy on each other, government officials are now reportedly becoming increasingly less willing to respond to calls from the media, for fear of future repercussions, according to <i>The Washington Post</i>’s Downey, Jr.</p>
<p>The administration’s mass surveillance is impacting on foreign journalists working in the United States, too.</p>
<p>“One of our more troublesome findings is that foreign journalists currently in the U.S. lack any legal protection U.S. reporters may now have,” CPJ’s Joel Simon told IPS. “Unfortunately, they need to operate under the assumption that their communication is not secure.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
<li><a href="http://www.ipsnews.net/2013/08/manning-supporters-vow-to-fight-35-year-sentence/" >Manning Supporters Vow to Fight 35-Year Sentence</a></li>
<li><a href="http://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/" >Groups Force Release of NSA Spying Documents</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/u-s-accused-of-unprecedented-assault-on-press-freedom/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</title>
		<link>https://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/</link>
		<comments>https://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/#comments</comments>
		<pubDate>Tue, 24 Sep 2013 21:31:50 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Dilma Roussef]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[U.N. General Assembly]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127715</guid>
		<description><![CDATA[Throwing diplomatic protocol to the winds, Brazilian President Dilma Rousseff launched a blistering attack on the United States for illegally infiltrating its communications network, surreptitiously intercepting phone calls, and breaking into the Brazilian Mission to the United Nations. Departing from a longstanding tradition of closed-door diplomacy on bilateral disputes, she dropped a political bombshell on [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="244" src="https://www.ipsnews.net/Library/2013/09/dilma2640-300x244.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/09/dilma2640-300x244.jpg 300w, https://www.ipsnews.net/Library/2013/09/dilma2640-579x472.jpg 579w, https://www.ipsnews.net/Library/2013/09/dilma2640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Brazilian President Dilma Rousseff addresses the general debate of the sixty-eighth session of the General Assembly on Sep. 24, 2013. Credit: UN Photo/Rick Bajornas</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Sep 24 2013 (IPS) </p><p>Throwing diplomatic protocol to the winds, Brazilian President Dilma Rousseff launched a blistering attack on the United States for illegally infiltrating its communications network, surreptitiously intercepting phone calls, and breaking into the Brazilian Mission to the United Nations.<span id="more-127715"></span></p>
<p>Departing from a longstanding tradition of closed-door diplomacy on bilateral disputes, she dropped a political bombshell on a room overflowing with world leaders, foreign ministers and ambassadors from 193 countries sitting in rapt silence.</p>
<p>Justifying her public criticism, she told delegates Tuesday that the problem of electronic surveillance goes beyond a bilateral relationship. &#8220;It affects the international community itself and demands a response from it.&#8221;</p>
<p>Rousseff said recent revelations concerning the activities of a global network of electronic espionage have caused indignation and repudiation in public opinion around the world.</p>
<p>But in Brazil, she said, &#8220;The situation was even more serious, as it emerged that we were targeted by this intrusion.&#8221;</p>
<p>She said that personal data of citizens was intercepted indiscriminately. Corporate information, often of high economic and even strategic value, was at the centre of espionage activity.</p>
<p>At the same time, Brazilian diplomatic missions, among them the Permanent Mission to the United Nations and the president&#8217;s office, had their communications intercepted, she charged.</p>
<p>Rousseff unleashed her attack even as U.S. President Barack Obama was awaiting his turn to address the General Assembly on the opening day of the annual high-level debate, which concludes Oct. 4.</p>
<p>By longstanding tradition, Brazil is the first speaker, followed by the United States.</p>
<p>Even though Obama had the right of reply, he did not address the issues raised by Rousseff, who also cancelled a proposed official visit to the White House last week protesting the electronic surveillance of her country.</p>
<p>&#8220;We have let the U.S. government know our disapproval, and demanded explanations, apologies and guarantees that such procedures will never be repeated,&#8221; she said.</p>
<p>According to documents released by U.S. whistleblower Edward Snowden, the illegal electronic surveillance of Brazil was conducted by the U.S. National Security Agency (NSA).</p>
<p>There has been considerable speculation that Brazil may initiate a General Assembly resolution condemning surveillance of member states by outside intelligence agencies. If it is brought before the Assembly, the United States and its Western allies may oppose it.</p>
<p>There have been reports that the NSA had also conducted similar surveillance of European countries and also the office of the European Union located in the U.N. neighbourhood.</p>
<p>Rousseff called on the United Nations to play a leading role in the effort to regulate the conduct of member states with regard to these technologies and the importance of the internet and social networks as a way to build democracy worldwide.</p>
<p>She said Brazil will present proposals for the establishment of a civilian multilateral framework for the governance and use of the Internet and to ensure the effective protection of data that travels through the web.</p>
<p>The Germany-based Der Spiegel magazine reported last month that NSA technicians have managed to decrypt the U.N.&#8217;s internal video teleconferencing (VTC) system, as part of its surveillance of the world body.</p>
<p>The combination of this new access to the U.N. and the cracked encryption code have led to &#8220;a dramatic improvement in VTC data quality and (the) ability to decrypt the VTC traffic,&#8221; the NSA agents reportedly said.</p>
<p>In the article, titled &#8220;How America Spies on Europe and the U.N.&#8221;, Spiegel said that in just under three weeks, the number of decrypted communications increased from 12 to 458.</p>
<p>Rousseff said she was publicly taking up the issue of surveillance because it was a matter of great importance and gravity.</p>
<p>Tampering in such a manner in the affairs of other countries is a breach of international law and is an affront to the principles that must guide the relations among them, especially among friendly nations, she added.</p>
<p>&#8220;A sovereign nation can never establish itself to the detriment of another sovereign nation,&#8221; she said.</p>
<p>The right to safety of citizens of one country can never be guaranteed by violating the fundamental human and civil rights of another country&#8217;s citizens, she added.</p>
<p>And it&#8217;s even worse when private sector companies participate in this type of spying activity, she said.</p>
<p>Responding to the U.S. argument that any surveillance outside the United States was aimed only at monitoring terrorist activities, she said, &#8220;Brazil knows how to protect itself. We reject, fight and do not harbour terrorist groups.&#8221;</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/09/the-oil-is-ours-but-its-secrets-are-the-nsas/" >“The Oil Is Ours” – But Its Secrets Are the NSA’s</a></li>
<li><a href="http://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/" >Brazil Wide Open to Cyber Invasion</a></li>
<li><a href="http://www.ipsnews.net/2013/07/denial-of-airspace-to-bolivian-leader-resonates-at-u-n/" >Denial of Airspace to Bolivian Leader Resonates at U.N.</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Groups Force Release of NSA Spying Documents</title>
		<link>https://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/</link>
		<comments>https://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/#respond</comments>
		<pubDate>Fri, 13 Sep 2013 13:34:50 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[FISC]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127502</guid>
		<description><![CDATA[After more than two years of fighting to prevent their release, the Department of Justice has released numerous documents related to domestic spying on U.S. citizens by the U.S. National Security Agency (NSA) and the previously-secret court opinions that authorised the NSA’s controversial programmes to go forward. On the evening of Sep. 10, the Justice [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Matthew Charles Cardinale<br />SPOKANE, Washington, Sep 13 2013 (IPS) </p><p>After more than two years of fighting to prevent their release, the Department of Justice has released numerous documents related to domestic spying on U.S. citizens by the U.S. National Security Agency (NSA) and the previously-secret court opinions that authorised the NSA’s controversial programmes to go forward.<span id="more-127502"></span></p>
<p>On the evening of Sep. 10, the Justice Department released the documents to the American Civil Liberties Union and the Electronic Frontier Foundation (EFF), which had sued to force their release. Both organisations also have separate litigation against the NSA challenging its domestic spying programmes altogether.“They fought tooth and nail to keep this information from getting out to the public." -- Trevor Timm of EFF<br /><font size="1"></font></p>
<p>The director of national intelligence, James Clapper, has also <a href="http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/927-draft-document">published the documents on the DNI website</a>.</p>
<p>At issue is a <a href="https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/">telephony metadata programme</a>, through which the NSA collects so-called “metadata” regarding every U.S. phonecall. The programme was revealed earlier this year by whistleblower Edward Snowden, who is currently living in Russia under the status of political asylum.</p>
<p>Some of the most significant documents that are part of the release are rulings by the Foreign Intelligence Surveillance Court (FISC) that authorised the telephony metadata programme to move forward over the last several years.</p>
<p>The document release “reveals a few things&#8221;, Trevor Timm, a policy analyst for EFF, told IPS.</p>
<p>&#8220;First the NSA admitted to the court [FISC] in 2009 it had not a single person in the NSA who was able to adequately understand their surveillance system, which is an extraordinary admission because… the surveillance system exists solely because the court authorised it based on the NSA’s explanations,” he said.</p>
<p>“This shows NSA is in charge of itself. They could get away with anything and not tell the court and there would be no repercussions or way for anybody to find out it,” Timm said.</p>
<p>On Jul. 19, the court ordered the Justice Department to meet with the parties seeking access to the FISC records and other records, to negotiate the voluntary release of as many records as possible.</p>
<p>According to EFF, some records have still not been released, but at least this has narrowed the scope of the records dispute remaining before the courts.</p>
<p>EFF is still waiting on at least one crucial FISC opinion that has yet to be released, specifically regarding the court’s interpretation of the word “relevant&#8221;. The word “relevant” appears in Section 215 of the amended Patriot Act and is the NSA’s justification for collecting all U.S. telephony metadata. The NSA argues every citizens’ metadata is relevant to national security.</p>
<p>“We still think we’re going to get that [document]. That will have the most direct effect on the lawsuit [challenging the programme],&#8221; Timm said.</p>
<p>In responding to the Jul. 19 court order, the Justice Department said it was able to release more records than it had been previously because of an Aug. 9 directive by President Barack Obama to release “as much information about these programmes as possible&#8221;.</p>
<p>However, EFF disputes the notion that the government has released the information voluntarily.</p>
<p>“The presidential directive was not the reason they started releasing information. It’s because the Court ordered them to start releasing information,” Timm said. “Because of the presidential directive, those negotiations turned out better than they normally would have.”</p>
<p>“They fought tooth and nail to keep this information from getting out to the public. They wouldn’t even tell us the number of pages involved. They said if we release even one word of this, it would cause significant and articulable harm to national security,” Timm said.</p>
<p>“Since the Snowden revelations, that’s been… [revealed] as ridiculous. Basically they’re just implementing public laws and explaining the legal standards for which they carry out these laws &#8211; this stuff should’ve been public years ago,” Timm said.</p>
<p>In January 2009, the NSA revealed to the court that it had failed to follow its own procedures to minimise the use of citizens’ constitutionally protected private information. The NSA had violated court orders on numerous occasions in which it queried citizens’ information without any suspicion of a connection to terrorism.</p>
<p>The NSA had a list of approximately 18,000 phone numbers that they had been not just collecting but using, but they only had reasonable suspicion of terrorist links for around 2,000 of them.</p>
<p>A Mar. 3, 2009 order, by FISC Judge Reggie B. Walton, obtained by the organisations, <a href="http://www.dni.gov/files/documents/section/pub_March%202%202009%20Order%20from%20FISC.pdf">describes a federal agency run amok</a>.</p>
<p>“The court at first authorised the collection of bulk metadata in 2006,&#8221; Patrick Toomey, attorney and national security fellow at the American Civil Liberties Union’s National Security Project, told IPS.</p>
<p>&#8220;In 2009 it describes the restrictions, the very rigorous restrictions that the court imposed on the use of this phone record metadata, and it describes the ways the government had defied or failed to comply with those restrictions.</p>
<p>“The most disturbing point probably that came out of these documents was the extent of the government’s failure to comply with the court order,” Toomey said.</p>
<p>The NSA argues there is no expectation of privacy for metadata under the Fourth Amendment because it is owned by the phone companies.</p>
<p>“They’ve clung to a case from 1970s that allowed law enforcement to collect one phone call for one person,” Timm said, referring to <a href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&amp;vol=442&amp;invol=735">Smith v. Maryland</a>, a 1979 case decided by the Supreme Court.</p>
<p>Collecting the telephony metadata of all U.S. residents is “not exactly what the U.S. Supreme Court intended or knew could happen when that decision was made,” Timm said.</p>
<p>The NSA has also argued that it is not violating citizens’ rights by merely collecting and storing citizens’ telephone metadata because it only uses the information when it needs to.</p>
<p>But the American Civil Liberties Union disagrees with that logic. “It doesn’t matter what the government does with the information. For Fourth Amendment and privacy purposes, the government has taken for itself information that discloses personal details, political, religious, even medical,” Toomey said.</p>
<p>“If the government took your diary and promised not to read it, it would still be a search, and not just because of your property interest in the paper,” Toomey said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/u-s-russian-rift-may-play-out-at-u-n/" >U.S.-Russian Rift May Play Out at U.N.</a></li>
<li><a href="http://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/" >Critics Question Obama’s Vows to Reform Spying Programme</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/09/groups-force-release-of-nsa-spying-documents/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Turning the Tables on the Trackers: Wikileaks Sniffs Out Spy Salesmen</title>
		<link>https://www.ipsnews.net/2013/09/turning-the-tables-on-the-trackers-wikileaks-sniffs-out-spy-salesmen/</link>
		<comments>https://www.ipsnews.net/2013/09/turning-the-tables-on-the-trackers-wikileaks-sniffs-out-spy-salesmen/#respond</comments>
		<pubDate>Sun, 08 Sep 2013 15:07:02 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Hacking Team]]></category>
		<category><![CDATA[Privacy International]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127372</guid>
		<description><![CDATA[What was Mostapha Maanna of Hacking Team, an Italian surveillance company, doing on his three trips to Saudi Arabia in the last year? A new data trove from WikiLeaks reveals travel details for salesmen like Maanna who hawk electronic technology to track communications by individuals without their knowledge. Wikileaks suspects that Hacking Team technology is [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Sep 8 2013 (IPS) </p><p>What was Mostapha Maanna of Hacking Team, an Italian surveillance company, doing on his three trips to Saudi Arabia in the last year? A new data trove from WikiLeaks reveals travel details for salesmen like Maanna who hawk electronic technology to track communications by individuals without their knowledge.<span id="more-127372"></span></p>
<p>Wikileaks suspects that Hacking Team technology is used to snoop on activists and dissidents.</p>
<p>Julian Assange, the editor in chief of WikiLeaks, says that the information came from a special counter-intelligence unit that his organisation created &#8220;to protect WikiLeaks&#8217; assets, staff and sources from hostile intelligence operations and to reveal the nature of intelligence threats against journalists and sources more broadly.&#8221;</p>
<p>According to research conducted by the Kaspersky Lab, an anti-virus company, Hacking Team sells technology that can be used to create emails to target suspects by inviting them to click on a link or attachment that then installs a spy tool called Remote Control System (RCS) on the target&#8217;s computer.</p>
<p>RCS (also known as DaVinci) can then copy the Web browsing history of its targets, turn on their computer microphone and webcam to eavesdrop on them, as well record their conversations on computer applications like Skype.</p>
<p>Wikileaks documented the travels of two Hacking Team salesmen to countries with a poor record of human rights.</p>
<p>The first was Maanna, whose LinkedIn profile confirms that he works for Hacking Team in Milan. He came to work for the company in January 2011 after completing high school in Tyre, Lebanon, and an undergraduate and graduate degree in telecommunications engineering from Politecnico di Torino in<br />
Turin, Italy.</p>
<p>In addition to three trips to Saudi Arabia, Maanna&#8217;s travel profile places him in Egypt three times in 2013. He also made two trips each to Malaysia and Morocco in the last three years, among other countries, including United Arab Emirates (UAE) and Turkey, according to the documents released by WikiLeaks.</p>
<p>The second individual is Marco Bettini, a sales manager for almost 10 years at HackingTeam whose LinkedIn profile says he studied at the Instituto Radiotecnico Beltrami. Bettini is also identified as traveling to Morocco and UAE in February 2013.</p>
<p>Three of these countries &#8211; Morocco, Turkey and the UAE &#8211; are nations in which Hacking Team has come under fire from groups like Privacy International and Reporters Without Borders for the alleged use of its software.</p>
<p>For example, Mamfakinch, a Moroccan citizen journalist group that was created during the 2011 Arab Spring, believes that it was targeted with a &#8220;backdoor&#8221; attack by software that is identical to Hacking Team&#8217;s RCS system, according to an analysis by Dr. Web, an anti-virus company.</p>
<p>Slate Magazine described how the Mamfakinch&#8217;s computers were infected by spy software after members opened an email titled &#8220;Dénonciation&#8221; (denunciation) that contained a link to what appeared to be a Microsoft Word document labeled &#8220;scandale (2).doc&#8221; alongside a single line of text in French, which translates as: &#8220;Please do not mention my name or anything else, I don&#8217;t want any problems.&#8221;</p>
<p>Wired magazine recently published details of an attack on a U.S. activist who was sent an email about Turkey that appeared to come from a trusted colleague at Harvard that &#8220;referenced a subject that was a hot-button issue for the recipient, including a link to a website where she could obtain more information about it.&#8221; Although she did not click on the email, Arsenal Consulting, a digital forensics company, analysed the link and discovered that it, too, contained RCS attack software.</p>
<p>And Citizen Lab, a computer security research group in Canada, identified emails sent to Ahmed Mansoor, a UAE human rights activist, which were also allegedly designed with Hacking Team software. Mansoor was a member of a group of activists who were imprisoned from April to November 2011 on charges of insulting an Emirati royal family. He told Bloomberg that he was identified and then beaten after he clicked on an email that contained a Microsoft attachment that infected him with the spy software.</p>
<p><strong>Company response</strong></p>
<p>A spokesperson for Hacking Team says the company strictly follows applicable export laws and other regulations and only sells its products to governments or government agencies.</p>
<p>&#8220;The point that is generally missed in discussions like this is that the world is a dangerous place, with plenty of criminals and terrorists using modern Internet and mobil technologies to do their business, and that threatens us all,&#8221; Eric Rabe, the general counsel of Hacking Team, told Corpwatch via email.</p>
<p>&#8220;We firmly believe that the technology we make available to government and law enforcement makes it harder for those criminals and terrorists to operate.&#8221;</p>
<p>Rabe says that Hacking Team understands the potential for abuse of its products, so it reviews customers before a sale to determine whether or not there is &#8220;objective evidence or credible concerns that Hacking Team technology provided to the customer will be used to facilitate human rights violations.&#8221;</p>
<p>He noted that his company&#8217;s products have an auditing feature that cannot be turned off so that government agencies can check how and when surveillance occurs.</p>
<p>&#8220;Of course, HT cannot monitor the use of our software directly since clients must have the ability to conduct confidential investigations,&#8221; Rabe added. &#8220;Should we suspect that abuse has occurred, we investigate. If we find our contracts have been violated or other abuse has occurred, we have the option to suspend support for the software. Without support, the software is quickly rendered ineffective.&#8221;</p>
<p>Rabe says that Hacking Team did investigate &#8220;the Morocco and UAE assertions&#8221; but he was not able to comment since the company &#8220;does not share the results of such investigations nor do we publish whatever actions we may subsequently take.&#8221;</p>
<p>But activists still say that they are very concerned about details in the travel logs released by Wikileaks.</p>
<p>&#8220;The evidence and timeline does give credence to the idea that the discovery of Hacking Team software in Morocco and UAE corroborates with their sales team visit to those countries,&#8221; Kenneth Page, a policy officer at Privacy International, told Corpwatch.</p>
<p>&#8220;This is clearly not an ad-hoc process within a small industry, but a calculated and considered business deal in a global trade with profits made off the suffering of individuals,&#8221; says Page. &#8220;As the Wikileaks release today has shown, the business procedure behind the sale of surveillance technology is as well laid out as any other international trade &#8211; including proposals and presentations, site and country visits, contracts, and costing packages.&#8221;</p>
<p>Page said that the companies that develop and sell surveillance technology to such regimes should not be allowed to abdicate responsibility for freely selling this technology to just any government regardless of their human rights record.</p>
<p>&#8220;Companies know full well how their products work and, after tailoring to their specific clients&#8217; need, know how they will be used,&#8221; added Page.</p>
<p><em>*A longer version of this story originally appeared on <a href="http://www.Corpwatch.org">Corpwatch.org</a>.</em></p>
		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/09/turning-the-tables-on-the-trackers-wikileaks-sniffs-out-spy-salesmen/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ACLU Reveals FBI Hacking Contractors</title>
		<link>https://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/</link>
		<comments>https://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/#respond</comments>
		<pubDate>Sun, 25 Aug 2013 14:28:08 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126817</guid>
		<description><![CDATA[James Bimen Associates of Virginia and Harris Corporation of Florida have contracts with the U.S. Federal Bureau of Investigation (FBI) to hack into computers and phones of surveillance targets, according to Chris Soghoian, principal technologist at the American Civil Liberties Union&#8217;s Speech, Privacy and Technology Project. &#8220;Bimen and Harris employees actively hack into target computers [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 25 2013 (IPS) </p><p>James Bimen Associates of Virginia and Harris Corporation of Florida have contracts with the U.S. Federal Bureau of Investigation (FBI) to hack into computers and phones of surveillance targets, according to Chris Soghoian, principal technologist at the American Civil Liberties Union&#8217;s Speech, Privacy and Technology Project.<span id="more-126817"></span></p>
<p>&#8220;Bimen and Harris employees actively hack into target computers for the FBI,&#8221; Soghoian told CorpWatch.</p>
<p>James Bimen Associates did not return phone calls asking for comment. Jaime O&#8217;Keefe, a spokesman for Harris, and Jennifer Shearer, an FBI spokeswoman, both declined to comment for this story.</p>
<p>However, the FBI has not denied these capabilities. The agency &#8220;hires people who have hacking skill, and they purchase tools that are capable of doing these things,&#8221; a former official in the FBI&#8217;s cyber division told the Wall Street Journal recently. &#8220;When you do, it&#8217;s because you don&#8217;t have any other choice.&#8221;</p>
<p>Soghoian verified the information from other sources, after uncovering the information from Freedom of Information Act requests filed by the Electronic Freedom Foundation (EFF) and other publicly available information.</p>
<p>&#8220;The government doesn&#8217;t have the resources to directly monitor every American or let alone every foreigner but they want to read the communications of every foreigner and they want to collect information on every American,&#8221; explains Soghoian. &#8220;What do you do when you don&#8217;t have the manpower to collect everyone&#8217;s communications?&#8221;</p>
<p>The answer, he says, is spy software. This is not unprecedented among government agencies. For example, the U.S. Food and Drug Administration (FDA) bought commercial products from a company named SpectorSoft in Florida to track five staff whom they suspected of whistleblowing in 2009.</p>
<p>The software allowed them to capture &#8220;screen images from the government laptops of five scientists as they were being used at work or at home, tracked their keystrokes, intercepted their personal e-mails, copied the documents on their personal thumb drives and even followed their messages line by line as they were being drafted,&#8221; the New York Times reported last year.</p>
<p>Other companies like Gamma International from Germany and Hacking Team from Italy have also been aggressively marketing their products for purchase by local police officers. A number of national governments like Egypt and Mexico have also reportedly bought such systems that allow them to listen to regular phone and Skype conversations and read email.</p>
<p>But what agencies like the FBI are now worried about is that individuals are &#8220;going dark&#8221; by using freely available encryption software to prevent their email and phone conversations to be captured by law enforcement agencies.</p>
<p>In order to combat this, Soghoian says the FBI wanted custom designed products, so they turned to a little known internal team named the &#8220;Remote Operations Unit&#8221; inside the Operational Technology Division, which set up a project called &#8220;Going Dark&#8221;.</p>
<p>Eric Chuang, the head of the Remote Operations Unit in Quantico, Virginia, who has a doctorate in clinical psychology from Indiana University of Pennsylvania, and a law degree from Temple University in Philadelphia, was put in charge of this task.</p>
<p>Bimen Associates, which has its headquarters in McLean, Virginia, near the headquarters of the Central Intelligence Agency, provided custom designed software tools developed exclusively for the FBI to crack encrypted conversations, says Soghoian. Agency staff and contractors access computers of suspects remotely to install this software to allow them to watch everything that the target types or says.</p>
<p>In February 2008, Bimen Associates hired Amanda Hemmila, a former U.S. Air Force computer technician, who was working on an online undergraduate degree in computer science with Grantham University in Missouri, to help test their new software.</p>
<p>Hemmila&#8217;s LinkedIn resume says that she was responsible for &#8220;building, testing, deploying, maintaining and tracking software kits and hardware deployed from the Remote Operations Unit Deployment Operations Center&#8221; as well as training them in &#8220;processing and viewing software and providing End User phone support.&#8221; She also helped write policies, guidance and training material to keep the software secret.</p>
<p>After spending a little over a year at Bimen Associates, Hemmila returned to her studies and graduated in 2012. A few months after she left, Mark Muller, who had an undergraduate degree in information technology from George Mason university, went to work for Bimen Associates in Quantico.</p>
<p>Muller says he wrote up the standard operating procedures for the FBI to use proprietary company software &#8220;we use to gain access to criminal subject machines in the field.&#8221;</p>
<p>He also conducted &#8220;pre-deployment meetings with the FBI agents and management to coordinate details of a case and implement an operational plan to track a subject(s).&#8221; After the agents completed monitoring of a target, Muller says he archived information on &#8220;previous implant(s) installed on subject&#8217;s machine, if any, as a knowledge base for the field agents.&#8221;</p>
<p>Bimen Associates does not appear to be a big or well known intelligence contractor &#8211; the only public contract that the company has been awarded lists zero income &#8211; but it is well connected.</p>
<p>Jerry Menchhoff, president of Bimen Associates, has been with the company since it was founded in 1998, after working for Booz Allen Hamilton, a company famous for two other employees &#8211; James Clapper and Michael McConnell, both of whom have worked as U.S. director of national intelligence, the top spy job in the country.</p>
<p>(Booz also made the news more recently when Edward Snowden, another former employee, blew the whistle on the surveillance activities of the U.S. National Security Agency).</p>
<p>The other company that supplies tracking software to the FBI is Melbourne, Florida-based Harris Corporation, which has been awarded almost seven million dollars in contracts by the agency since 2001, mostly for radio communication equipment. In 1999 Harris designed the software for the agency&#8217;s National Crime Information Centre database that keeps track of criminal histories, fugitives, missing persons, and stolen property.</p>
<p>Harris made it into the news a couple of years ago when the Wall Street Journal revealed that the company was selling a gadget called a &#8220;Stingray&#8221; to the FBI that allows the agency to track cellphone locations of users without their knowledge.</p>
<p>At the time Sherry Sabol, chief of the Science &amp; Technology Office for the FBI&#8217;s Office of General Counsel, refused to provide any background on the subject because she said that information about Stingrays and related technology was &#8220;considered Law Enforcement Sensitive, since its public release could harm law enforcement efforts by compromising future use of the equipment.&#8221;</p>
<p>However, legal depositions by FBI agents, together with contract data dating back to 2002, confirmed the existence of the Stingray.</p>
<p>The big question is whether or not the FBI obtains warrants before using tracking software. In the case of the Stingray, the agency claimed that it was okay to use such devices without obtaining a warrant, on the grounds that it was like tracking down phone numbers, which the U.S. Supreme Court has ruled is permissible.</p>
<p>But privacy advocates say that tracking the &#8220;metadata&#8221; of phone and computer communications and the information on it involves a far greater invasion of privacy, and should require a warrant from a judge. (This discussion is still ongoing in the courts, notably after a U.S. court ruled it was okay for the government to track cell phone location data without a warrant).</p>
<p>Soghoian believes there needs to be a public debate on the use and potential misuse of these tools.</p>
<p>&#8220;There hasn&#8217;t been a (Congressional) debate about the FBI getting into the hacking business,&#8221; Soghoian told attendees at DEFCON, an annual hacker convention that took place earlier this month in Las Vegas. &#8220;People should understand that local cops are going to be hacking into surveillance targets. Particularly for dragnet searches where they want to do a keyword search or a social network analysis, you need everyone&#8217;s communications.&#8221;</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.CorpWatch.org">CorpWatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/" >Eavesdropping on the Whole World</a></li>
<li><a href="http://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/" >Glimmerglass Taps Undersea Cables for Spy Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Eavesdropping on the Whole World</title>
		<link>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/</link>
		<comments>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/#respond</comments>
		<pubDate>Sat, 24 Aug 2013 12:03:08 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Africa]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glimmerglass]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126807</guid>
		<description><![CDATA[How do U.S. intelligence agencies eavesdrop on the whole world? The ideal place to tap trans-border telecommunications is undersea cables that carry an estimated 90 percent of international voice traffic. These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 24 2013 (IPS) </p><p>How do U.S. intelligence agencies eavesdrop on the whole world? The ideal place to tap trans-border telecommunications is undersea cables that carry an estimated 90 percent of international voice traffic.<span id="more-126807"></span></p>
<p>These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead to wire the far reaches of its empire. Today a multi-billion dollar shipping industry continues to lay and maintain hundreds of such cables that crisscross the planet &#8211; over half a million miles of such cables are draped along the ocean floor and snaked around coastlines &#8211; to make landfall at special locations to be connected to national telecommunications systems.</p>
<p>The original cables were made of copper but about 25 years ago, they were replaced by fibre-optic cables. The oldest undersea cable was Trans Atlantic-8 (installed in 1988 by AT&amp;T to transmit data from Tuckerton, New Jersey to Bude, Cornwall) which transmitted data at 280 megabits per second.</p>
<p>The latest cables like Yellow/Atlantic Crossing 2 (installed in 2000 and upgraded in 2007 by Level Three Communications from Brookhaven, New York to Bude, Cornwall) is capable of transmitting data at an astonishing 640 gigabits per second, which is roughly equal to 7.5 million simultaneous phone calls.</p>
<p>In order to make sure that data and voice are transmitted quickly and accurately across the world even if cables break or equipment fails, cable companies break the data into separate tiny packets that are dispatched over what they call &#8220;redundant fibre optic paths&#8221; across the ocean before it is captured and re-assembled on the other side, where it also becomes easy to intercept the data unobtrusively.</p>
<p>This is where Glimmerglass, a northern California company that sells optical fibre technology, comes in. In September 2002, the company started to ship a pioneering technology to help transmit data accurately over multiple optical paths.</p>
<p>Their patented &#8220;3D Micro-Electro-Mechanical-System (MEMS) mirror array&#8221; is composed of 210 gold-coated mirrors mounted on microscopic hinges, each measuring just one millimeter in diameter, etched on a single wafer of silicon.</p>
<p>Each mirror can be individually managed by remote operators anywhere in the world to capture or bounce the light signals and even more importantly, communicate with the other mirrors to make sure that the rest of the array stays in place, allowing very accurate data transmission. This technology slashed the cost of optical switching by a factor of 100, and the company claims that the switches are very robust with an expected failure rate of once in 30 years.</p>
<p>For telecommunication companies, Glimmerglass offers three hardware racks to handle optical data &#8211; the entry level &#8220;100&#8221; system which can handle as many as 96&#215;96 fibre ports for traffic as high as 100 gigabits per second all the way up to the &#8220;600&#8221; system which can handle 192&#215;192 fibre ports. It also offers the &#8220;3000&#8221; system which can hold up to 12 racks.</p>
<p>A major advantage of the Glimmerglass technology, according to the company, is that operators can &#8220;monitor and test remote facilities&#8221; at undersea cable landings from a central office and then select any one of multiple optical signals to distribute it to multiple recipients, as well as the ability to redirect any signal.</p>
<p>&#8220;With Glimmerglass Intelligent Optical Systems, any signal travelling over fibre can be redirected in milliseconds, without adversely affecting customer traffic,&#8221; the company writes on its website. &#8220;At a landing site, this connectivity permits optical layer connections between the wet side and dry side to be re-provisioned in milliseconds from the Network Operations Center with a few clicks of a mouse.&#8221;</p>
<p>In another section of the public website the company also promotes a product named Glimmerglass Intelligent Optical System (IOS) that combines the 3D-MEMS switches with another Glimmerglass product called CyberSweep into an integrated product that has the ability to &#8220;monitor and selectively intercept communications&#8221;.</p>
<p>&#8220;Service Providers can use the speed and flexibility of the IOS to select and deliver signals to Law Enforcement Agencies (LEA),&#8221; add company brochures uncovered by Wikileaks. &#8220;The agency gains rapid access, not just to signals, but to individual wavelengths on those signals (and) make perfect photonic copies of optical signals for comprehensive analysis.&#8221;</p>
<p>Could the new Glimmerglass optical switching technology be the means by which the U.S. National Security Agency (NSA) is tapping international phone calls, as revealed by whistleblower Edward Snowden to the Guardian newspaper?</p>
<p>Vanee Vines, a spokesperson for the NSA, declined to comment on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.</p>
<p>But Glimmerglass has told industry media that it sells this technology to some major government intelligence agencies.</p>
<p>&#8220;We&#8217;ve become a gold standard in the intel and defence community. They&#8217;re managing these optical signals so they can acquire, split, move and obtain the necessary information to protect the country,&#8221; Robert Lundy, the CEO of Glimmerglass for the last nine years, told Fierce Telecom, an industry blog, in an interview about global malware threats.</p>
<p>&#8220;At their undersea landing locations, their major points of presence, on a selective basis they need to acquire and monitor those optical signals rather than wait to get it off somebody&#8217;s, when it hits a PC or cellphone.&#8221;</p>
<p>Keith May, his deputy in charge of business development, has gone even further. &#8220;We believe that our 3D MEMS technology &#8211; as used by governments and various agencies &#8211; is involved in the collection of intelligence from sensors, satellites and undersea fibre systems,&#8221; May told the magazine. &#8220;We are deployed in several countries that are using it for lawful interception.&#8221;</p>
<p><strong>Fulfilling a dream</strong></p>
<p>Analysis of bulk telecommunications data to track as yet unknown targets has long been on the NSA wish list. For decades, the agency stuck to following specific individuals because there was no way to capture and analyse everything.</p>
<p>In 2000, two rival projects were commissioned to try to collect &#8220;all the signals all the time&#8221;. Science Applications International Corporation, based in Tyson&#8217;s Corner, Virginia, was given a contract to design a collection system called TrailBlazer, while the NSA&#8217;s in-house Signals Intelligence Automation Research Center (SARC) worked on a project called ThinThread.</p>
<p>TrailBlazer was eventually jettisoned as unworkable after 1.2 billion dollars had been spent. ThinThread was more successful, according to its proponents, because it was able to selectively process important information and dump the rest. The designers also created controls to anonymise the data collection to avoid violating privacy laws.</p>
<p>ThinThread could &#8220;correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other &#8216;attributes&#8217; that an analyst might find useful in pinpointing &#8216;the bad guys,'&#8221; writes Jane Mayer in the New Yorker magazine, based on her interviews with former NSA staff.</p>
<p>Unfortunately for the SARC team, ThinThread was vetoed by upper management at the NSA in August 2001. But after the Sep. 11, 2001 attacks, the NSA is believed to have returned to the drawing board. Rumor has it that the project was restarted, stripped of any privacy controls.</p>
<p>Some of the scientists who worked on the project recently came forward to say that they had made a mistake.</p>
<p>&#8220;I should apologise to the American people,&#8221; William Binney, a former NSA staffer who was in charge of designing ThinThread, told Mayer. &#8220;It&#8217;s violated everyone&#8217;s rights. It can be used to eavesdrop on the whole world.&#8221;</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.CorpWatch.org">CorpWatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/" >Glimmerglass Taps Undersea Cables for Spy Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Glimmerglass Taps Undersea Cables for Spy Agencies</title>
		<link>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/</link>
		<comments>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/#respond</comments>
		<pubDate>Fri, 23 Aug 2013 14:18:55 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Glimmerglass]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126783</guid>
		<description><![CDATA[Glimmerglass, a northern California company that sells optical fibre technology, offers government agencies a software product called &#8220;CyberSweep&#8221; to intercept signals on undersea cables. The company says their technology can analyse Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover &#8220;actionable intelligence&#8221;. Could this be the technology that the [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Aug 23 2013 (IPS) </p><p>Glimmerglass, a northern California company that sells optical fibre technology, offers government agencies a software product called &#8220;CyberSweep&#8221; to intercept signals on undersea cables.<span id="more-126783"></span></p>
<p>The company says their technology can analyse Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover &#8220;actionable intelligence&#8221;.</p>
<p>Could this be the technology that the U.S. National Security Agency (NSA) is using to tap global communications? The company says it counts several intelligence agencies among its customers but refuses to divulge details. One thing is certain &#8211; it is not the only company to offer such capabilities &#8211; so if such data mining is not already taking place, that day is not far off.<div class="simplePullQuote"><b>The GCHQ Advantage</b><br />
<br />
Why go overseas to collect the data? Well, there are legal obstacles in the U.S. to collecting phone calls made by U.S. citizens - such a programme would violate the fourth amendment to the U.S. constitution that protects individuals against invasion of privacy. (Exceptions are granted for communications with foreigners if government agencies suspect terrorism under a 1981 presidential executive order, although they still need approval of the U.S. Attorney General).<br />
<br />
But given that U.S. laws stop at the border, foreign spy agencies like GCHQ can legally pick up and store any and all information from data that travels outside the country, suggest reporters at the Guardian newspaper.<br />
<br />
"We know the NSA is forbidden from spying on American citizens; in the case of (Faizal) Shahzad (the would-be Times Square bomber in New York), this question remains - was GCHQ doing it for them?" ask the Guardian reporters, noting that the GCHQ now has the "opportunity to build such a complete record of someone's life through their texts, conversations, emails and search records" allowing it to make a "unique contribution to the NSA in providing insights into some of their highest priority targets."</div></p>
<p>&#8220;Revolutions in communications technologies are usually followed by revolutions in collection capabilities,&#8221; said Jeffrey Richelson, a senior fellow at the National Security Archives and the author of the definitive guide to the U.S. intelligence agencies.</p>
<p>The recent leaks by whistleblower Edward Snowden to the Guardian newspaper specifically suggest that the NSA is tapping undersea cables, although no details on the specific technology have yet been published. Notably Snowden has revealed evidence that the NSA paid 15.5 million pounds (25 million dollars) in 2009 to &#8220;radically&#8221; upgrade a listening station operated by its U.K. equivalent &#8211; the Government Communications Head Quarters (GCHQ) in Bude, north Cornwall, England, where many of the cables surface.</p>
<p>If GCHQ and the NSA installed Glimmerglass&#8217;s commercial optical fibre switching technology on the undersea cables to tap the torrent of data that crosses the Atlantic, they will be able to pair it up with CyberSweep to make sense of the information, according to advertising claims made in a treasure trove of documents on dozens of surveillance contractors released by Wikileaks.</p>
<p>Privacy experts say that if the NSA is using this Glimmerglass technology, it will prove whistleblower Edward Snowden&#8217;s claim that the government is collecting everyone&#8217;s communications, regardless of their citizenship or innocence.</p>
<p>Vanee Vines, a spokesperson for the NSA, declined to comment to IPS on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.</p>
<p><strong>CyberSweep</strong></p>
<p>On the Glimmerglass website, the company claims that CyberSweep can process optical signals to &#8220;extract the data source format&#8221; and aggregate the data for &#8220;probes&#8221; to uncover &#8220;actionable information from the flood of data on persons of interest, known and unknown targets, anticipated and known threats.&#8221;</p>
<p>More details on what Glimmerglass claims CyberSweep can do are explained in &#8220;Paradigm Shifts&#8221; &#8211; a confidential 18 page Powerpoint presentation made in 2011 by Jim Donnelly, the Glimmerglass vice president of North American sales. The document was released by Wikileaks as part of the Spy Files series in December of that year.</p>
<p>On page five of the presentation, Glimmerglass notes that CyberSweep is an &#8220;end to end cyber security solution&#8221; that can &#8220;select, extract and monitor&#8221; all &#8220;mobile and fixed line data, voice and video, internet, web 2.0 and social networking&#8221; with &#8220;probes and sniffers.&#8221; On the following page, it notes that its product can be used at &#8220;submarine landing stations&#8221; &#8211; a reference to the locations where the undersea cables are connected to terrestrial systems.<div class="simplePullQuote"><b>Are Companies Helping Invade Privacy?</b><br />
<br />
Civil liberties experts have denounced the practice of wholesale data collection. "By injecting the N.S.A. into virtually every crossborder interaction, the U.S. government will forever alter what has always been an open exchange of ideas," says Jameel Jaffer, the deputy legal director of the American Civil Liberties Union.<br />
<br />
Such collection would also violate numerous legal principles that safeguard individual privacy. In addition to the fourth amendment to the U.S. constitution, human rights experts say that it would violate Article 8 of the European Convention on Human Rights and Article 12 of the Universal Declaration of Human Rights.<br />
<br />
The big questions now are what role did the telecommunication companies play in the data interception and are intelligence contractors like Glimmerglass helping to design the collection and analysis system?<br />
<br />
"Tempora would not have been possible without the complicity of these undersea cable providers," says Eric King, head of research at Privacy International. "What we, and the public, deserve to know is this: To what extent are companies cooperating with disproportionate intelligence gathering, and are they doing anything to protect our right to privacy?"<br />
</div></p>
<p>On page eight, Glimmerglass provides specific examples of what it can gather &#8211; like Gmail, Yahoo! Mail as well as Facebook and Twitter. Over the next four pages it offers screenshots of these capabilities.</p>
<p>One display of what CyberSweep is capable of is a visual grid of Facebook messages of a presumably fictional person named John Smith. His profile is connected to a number of other individuals with arrows indicating how often he connected to each of them. Each individual can be identified with images, user names and IDs. Another pane shows the detailed chat records. Yet another graphic shows Facebook connections between multiple individuals, presumably to identify networks.</p>
<p>A third graphic is a grid of phone calls made by an individual with a pane that allows an operator to select and listen to audio of any specific conversation. Other images show similar demonstrations of monitoring webmail and instant message chats.</p>
<p>Where is this product being used? In a product video on the company website, Glimmerglass states that their optical data management products have been used by the U.S. intelligence agencies for the last five years. The video specifically mentions data transmissions from Predator drones and well as the tapping of undersea fibre optic cables, but it does not go into any details.</p>
<p>&#8220;The challenge of managing information has become the challenge of managing the light,&#8221; says an announcer. &#8220;With Glimmerglass, customers have full control of massive flows of intelligence from the moment they access them.&#8221;</p>
<p>The description mirrors the technology described in documents provided by Edward Snowden to the Guardian newspaper.</p>
<p><strong>Collecting all the signals</strong></p>
<p>In a document released by Snowden, Lieutenant General Keith Alexander, the NSA director, was quoted on a June 2008 visit to an intelligence facility in the U.K., saying: &#8220;Why can&#8217;t we collect all the signals all the time? Sounds like a good summer project.&#8221;</p>
<p>According to the leaked documents, a three year trial project was soon set up with a 25-million-dollar grant from the NSA to &#8220;radically enhance the infrastructure&#8221; at the Cyber Development Centre in Bude, Cornwall, as well as potentially at other sites like the GCHQ base in Cheltenham.</p>
<p>Probes were installed on 200 undersea cables and in the fall of 2011, a project code-named Tempora was launched with the help of NSA analysts who came to help at the Bude site. At least seven companies took part in the project &#8211; British Telecom, Global Crossing, Interoute, Level 3, Viatel, Verizon Business and Vodafone Cable &#8211; according to the German paper Suddeutsche Zeitung, all of whom manage major undersea cable systems.</p>
<p>Under Tempora, a three-day buffer of global internet traffic was held at any given time &#8211; totaling some 600 million &#8220;telephone events&#8221; a day or as much as 21 petabytes (million gigabytes) of data. While much of it was deleted through a process called Massive Volume Reduction for reasons of space, the meta-data (such as the details of who called whom, and when, but not the content) was held for as long as 30 days.</p>
<p>Snowden&#8217;s documents suggest that GCHQ now &#8220;produces larger amounts of metadata than NSA&#8221; which was being analysed by 300 U.K. analysts in addition to 250 NSA analysts, as of last May. The U.K. analysts were encouraged to dig deep since they had a less onerous oversight regime compared to the U.S.</p>
<p>&#8220;Over the last five years, GCHQ&#8217;s access to &#8216;light&#8217; (has) increased by 7,000 percent,&#8221; a Tempora official is quoted as saying in another Powerpoint document cited in the Guardian. &#8220;We will have exploited to the full our unique selling points of geography, partnerships, the UK&#8217;s legal regime and our skilled workforce.&#8221;</p>
<p>A recent interview of a &#8220;senior intelligence official&#8221; by the New York Times confirmed that &#8220;the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border&#8221; by making a &#8220;clone of selected communication links.&#8221; The official did not state where the communications were being intercepted.</p>
<p><em>Pratap Chatterjee is executive director of CorpWatch. This story originally appeared on <a href="http://www.Corpwatch.org">Corpwatch.org</a>.</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" >Spying Scandal Engulfs Other U.S. Agencies</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/glimmerglass-taps-undersea-cables-for-spy-agencies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spying Scandal Engulfs Other U.S. Agencies</title>
		<link>https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/</link>
		<comments>https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/#respond</comments>
		<pubDate>Wed, 21 Aug 2013 20:51:31 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[DEA]]></category>
		<category><![CDATA[Drugs]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[IRS]]></category>
		<category><![CDATA[Law Enforcement Against Prohibition]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Special Operations Division]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126743</guid>
		<description><![CDATA[Earlier this month, Reuters revealed that a special division within the U.S. Drug Enforcement Administration (DEA) has been using intelligence intercepts, wiretaps, informants and a mass database of telephone records to secretly identify targets for drug enforcement actions. In the wake of these revelations, a former prosecutor tells IPS he believes he and his colleagues [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Matthew Charles Cardinale<br />SPOKANE, Washington, Aug 21 2013 (IPS) </p><p>Earlier this month, Reuters revealed that a special division within the U.S. Drug Enforcement Administration (DEA) has been using intelligence intercepts, wiretaps, informants and a mass database of telephone records to secretly identify targets for drug enforcement actions.<span id="more-126743"></span></p>
<p>In the wake of these revelations, a former prosecutor tells IPS he believes he and his colleagues may have been unwitting pawns in the federal government’s effort to deceive defendants and the court system, thereby violating citizens’ constitutional rights.“This is changing the rules of the game so they can conceal the source and use tainted information." -- former prosecutor Patrick Nightingale<br /><font size="1"></font></p>
<p>“None of us had any idea whatsoever there was a secret DEA programme that instructed DEA agents to conceal the source,” Patrick Nightingale, a former prosecutor for Allegheny County, Pennsylvania, and a member of <a href="http://www.leap.cc/">Law Enforcement Against Prohibition</a>, told IPS.</p>
<p>“My oath as an attorney and as a prosecutor was as an officer of the constitution, and not to win at all costs. This [programme] is a win at all costs mentality: whether it’s constitutional or not we’re going to use it and we can conceal it,” he said.</p>
<p>Called the Special Operations Division (SOD), it is comprised of some two dozen federal agencies, including the Federal Bureau of Investigation, Central Intelligence Agency, National Security Agency (NSA), Internal Revenue Service (IRS), and the Department of Homeland Security.</p>
<p>Everything about the SOD is secret, including the size of its budget and the location of its offices.</p>
<p>Reuters has also identified the IRS as a recipient of the information, pointing to a former IRS training manual that referenced the SOD programme.</p>
<p>As a routine practice, the SOD secretly provides the information to local authorities across the U.S., allowing them to start investigations against U.S. citizens under false pretenses, in a practice known as “parallel construction&#8221;.</p>
<p>For example, under parallel construction, local law enforcement will be instructed to find a reason to stop a particular vehicle &#8211; for example, through a routine traffic stop &#8211; and then once the drugs are found, the government will falsely state the drugs were found in the traffic stop.</p>
<p>The IRS training document details how government officials are instructed to conceal &#8211; from prosecutors, defence attorneys, and even the courts &#8211; the methods by which a suspected drug criminal is identified and then targeted for apprehension.</p>
<p>&#8220;Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,&#8221; the 2005 and 2006 IRS training manual says, according to Reuters.</p>
<p>&#8220;SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations,” the document states.</p>
<p>The Electronic Frontier Foundation (EFF), a group that defends free speech and privacy issues, calls it “<a href="https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering">intelligence laundering</a>&#8220;.</p>
<p>Since the revelations on Aug. 5, the Justice Department has said it is reviewing the programme, according to reports. But such a review does not address the constitutional violations that appear to have already occurred.</p>
<p>“Our criminal justice system is based on the presumption of innocence and our constitution demands fair play in criminal proceedings. It demands that prosecutors reveal to the defence both the good and the bad,” Nightingale said.</p>
<p>“If the source of this information is so sensitive that a law enforcement agency is told to keep the information from its own team [including federal and local prosecutors] because it knows members of its team are required to divulge it to the other side [the defence], then it’s a problem,” he said.</p>
<p>Nightingale told IPS he had no awareness of the programme as a prosecutor, even though he worked on many cases where he sought court approval for a Title 3 wiretap based on certain evidence. Now he does not know &#8211; nor does he have any way of knowing &#8211; how many of those cases originated from a secret SOD tip.</p>
<p>“This is changing the rules of the game so they can conceal the source and use tainted information, depriving&#8230; defence attorneys and defendants from being able to have a fair trial as defined by the Constitution,” he said.</p>
<p>Hanni Fakhoury, a staff attorney with EFF, told IPS, “The NSA data is being gathered on purpose, and then directed to a different purpose.” He said the information being gathered by the NSA “should” be something that the FISA Court has been approving, although there is no way to know.</p>
<p>“Those orders have a broad scope. The orders aren’t public, there isn’t insight into what the orders look like, or how the court operates really,” Fakhoury said.</p>
<p>“The big concern is they’re not being forthright about the fact that they’re using the information directed toward a purpose not related to national security, and they’re not telling the court or the defendants the true source of that information.</p>
<p>“It’s yet more proof what is being said publicly [by the NSA] is not all entirely accurate,&#8221; he said. “It’s another reason why we have to very carefully scrutinise the government’s justification for these types of programmes.&#8221;</p>
<p>Fakhouri says the SOD programme is unconstitutional because of the Fifth and Sixth Amendments combined.</p>
<p>Full and fair disclosure is enshrined in the U.S. Constitution as part of the Sixth Amendment, which states, “In all criminal prosecutions, the accused shall enjoy the right&#8230; to be informed of the nature and cause of the accusation.”</p>
<p>The Fifth Amendment provides, “No person shall be&#8230; deprived of life, liberty, or property, without due process of law.”</p>
<p>The revelations also raise the possibility that individuals who have been convicted over the last 20 years on drug charges, or perhaps IRS-related charges, will challenge those convictions in court on the basis that secret evidence may have been used in the investigative process.</p>
<p>“I think we’re going to see a lot of those types of arguments. How successful those will be &#8211; will be a tough sell. I think it will be an interesting thing to watch,” Fakhoury said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/05/obama-issues-landmark-open-government-rules/" >Obama Issues Landmark “Open Government” Rules</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2010/02/us-telecom-lobby-tests-pledge-of-transparency/" >U.S.: Telecom Lobby Tests Pledge of Transparency</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Manning Supporters Vow to Fight 35-Year Sentence</title>
		<link>https://www.ipsnews.net/2013/08/manning-supporters-vow-to-fight-35-year-sentence/</link>
		<comments>https://www.ipsnews.net/2013/08/manning-supporters-vow-to-fight-35-year-sentence/#respond</comments>
		<pubDate>Wed, 21 Aug 2013 19:48:36 +0000</pubDate>
		<dc:creator>Jared Metzker</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Armed Conflicts]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[Bradley Manning]]></category>
		<category><![CDATA[Heritage Foundation]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[Whistleblowers]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126737</guid>
		<description><![CDATA[Bradley Manning, the army private whose leaks of classified information and subsequent prosecution have been the subject of fierce international debate for over three years, was sentenced to 35 years in military prison Wednesday, but his legal team and supporters say they will fight the sentence. “It’s tragic,” Nathan Fuller of the Bradley Manning Support [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Jared Metzker<br />WASHINGTON, Aug 21 2013 (IPS) </p><p>Bradley Manning, the army private whose leaks of classified information and subsequent prosecution have been the subject of fierce international debate for over three years, was sentenced to 35 years in military prison Wednesday, but his legal team and supporters say they will fight the sentence.<span id="more-126737"></span></p>
<div id="attachment_126738" style="width: 370px" class="wp-caption alignright"><a href="https://www.ipsnews.net/Library/2013/08/manning450.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-126738" class="size-full wp-image-126738" alt="Bradley Manning. Credit: public domain" src="https://www.ipsnews.net/Library/2013/08/manning450.jpg" width="360" height="450" srcset="https://www.ipsnews.net/Library/2013/08/manning450.jpg 360w, https://www.ipsnews.net/Library/2013/08/manning450-240x300.jpg 240w" sizes="auto, (max-width: 360px) 100vw, 360px" /></a><p id="caption-attachment-126738" class="wp-caption-text">Bradley Manning. Credit: public domain</p></div>
<p>“It’s tragic,” Nathan Fuller of the Bradley Manning Support Network told IPS minutes after the sentence was read. “It sends a terrible message for holding government accountable.”</p>
<p>Colonel Denise Lind, the sole judge in the case, read Manning’s sentence at the courthouse in Fort Meade, Maryland, near the location where he was being held during trial. She took one day to reach her decision after adjourning a three-week sentencing hearing on Tuesday morning.</p>
<p>In early 2010, Manning handed over a trove of classified data from U.S. Army computers to WikiLeaks, the radical pro-transparency group. The latter made the data public, causing scandals for the U.S. and some of its allies.</p>
<p>Manning&#8217;s supporters argue that he released the information believing he would better society, and they protest that he was unfairly held for an extended time prior to being tried.</p>
<p>Manning was arrested in May 2010 and has been detained since. Lind announced that this time will be subtracted from his sentence, effectively reducing it by nearly 1,300 days.</p>
<p>The judge convicted him on Jul. 30 of six violations of the federal Espionage Act, as well as 14 other charges of theft and fraud. The maximum sentence Manning faced would have been 90 years.</p>
<p>Kevin Gosztola, a blogger for <a href="http://firedoglake.com/" target="_blank">firedoglake.com</a> who supports Manning and covered his trial, told IPS that the possibility remains open that the 25-year-old soldier could be freed before he turns 40. By regulation, he is eligible for parole after serving 10 years of his sentence, minus the discounted pre-trial confinement days.</p>
<p>“I think this shows that the judge was responsive to the defence’s plea to allow [Manning] a life after prison,” Gosztola says.</p>
<p>Manning’s attorney, David Coomb, questions the severity of the sentence. Speaking with reporters after the sentence was handed down, he noted that he has seen lighter punishments for military clients he has defended who have murdered people or molested children.</p>
<p>Fuller says the next step for those who oppose Manning’s imprisonment will be to lobby Major General Jeffrey Buchanan, the military commander in charge of the district, to reduce the sentence. According to Fuller, Buchanan has “full latitude” in his ability to soften the sentence, if he chooses.</p>
<p>If the effort to sway Buchanan fails, Manning’s legal team will pursue the military appeals process and take advantage of available yearly sentencing reviews by a military parole and clemency board.</p>
<p>His support network will also try to convince U.S. President Barack Obama to commute the sentence.</p>
<p>A demonstration outside the White House is planned for Wednesday evening.</p>
<p>“There are several battles left to fight,” Fuller told IPS. “People will be angry.”</p>
<p><b>Leaks</b></p>
<p>The data Manning leaked included 470,000 battlefield reports from the wars in Iraq and Afghanistan, along with 250,000 State Department diplomatic cables.</p>
<p>Perhaps most notorious of the data released was a video titled “Collateral Murder”, which contained footage taken by a U.S. Army helicopter crew as it gunned down a group of Iraqis standing on a Baghdad street and continued firing as passers-by attempted to rescue them. In the video, U.S. soldiers engaged in the killing can be heard laughing.</p>
<p>Manning’s actions divided popular opinion in the U.S., as some praised him as a hero and others excoriated him as a traitor.</p>
<p>“He was really hoping to change the world for the better,” Deborah Van Poolen, an artist who attended Manning’s trial and claims to have been “inspired” by his actions, told IPS.</p>
<p>Others disagree.</p>
<p>“He is not a whistleblower or a hero. [His leaks] tarnished the image of the U.S. at a sensitive time,” Steven Bucci, director of the Foreign Policy Center at the Heritage Foundation, a right-wing think tank here, told IPS, adding that Manning should be considered the “biggest spy [the U.S. has] ever had&#8221;.</p>
<p>Sympathy for Manning was more widespread outside the U.S., coming especially from those critical of U.S. policy, and over the past three years movements around the world have advocated for his release.</p>
<p>A campaign has even been started promoting Manning as a candidate for the Nobel Peace Prize, and last week a U.S. human rights group delivered a petition with 100,000 signatures to the Norwegian Nobel Committee, which decides the winner.</p>
<p>Defence attorneys for Manning did not attempt to argue that their client acted as a hero, however, portraying him instead as naïve and telling the court that he was a “young man capable of being redeemed&#8221;.</p>
<p>“Perhaps his biggest crime was that he cared about the loss of life that he was seeing and couldn’t ignore it,” defence attorney David Coombs, who will remain as Manning’s attorney, told the judge during the sentencing hearing.</p>
<p>In his own testimony, Manning said he regretted his actions.</p>
<p>“I’m sorry that my actions hurt people,” he told the judge. “I’m sorry that they hurt the United States.”</p>
<p>“In retrospect I should have worked more aggressively inside the system, as we discussed during the … statement, I had options and I should have used these options.”</p>
<p>The prosecution argued that Manning’s leaks strengthened enemies of the United States and put at risk the lives of U.S. soldiers and diplomats living abroad.</p>
<p>“There may not be a soldier in the history of the army who displayed such an extreme disregard [for his duty],” prosecutor Capt. Joe Morrow argued.</p>
<p>Before the conviction was handed down, the prosecution had argued that Manning was guilty of “aiding the enemy&#8221;, a crime which could have resulted in a life sentence for the young soldier, and, many feared, an extreme precedent for punishing information leaks.</p>
<p>The judge did not convict Manning of &#8220;aiding the enemy&#8221;, but still some believe Manning&#8217;s case is intended to serve as a warning to future whistleblowers.</p>
<p>&#8220;Manning’s treatment has been intended to send a signal to people of conscience in the U.S. government who might seek to bring wrongdoing to light,&#8221; Julian Assange, a founder of WikiLeaks, said in a statement.</p>
<p><b>&#8220;</b>[T]he Obama administration is demonstrating that there is no place in its system for people of conscience and principle.&#8221;</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/five-theses-about-assange-manning-snowden/" >Five Theses about Assange-Manning-Snowden</a></li>
<li><a href="http://www.ipsnews.net/2013/08/100000-signers-urge-nobel-prize-for-manning/" >100,000 Signers Urge Nobel Prize for Manning</a></li>
<li><a href="http://www.ipsnews.net/2013/07/mixed-verdict-for-wikileaker-bradley-manning/" >Mixed Verdict for WikiLeaker Bradley Manning</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/manning-supporters-vow-to-fight-35-year-sentence/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Critics Question Obama’s Vows to Reform Spying Programme</title>
		<link>https://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/</link>
		<comments>https://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/#respond</comments>
		<pubDate>Tue, 13 Aug 2013 00:58:06 +0000</pubDate>
		<dc:creator>Jared Metzker</dc:creator>
				<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126447</guid>
		<description><![CDATA[Civil liberties advocates are expressing doubt that promised reforms to a vast and controversial U.S. surveillance programme will allay concerns that the spying infringes on certain rights. On Friday, U.S. President Barack Obama announced that he would oversee reforms to his administration’s surveillance programme. Evidence of this programme, which was initially leaked in May, showed [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Jared Metzker<br />WASHINGTON, Aug 13 2013 (IPS) </p><p>Civil liberties advocates are expressing doubt that promised reforms to a vast and controversial U.S. surveillance programme will allay concerns that the spying infringes on certain rights.<span id="more-126447"></span></p>
<p>On Friday, U.S. President Barack Obama announced that he would oversee reforms to his administration’s surveillance programme. Evidence of this programme, which was initially leaked in May, showed that the U.S. National Security Agency (NSA) had gained access to the communication records of millions of U.S. citizens, sparking public outrage.“Intelligence agencies, by their nature, will always want to collect as much information as possible, and today there are very few technological limits left on what they can collect." -- Prof. David C. Unger<br /><font size="1"></font></p>
<p>“It’s good that President Obama has gotten the message that Americans are troubled to learn of the National Security Agency’s overreaching surveillance of their private communications,” David C. Unger, a professor of U.S. foreign policy at the Johns Hopkins University School of Advanced International Studies (SAIS), told IPS.</p>
<p>“But more transparency alone won’t be enough, especially if the president intends to keep his proposed review process within the executive branch itself.”</p>
<p>Rather, Unger says what is needed is a “reinvigorated system of checks and balances, with much more vigorous legislative and judicial oversight than we have today.”</p>
<p>In his remarks, Obama listed four reforms his administration was ready to make. The steps include working with Congress to reform the laws governing surveillance, pursuing measures to increase transparency, and establishing “a high-level group of outside experts” to assess how U.S. intelligence agencies utilise communications technology.</p>
<p>The reforms, he said, are intended to “strike the right balance between protecting our security and preserving our freedoms,” as well as “to give the American people additional confidence that there are additional safeguards against abuse.”</p>
<p>In a sign of sincerity about the reforms, on Monday the president sent a memorandum to the director of national intelligence (DNI), James Clapper, ordering him to establish a Review Group on Intelligence and Communications Technologies.</p>
<p>The Review Group’s primary assignment is to “assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.”</p>
<p>The committee will now have two months to carry out the review, after which it will present its findings to Obama through the DNI.</p>
<p><b>Right to ask questions</b></p>
<p>Speaking with reporters at the White House, Obama reminded U.S. citizens about the threat of terrorism the country continues to face. He also lamented the effects that high-profile leaks made by former intelligence analyst Edward Snowden have had on the country’s discourse about the power of its spy agencies.</p>
<p>“Unfortunately, rather than an orderly and lawful process to debate these issues and come up with appropriate reforms, repeated leaks of classified information have initiated the debate in a very passionate, but not always fully informed, way,” the president said.</p>
<p>Yet that opinion clashes with the widespread views of critics of the surveillance programme, who are encouraged that an impassioned public outcry has reached presidential ears.</p>
<p>“While we’re glad Obama is responding to the public’s concerns, we take [his] promises today with a healthy dose of scepticism,” the Electronic Frontier Foundation, a group which advocates for less government surveillance, said in a statement.</p>
<p>“He may be paying lip service to accountability and transparency, but the devil will be in the details when it comes to whether his proposals will be effective.”</p>
<p>The EFF also remarked that it is “glad” the Obama administration “has been forced to address the matter publicly as a result of the sustained public pressure from concerned voters as well as the ongoing press coverage of this issue.”</p>
<p>In his remarks on the subject, Obama did note that he had been influenced by a meeting held with civil liberties advocates at the beginning of this month. He also said he understood the concerns being expressed by those who oppose the more invasive spying techniques that his administration has reportedly used.</p>
<p>“[G]iven the history of abuse by governments, it’s right to ask questions about surveillance,” the president said, “particularly as technology is reshaping every aspect of our lives.”</p>
<p>Critics of the extensive spying programme agree the advancement of communication technology has played a part in enabling governments to gather vast amounts of information on private citizens.</p>
<p>“Intelligence agencies, by their nature, will always want to collect as much information as possible, and today there are very few technological limits left on what they can collect,” says SAIS’s Unger, author of “The Emergency State: America’s Pursuit of Absolute Security at All Costs.”</p>
<p><b>Maintaining principles</b></p>
<p>In his remarks, President Obama also made noteworthy comments on the importance of openness and adherence to the law, even when engaging in controversial surveillance activity. He suggested this was one way in which the United States distinguishes itself from other powers.</p>
<p>“[W]e show a restraint that many governments around the world don’t even think to do, refuse to show – and that includes, by the way, some of America’s most vocal critics,” the president stated.</p>
<p>U.S. leadership, Obama suggested, depends upon “the example of American democracy and American openness – because what makes us different from other countries is not simply our ability to secure our nation, it’s the way we do it.”</p>
<p>While those leery of extensive spying are aware that U.S. practices are often less abusive than some states that have criticised it, many continue to warn against using that fact as justification for the U.S. abandoning its ethical principles.</p>
<p>“Without a doubt there are worse actors in the world of espionage than the United States, including some of America’s critics,” SAIS’s Unger told IPS.</p>
<p>“[However,] none of that should or does absolve the United States from adhering to the principled standards it has historically set for itself and that are in its own long-term best interests.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/u-s-russia-rift-could-impact-upcoming-nuke-talks/" >U.S.-Russia Rift Could Impact Upcoming Nuke Talks</a></li>
<li><a href="http://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/" >Flap over Spying Shows Party Isn’t Everything in U.S. Politics</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/critics-question-obamas-vows-to-reform-spying-programme/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Flap over Spying Shows Party Isn&#8217;t Everything in U.S. Politics</title>
		<link>https://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/</link>
		<comments>https://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/#respond</comments>
		<pubDate>Fri, 26 Jul 2013 19:48:53 +0000</pubDate>
		<dc:creator>Jared Metzker</dc:creator>
				<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[American Enterprise Institute]]></category>
		<category><![CDATA[Brookings Institution]]></category>
		<category><![CDATA[Cato Institute]]></category>
		<category><![CDATA[Civil Liberties]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126057</guid>
		<description><![CDATA[Party allegiances apparently mean little in the U.S. when it comes to the debate over domestic government surveillance. A study released this morning by the Pew Research Center, a major U.S. polling agency, revealed that 57 percent of Democrats approve of government spying, along with 44 percent of Republicans. &#8220;There is a real division within [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Jared Metzker<br />WASHINGTON, Jul 26 2013 (IPS) </p><p>Party allegiances apparently mean little in the U.S. when it comes to the debate over domestic government surveillance.<span id="more-126057"></span></p>
<p>A <a href="http://www.people-press.org/files/legacy-pdf/7-26-2013%20NSA%20release.pdf">study</a> released this morning by the Pew Research Center, a major U.S. polling agency, revealed that 57 percent of Democrats approve of government spying, along with 44 percent of Republicans.“There is a rising tide of public concern about the balance that’s being struck between national security and civil liberties." -- William A. Galston of the Brookings Institution<br /><font size="1"></font></p>
<p>&#8220;There is a real division within each party on this issue,&#8221; Norman J. Ornstein, a renowned expert on U.S. politics, told IPS.</p>
<p>This was evident in the U.S. Congress on Wednesday, when a vote to curtail domestic spying by the National Security Agency (NSA) sundered the Democratic and Republican parties alike.</p>
<p>The vote was the first of its kind to take place since the revelations by NSA whistleblower Edward Snowden which, when published by The Guardian newspaper, exposed a degree of domestic surveillance far greater in scale and scope than was previously understood by the public.</p>
<p>The 217-205 decision to reject an amendment blocking spending on NSA domestic spying was so close that one political commentator called it a “nail biter&#8221;. Of the 205 votes in favour, 111 were from Democrats and 94 from Republicans, and of the 217 votes opposed, 83 were from Democrats votes and 134 from Republicans.</p>
<p>&#8220;You&#8217;re not going to see many votes like this,” says Ornstein, who is a scholar at the American Enterprise Institute (AEI), a Washington-based neoconservative think tank.</p>
<p>William A. Galston, a senior fellow at the Brookings Institution, another think tank here, agrees that the outcome was unusual.</p>
<p>“It did not conform to standard party lines but instead saw an unusual coalition of the libertarian right and the liberal left voting against the centres of both parties,” Galston told IPS.</p>
<p>Julian Sanchez of the Cato Institute, a research organisation which advocates individual liberties and limited government, told IPS that there are historical reasons for civil liberties being a major issue for members of both parties.</p>
<p>“The libertarian strain is a natural dimension of Republican ideology which was diminished by the immediate reaction to [the attacks of Sep. 11, 2001], and now it is sort of naturally reasserting itself,” says Sanchez.</p>
<p>“[On the other hand,] progressive activists have frequently been the targets of abusive intelligence powers,” he added, citing historical examples of government crackdowns on unions, civil rights groups and other leftist organisations as lessons that help explain Democratic opposition to spying.</p>
<p><b>Rising Tide</b></p>
<p>Both Ornstein and Galston told IPS that the narrow decision in congress was reflective of public opinion.</p>
<p>“There is a rising tide of public concern about the balance that’s being struck between national security and civil liberties,” says Galston.</p>
<p>U.S. citizens, Ornstein told IPS, are &#8220;strongly divided as a whole&#8221;.</p>
<p>Indeed, the Pew poll indicates more U.S. citizens favour being surveilled by their own government, but only by a slim margin.</p>
<p>Of the 1480 adults surveyed, 50 percent overall said they approved of the domestic surveillance programme, while 44 percent actually said they disapproved.</p>
<p>In a separate question, 56 percent agreed that federal courts have failed to impose adequate limits on intelligence gathering.</p>
<p>Based on the Pew findings, age and gender seem to be factors in where citizens stand on the issue.</p>
<p>By a ratio of about two-to-one, 60 to 29 percent, young respondents said they were more concerned about the government doing too much to weaken civil liberties than they were about it doing too little to defend the nation from terror. In terms of gender, 51 percent of men agreed with this statement, as opposed to only 29 percent of women.</p>
<p>In the report, Pew concludes that the views of U.S. citizens on this issue are “complex&#8221;, a conclusion based in part on the relative lack of correlation with party leanings.</p>
<p><b>Spill Over</b></p>
<p>Ornstein believes that the cross-cutting divide splitting both major parties is &#8220;issue-specific&#8221; and unlikely to spill over into other major controversies, for example on social issues such as spending on health care.</p>
<p>To an extent, Galston agrees.</p>
<p>“The liberal left has strict views on economic questions that are poles apart from the views of the libertarians,” Galston says, “and it would be very hard for them to find common ground.”</p>
<p>Liberal Democrats, Galston explains, would have difficulty accepting the small-government solutions often championed by libertarian Republicans.</p>
<p>He notes, however, that more legislation on government spying will take place in the foreseeable future, and that the closeness of Wednesday’s vote was indicative of a strengthening bipartisan opposition to intrusive government tactics.</p>
<p>Cato’s Sanchez believes this like-mindedness could spill over into over issues, namely those related to civil liberties.</p>
<p>“There are civil libertarian wings of both parties, so I expect we could see cooperation on other things, such as free speech issues,” Sanchez says.</p>
<p>It is widely speculated that the de facto leader of the libertarian wing of the Republican Party, Senator Rand Paul, will make a run for the presidency in 2016. One early <a href="http://dailycaller.com/2013/07/25/rand-paul-top-pick-for-republicans-in-2016/">poll</a> has placed him as the current top contender for the Republican nomination.</p>
<p>Galston told IPS that this issue has opened the way for “conversation” between Paul’s faction of the right and the liberal left.</p>
<p>“Now that they’ve discovered each other, there is likely to be more conversation across party lines,” says Galston.  “This is probably a beginning rather than an end.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
<li><a href="http://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/" >Spy Contractor Bug in Ecuador Embassy Fails to Stop Wikileaks</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/flap-over-spying-shows-party-isnt-everything-in-u-s-politics/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fight over NSA Spying Spills into U.S. Courts</title>
		<link>https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/</link>
		<comments>https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/#respond</comments>
		<pubDate>Fri, 19 Jul 2013 19:20:46 +0000</pubDate>
		<dc:creator>Matthew Charles Cardinale</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[ACLU]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[Electronic Privacy Information Center]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[United States]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125873</guid>
		<description><![CDATA[A wide variety of individuals and organisations have filed lawsuits challenging the National Security Agency (NSA) and other federal agencies and officials for conducting a massive, dragnet spying operation on U.S. citizens that was recently confirmed by whistleblower Edward Snowden. At least three ongoing lawsuits are challenging the NSA’s practice of indiscriminately collecting and storing [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="199" src="https://www.ipsnews.net/Library/2013/07/metadata640-300x199.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/07/metadata640-300x199.jpg 300w, https://www.ipsnews.net/Library/2013/07/metadata640-629x417.jpg 629w, https://www.ipsnews.net/Library/2013/07/metadata640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The U.S. government argues there is no expectation of privacy for so-called metadata collected by the NSA. Credit: Zofeen Ebrahim/IPS</p></font></p><p>By Matthew Charles Cardinale<br />ATLANTA, Georgia, Jul 19 2013 (IPS) </p><p>A wide variety of individuals and organisations have filed lawsuits challenging the National Security Agency (NSA) and other federal agencies and officials for conducting a massive, dragnet spying operation on U.S. citizens that was recently confirmed by whistleblower Edward Snowden.<span id="more-125873"></span></p>
<p>At least three ongoing lawsuits are challenging the NSA’s practice of indiscriminately collecting and storing information related to all phone calls to and from U.S. citizens &#8211; referred to as “telephony metadata” by the government &#8211; as in violation of several protections guaranteed under the constitution."Metadata is extraordinarily important. You could make a pretty clear map of your political views, your religious affiliations." -- Rebecca Jeschke of the Electronic Frontier Foundation<br />
<br /><font size="1"></font></p>
<p>In addition, at least one lawsuit challenges the NSA’s PRISM programme, which collects a variety of multimedia communications of non-U.S. citizens that are handled by U.S.-based companies such as Facebook, Google, MSN and Yahoo.</p>
<p>Snowden, a former contractor for Booz Allen Hamilton, a computer technology consulting firm that works with the NSA, revealed the NSA programmes in interviews with several publications, including the Guardian newspaper in the United Kingdom, which was the first to begin publishing related documents on Jun. 6.</p>
<p>Snowden has been stuck at an airport terminal in Russia for several weeks and is currently seeking asylum there, as he has said he fears he would be wrongfully prosecuted, tortured, or even killed by the U.S. government.</p>
<p>One of the <a href="https://www.eff.org/sites/default/files/filenode/firstunitarianvnsa-final.pdf">latest lawsuits</a> to challenge the telephonic spying programme, First Unitarian Church of Los Angeles, et al., v. National Security Agency, et al., was filed on Tuesday.</p>
<p>The plaintiffs “are organisations with members with First Amendment rights to freedom of association,&#8221; Rebecca Jeschke, a digital rights analyst with the Electronic Frontier Foundation, told IPS. &#8220;CALGUNS [a California-based gun rights advocacy group] is scared people won’t call their hotline.</p>
<p>&#8220;We have the First Unitarian Church as a plaintiff. They are concerned people won’t use the services they have, because they’re afraid they’re going to be associated with other services they have. Metadata is extraordinarily important. You could make a pretty clear map of your political views, your religious affiliations,” Jeschke said.</p>
<p>The government admits the telephonic spying programme collects the phone numbers, time and date, and durations of all U.S. phonecalls.</p>
<p>The plaintiffs argue the programme is a violation of the First Amendment because it has a chilling effect on the rights to free speech, assembly, practice of religion, and to petition the government for a redress of grievances; the Fourth Amendment right to be free from unreasonable searches and seizures; the Fifth Amendment right to due process; and various federal statutes related to electronic surveillance.</p>
<p>The federal government has said it collects and stores the metadata for several years &#8211; in order to preserve it &#8211; but only uses it when it decides there is a national security reason to search the information.</p>
<p>The government also argues there is no expectation of privacy for metadata under the Fourth Amendment because it is owned by the phone companies.</p>
<p>“The Fourth Amendment question is in part going to turn on the scope of search and the reasonableness. Accessing metadata for persons for which some level of suspicion [exists] is one thing, accessing metadata for everybody is a different matter,” Prof. Gerry Weber, an adjunct professor at Emory School of Law specialising in constitutional law, told IPS.</p>
<p>“This is all an evolving technology area, where the Supreme Court has generally been hit or miss. They’re dealing with new electronic technologies as they come,” Weber said.</p>
<p>On Jun. 9, Larry Klayman, the former chairman of Judicial Watch, and two other citizens filed a <a href="http://www.scribd.com/doc/146930457/PRISM-Class">federal class action lawsuit</a> challenging the telephonic surveillance programme.</p>
<p>On Jun. 11, the American Civil Liberties Union (ACLU) <a href="http://www.aclu.org/national-security/aclu-v-clapper-complaint">also sued</a> over the telephonic spying programme.</p>
<p>The ACLU had previously sued the NSA in 2008, challenging the constitutionality of the Foreign Intelligence Surveillance Act (FISA) of 1978 Amendments Act of 2008 &#8211; which the government has used as part of its secret legal justification for its programme &#8211; but their complaint was dismissed by the U.S. Supreme Court in February 2013 on the grounds that the ACLU could not prove it had been monitored by the government.</p>
<p>However, given the recent revelations, and given that the ACLU is a Verizon subscriber, the organisation should now have standing.</p>
<p>Verizon, a phone service provider, was subject to a previously-secret court order dated Apr. 25 by U.S. Foreign Intelligence Surveillance Court Judge Roger Vinson compelling it to turn over customers’ phone records to the NSA.</p>
<p>But advocates are confident that Verizon is not the only participant.</p>
<p>“The director of National Intelligence, James Clapper, acknowledged the Verizon order was part of a large programme from the NSA. It would be surprising if it were only Verizon. That’s [just] the document that’s leaked. We do have intelligence officials saying it was a wide-ranging programme&#8230; ‘broad in scope,’” Jeschke said.</p>
<p>Klayman has also sued over the multi-media eavesdropping programme, PRISM.</p>
<p>In addition, the Electronic Privacy Information Center (EPIC) filed a <a href="http://epic.org/EPIC-FISC-Mandamus-Petition.pdf">Petition for a Writ of Mandamus</a> and Prohibition, or a Writ of Certiorari, with the Supreme Court on Jul. 8. The petition asks the court to vacate the Apr. 25 order by the FISA Court that had compelled Verizon to send telephony metadata to the NSA.</p>
<p>In addition to arguments similar to those made in the other cases, the petition also argues the NSA telephonic spying programme violates attorney-client privilege, and is a violation of separation of powers because the NSA is also collecting phone records of Congress and the judiciary.</p>
<p>Meanwhile, in separate, ongoing class action litigation the EFF has had against the NSA since 2008, Jewel v. NSA, a federal judge last week rejected a motion by the federal government to dismiss the suit. That case alleged ongoing, dragnet surveillance by the NSA on millions of U.S. citizens, even years prior to Snowden&#8217;s revelations.</p>
<p>“We’ve asked this case to be associated with Jewel v. NSA. There were other leaks. The fact that this programme was ongoing was something that many people were aware of before these leaks came out &#8211; it’s just the documents from the FISA Court confirmed it,” Jeschke said.</p>
<p>A whistleblower with AT&amp;T, who had wired a room that he believed was for the government to track U.S. citizens’ phonecalls, came to EFF in 2006.</p>
<p>“He realised he was wiring up Big Brother and came to us,” Jeschke said.</p>
<p>Meanwhile, in a U.S. House Judiciary Committee hearing this week on the NSA spying programmes, members of Congress of both parties told representatives of the NSA and the Federal Bureau of Investigation that they believe the administration has abused the authority granted to it by Congress.</p>
<p>Rep. Jim Sensenbrenner, a powerful Republican from Wisconsin, warned that if the administration did not stop collecting the phone records of U.S. citizens indiscriminately, that a provision, Section 215 of the Patriot Act, known as the business records provision, will expire, and that there will not be enough votes in Congress to renew it.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/" >Brazil Wide Open to Cyber Invasion</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
<li><a href="http://www.ipsnews.net/2013/07/spy-contractor-bug-in-ecuador-embassy-fails-to-stop-wikileaks/" >Spy Contractor Bug in Ecuador Embassy Fails to Stop Wikileaks</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>In Conservatives&#8217; Canada, It&#8217;s Not Easy Being Green</title>
		<link>https://www.ipsnews.net/2013/02/in-conservatives-canada-its-not-easy-being-green/</link>
		<comments>https://www.ipsnews.net/2013/02/in-conservatives-canada-its-not-easy-being-green/#comments</comments>
		<pubDate>Wed, 20 Feb 2013 19:38:08 +0000</pubDate>
		<dc:creator>Stephen Leahy</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Biodiversity]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Climate Change]]></category>
		<category><![CDATA[Combating Desertification and Drought]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Editors' Choice]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Environment]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Activists]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[Stephen Harper]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=116597</guid>
		<description><![CDATA[Canada&#8217;s police and security agencies think citizens concerned about the environment are threats to national security, and some are under surveillance, documents reveal. The RCMP, the national police force, and Canada&#8217;s spy agency CSIS are increasingly conflating terrorism and extremism with peaceful citizens exercising their democratic rights to organise petitions, protest and question government policies, [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="168" src="https://www.ipsnews.net/Library/2013/02/dirtyolympics-300x168.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/02/dirtyolympics-300x168.jpg 300w, https://www.ipsnews.net/Library/2013/02/dirtyolympics-629x353.jpg 629w, https://www.ipsnews.net/Library/2013/02/dirtyolympics.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">A banner targets Canada's tar sands development, the country's fastest growing source of greenhouse gas emissions. Credit: Anthony Fenton/IPS</p></font></p><p>By Stephen Leahy<br />UXBRIDGE, Canada, Feb 20 2013 (IPS) </p><p>Canada&#8217;s police and security agencies think citizens concerned about the environment are threats to national security, and some are under surveillance, documents reveal.<span id="more-116597"></span></p>
<p>The RCMP, the national police force, and Canada&#8217;s spy agency CSIS are increasingly conflating terrorism and extremism with peaceful citizens exercising their democratic rights to organise petitions, protest and question government policies, said Jeffrey Monaghan, a researcher with the Surveillance Studies Centre at Queen’s University in Kingston, Ontario.</p>
<p>Protests and opposition to Canada&#8217;s resource-based economy, especially oil and gas production, are now viewed as threats to national security, Monaghan said. This conclusion is based on official security documents obtained under freedom of information laws over the last five years.It is governments and the fossil fuel industry who are the extremists, threatening the prosperity of future generations.<br /><font size="1"></font></p>
<p>For the past two years, officials in Canada&#8217;s Stephen Harper government have been calling environmentalists &#8220;radicals&#8221; and accusing environmental organisations of money laundering.</p>
<p>&#8220;The Harper government has a strong interest in suppressing environmental activism,&#8221; Monaghan told IPS.</p>
<p>By branding activists as extremists or radicals, many people will not want to be involved. Surveillance and other security activities will have a similar &#8220;chilling effect&#8221;, he fears.</p>
<p>&#8220;There could be an incredibly profound impact on public participation,&#8221; Monaghan noted.</p>
<p>In 2011, a Montreal, Quebec man who wrote threatening letters opposing shale gas fracking was charged under Canada&#8217;s Anti-Terrorism Act. Documents released in January show the RCMP has been monitoring Quebec residents who oppose fracking.</p>
<p>In a Canadian Senate hearing last week, Richard Fadden, the director of CSIS (Canadian Security Intelligence Service) said they are more worried about domestic terrorism, acknowledging that the vast majority of its spying is done within Canada. Fadden said they are &#8220;following a number of cases where we think people might be inclined to acts of terrorism&#8221;.</p>
<p>Canada is at very low risk from foreign terrorists, but like the U.S. it built a large security apparatus following 9/11. The resources and costs are wildly out of proportion to the risk, Monaghan said.</p>
<p>Without a significant foreign threat, security services are looking inside the country for reasons to justify their &#8220;bloated budgets&#8221;, he said. And the new &#8220;enemy within&#8221; is environmental organisations, according to the inflammatory rhetoric of Harper&#8217;s Conservative government.</p>
<p>A year ago, in a widely-published open letter, Joe Oliver, the minister of natural resources, slammed &#8220;environmental and other radical groups&#8221; for getting in the way of forestry, mining and energy projects.</p>
<p>&#8220;These groups threaten to hijack our regulatory system to achieve their radical ideological agenda,&#8221; Oliver wrote, without naming any groups.</p>
<p>&#8220;They use funding from foreign special interest groups to undermine Canada’s national economic interest,&#8221; he charged, without offering any evidence.</p>
<p>A few months later, in a television interview, environment minister Peter Kent accused some charitable environmental groups in Canada of being used &#8220;to launder offshore foreign funds for inappropriate use against Canadian interest&#8221;. Kent went on imply evidence of illegal activity but offered no proof.</p>
<p>Canada&#8217;s economy has become increasingly reliant on resource extraction, oil and gas in particular. The Alberta tar sands are the world&#8217;s biggest industrial project, sending 1.6 million barrels of tar-like oil south to the U.S. daily.</p>
<p>The tar is too thick to extract with conventional drilling so it is strip-mined or boiled out of the ground, destroying large areas of pristine forest, consuming vast quantities of fresh water and emitting tens of millions of tonnes of climate-disrupting carbon.</p>
<p>Environmentalists&#8217; have labelled the tar sands region &#8220;Canada&#8217;s Mordor&#8221;. The Harper and Alberta governments are banking on doubling or tripling the size of the tar sands and aggressively support new pipelines to ship the tarry oil south to the U.S., west to Asia and east to Europe.</p>
<p>Tar sands oil, natural gas and the pipelines to move them are considered by these governments to be essential to &#8220;Canada’s national economic interest&#8221;. This has now been directly linked to national security, said Monaghan.</p>
<p>The federal and Alberta governments and the fossil fuel industry are &#8220;virtually seamless&#8221; in their thinking, said Greenpeace Canada&#8217;s executive director Bruce Cox.</p>
<p>&#8220;You can&#8217;t tell the difference between a government of Canada ad and one from the oil industry,&#8221; Cox told IPS.</p>
<p>Canada&#8217;s Natural Resource ministry spent nine million dollars in 2012 in advertising to promote pipelines, safety measures such as double-hulled oil tankers and changes to environmental laws. Cox said those changes &#8220;gutted&#8221; environmental regulations but the government promotes them as a benefit to the Canadian people.</p>
<p>Canadian security forces seem to have a &#8220;fixation&#8221; with Greenpeace, continually describing them as &#8220;potentially violent&#8221; in threat assessment documents, said Monaghan.</p>
<p>Cox said he was aware of this attention and met with the head of the RCMP last year. &#8220;We&#8217;re an outspoken voice for non-violence and this was made clear to the RCMP,&#8221; Cox said.</p>
<p>He said there was real anger among Canadians about the degradation of the natural environment by oil, gas and other extractive industries and governments working for those industries and not in the public interest. Security forces should see Greenpeace as a &#8220;plus&#8221;, a non-violent outlet for this anger, he argued.</p>
<p>&#8220;It is governments and the fossil fuel industry who are the extremists, threatening the prosperity of future generations,&#8221; Cox said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2012/02/scientists-denounce-climate-change-denial-censorship/" >Scientists Denounce Climate Change Denial, Censorship</a></li>
<li><a href="http://www.ipsnews.net/2012/03/rio-20-suffers-leadership-void-weeks-ahead-of-summit/" >Rio+ 20 Suffers Leadership Void Weeks Ahead of Summit</a></li>
<li><a href="http://www.ipsnews.net/2011/12/in-unprecedented-move-canada-withdraws-from-kyoto-protocol/" >In Unprecedented Move, Canada Withdraws from Kyoto Protocol</a></li>
<li><a href="http://www.ipsnews.net/2011/11/canada-harper-government-guts-environment-programmes/" >CANADA: Harper Government Guts Environment Programmes</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/02/in-conservatives-canada-its-not-easy-being-green/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>&#8220;Drone&#8221; a Dirty Word in the U.N. Lexicon</title>
		<link>https://www.ipsnews.net/2013/02/drone-a-dirty-word-in-the-u-n-lexicon/</link>
		<comments>https://www.ipsnews.net/2013/02/drone-a-dirty-word-in-the-u-n-lexicon/#respond</comments>
		<pubDate>Thu, 07 Feb 2013 00:01:02 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Africa]]></category>
		<category><![CDATA[Armed Conflicts]]></category>
		<category><![CDATA[Editors' Choice]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Humanitarian Emergencies]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Peace]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[DRC]]></category>
		<category><![CDATA[Drones]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[UAVs]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=116310</guid>
		<description><![CDATA[The &#8220;drone&#8221;, one of the eminently controversial lethal weapons deployed by the United States in its war against terrorism, is obviously a dirty word in the U.N. lexicon. So when Under-Secretary-General for Peacekeeping Operations Herve Ladsous was asked about U.N. plans to use drones in the Democratic Republic of Congo (DRC), he demurred. &#8220;I would [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="188" src="https://www.ipsnews.net/Library/2013/02/drone_iraq_640-300x188.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/02/drone_iraq_640-300x188.jpg 300w, https://www.ipsnews.net/Library/2013/02/drone_iraq_640-629x395.jpg 629w, https://www.ipsnews.net/Library/2013/02/drone_iraq_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The RQ-7B Shadow 200 tactical UAV is wheeled off the runway after a reconnaissance mission in Iraq Aug. 11, 2008. Credit: U.S. military/public domain</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Feb 7 2013 (IPS) </p><p>The &#8220;drone&#8221;, one of the eminently controversial lethal weapons deployed by the United States in its war against terrorism, is obviously a dirty word in the U.N. lexicon.<span id="more-116310"></span></p>
<p>So when Under-Secretary-General for Peacekeeping Operations Herve Ladsous was asked about U.N. plans to use drones in the Democratic Republic of Congo (DRC), he demurred.</p>
<p>&#8220;I would not use the word drones,&#8221; he told reporters Wednesday, opting for a military euphemism: &#8220;unmanned aerial vehicles&#8221; (UAVs).</p>
<p>Ladsous said the United Nations plans to use &#8220;unarmed UAVs&#8221; only for surveillance purposes &#8211; but with the express permission of the government of DRC and neighbouring countries.</p>
<p>&#8220;We will see how this experiment works,&#8221; he said, adding that the United Nations will be &#8220;open&#8221; to sharing whatever intelligence it gathers with regional bodies in Africa, besides U.N. force commanders on the ground.</p>
<p>The &#8220;green light&#8221; for the use of unarmed drones in DRC &#8211; a country battling a violent insurgency &#8211; was given by the 15-member Security Council last November, and is aimed at monitoring the movement of armed groups by the 17,500-strong U.N. Organisation Stabilisation Mission in DRC (MONUSCO).</p>
<p>But some U.N. diplomats fear that U.N. drones may eventually be armed, if and when the conflict in DRC takes a turn for the worse.</p>
<p>The drones used by the United States are fully armed and have resulted in the killings of both suspected terrorists and civilians in countries such as Afghanistan, Pakistan, Somalia, and Yemen.</p>
<p>According to published reports, more than 40 countries either deploy or manufacture drones.</p>
<p>Larry Dickerson, defence systems analyst at Forecast International, a U.S. defence marketing research firm, told IPS that besides the United States, there is a very long list of countries manufacturing these UAVs.</p>
<p>These countries include U.K., Israel, France, Germany, Poland, Czech Republic, Canada, Greece, Bulgaria, Spain, Italy, Russia, China, South Korea, Austria, India, South Africa, Japan and Singapore.</p>
<p>Ben Emmerson, a British lawyer and U.N. special rapporteur for human rights and counterterrorism, is in the process of preparing an investigative report on the use of drones.</p>
<p>He is focusing on 25 drone strikes, specifically in Afghanistan, Pakistan, Yemen, Somalia, and the Palestinian territories (by Israeli drones), where these attacks have reportedly resulted in civilian deaths.</p>
<p>The report is expected to be presented to the General Assembly next October or November.</p>
<p>Secretary-General Ban Ki-moon has already expressed &#8220;concern&#8221; on the use of armed drones for targeted killings, &#8220;as it raises questions about compliance with the fundamental principle of distinction between combatants and non-combatants.&#8221;</p>
<p>Associate U.N. spokesman Farhan Haq told reporters last month that drone attacks have also reportedly caused &#8220;substantial casualties, raising questions about the ability to ensure full compliance with the principle of proportionality&#8221;.</p>
<p>He said the secretary-general has asked relevant member states to be transparent about the circumstances in which drones are used, and the means by which they ensure that attacks involving drones comply with international law.</p>
<p>According to Amnesty International, there have been more than 300 drone strikes in Pakistan alone over the last few years, which have killed both civilians as well as suspected militants.</p>
<p>Responding to a report that the administration of President Barack Obama was finalising guidelines for &#8220;targeted killings&#8221; by drones, Susan Lee, Amnesty&#8217;s Americas programme director, said bluntly: &#8220;There already exists a rulebook for these issues: it is called international law.&#8221;</p>
<p>Any policy on so-called targeted killings by the U.S. government, she said, should not only be fully disclosed, but must comply with international law.</p>
<p>To date, the justifications publicly offered by senior Obama administration officials have shown only that U.S. government policy appears to permit extrajudicial executions in violation of international law, Lee added.</p>
<p>Asked how far behind are China and Russia in deploying drones in conflict situations, Dickerson told IPS that both countries are increasing their UAV inventories, &#8220;but remain far behind the United States in terms of numbers fielded and the sophistication of these systems.&#8221;</p>
<p>&#8220;Neither have the battlefield experience in the operation of UAVs that the U.S. military gained over the last 10 years,&#8221; he said.</p>
<p>Dickerson also said that the United States has the largest market share and produces more UAVs than any other country in the world.</p>
<p>He said the worldwide market for UAVs is worth a staggering 70.9 billion dollars over the next 10 years: 39.2 billion dollars related to the production of these systems; 28.7 billion dollars for research and development spending; and around 3.0 billion dollars for UAV services contracts.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/01/washington-urged-to-stress-diplomacy-in-mali/" >Washington Urged to Stress Diplomacy in Mali</a></li>
<li><a href="http://www.ipsnews.net/2013/01/whos-watching-those-unblinking-eyes-in-the-sky/" >Who’s Watching Those Unblinking Eyes in the Sky?</a></li>
<li><a href="http://www.ipsnews.net/2013/01/drones-provoke-growing-controversy-in-u-s/" >Drones Provoke Growing Controversy in U.S.</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/02/drone-a-dirty-word-in-the-u-n-lexicon/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
