<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press Servicesurveillance Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/surveillance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/surveillance/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Fri, 17 Apr 2026 10:16:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>Press Freedom Groups Denounce NSA Spying on AJ Bureau Chief</title>
		<link>https://www.ipsnews.net/2015/05/press-freedom-groups-denounce-nsa-spying-on-aj-bureau-chief/</link>
		<comments>https://www.ipsnews.net/2015/05/press-freedom-groups-denounce-nsa-spying-on-aj-bureau-chief/#respond</comments>
		<pubDate>Tue, 12 May 2015 18:14:45 +0000</pubDate>
		<dc:creator>Kitty Stapp</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Middle East & North Africa]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Al Jazeera]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=140601</guid>
		<description><![CDATA[Ahmad Muaffaq Zaidan doesn’t deny that he’s had contact with terrorist groups. In fact, it would have been rather difficult to do his job otherwise. But the fact that Zaidan is a respected investigative journalist and the Islamabad bureau chief for Al Jazeera didn’t seem to faze the U.S. National Security Agency, which not only [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="188" src="https://www.ipsnews.net/Library/2015/05/intercept-300x188.jpg" class="attachment-medium size-medium wp-post-image" alt="A slide dated June 2012 from a National Security Agency PowerPoint presentation bears Ahmad Muaffaq Zaidan’s photo, name, and a terror watch list identification number, and labels him a “member of Al-Qa’ida” as well as the Muslim Brotherhood. It also notes that he “works for Al Jazeera.” Courtesy of the Intercept" decoding="async" fetchpriority="high" srcset="https://www.ipsnews.net/Library/2015/05/intercept-300x188.jpg 300w, https://www.ipsnews.net/Library/2015/05/intercept.jpg 540w" sizes="(max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">A slide dated June 2012 from a National Security Agency PowerPoint presentation bears Ahmad Muaffaq Zaidan’s photo, name, and a terror watch list identification number, and labels him a “member of Al-Qa’ida” as well as the Muslim Brotherhood. It also notes that he “works for Al Jazeera.” Courtesy of the Intercept</p></font></p><p>By Kitty Stapp<br />NEW YORK, May 12 2015 (IPS) </p><p>Ahmad Muaffaq Zaidan doesn’t deny that he’s had contact with terrorist groups. In fact, it would have been rather difficult to do his job otherwise.<span id="more-140601"></span></p>
<p>But the fact that Zaidan is a respected investigative journalist and the Islamabad bureau chief for Al Jazeera didn’t seem to faze the U.S. National Security Agency, which not only spied on him, but went as far as to brand him a likely member of Al Qaeda and put him on a watch list.“This is the reality under which we live. Government agencies are relatively autonomous and attempts to control them are ludicrous." -- Bob Dietz of CPJ<br /><font size="1"></font></p>
<p>The revelations emerged late last week as part of the thousands of classified documents leaked by former NSA employee Edward Snowden.</p>
<p>&#8220;Given that Pakistan has been consistently ranked as one of the most dangerous countries for journalists, the news of Zaidan&#8217;s surveillance further adds to the fear, restricting press freedom,” said Furhan Hussain, manager of the Digital Rights and Freedom of Expression programme at Bytes for All, a Pakistani human rights group.</p>
<p>“Equally alarming, in this case, is the fact that by compromising the information of respected journalists, such spying also weakens the safety of their sources and media networks,” he told IPS. “Zaidan&#8217;s communications intercept took place through the invasive gathering and analysis of his metadata, a technique which has been frequently responsible for drone-led non-transparent persecution of hundreds of people.</p>
<p>“While it is often claimed that the state of Pakistan has failed to effectively protest against these violations, it may also be important to raise questions about the possible role of the state in facilitating the NSA to access vast amounts of data of those residing within its borders, in the context of its <a href="http://electrospaces.blogspot.com/2014/09/nsas-foreign-partnerships.html">third-party SIGINT partnership</a>.”</p>
<p>Other press freedom groups said the case was just one more in a long-running pattern of civil liberties abuses.</p>
<p>&#8220;Given the flood of disclosures over the past two years about the NSA’s vast range of mass and intrusive surveillance techniques and targets, it is unsurprising, but nevertheless shocking, that the intelligence agency thought it appropriate to use its capabilities to spy on an eminent journalist,” Carly Nyst, Legal Director of Privacy International, told IPS.</p>
<p>“This case is illustrative of the grave dangers of allowing security services to exercise immense powers in the absence of proper scrutiny. By placing members of the media, who themselves play an essential accountability role, particularly in areas of conflict, under surveillance, the NSA has undermined the very values it is charged with promoting &#8211; security, democracy, and free flow of information.</p>
<p>“Without democratic accountability, spy agencies will continue to sacrifice civil liberties in the name of strategic gain, without sparing a thought to the critical journalistic freedom caught in the cross hairs,” she added.</p>
<p>It’s not the first time the NSA has targeted Al Jazeera. Based on leaked documents, the German magazine Der Spiegel reported in 2009 that it had hacked into the news agency’s internal communication system.</p>
<p><a href="https://cpj.org/blog/2013/09/nsa-hack-compromises-al-jazeera-sources-us-credibi.php">According to the Committee to Protect Journalists</a>, NSA whistleblower Russell Tice claimed in 2009 that in fact, the agency makes it a point to target journalists and news agencies.</p>
<p>Zaidan was targeted under the ominously titled SKYNET programme, which monitors bulk call records and searches the metadata for particular patterns.</p>
<p>“It’s this kind of big, sweeping data gathering that worries us the most,” Bob Dietz, Asia programme coordinator for the New York-based Committee to Protect Journalists, told IPS.</p>
<p>“If someone were to track my behavior and all the people I’ve come into contact with over the last 20 years, I imagine I would come up on some sort of chart ranking very high,” he said wryly.</p>
<p>Dietz doesn’t expect the situation to change anytime soon, regardless of who occupies the White House.</p>
<p>“This is the reality under which we live. Government agencies are relatively autonomous and attempts to control them are ludicrous…whether or not there are laws protecting us,” he said.</p>
<p>Thomas Hughes, executive director of the London-based ARTICLE 19, said his group is deeply concerned by the Zaidan spying revelations.</p>
<p>“According to statements from Al Jazeera and colleagues from other networks, Zaidan is a journalist of longstanding professional reputation. Surveillance of journalists has a serious chilling effect on freedom of expression, impeding the crucial role journalists play in uncovering wrongdoing and holding governments to account for their actions,&#8221; he told IPS.</p>
<p>“Compromising the confidentially of sources also seriously undermines the ability of journalists to perform their work and potentially endangers the wellbeing and safety of those sources.”</p>
<p>Indeed, as noted by the Intercept, which broke the allegations, Zaidan’s reporting focused on the Taliban and Al Qaeda, including several high-profile interviews with senior Al Qaeda leaders.</p>
<p>In strenuously denying the allegations, he patiently explained, “For us to be able to inform the world, we have to be able to freely contact relevant figures in the public discourse, speak with people on the ground, and gather critical information.</p>
<p>“Any hint of government surveillance that hinders this process is a violation of press freedom and harms the public’s right to know,” he wrote in a response to the Intercept. “To assert that myself, or any journalist, has any affiliation with any group on account of their contact book, phone call logs, or sources is an absurd distortion of the truth and a complete violation of the profession of journalism.”</p>
<p><em>Edited by Kanya D&#8217;Almeida</em></p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2015/04/media-watchdog-unveils-top-ten-worst-censors/" >Media Watchdog Unveils Top Ten Worst Censors</a></li>
<li><a href="http://www.ipsnews.net/2015/04/israeli-forces-target-journalists-in-west-bank/" >Israeli Forces Target Journalists in West Bank</a></li>
<li><a href="http://www.ipsnews.net/2015/03/my-number-was-six/" >“My Number Was Six”</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2015/05/press-freedom-groups-denounce-nsa-spying-on-aj-bureau-chief/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.N. States Unanimously Agree: Even the Walls Have Ears</title>
		<link>https://www.ipsnews.net/2013/12/walls-ears-u-n-s-glass-house/</link>
		<comments>https://www.ipsnews.net/2013/12/walls-ears-u-n-s-glass-house/#respond</comments>
		<pubDate>Fri, 27 Dec 2013 00:18:55 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Government Communications Headquarters (GCHQ)]]></category>
		<category><![CDATA[National Security Agency (NSA)]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[U.N. General Assembly]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=129746</guid>
		<description><![CDATA[When the U.N. Correspondents Association (UNCA) held its annual award ceremony last week, one of the video highlights was a hilarious skit on the clumsy attempts to bug the 38th floor offices of Secretary-General Ban Ki-moon. Three days later, the New York Times ran an updated story about the widespread electronic surveillance by the U.S. [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="200" src="https://www.ipsnews.net/Library/2013/12/banunca640-300x200.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/12/banunca640-300x200.jpg 300w, https://www.ipsnews.net/Library/2013/12/banunca640-629x419.jpg 629w, https://www.ipsnews.net/Library/2013/12/banunca640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Secretary-General Ban Ki-moon speaks at the 2013 Annual Awards Dinner and Dance of the U.N. Correspondents Association (UNCA), honouring winners of prizes for best media coverage of the U.N. Credit: UN Photo/Eskinder Debebe</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Dec 27 2013 (IPS) </p><p>When the U.N. Correspondents Association (UNCA) held its annual award ceremony last week, one of the video highlights was a hilarious skit on the clumsy attempts to bug the 38th floor offices of Secretary-General Ban Ki-moon.<span id="more-129746"></span></p>
<p>Three days later, the New York Times ran an updated story about the widespread electronic surveillance by the U.S. National Security Agency (NSA) and Britain&#8217;s spy agency, the Government Communications Headquarters (GCHQ), which had targeted over 1,000 political leaders, diplomats, and international institutions."Let's hope the spirit of hopeless resignation is finally set aside and serious consideration given to privacy at the U.N." -- James Paul<br /><font size="1"></font></p>
<p>These included the U.N. children&#8217;s agency UNICEF and the Geneva-based U.N. Institute for Disarmament Research (UNIDIR).</p>
<p>At last week&#8217;s award ceremony, the secretary-general was given an unsolicited piece of light-hearted advice: if you want to figure out whether your office is bugged, you only have to sneeze loudly, and a voice from inside the walls would instinctively and courteously respond, &#8220;Bless you.&#8221;</p>
<p>Jokes apart, the 193-member General Assembly last week adopted a unanimous resolution highly critical of electronic surveillance and demanding &#8220;the right to privacy in the digital age.&#8221;</p>
<p>Not surprisingly, the resolution was co-sponsored by Brazil and Germany, whose leaders were wiretapped by the NSA.</p>
<p>Although both countries publicly lambasted the surveillance, the resolution does not single out either the United States or Britain by name.</p>
<p>&#8220;This was due to two reasons,&#8221; a Third World diplomat told IPS. &#8220;One, to ensure the resolution was adopted unanimously, with no negative votes and abstentions, and two, both Brazil and Germany were obviously under strong political pressure not to name names.&#8221;</p>
<p>As a result, he noted, the resolution was &#8220;lamentably weak &#8211; and the culprits got away.&#8221;</p>
<p>Asked for a response, the Brazilian ministry of external relations, through its public relations firm in New York, remained tight-lipped.</p>
<p>James A. Paul, who served for 19 years as executive director of the New York-based Global Policy Forum, told IPS it was long past due for this issue to be addressed at the United Nations.</p>
<p>&#8220;Electronic espionage has been especially abusively practiced in the U.N. environment and cases are very well known,&#8221; he said.</p>
<p>He pointed out that diplomats have been furious about this for years but many have been reluctant to take up the matter and risk the ill-will of the mighty, especially the United States and UK &#8211; &#8220;the prime offenders&#8221;.</p>
<p>&#8220;In addition to the resolution, let&#8217;s hope the spirit of hopeless resignation is finally set aside and serious consideration given to privacy at the U.N., where much needs to be done to bring the powerful into conformity with international law,&#8221; said Paul, who has written extensively on the politics of the world body.</p>
<p>Samir Sanbar, a former assistant secretary-general who was primarily responsible for the U.N. presence on the internet with the 1995 launch of the U.N. website, told IPS, &#8220;My general impression is that while political officials make public statements, security representatives arrange for discreet deals.&#8221;</p>
<p>And that may explain eventual changes in negotiated texts of the resolution, he said.</p>
<p>In certain circles, bugging was so common that a diplomat excluded from monitoring may have felt insulted, said Sanbar, who served under five different U.N. secretaries-general.</p>
<p>He recalled a long telephone conversation once between a former secretary-general and a pivotal head of state in the Middle East on the Arab-Israeli conflict.</p>
<p>After the call, the secretary general wondered with a wry smile: How many countries would have been listening [to our conversation]?&#8221;</p>
<p>He said on occasions even those directly involved resorted to public exposure when it suited them.</p>
<p>Still, Paul told IPS the General Assembly resolution is a very welcome initiative in the worldwide battle over mass electronic information-gathering.</p>
<p>He said recent revelations have made it clear there is an increasing intrusion of states &#8211; particularly the U.S. &#8211; into the private lives of all citizens, not only those within their national jurisdictions but worldwide.</p>
<p>&#8220;This battle involves first and foremost public opinion. Citizens must bring pressure on states to end or at least greatly restrict these practices,&#8221; he said.</p>
<p>Paul pointed out that a U.N. resolution will not have a binding effect but it will be part of a shift of opinion.</p>
<p>A recent open letter by famous authors is also part of this process as is the initiative of top executives in the internet industry, he noted.</p>
<p>&#8220;The resolution may disappoint some who would like to see stronger language. But in fact this resolution is well-crafted to win broad support and thus to have the maximum moral authority,&#8221; he added.</p>
<p>In a statement released last week, the Brazilian ministry of external relations said it was &#8220;greatly satisfied&#8221; with the consensus resolution.</p>
<p>And it &#8220;demonstrates the recognition, within the international community, of universal principles upheld by Brazil, such as protecting the right to privacy and freedom of expression, especially against extraterritorial actions of States in regard to data collection, monitoring and interception of communications.&#8221;</p>
<p>The statement also noted the resolution was &#8220;innovative in affirming the recognition that the rights of citizens must be protected both &#8216;offline&#8217; and &#8216;online&#8217;, and provides for steps to continue the dialogue and to deepen discussions over the coming months, at the United Nations, on the right to privacy in electronic communications.&#8221;</p>
<p>Meanwhile, the resolution requests U.N. High Commissioner for Human Rights Navi Pillay to present a report on &#8220;the protection and promotion of the right to privacy in the context of domestic and extra-territorial surveillance and/or interception of digital communications and collection of personal data, including on a mass scale.&#8221;</p>
<p>This report is to be submitted to the Human Rights Council and to the General Assembly in 2014, &#8220;with views and recommendations, to be considered by Member States.&#8221;</p>
<p>Virtually all of the revelations of electronic spying have been sourced to documents released by NSA contractor Edward Snowden, currently living in exile in Russia, and a fugitive from U.S. law enforcement agencies who have accused him of espionage.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/" >U.N.’s New Phone Network Vulnerable to Surveillance</a></li>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/10/u-n-will-censure-illegal-spying-but-not-u-s/" >U.N. Will Censure Illegal Spying, But Not U.S.</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/12/walls-ears-u-n-s-glass-house/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Turning the Tables on the Trackers: Wikileaks Sniffs Out Spy Salesmen</title>
		<link>https://www.ipsnews.net/2013/09/turning-the-tables-on-the-trackers-wikileaks-sniffs-out-spy-salesmen/</link>
		<comments>https://www.ipsnews.net/2013/09/turning-the-tables-on-the-trackers-wikileaks-sniffs-out-spy-salesmen/#respond</comments>
		<pubDate>Sun, 08 Sep 2013 15:07:02 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Hacking Team]]></category>
		<category><![CDATA[Privacy International]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127372</guid>
		<description><![CDATA[What was Mostapha Maanna of Hacking Team, an Italian surveillance company, doing on his three trips to Saudi Arabia in the last year? A new data trove from WikiLeaks reveals travel details for salesmen like Maanna who hawk electronic technology to track communications by individuals without their knowledge. Wikileaks suspects that Hacking Team technology is [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />BERKELEY, California, Sep 8 2013 (IPS) </p><p>What was Mostapha Maanna of Hacking Team, an Italian surveillance company, doing on his three trips to Saudi Arabia in the last year? A new data trove from WikiLeaks reveals travel details for salesmen like Maanna who hawk electronic technology to track communications by individuals without their knowledge.<span id="more-127372"></span></p>
<p>Wikileaks suspects that Hacking Team technology is used to snoop on activists and dissidents.</p>
<p>Julian Assange, the editor in chief of WikiLeaks, says that the information came from a special counter-intelligence unit that his organisation created &#8220;to protect WikiLeaks&#8217; assets, staff and sources from hostile intelligence operations and to reveal the nature of intelligence threats against journalists and sources more broadly.&#8221;</p>
<p>According to research conducted by the Kaspersky Lab, an anti-virus company, Hacking Team sells technology that can be used to create emails to target suspects by inviting them to click on a link or attachment that then installs a spy tool called Remote Control System (RCS) on the target&#8217;s computer.</p>
<p>RCS (also known as DaVinci) can then copy the Web browsing history of its targets, turn on their computer microphone and webcam to eavesdrop on them, as well record their conversations on computer applications like Skype.</p>
<p>Wikileaks documented the travels of two Hacking Team salesmen to countries with a poor record of human rights.</p>
<p>The first was Maanna, whose LinkedIn profile confirms that he works for Hacking Team in Milan. He came to work for the company in January 2011 after completing high school in Tyre, Lebanon, and an undergraduate and graduate degree in telecommunications engineering from Politecnico di Torino in<br />
Turin, Italy.</p>
<p>In addition to three trips to Saudi Arabia, Maanna&#8217;s travel profile places him in Egypt three times in 2013. He also made two trips each to Malaysia and Morocco in the last three years, among other countries, including United Arab Emirates (UAE) and Turkey, according to the documents released by WikiLeaks.</p>
<p>The second individual is Marco Bettini, a sales manager for almost 10 years at HackingTeam whose LinkedIn profile says he studied at the Instituto Radiotecnico Beltrami. Bettini is also identified as traveling to Morocco and UAE in February 2013.</p>
<p>Three of these countries &#8211; Morocco, Turkey and the UAE &#8211; are nations in which Hacking Team has come under fire from groups like Privacy International and Reporters Without Borders for the alleged use of its software.</p>
<p>For example, Mamfakinch, a Moroccan citizen journalist group that was created during the 2011 Arab Spring, believes that it was targeted with a &#8220;backdoor&#8221; attack by software that is identical to Hacking Team&#8217;s RCS system, according to an analysis by Dr. Web, an anti-virus company.</p>
<p>Slate Magazine described how the Mamfakinch&#8217;s computers were infected by spy software after members opened an email titled &#8220;Dénonciation&#8221; (denunciation) that contained a link to what appeared to be a Microsoft Word document labeled &#8220;scandale (2).doc&#8221; alongside a single line of text in French, which translates as: &#8220;Please do not mention my name or anything else, I don&#8217;t want any problems.&#8221;</p>
<p>Wired magazine recently published details of an attack on a U.S. activist who was sent an email about Turkey that appeared to come from a trusted colleague at Harvard that &#8220;referenced a subject that was a hot-button issue for the recipient, including a link to a website where she could obtain more information about it.&#8221; Although she did not click on the email, Arsenal Consulting, a digital forensics company, analysed the link and discovered that it, too, contained RCS attack software.</p>
<p>And Citizen Lab, a computer security research group in Canada, identified emails sent to Ahmed Mansoor, a UAE human rights activist, which were also allegedly designed with Hacking Team software. Mansoor was a member of a group of activists who were imprisoned from April to November 2011 on charges of insulting an Emirati royal family. He told Bloomberg that he was identified and then beaten after he clicked on an email that contained a Microsoft attachment that infected him with the spy software.</p>
<p><strong>Company response</strong></p>
<p>A spokesperson for Hacking Team says the company strictly follows applicable export laws and other regulations and only sells its products to governments or government agencies.</p>
<p>&#8220;The point that is generally missed in discussions like this is that the world is a dangerous place, with plenty of criminals and terrorists using modern Internet and mobil technologies to do their business, and that threatens us all,&#8221; Eric Rabe, the general counsel of Hacking Team, told Corpwatch via email.</p>
<p>&#8220;We firmly believe that the technology we make available to government and law enforcement makes it harder for those criminals and terrorists to operate.&#8221;</p>
<p>Rabe says that Hacking Team understands the potential for abuse of its products, so it reviews customers before a sale to determine whether or not there is &#8220;objective evidence or credible concerns that Hacking Team technology provided to the customer will be used to facilitate human rights violations.&#8221;</p>
<p>He noted that his company&#8217;s products have an auditing feature that cannot be turned off so that government agencies can check how and when surveillance occurs.</p>
<p>&#8220;Of course, HT cannot monitor the use of our software directly since clients must have the ability to conduct confidential investigations,&#8221; Rabe added. &#8220;Should we suspect that abuse has occurred, we investigate. If we find our contracts have been violated or other abuse has occurred, we have the option to suspend support for the software. Without support, the software is quickly rendered ineffective.&#8221;</p>
<p>Rabe says that Hacking Team did investigate &#8220;the Morocco and UAE assertions&#8221; but he was not able to comment since the company &#8220;does not share the results of such investigations nor do we publish whatever actions we may subsequently take.&#8221;</p>
<p>But activists still say that they are very concerned about details in the travel logs released by Wikileaks.</p>
<p>&#8220;The evidence and timeline does give credence to the idea that the discovery of Hacking Team software in Morocco and UAE corroborates with their sales team visit to those countries,&#8221; Kenneth Page, a policy officer at Privacy International, told Corpwatch.</p>
<p>&#8220;This is clearly not an ad-hoc process within a small industry, but a calculated and considered business deal in a global trade with profits made off the suffering of individuals,&#8221; says Page. &#8220;As the Wikileaks release today has shown, the business procedure behind the sale of surveillance technology is as well laid out as any other international trade &#8211; including proposals and presentations, site and country visits, contracts, and costing packages.&#8221;</p>
<p>Page said that the companies that develop and sell surveillance technology to such regimes should not be allowed to abdicate responsibility for freely selling this technology to just any government regardless of their human rights record.</p>
<p>&#8220;Companies know full well how their products work and, after tailoring to their specific clients&#8217; need, know how they will be used,&#8221; added Page.</p>
<p><em>*A longer version of this story originally appeared on <a href="http://www.Corpwatch.org">Corpwatch.org</a>.</em></p>
		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/09/turning-the-tables-on-the-trackers-wikileaks-sniffs-out-spy-salesmen/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.N.&#8217;s New Phone Network Vulnerable to Surveillance</title>
		<link>https://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/</link>
		<comments>https://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/#respond</comments>
		<pubDate>Mon, 26 Aug 2013 22:22:17 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Der Speigel]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=126845</guid>
		<description><![CDATA[The U.S. National Security Agency&#8217;s (NSA) surveillance and telephone data collection programme has come under heavy fire for violating privacy laws, even as the U.N.&#8217;s new telephone network appears vulnerable to hackers and eavesdroppers. A five-year, 2.1-billion-dollar refurbishment of the U.N. headquarters building was aimed at modernising the 39-storey infrastructure, making it more energy efficient [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Thalif Deen<br />UNITED NATIONS, Aug 26 2013 (IPS) </p><p>The U.S. National Security Agency&#8217;s (NSA) surveillance and telephone data collection programme has come under heavy fire for violating privacy laws, even as the U.N.&#8217;s new telephone network appears vulnerable to hackers and eavesdroppers. <span id="more-126845"></span>A five-year, 2.1-billion-dollar refurbishment of the U.N. headquarters building was aimed at modernising the 39-storey infrastructure, making it more energy efficient and technologically advanced in order to keep pace with the global digital revolution.</p>
<p>As part of this process, however, the 63-year-old Secretariat has also been equipped with a sophisticated telephone network by Cisco Systems, which apparently has the capacity to collect phone data and track all incoming and outgoing calls made by staffers as well as diplomats, if they access U.N. phones in the delegates&#8217; lounge or elsewhere in the building.</p>
<p>&#8220;If and when the U.N. administration wants to intercept communications, it will now have the capacity to do so in violation of one&#8217;s privacy,&#8221; a U.N. source familiar with the new network told IPS.</p>
<p>But that does not necessarily mean the current administration is already doing so, he added.</p>
<p>Barbara Tavora-Jainchill, president of the United Nations Staff Union, told IPS, &#8220;Yes, we have this new phone system but never heard that it has this capability.&#8221;</p>
<p>&#8220;If it does, I believe the U.N. Administration should immediately act so that the information exchanged through telephone and internet by staff and diplomats is fully protected and kept private,&#8221; Tavora-Jainchill added.</p>
<p>She pointed out that each extension holder in the new phone network has a personalised access code, and outside calls are allowed only after the code is punched in.</p>
<p>Staff members allowed to make long distance calls also have to specify whether the call is for personal or business purposes, with the former being paid for by the staff member. This was true in the old phone system as well, she said, but &#8220;the capability of the new system is news to me.&#8221;</p>
<p>Asked for his comments, U.N. spokesperson Martin Nesirky, told IPS, &#8220;The Secretariat has indeed upgraded its telephony system to a modern &#8216;IP telephony&#8217; system that uses Cisco equipment and technology.&#8221; He said the upgraded system converges the data and voice communications infrastructure, resulting in cost savings and the ability to integrate the phone system into various information technology (IT) systems.</p>
<p>Nesirky insisted the system does not provide any additional &#8220;monitoring&#8221; features that were not already present in the old analog system, and it also does not provide a function to &#8220;monitor internet traffic&#8221;. However, he admitted, &#8220;the Secretariat already collects connection data about incoming and outgoing calls, in order to provide usage-based billing, and perform troubleshooting, diagnostics, statistical analysis and performance tuning.&#8221;</p>
<p>All such monitoring, he pointed out, is performed pursuant to a 2004 memo by then Secretary-General Kofi Annan (ST/SGB/2004/15) titled, &#8220;Use of information and communication technology resources and data&#8221;.</p>
<p>The U.N. source familiar with the workings of the network told IPS the phone logs are a treasure trove, with detailed history of all outgoing and incoming calls. &#8220;It&#8217;s an addition to logs on your entrances and exits&#8230;recorded at the turnstiles inside the building.&#8221; With these phones, he said, finding out about one&#8217;s calling activity is easy. He also said he does not know who has access to such logs and what confidentiality, if any, exists, and that calls could easily be recorded if someone is being investigated. &#8220;It is safe to assume all calls are monitored, and if you don&#8217;t want anybody to know that you are calling someone, it&#8217;s better not to use such phones, and use your cell phone or Skype,&#8221; he added.</p>
<p>The Germany-based Spiegel Online International reported last week that NSA technicians have managed to decrypt the U.N.&#8217;s internal video teleconferencing (VTC) system as part of its surveillance of the world body.</p>
<p>The combination of this new access to the U.N. and the cracked encryption code have led to &#8220;a dramatic improvement in VTC data quality and [the] ability to decrypt the VTC traffic,&#8221; the NSA agents have noted.</p>
<p>In the article, titled &#8220;How America Spies on Europe and the U.N.&#8221;, Spiegel said that within just under three weeks, the number of decrypted communications increased from 12 to 458. Meanwhile there have been published reports that Cisco Systems outside the U.N. have been hacked.</p>
<p>A January online article by Dan Goodin, information technologies editor at Ars Technica, says internet phones sold by Cisco Systems are vulnerable to stealthy hacks that turn them into remote bugging devices that eavesdrop on private calls and nearby conversations.</p>
<p>The networking giant warned of the vulnerability almost two weeks after a security expert demonstrated how people with physical access to the phones could cause them to execute malicious code.</p>
<p>Cisco has reportedly released a stop-gap software patch for the weakness, which affects several models in the CiscoUnified IP Phone 7900 series.</p>
<p>The vulnerability can also be exploited remotely over corporate networks, although Cisco has issued workarounds to make those hacks more difficult.</p>
<p>&#8220;Cisco recognises that while a number of network, device, and configuration based mitigations exist, there is no way to mitigate the physical attack vector on the affected devices,&#8221; the company&#8217;s advisory stated.</p>
<p>&#8220;To this end, Cisco will conduct a phased remediation approach and will be releasing an intermediate Engineering Special software release for affected devices to mitigate known attack vectors for the vulnerability documented in this advisory.&#8221;</p>
<p>The vulnerability is the latest reminder of privacy threat posed by today&#8217;s phones, computers, smartphones and other network-connected devices, according to the article.</p>
<p>Because the devices run on software that is susceptible to hacking, they can often surreptitiously be turned into listening and sometimes spying vehicles that capture business secrets or intimate moments, it added.</p>
<p>Spiegel said the NSA caught Chinese spying on the U.N. in 2011. And NSA agents succeeded in penetrating defences to &#8220;tap into Chinese SIGINT (signals intelligence) collection,&#8221; describing it as &#8220;how spies were spying on spies&#8221;.</p>
<p>Based on this source, the NSA has allegedly gained access to three reports on &#8220;high interest, high profile current events&#8221;. The internal NSA documents correspond to instructions from the State Department authorised by then-U.S. Secretary of State Hillary Clinton in Jul. 2009.</p>
<p>The 29-page report, &#8220;Reporting and Collection Needs: The United Nations&#8221;, called on its diplomats to collect information on key players at the United Nations. According to this document, the diplomats were asked to gather numbers for phones, mobiles, pagers and fax machines.</p>
<p>They were called on to amass phone and email directories, credit card and frequent-flier customer numbers, duty rosters, passwords and even biometric data.</p>
<p>When Spiegel reported on the confidential cable back in 2010, it said the State Department tried to deflect the criticism by saying it was merely helping out other agencies.</p>
<p>&#8220;In reality, though, as the NSA documents now clearly show, they served as the basis for various clandestine operations targeting the United Nations and other countries,&#8221; Spiegel added.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
<li><a href="http://www.ipsnews.net/2013/08/aclu-reveals-fbi-hacking-contractors/" >ACLU Reveals FBI Hacking Contractors</a></li>
<li><a href="http://www.ipsnews.net/2013/08/eavesdropping-on-the-whole-world/" >Eavesdropping on the Whole World</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/08/u-n-s-new-phone-network-vulnerable-to-surveillance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Snowden Defies White House, Still Caught in Limbo</title>
		<link>https://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/</link>
		<comments>https://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/#respond</comments>
		<pubDate>Tue, 02 Jul 2013 18:02:32 +0000</pubDate>
		<dc:creator>Pratap Chatterjee</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[Booz Allen]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125402</guid>
		<description><![CDATA[Late on Monday night, Sarah Harrison, a Wikileaks activist, hand-delivered 21 letters to Kim Shevchenko, the duty officer at the Russian consulate office in Moscow&#8217;s Sheremetyevo airport, on behalf of Edward Snowden, the U.S. National Security Agency (NSA) whistleblower. The letters that Harrison delivered were requests for asylum addressed to embassy officials of the following [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p>By Pratap Chatterjee<br />WASHINGTON, Jul 2 2013 (IPS) </p><p>Late on Monday night, Sarah Harrison, a Wikileaks activist, hand-delivered 21 letters to Kim Shevchenko, the duty officer at the Russian consulate office in Moscow&#8217;s Sheremetyevo airport, on behalf of Edward Snowden, the U.S. National Security Agency (NSA) whistleblower.<span id="more-125402"></span></p>
<p>The letters that Harrison delivered were requests for asylum addressed to embassy officials of the following countries: Austria, Bolivia, Brazil, China, Cuba, Ecuador, Finland, France, Germany, Iceland, India, Italy, Ireland, the Netherlands, Nicaragua, Norway, Poland, Russia, Spain, Switzerland and Venezuela.</p>
<p>&#8220;Although I am convicted of nothing, [the U.S. government] has unilaterally revoked my passport, leaving me a stateless person,&#8221; Snowden wrote in a statement for the public that was posted on the Wikileaks website. &#8220;Without any judicial order, the administration now seeks to stop me exercising a basic right. A right that belongs to everybody. The right to seek asylum.&#8221;</p>
<p>Washington is furious because Snowden has released dozens of top secret documents that prove that the U.S. government has been tapping global internet and phone systems on a massive scale. As many as one trillion documents have been intercepted under one scheme &#8211; codenamed &#8220;ShellTrumpet.&#8221; Other secret projects include &#8220;Prism&#8221; which allows the NSA to harvest information on ordinary citizens from servers belonging to companies like Google and Facebook.</p>
<p>Snowden coordinated the releases from a hotel in Hong Kong in late May, working principally with two U.S. reporters &#8211; Glenn Greenwald and Laura Poitras &#8211; and the Guardian newspaper in the UK. Der Spiegel in Germany and the Washington Post in the U.S. also were given some material.</p>
<p>For these revelations, the 30-year-old former U.S. Central Intelligence Agency (CIA) staffer &#8211; is now a wanted man. The U.S. government has charged him with espionage in a court order issued Jun. 14 and signed by John Anderson, a judge in Virginia, and canceled his U.S. passport.</p>
<p>Informed that the Chinese authorities would allow him to depart without hindrance, Snowden fled from Hong Kong to Moscow on Jun. 23 with Harrison&#8217;s assistance after she arrived to help him with safe passage papers issued by Fidel Narvaez, an Ecuadorean consular officer in London.</p>
<p>The pair, however, are now marooned in the Russian capital because Ecuador has since canceled the papers it issued to Snowden.</p>
<p>Snowden&#8217;s 21 letters requesting asylum reflect his perilous state, given that the U.S. government is now working the phones to ask governments around the world to prevent him from escaping to freedom.</p>
<p>Russia has said that it will not deport Snowden from Moscow airport, but it has also refused to grant him asylum unless he agrees to stop releasing documents.</p>
<p>&#8220;Russia never hands anybody over anywhere and doesn&#8217;t intend to do so. If he wants to go somewhere and somebody will host him &#8211; no problem,&#8221; Putin said at a news conference in Moscow. &#8220;If he wants to stay here, there is one condition: He must stop his work aimed at harming our American partners.&#8221;</p>
<p>Ecuadorean President Rafael Correa has also backed away from helping Snowden after he got a personal call from U.S. Vice President Joe Biden. Correa now says that Narvaez had made a mistake in giving Snowden papers.</p>
<p>&#8220;The consul, in his desperation, issued a safe conduct document without validity, without authorisation, without us even knowing,&#8221; Correa told the Guardian newspaper. &#8220;It was a mistake on our part.&#8221;</p>
<p>Snowden&#8217;s top hope is now Venezuela, which has expressed an interest in him. &#8220;If this young man is punished, nobody in the world will ever dare to tell the truth,&#8221; Venezuelan President Nicolás Maduro has told the media, hinting strongly that his government would offer Snowden asylum.</p>
<p>By coincidence, Maduro is in Moscow attending talks on oil and gas. In theory he could whisk Snowden away to safety on his presidential jet.</p>
<p>While Snowden is living in limbo, he has not arrived at this extraordinary situation without some forethought.</p>
<p>The computer programmer, who has never attended college, previously worked for the CIA in Geneva where he first became troubled by the NSA&#8217;s massive dragnet for global communications and decided to do something about it.</p>
<p>Several months ago Snowden applied for a job as an &#8220;infrastructure analyst&#8221; with Booz Allen Hamilton, a Virginia intelligence contractor, in order to acquire documents to prove what the NSA was doing. He was hired by the company in March at a salary of 122,000 dollars a year at an NSA station in Hawaii until late May when he left for Hong Kong.</p>
<p>&#8220;My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked,&#8221; Snowden told the South China Morning Post.</p>
<p>Most significantly he found evidence that the NSA was storing huge quantities of data for as much as five years under a secret interpretation of the law. Armed with these documents, he left for Hong Kong on May 20 after telling his supervisor that he had to get medical assistance for epilepsy.</p>
<p>While Snowden now faces an uncertain future, he says he remains &#8220;unbowed&#8221; in his convictions and that he placed his trust in his supporters to fight back against the NSA and the White House.</p>
<p>&#8220;The Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless,&#8221; Snowden wrote in his statement issued last night. &#8220;No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised &#8211; and it should be.&#8221;</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/06/how-booz-allen-made-the-revolving-door-redundant/" >How Booz Allen Made the Revolving Door Redundant</a></li>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The New Fascism</title>
		<link>https://www.ipsnews.net/2013/07/the-new-fascism/</link>
		<comments>https://www.ipsnews.net/2013/07/the-new-fascism/#respond</comments>
		<pubDate>Mon, 01 Jul 2013 12:19:52 +0000</pubDate>
		<dc:creator>Johan Galtung</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Armed Conflicts]]></category>
		<category><![CDATA[Asia-Pacific]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Development & Aid]]></category>
		<category><![CDATA[Economy & Trade]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Globalisation]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Peace]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[Trade & Investment]]></category>
		<category><![CDATA[Auschwitz]]></category>
		<category><![CDATA[Bradley Manning]]></category>
		<category><![CDATA[British Colonialism]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Fascism]]></category>
		<category><![CDATA[Guantanamo]]></category>
		<category><![CDATA[Hiroshima]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Mau Mau]]></category>
		<category><![CDATA[Military Industrial Complex]]></category>
		<category><![CDATA[Military-Financial Complex]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[World War II]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125343</guid>
		<description><![CDATA[In this column, Johan Galtung, rector of the TRANSCEND Peace University and author of "The Fall of the US Empire--And Then What?", writes that the essence of fascism – the pursuit of political goals using violence – lies in the monopoly of power, including nonviolent power. Fascism also makes itself compatible with democracy through the use of such bridging words as “security” and “freedom”, which enable unbridled surveillance, and place control of key institutions like the judiciary, the police and the military in the hands of the executive.]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="201" src="https://www.ipsnews.net/Library/2013/07/5084666254_666942ce5f_z-300x201.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/07/5084666254_666942ce5f_z-300x201.jpg 300w, https://www.ipsnews.net/Library/2013/07/5084666254_666942ce5f_z-629x422.jpg 629w, https://www.ipsnews.net/Library/2013/07/5084666254_666942ce5f_z.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Fascism means unlimited surveillance of one's own people and others, made possible by postmodern technology. Credit: Frédéric BISSON/CC-BY-2.0</p></font></p><p>By Johan Galtung<br />ALFAZ, Spain, Jul 1 2013 (IPS) </p><p>The atrocious Second World War left behind lasting damage by lowering our standards for what is marginally acceptable.<span id="more-125343"></span></p>
<div id="attachment_125346" style="width: 310px" class="wp-caption alignright"><a href="https://www.ipsnews.net/Library/2013/07/GALTUNG-300x225-1.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-125346" class="size-full wp-image-125346" alt="Johan Galtung, rector of the TRANSCEND Peace University. Credit: IPS" src="https://www.ipsnews.net/Library/2013/07/GALTUNG-300x225-1.jpg" width="300" height="225" srcset="https://www.ipsnews.net/Library/2013/07/GALTUNG-300x225-1.jpg 300w, https://www.ipsnews.net/Library/2013/07/GALTUNG-300x225-1-200x149.jpg 200w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-125346" class="wp-caption-text">Johan Galtung, rector of the TRANSCEND Peace University. Credit: IPS</p></div>
<p>War is bad but if it’s not nuclear war, the limit has not yet been reached.</p>
<p>Fascism is bad, but if it does not come with dictatorship and the elimination of an entire people, the limit has not yet been reached.</p>
<p>Hiroshima, Hitler, Auschwitz are deeply rooted in our minds. And we distort them.</p>
<p>Hiroshima makes us disregard the state terrorism against German and Japanese cities, the killing of citizens of any age and both genders. And Hitler and Auschwitz make us disregard fascism as the pursuit of political goals by means of violence and the threat of violence.</p>
<p>It takes two to make a war, by whatever means. But it takes only one to make fascism, against one&#8217;s own people, and/or against others.</p>
<p>What is the essence of fascism? A definition has been given: coupling the pursuit of political goals with massive violence. We have democracy exactly to prevent that, a political game for the pursuit of political goals by nonviolent means, and more particularly by getting the majority, as demonstrated by free and fair elections or referenda, on one&#8217;s side.</p>
<p>A wonderful innovation with a logical follow-up: nonviolence even when the majority oversteps lines or limits, for instance, as written into the codes of human rights. The strong state, able and willing to display its force – including through the use of capital punishment – belongs to the essence of fascism.</p>
<p>That means absolute monopoly on power, including the power that does not come out of a gun, including nonviolent power. And it means a view of war as an acceptable activity of the state, normalising, even eternalising war. It means a deep contradiction with an omnipresent enemy, like Aryans against non-Aryans, or Judeo-Christianity against Islam, glorifying the former, demonising the latter.</p>
<p>It means unlimited surveillance of one&#8217;s own people and others, made possible by postmodern technology. What matters is fear, that people are afraid and abstain from protests and nonviolent action lest they are singled out for the ultimate punishment: extrajudicial execution.</p>
<p>More important than actually checking everybody&#8217;s email and web activity and listening to telephone calls is that people believe this is happening. The trick is to do so indiscriminately, not focusing on suspects only but making people feel that anyone is a potential suspect.</p>
<p>The even more basic trick is to make fascism compatible with democracy. A piece of news comes to mind: &#8220;Admitting that British forces tortured Kenyans fighting against colonial rule in the 1950s – the government (has agreed) to compensate 5,228 victims.&#8221; (International Herald Tribune, 07-06-2013).</p>
<p>A staggering number, more than 5,000 &#8211; for sure there were more. Where was the Mother of Parliaments during this display of fascism? One senses a formula behind this decision, &#8220;the security of Britons in Kenya” – “security” being the bridging word between fascism and democracy, sustained by that academically institutionalised paranoia, &#8220;security studies&#8221;.</p>
<p>There are other ways to make fascism compatible with democracy.</p>
<p>First, a reductionist definition of democracy as multi-party national elections.</p>
<p>Second, making the parties close to identical in matters of &#8220;security&#8221;, ready to use violence internationally or nationally.</p>
<p>Third, privatising the economy under the heading of “freedom”, the other bridging word, essentially granting the Executive power over the judiciary, the police and the military – a move for which there is already manufactured consent. To arrive at that consent, a permanent crisis with a permanent enemy ready to hit is useful, but there are other approaches.</p>
<p>Just as a crisis defined as “military” catapults the military into power, a crisis defined as “economic” catapults capital into power. If the crisis is that the West has been outcompeted in the real economy, then the finance economy – the huge banks – start handling the trillions under the formula of freedom.</p>
<p>There is a way out, and sooner or later it will be traveled. People pay around 20 percent (in the U.S. they pay half) in tax to the state when they buy goods or services in the real economy – for end consumption – but the finance economy effectively lobbies against even one percent. Even a compromise like five percent would solve the dilemma of Western states that the real economy does not generate a surplus sufficient to run a modern state beyond force.</p>
<p>If freedom is defined as the freedom to use money to make more money, and security as the force to kill the designated enemy wherever he is, then we get a military-financial complex, the successor to the military-industrial complex in deindustrialising societies.</p>
<p>They know their enemies: peace movements and environment movements, threats to security and freedom respectively by not only casting doubts on killing, wealth and inequality but also framing them as counter-productive.</p>
<p>Both movements say that you are in fact producing insecurity and dictatorship. Both operate in the open, are easily infiltrated with spies and provocateurs, thereby eliminating badly needed voices.</p>
<p>So, here we are. Torture as enhanced investigation, de facto camps of concentration like Guantanamo, habeas corpus eliminated. And a U.S. president up front for the gullible, telling progressive tales he never enacts, never mind whether he is a hypocrite or is put up by somebody as a veil over fascist reality.</p>
<p>Those who pull the veil aside – Julian Assange, Bradley Manning, Edward Snowden – are criminalised, not those building fascism. The old adage: when democracy is most needed, abolish it.</p>
<p>(END/COPYRIGHT IPS)</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/01/preventing-world-war-iii/" >Preventing World War III </a></li>
<li><a href="http://www.ipsnews.net/2012/06/world-slightly-more-peaceful-despite-u-s-militarisation/" >World Slightly More Peaceful, Despite U.S. Militarisation </a></li>
<li><a href="http://www.ipsnews.net/2013/06/nsa-leaks-prompt-lawsuit-and-u-n-action/" >NSA Leaks Prompt Lawsuit and U.N. Action </a></li>
</ul></div>		<p>Excerpt: </p>In this column, Johan Galtung, rector of the TRANSCEND Peace University and author of "The Fall of the US Empire--And Then What?", writes that the essence of fascism – the pursuit of political goals using violence – lies in the monopoly of power, including nonviolent power. Fascism also makes itself compatible with democracy through the use of such bridging words as “security” and “freedom”, which enable unbridled surveillance, and place control of key institutions like the judiciary, the police and the military in the hands of the executive.]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/the-new-fascism/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>In Conservatives&#8217; Canada, It&#8217;s Not Easy Being Green</title>
		<link>https://www.ipsnews.net/2013/02/in-conservatives-canada-its-not-easy-being-green/</link>
		<comments>https://www.ipsnews.net/2013/02/in-conservatives-canada-its-not-easy-being-green/#comments</comments>
		<pubDate>Wed, 20 Feb 2013 19:38:08 +0000</pubDate>
		<dc:creator>Stephen Leahy</dc:creator>
				<category><![CDATA[Active Citizens]]></category>
		<category><![CDATA[Biodiversity]]></category>
		<category><![CDATA[Civil Society]]></category>
		<category><![CDATA[Climate Change]]></category>
		<category><![CDATA[Combating Desertification and Drought]]></category>
		<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Editors' Choice]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Environment]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Activists]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[Stephen Harper]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=116597</guid>
		<description><![CDATA[Canada&#8217;s police and security agencies think citizens concerned about the environment are threats to national security, and some are under surveillance, documents reveal. The RCMP, the national police force, and Canada&#8217;s spy agency CSIS are increasingly conflating terrorism and extremism with peaceful citizens exercising their democratic rights to organise petitions, protest and question government policies, [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="168" src="https://www.ipsnews.net/Library/2013/02/dirtyolympics-300x168.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/02/dirtyolympics-300x168.jpg 300w, https://www.ipsnews.net/Library/2013/02/dirtyolympics-629x353.jpg 629w, https://www.ipsnews.net/Library/2013/02/dirtyolympics.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">A banner targets Canada's tar sands development, the country's fastest growing source of greenhouse gas emissions. Credit: Anthony Fenton/IPS</p></font></p><p>By Stephen Leahy<br />UXBRIDGE, Canada, Feb 20 2013 (IPS) </p><p>Canada&#8217;s police and security agencies think citizens concerned about the environment are threats to national security, and some are under surveillance, documents reveal.<span id="more-116597"></span></p>
<p>The RCMP, the national police force, and Canada&#8217;s spy agency CSIS are increasingly conflating terrorism and extremism with peaceful citizens exercising their democratic rights to organise petitions, protest and question government policies, said Jeffrey Monaghan, a researcher with the Surveillance Studies Centre at Queen’s University in Kingston, Ontario.</p>
<p>Protests and opposition to Canada&#8217;s resource-based economy, especially oil and gas production, are now viewed as threats to national security, Monaghan said. This conclusion is based on official security documents obtained under freedom of information laws over the last five years.It is governments and the fossil fuel industry who are the extremists, threatening the prosperity of future generations.<br /><font size="1"></font></p>
<p>For the past two years, officials in Canada&#8217;s Stephen Harper government have been calling environmentalists &#8220;radicals&#8221; and accusing environmental organisations of money laundering.</p>
<p>&#8220;The Harper government has a strong interest in suppressing environmental activism,&#8221; Monaghan told IPS.</p>
<p>By branding activists as extremists or radicals, many people will not want to be involved. Surveillance and other security activities will have a similar &#8220;chilling effect&#8221;, he fears.</p>
<p>&#8220;There could be an incredibly profound impact on public participation,&#8221; Monaghan noted.</p>
<p>In 2011, a Montreal, Quebec man who wrote threatening letters opposing shale gas fracking was charged under Canada&#8217;s Anti-Terrorism Act. Documents released in January show the RCMP has been monitoring Quebec residents who oppose fracking.</p>
<p>In a Canadian Senate hearing last week, Richard Fadden, the director of CSIS (Canadian Security Intelligence Service) said they are more worried about domestic terrorism, acknowledging that the vast majority of its spying is done within Canada. Fadden said they are &#8220;following a number of cases where we think people might be inclined to acts of terrorism&#8221;.</p>
<p>Canada is at very low risk from foreign terrorists, but like the U.S. it built a large security apparatus following 9/11. The resources and costs are wildly out of proportion to the risk, Monaghan said.</p>
<p>Without a significant foreign threat, security services are looking inside the country for reasons to justify their &#8220;bloated budgets&#8221;, he said. And the new &#8220;enemy within&#8221; is environmental organisations, according to the inflammatory rhetoric of Harper&#8217;s Conservative government.</p>
<p>A year ago, in a widely-published open letter, Joe Oliver, the minister of natural resources, slammed &#8220;environmental and other radical groups&#8221; for getting in the way of forestry, mining and energy projects.</p>
<p>&#8220;These groups threaten to hijack our regulatory system to achieve their radical ideological agenda,&#8221; Oliver wrote, without naming any groups.</p>
<p>&#8220;They use funding from foreign special interest groups to undermine Canada’s national economic interest,&#8221; he charged, without offering any evidence.</p>
<p>A few months later, in a television interview, environment minister Peter Kent accused some charitable environmental groups in Canada of being used &#8220;to launder offshore foreign funds for inappropriate use against Canadian interest&#8221;. Kent went on imply evidence of illegal activity but offered no proof.</p>
<p>Canada&#8217;s economy has become increasingly reliant on resource extraction, oil and gas in particular. The Alberta tar sands are the world&#8217;s biggest industrial project, sending 1.6 million barrels of tar-like oil south to the U.S. daily.</p>
<p>The tar is too thick to extract with conventional drilling so it is strip-mined or boiled out of the ground, destroying large areas of pristine forest, consuming vast quantities of fresh water and emitting tens of millions of tonnes of climate-disrupting carbon.</p>
<p>Environmentalists&#8217; have labelled the tar sands region &#8220;Canada&#8217;s Mordor&#8221;. The Harper and Alberta governments are banking on doubling or tripling the size of the tar sands and aggressively support new pipelines to ship the tarry oil south to the U.S., west to Asia and east to Europe.</p>
<p>Tar sands oil, natural gas and the pipelines to move them are considered by these governments to be essential to &#8220;Canada’s national economic interest&#8221;. This has now been directly linked to national security, said Monaghan.</p>
<p>The federal and Alberta governments and the fossil fuel industry are &#8220;virtually seamless&#8221; in their thinking, said Greenpeace Canada&#8217;s executive director Bruce Cox.</p>
<p>&#8220;You can&#8217;t tell the difference between a government of Canada ad and one from the oil industry,&#8221; Cox told IPS.</p>
<p>Canada&#8217;s Natural Resource ministry spent nine million dollars in 2012 in advertising to promote pipelines, safety measures such as double-hulled oil tankers and changes to environmental laws. Cox said those changes &#8220;gutted&#8221; environmental regulations but the government promotes them as a benefit to the Canadian people.</p>
<p>Canadian security forces seem to have a &#8220;fixation&#8221; with Greenpeace, continually describing them as &#8220;potentially violent&#8221; in threat assessment documents, said Monaghan.</p>
<p>Cox said he was aware of this attention and met with the head of the RCMP last year. &#8220;We&#8217;re an outspoken voice for non-violence and this was made clear to the RCMP,&#8221; Cox said.</p>
<p>He said there was real anger among Canadians about the degradation of the natural environment by oil, gas and other extractive industries and governments working for those industries and not in the public interest. Security forces should see Greenpeace as a &#8220;plus&#8221;, a non-violent outlet for this anger, he argued.</p>
<p>&#8220;It is governments and the fossil fuel industry who are the extremists, threatening the prosperity of future generations,&#8221; Cox said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2012/02/scientists-denounce-climate-change-denial-censorship/" >Scientists Denounce Climate Change Denial, Censorship</a></li>
<li><a href="http://www.ipsnews.net/2012/03/rio-20-suffers-leadership-void-weeks-ahead-of-summit/" >Rio+ 20 Suffers Leadership Void Weeks Ahead of Summit</a></li>
<li><a href="http://www.ipsnews.net/2011/12/in-unprecedented-move-canada-withdraws-from-kyoto-protocol/" >In Unprecedented Move, Canada Withdraws from Kyoto Protocol</a></li>
<li><a href="http://www.ipsnews.net/2011/11/canada-harper-government-guts-environment-programmes/" >CANADA: Harper Government Guts Environment Programmes</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/02/in-conservatives-canada-its-not-easy-being-green/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>&#8220;Drone&#8221; a Dirty Word in the U.N. Lexicon</title>
		<link>https://www.ipsnews.net/2013/02/drone-a-dirty-word-in-the-u-n-lexicon/</link>
		<comments>https://www.ipsnews.net/2013/02/drone-a-dirty-word-in-the-u-n-lexicon/#respond</comments>
		<pubDate>Thu, 07 Feb 2013 00:01:02 +0000</pubDate>
		<dc:creator>Thalif Deen</dc:creator>
				<category><![CDATA[Africa]]></category>
		<category><![CDATA[Armed Conflicts]]></category>
		<category><![CDATA[Editors' Choice]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Humanitarian Emergencies]]></category>
		<category><![CDATA[IPS UN: Inside the Glasshouse]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Peace]]></category>
		<category><![CDATA[TerraViva Europe]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[DRC]]></category>
		<category><![CDATA[Drones]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[UAVs]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=116310</guid>
		<description><![CDATA[The &#8220;drone&#8221;, one of the eminently controversial lethal weapons deployed by the United States in its war against terrorism, is obviously a dirty word in the U.N. lexicon. So when Under-Secretary-General for Peacekeeping Operations Herve Ladsous was asked about U.N. plans to use drones in the Democratic Republic of Congo (DRC), he demurred. &#8220;I would [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="188" src="https://www.ipsnews.net/Library/2013/02/drone_iraq_640-300x188.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/02/drone_iraq_640-300x188.jpg 300w, https://www.ipsnews.net/Library/2013/02/drone_iraq_640-629x395.jpg 629w, https://www.ipsnews.net/Library/2013/02/drone_iraq_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">The RQ-7B Shadow 200 tactical UAV is wheeled off the runway after a reconnaissance mission in Iraq Aug. 11, 2008. Credit: U.S. military/public domain</p></font></p><p>By Thalif Deen<br />UNITED NATIONS, Feb 7 2013 (IPS) </p><p>The &#8220;drone&#8221;, one of the eminently controversial lethal weapons deployed by the United States in its war against terrorism, is obviously a dirty word in the U.N. lexicon.<span id="more-116310"></span></p>
<p>So when Under-Secretary-General for Peacekeeping Operations Herve Ladsous was asked about U.N. plans to use drones in the Democratic Republic of Congo (DRC), he demurred.</p>
<p>&#8220;I would not use the word drones,&#8221; he told reporters Wednesday, opting for a military euphemism: &#8220;unmanned aerial vehicles&#8221; (UAVs).</p>
<p>Ladsous said the United Nations plans to use &#8220;unarmed UAVs&#8221; only for surveillance purposes &#8211; but with the express permission of the government of DRC and neighbouring countries.</p>
<p>&#8220;We will see how this experiment works,&#8221; he said, adding that the United Nations will be &#8220;open&#8221; to sharing whatever intelligence it gathers with regional bodies in Africa, besides U.N. force commanders on the ground.</p>
<p>The &#8220;green light&#8221; for the use of unarmed drones in DRC &#8211; a country battling a violent insurgency &#8211; was given by the 15-member Security Council last November, and is aimed at monitoring the movement of armed groups by the 17,500-strong U.N. Organisation Stabilisation Mission in DRC (MONUSCO).</p>
<p>But some U.N. diplomats fear that U.N. drones may eventually be armed, if and when the conflict in DRC takes a turn for the worse.</p>
<p>The drones used by the United States are fully armed and have resulted in the killings of both suspected terrorists and civilians in countries such as Afghanistan, Pakistan, Somalia, and Yemen.</p>
<p>According to published reports, more than 40 countries either deploy or manufacture drones.</p>
<p>Larry Dickerson, defence systems analyst at Forecast International, a U.S. defence marketing research firm, told IPS that besides the United States, there is a very long list of countries manufacturing these UAVs.</p>
<p>These countries include U.K., Israel, France, Germany, Poland, Czech Republic, Canada, Greece, Bulgaria, Spain, Italy, Russia, China, South Korea, Austria, India, South Africa, Japan and Singapore.</p>
<p>Ben Emmerson, a British lawyer and U.N. special rapporteur for human rights and counterterrorism, is in the process of preparing an investigative report on the use of drones.</p>
<p>He is focusing on 25 drone strikes, specifically in Afghanistan, Pakistan, Yemen, Somalia, and the Palestinian territories (by Israeli drones), where these attacks have reportedly resulted in civilian deaths.</p>
<p>The report is expected to be presented to the General Assembly next October or November.</p>
<p>Secretary-General Ban Ki-moon has already expressed &#8220;concern&#8221; on the use of armed drones for targeted killings, &#8220;as it raises questions about compliance with the fundamental principle of distinction between combatants and non-combatants.&#8221;</p>
<p>Associate U.N. spokesman Farhan Haq told reporters last month that drone attacks have also reportedly caused &#8220;substantial casualties, raising questions about the ability to ensure full compliance with the principle of proportionality&#8221;.</p>
<p>He said the secretary-general has asked relevant member states to be transparent about the circumstances in which drones are used, and the means by which they ensure that attacks involving drones comply with international law.</p>
<p>According to Amnesty International, there have been more than 300 drone strikes in Pakistan alone over the last few years, which have killed both civilians as well as suspected militants.</p>
<p>Responding to a report that the administration of President Barack Obama was finalising guidelines for &#8220;targeted killings&#8221; by drones, Susan Lee, Amnesty&#8217;s Americas programme director, said bluntly: &#8220;There already exists a rulebook for these issues: it is called international law.&#8221;</p>
<p>Any policy on so-called targeted killings by the U.S. government, she said, should not only be fully disclosed, but must comply with international law.</p>
<p>To date, the justifications publicly offered by senior Obama administration officials have shown only that U.S. government policy appears to permit extrajudicial executions in violation of international law, Lee added.</p>
<p>Asked how far behind are China and Russia in deploying drones in conflict situations, Dickerson told IPS that both countries are increasing their UAV inventories, &#8220;but remain far behind the United States in terms of numbers fielded and the sophistication of these systems.&#8221;</p>
<p>&#8220;Neither have the battlefield experience in the operation of UAVs that the U.S. military gained over the last 10 years,&#8221; he said.</p>
<p>Dickerson also said that the United States has the largest market share and produces more UAVs than any other country in the world.</p>
<p>He said the worldwide market for UAVs is worth a staggering 70.9 billion dollars over the next 10 years: 39.2 billion dollars related to the production of these systems; 28.7 billion dollars for research and development spending; and around 3.0 billion dollars for UAV services contracts.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/01/washington-urged-to-stress-diplomacy-in-mali/" >Washington Urged to Stress Diplomacy in Mali</a></li>
<li><a href="http://www.ipsnews.net/2013/01/whos-watching-those-unblinking-eyes-in-the-sky/" >Who’s Watching Those Unblinking Eyes in the Sky?</a></li>
<li><a href="http://www.ipsnews.net/2013/01/drones-provoke-growing-controversy-in-u-s/" >Drones Provoke Growing Controversy in U.S.</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/02/drone-a-dirty-word-in-the-u-n-lexicon/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
