For those out of the loop, sdparm allows for setting and getting SCSI device parameters. The ddpt utility is yet another spin-off of dd but with extra features regarding storage control. Both ddpt and sdparm work on not only Linux but also BSDs, Solaris, and even Windows.
Popcorn Time, an application that lets users stream movies and TV shows directly from torrents without having to download them, has been upgraded to version 0.3.6 and is now available for download.
Calibre, a complete application to edit, view, and convert eBook files, has received its last update this year and the developer chose to add a number of fixes and other various improvements.
The phrase 'terminal multiplexer' sounds a bit of a mouthful and a large dollop of jargon. Multiplexing is a method of combining multiple data streams into one stream over a shared medium. This gives us a hint of the function of a terminal multiplexer. It is computer software that can be used to multiplex several video consoles. In English? Well, it allows you to make use of multiple separate terminal sessions inside a single terminal. So one terminal session can act like many sessions.
Vendetta Online, a space MMORPG (massively multiplayer online role-playing game) developed and published by Guild Software Inc. that comes with Linux support, has received an update for the Holidays and the devs have made some very interesting improvements.
In honor of the occasion, we have a few things to announce, including a newsletter update, and some graphical improvements in the latest versions (Shadows in DX11!).
Q4OS, a Linux distribution built to offer a similar experience to Windows XP, is now featuring a couple of extra desktop environments that should provide some more options for users who want a different look.
Released this Sunday was OpenELEC 5.0 as one of the more popular XBMC (now known as Kodi) multimedia Linux distributions.
KaOS, a Linux distribution built from scratch that uses a modified KDE desktop environment and that follows a rolling release model, has reached version 2014.12 and is now ready for download.
4MRecover 11.0 Beta, a new distribution based on 4MLinux that is designed to be used specifically for file recovery, is now available for download and testing.
When an important decision like this is taken, usually all the forks adopt the change, but this is not mandatory. Linux Mint’s Clement Lefebvre said that the decision to switch to systemd on their Linux Mint Debian Edition (LMDE) has not been taken yet.
Crouton is a script that lets you run Ubuntu or Debian on a Chromebook without uninstalling Chrome OS. Developed by David Schneider, the tool has been around for a few years, offering an easy way to run native desktop Linux apps such as GIMP, LibreOffice, and even Firefox on Chrome OS laptops and desktops.
The Ubuntu Manual Team announces that the second edition of the famous manual has been released and is now available for free download. The Ubuntu Manual usually covers the LTS releases made by Canonical, so it only stands to reason that the current version is now focused on Ubuntu 14.04 LTS (Trusty Tahr) release made six months ago. Like any other book out there, especially in large ones, mistakes occur or maybe it was left out. In any case, this is a digital edition so it's quite easy to fix and improve.
The Linux Mint team has ended 2014 in force with a great Linux Mint 17.1 "Rebecca" release, for both the MATE and Cinnamon desktop, but it looks like the Debian edition is also going to be interesting.
Google then rolled out its $35 Chromecast dongle, a streaming device, in mid-2013. Google's new Android TV operating system is expected to make it easier for software developers to move apps from mobile devices to TVs.
Samsung has rolled out the Android 5.0 update starting with the new Galaxy S series flagship smartphone. Now it looks like the next device to get the Android dessert treatment is the third gen Galaxy Note, suggests a leak.
Our weekly round-ups of all the newest and best apps are as much a part of Giz UK's furniture as Mr. T extolling the virtues of PlayStation 4s in comments. So after 52 weeks of investigation, here is a selection of the best Android apps from each month, spanning the crazy year that was 2014.
After watching profits tumble this year due to increased competition from other Android phone makers, Samsung sits at an odd inflection point. It can pump out pricey, generic Android phones and watch cheaper phone manufacturers continue to eat its lunch, or it can start innovating in software and services and find new ways to differentiate its devices from the competition.
Android 5.0 Lollipop is already available on a bunch of non-Nexus devices, but there are still many more devices waiting to get updated to the newest version of Google’s operating system. Samsung’s Galaxy Note 3 phablet is one of those device, we’ve seen the beta ROM leak for the Exynos version of this handset and also a video showing off the preview of Samsung’s Lollipop update on top of TouchWiz. The update should officially land on the Note 3 rather soon considering the build of it has leaked and it is now available, read on if you’re interested.
After Kodak nearly went bankrupt in 2012, the company went looking for ways to stay afloat. Today, the brand announced it is partnering with the Bullitt Group to unveil a new range of mobile devices, including smartphones and tablets, at a CES event in January.
The Moto 360, Samsung Gear Live or LG G Watch/G Watch R bring Android to your wrist thanks to Google’s Android Wear. These watches run a dumbed down form of Android, which recently received an update to Android 5.0 Lollipop.
The Nexus 7 Android 5.0.2 Lollipop update is finally rolling out to owners of the aging former flagship as it takes the device from Android 5.0 Lollipop to a newer version of the software that delivers bug fixers for several Android 5.0 Lollipop problems.
Android smartphone users have been waiting for the newest software to hit their devices. Google successfully rolled out Android 5.0 Lollipop to a handful of units including the LG G3. Interestingly, a newly-leaked photo suggests that its predecessor, the LG G2, will get the update next.
Google’s Nexus 7 Android 5.0.2 Lollipop update is currently rolling out to owners of the aging former flagship and it delivers several bug fixes meant to stabilize the software. With that in mind, we take a look at a few reasons why you might want to think about installing the Android 5.0.2 Lollipop update when it arrives on your device.
After The Pirate Bay made its site available for anyone to host with “minimal web knowledge”, the project has become a hit on the popular developer site GitHub, and 372 copies of “The Open Bay” have been created.
The Pirate Bay was recently raided by police in Sweden, knocking its services offline. Its answer? Make it possible for anyone to create their own Pirate Bay, complete with all of its old torrents, and the ability to carry on the tradition.
The better part of four years since the release of PCC 1.0, the second official release of the modern Portable C Compiler is now available.
Douglas Carswell, one of Ukip’s most senior figures, has called on the party to stop making “the mistake of blaming outsiders” for Britain’s problems and described disliking foreigners as “not merely offensive, but absurd”.
The former Tory MP’s comments came as a damning new poll showed Ukip had failed to win the support of young voters ahead of the general election in May, who were found to be six times more likely to choose the Green Party.
Mr Carswell, whose by-election victory over his former party in October made him one of Ukip’s most influential faces and one of their two members in the Commons, said it was “interdependence that put the Great into Great Britain”.
His comments come after party leader Nigel Farage defended the language used by Ukip candidate Kerry Smith, who mocked gay party members as “p******s”, joked about shooting people from Chigwell in a “peasant hunt” and referred to someone as a “C****y bird”.
Mr Farage also made headlines last month when he blamed his lateness to a paid-for party event on “immigrants” causing greater traffic on the M4.
Flight QZ 8501 -- an Airbus 320-200 -- lost communication with Indonesia's Surabaya Juanda International Airport at 7:24 Singapore time on Sunday morning, the airline said. The plane "was requesting deviation due to enroute weather before communication with the aircraft was lost," AirAsia said in a statement.
"The weather was not good -- it was bad -- at the estimated location the plane lost contact," Indonesian Transport Ministry official Hadi Mustafa said.
Former Nestle CEO claims water is not a human right and should be privatized and controlled. He also states that GMOs have never caused illnesses despite hundreds of independent studies showing otherwise.
So, is water a free and basic human right, or should all the water on the planet belong to major corporations?
Should the poor who cannot afford to pay these said corporations suffer from starvation due to their lack of financial wealth?
Security geeks reveal government disinformation
The FBI announcement last week that it had uncovered evidence in the Sony hack pointing to North Korea appears to have settled the issue for a lot of people—in Washington, DC.
“As a result of our investigation,” the FBI announced, “and in close collaboration with other U.S. government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions.”
Everyone has a theory about who really hacked SONY PICTURES ENTERTAINMENT website, according to ASSOCIATED PRESS.
Truth can definitely be stranger than fiction, especially if you believe what actor/director Seth Rogen recently said about the production behind his latest film, The Interview.
Sony Pictures' controversial movie "The Interview" collected more than $1m in a limited Christmas Day release, and is expected to make several millions of dollars over the holiday weekend.
Although Beijing is Pyongyang’s only significant ally on the world stage, many ordinary Chinese have mixed feelings about their government’s relationship with North Korea, which has been called as close as “lips and teeth.” Some have come to see a reflection of their own condition in North Korea’s poverty, repressiveness and over-the-top propaganda. Online, some commentators have begun to refer to the North Korean leader as “Fatty Kim the 3rd.”
The campaign of aggression against North Korea, from the hacking of Sony and the crescendo of noise over the film, The Interview, bears all the markings of a CIA false flag operation.
The hacking and alleged threats to moviegoers has been blamed entirely on North Korea, without a shred of credible evidence beyond unsubstantiated accusations by the FBI. Pyongyang’s responsibility has not been proven. But it has already been officially endorsed, and publicly embraced as fact.
The idea of “America under attack by North Korea” is a lie.
The actual individuals of the mysterious group responsible for the hacking remain conveniently unidentified. A multitude of possibilities—Sony insiders, hackers-for-hire, generic Internet vandalism—have not been explored in earnest. The more plausible involvement of US spying agencies—the CIA, the NSA, etc. , their overwhelming technological capability and their peerless hacking and surveillance powers—remains studiously ignored.
In December of 2001, the mightiest military force the world has ever known launched 'Operation Enduring Freedom' in Afghanistan. Today, the US and NATO military mission in that distant country officially comes to a close, but the foe remains unvanquished.
[...]
To sum up, the US and NATO mission in Afghanistan can rightfully be called disastrous. The America that once was aghast at the idea of torturing people wholesale, is today subdued and numbed to the so-called “black sites” in Afghanistan and around the globe, where torture became the norm. Compared to NSA spying on US citizens, the cover-up or misdirection used to conceal these activities are outright war crimes for most people. Names like Parwan Detention Facility, the Salt Pit, and detainees like Khaled el-Masri and other tortured detainees echo a dark reality of this war on terror. For the leaders who have helped perpetuate these wars, though, cheap talk still resonates. Barack Obama just spoke to US troops on Christmas day about this war’s effects. He said:
At least nine people suspected of being militants, including four foreigners, were killed in two separate drone strikes in northwestern Pakistan on Friday, a Pakistani security official said.
Two suspected U.S. drones fired missiles at militant hideouts in northwest Pakistan on Friday killing at least seven fighters, Pakistani intelligence officials said.
A US drone strike has killed at least three civilians in Afghanistan’s troubled southeastern province of Logar.
At least seven alleged Taliban fighters died in two separate US drone attacks in the northern-western Pakistani province of North Waziristan, where the Army is carrying out an air and ground operation against the insurgency.
A secretive group of U.S. Air Force intelligence specialists flying aboard American spy planes helped U.S. military commandos kill more than a thousand enemy combatants in just a single year back in 2012.
Robert Baer: Assassination doesn’t work, generally. I approached it from the premise that had we assassinated Hitler in 1933 we would have saved lives and destruction. Probably we would have, but in general assassination doesn’t turn out to be a way to avoid war. I take my own experience and other assassinations through history and get a lot into the drone program, which doesn’t work, as well. It’s clear to me, with the massacre at this Pakistani school [at Peshawar]; the CIA in a sense had a role in that, because the two predecessors of the man [Maulana Fazlullah, AKA “Mullah Radio”] who ordered that were both killed by drones. - See more at: http://www.progressive.org/news/2014/12/187945/torture-drones-and-hollywood-former-cia-operative-talks#sthash.jMxsX8Oy.dpuf
There were the new tidbits of information on the workings of the president’s “kill list” and the convening of “terror Tuesday” briefings to target specific individuals around the world. There were the insider discussions of ongoing decisions to target American citizens abroad for assassination by drone without due process of law and the revealing emails in which participants up to presidential advisers discussed how exactly to craft the exculpatory “legal” documents for those acts at the Department of Justice.
Law professor, writer and social critic Marjorie Cohn explores human rights and US foreign policy, and the frequent contradiction between the two in her monthly Truthout column, "Human Rights and Global Wrongs." She agreed to an interview with Leslie Thatcher recently about her new book, Drones and Targeted Killing: Legal, Moral, and Geopolitical Issues.
Acts of ‘terror’ have been permeating through our televisions screens and newspapers in the West to the extent that we now seem to be surrounded by them. The ‘war on terror’ makes ‘us’ in the West feel safe, but what is almost never considered is how ‘our’ safety affects the lives of the ‘others’ we aim to destroy.
Over a lunch in Washington in 1976, James J. Angleton, for years the ruthless chief of counterintelligence at the C.I.A., likened the agency to a medieval city occupied by an invading army.
“Only, we have been occupied by Congress,” he told a young congressional investigator. “With our files rifled, our officials humiliated, and our agents exposed.”
The spymaster had cause for worry. He had endured a public grilling about his role in domestic spying operations by a select committee headed by Senator Frank Church, a Democrat from Idaho, that spent years looking into intelligence abuses. And the Central Intelligence Agency, used to doing what it wanted while keeping Congress mostly in the dark, was in the midst of convulsions that would fundamentally remake its mission.
The Obama administration insists that international humanitarian law (IHL) is the applicable law because it claims the US is involved in an armed conflict.
On November 24, two weeks before the Senate Intelligence Committee released its “torture report,” Reprieve, a UK-based human rights NGO, published the results of its latest investigation into President Obama’s drone strike program. While Obama was preparing for the inevitable release of the Senate’s report which provided the most extensive insight yet into the CIA’s use of torture during the Bush administration, Reprieve provided insights of its own into the Obama administration’s equally disturbing targeted drone assassination program.
On November 24, two weeks before the Senate Intelligence Committee released its “torture report,” Reprieve, a UK-based human rights NGO, published the results of its latest investigation into President Obama’s drone strike program. While Obama was preparing for the inevitable release of the Senate’s report which provided the most extensive insight yet into the CIA’s use of torture during the Bush administration, Reprieve provided insights of its own into the Obama administration’s equally disturbing targeted drone assassination program.
The Washington Post, ABC News, and other news outlets stress the report’s findings that targeted assassinations had limited impacts on Taliban targets. While this leaked report does criticize the effectiveness of some High-Value Target (HVT) assassination operations, such characterizations mistake the CIA’s argument that not all counterinsurgency problems can be solved with targeted assassinations as an argument against such operations. Far from dismissing HVT operations, the report advocates them in select conditions.
What the Post and others miss is the role this CIA report played in larger conversations about counterinsurgency strategies among members of the CIA, Pentagon, Congress, White House, and corporate military profiteers. In 2009, these conversations focused not only on the roles counterinsurgency should play in warzones, but whether this counterinsurgency should be based on soft power models (providing needed services, etc.) or hard power models (like Project Phoenix in Vietnam, or JSOC’s targeted assassination programs in Iraq). While this leaked document is only a single report, it provides a view into the types of intelligence analysis that informed President Obama’s rapid increased use of CIA HVT drone operations targeting individuals, including American citizens, in Yemen, Pakistan, Iraq, Somalia, and Afghanistan.
This 18-page CIA report reads like a Harvard International Relations dissertation proposal—an observation more about audience, than author–as it reviews data on past HVT programs, weighing the “positive and negative implications of targeted assassinations” in select insurgency campaigns around the world. High-Value Targeting refers to “focused operations against specific individuals or networks whose removal or marginalization should disproportionately degrade an insurgent group’s effectiveness. The criteria for designating high-value targets will vary according to factors such as the insurgent group’s capabilities, structure, and leadership dynamics and the government’s desired outcome.”
After a CIA memo explaining how to get through tighter EU border security checks was leaked to WikiLeaks, the question arose why are there covert agents in the countries the US is meant to share intelligence with, former MI5 agent Annie Machon told RT.
While the source isn't named, Risen's 2006 book "State of War" discusses a Russian nuclear scientist the CIA used as an intermediary to pass nuclear blueprints containing intentional flaws to Iran for use in their nuclear program. Risen's account of what the CIA effort code-named "Operation Merlin" suggests that the Russian became concerned the flaws were too obvious and flagged them to the Iranians.
One case of many was the CIA’s involvement beginning in 1970 with the overthrow of the elected Chilean President Salvador Allende. They did this through instigating a coup that installed the military dictatorship of General Augusto Pinochet. His repression called the Caravan of Death resulted in the death of thousands and torturing tens of thousands. This account is a sordid story and approval went for it went all the way to the White House. Check out the details on Wikipedia. Unbelievable.
When created in 1947, the CIA was meant to coordinate objective intelligence and thus avert some future Pearl Harbor attack, but its secondary role – engaging in covert operations – came to corrupt its independence, a problem that must now be addressed, says ex-CIA analyst Melvin A. Goodman.
From its inception in 1947, the C.I.A. was designed with one overriding mission: preventing strategic surprise. Its controversial interrogation program is just the latest symptom of a larger disease, the tyranny of the current. Since 9/11, rather than assessing the threat landscape of the future, the C.I.A. has been mired in the terrorist threat of the here and now. Time and energy spent on targeted killings, black sites and interrogations with water boards and rectal hydration was time and energy that could have been spent better assessing and anticipating emerging challenges like the Arab Spring, Russian President Vladimir Putin’s intentions, or ISIS’s gathering strength. White House officials and warfighters naturally worry most about today. The C.I.A.’s job is to also worry about tomorrow.
Prominent JFK assassination researcher and author Lamar Waldron has posted on the White House website a petition calling for the release of all classified government files on the JFK assassination and a pardon for former Secret Service agent Abraham Bolden.
A 2010 email released by Wikileaks from a top-level CIA contractor asserts that CIA Director John Brennan, the subject of a story by deceased journalist Michael Hastings, was on a "witch hunt" against "investigative journalists" perceived as hostile.
[...]
The story on Brennan was never published. Stratfor was once called "The Shadow CIA" by Barron's. In 2012 WikiLeaks began publishing “The Global Intelligence Files,” over five million e-mails from the Texas-based company.
The email has never been disavowed by Stratfor. When San Diego 6 reporter Kim Dvorak asked the CIA for comment on the email in the context of the Hastings' death, in an August, 2013 report, a CIA spokesman responded:"“Without commenting on information disseminated by WikiLeaks, any suggestion that Director Brennan has ever attempted to infringe on constitutionally-protected press freedoms is offensive and baseless.” "Michael Hasting was killed on June 18, 2013, when the new Mercedes C250 SUV he had just leased hit a tree after running numerous red lights at over 100 mph in Los Angeles. A surveillance video at a pizza shop captured a fiery, violent explosion, which is uncharacteristic of high-speed impacts. Generations of advances in safety design have made accidents exhibiting these characteristics unheard of.
Those of us who lived through the atrocities of World War II, the Nuremberg trials of Axis leadership for crimes against the peace and humanity, and the growth of the U.S. national security state are aware of CIA's principal role. It's to do things that the government wants done with plausible deniability. Harry Truman's creation of the CIA was the worst mistake of his presidency.
In a December 19th interview in the Russian magazine Kommersant, George Friedman, who is the Founder and CEO of Stratfor, the ‘Shadow CIA’ firm, says of the overthrow of Ukraine’s President Viktor Yanukovych that occurred on February 22nd of 2014: “It really was the most blatant coup in history.” Perhaps he is saying this because of the videos that were uploaded to the Web which showed it to be so, but this statement by him contradicts the description that is asserted by the U.S. White House and the European Union, and the Western press, which description is that Yanukovych’s overthrow was instead just the result of the U.S. Government’s $5+ billion expense since 1991 to establish ‘democracy’ in Ukraine.
Wars against nations that haven’t harmed us in any way.
Spending by tourists visiting the UK is expected to reach record levels next year, the government has said.
Spending by overseas visitors will top €£22bn for the first time, according to forecasts by tourism body VisitBritain.
Right-wing media websites continued to undermine their credibility in 2014 by peddling a number of false, ridiculous, and bigoted smears. Here are the top smears from conservative websites The Daily Caller, Breitbart.com, and The Washington Free Beacon.
Censorship battles are usually a good thing, especially when powerful voices and interests are ranged on opposing sides. They illuminate the social and political landscape in a country – our own, as well as those we routinely regard as less enlightened. But the triangular controversy over Sony Pictures’ low-budget comedy The Interview, North Korea and the White House has not made my Christmas.
In an abundance of caution, Mr. Szulc’s article was shifted at the last moment from its position in the upper right corner as the lead story of the day. It was further demoted in importance when the revised layout for Page 1 specified a headline one column wide rather than four columns.
Iran is to expand what it calls “smart filtering” of the Internet, a policy of censoring undesirable content on websites without banning them completely, as it used to, the government said on Friday.
Iran is rolling out new “individual filters” that will let citizens receive access to different parts of the internet, depending on government clearance, and will allow censors to weed out specific website pages – not entire domains, as they currently do.
Google, Facebook and Twitter are putting up resistance to orders received from the Russian government to block and remove information about the planned rally by the Russian opposition leader Alexei Navalny next month, which might result into a full scale showdown as Russia tried to censor online content.
Censorship is a part of daily life in China. News articles are erased from online search engines, social media sites such as Facebook and Twitter are banned, and CNN is routinely blacked out for Chinese viewers.
Instagram was a huge hit in China -- until the government banned it during the Hong Kong protests.
Mishandled data and unauthorized spying are among the allegations mentioned in recently released NSA documents through a records request.
The National Security Agency has quietly released more than a decade of reports detailing surveillance activities that potentially violated U.S. citizens' privacy rights.
The heavily redacted reports detail many, many incidents where NSA agents pulled up the wrong information with the database. Each incident is followed by a statement that the data was either not accessed or the query and results were deleted.
Other reports cover agents being granted access to data without the proper training or using searches that were no longer meant to be in effect. Raw data was at times accidentally emailed or kept on an unsecured computer.
There is also at least one instance where an NSA employee purposefully sought out data that was both unnecessary and illegal. One document states a woman went through her husband’s phone contacts “without his knowledge to obtain names and phone numbers for targeting” over a period of 2-3 years.
One NSA analyst also looked up her husband's personal telephone directory without informing him, to get names and contact information for "targeting." The employee was advised to stop her activities.
Former NSA executive Thomas Drake stated that the information, released by the US NSA is Constitutional privacy violations of the 4th Amendment and statute involving process, procedure, unauthorized access and abuse, but the real scope of the agency’s actions still needs clarification.
The reports show "how the NSA has misused the information it collects [sic] over the past decade," Toomey told the Wall Street Journal, and "... shows an urgent need for greater oversight by all three branches of government."
Keith Alexander ordered a subordinate to unlawfully search the database on his behalf.
There are holiday document dumps and there are holiday document dumps. And then there is holiday document carpet-bombing from 30,000 feet.
The National Security Agency (NSA) is heading to court to defend its Internet data collection program. The Electronic Frontier Foundation (EFF) is arguing that the NSA’s information collection violates the Fourth Amendment, which prohibits unreasonable searches and seizures by the government.
Late Wednesday afternoon - yes, on Christmas Eve - the NSA dumped twelve years worth of documents detailing illegal surveillance and wiretapping. However, Sputnik was watching.
A former U.S. government official has filed a lawsuit against the makers of the Edward Snowden documentary Citizenfour, claiming they aided and abetted the former CIA agent in disseminating information related to U.S. National Security Agency leaks that originated with Snowden's unauthorized release of thousands of classified documents last year.
The Hollywood Reporter says Horace Edwards - a retired U.S. naval officer, the former secretary of the Kansas Department of Transportation and a former pipeline company chief executive - filed the lawsuit in Kansas federal court Friday. Edwards seeks the creation of "a constructive trust" for profits from the film.
A recently released documentary about former government contractor Edward Snowden is being considered a potential candidate for the Academy Awards next year, but all isn’t well for the team behind the flick “Citizenfour.”
Attorneys representing a Kansas man filed a civil suit in District Court on Friday last week in which they allege that Snowden, movie director Laura Poitras and others involved in making “Citizenfour” intentionally violated federal law by profiting off of the disclosure of state secrets.
Retired National Security Agency official William Binney, who challenged decisions to ignore the Fourth Amendment in the government’s massive — and wasteful — collection of electronic data, faced career and legal repercussions. Because of his courage, he is being honored by former intelligence officials.
Sam Adams Associates for Integrity in Intelligence (SAAII) is pleased to announce that it has selected retired NSA Technical Director William “Bill” Binney to receive its 2015 award for integrity in intelligence. The public is invited to attend the award presentation scheduled to begin at 7 p.m. on Jan. 22at the Berlin Moscow venue, Unter den Linden 52, 10117, Berlin, Germany.
The malware known as Regin – linked to the National Security Agency as a tool for tapping mobile phone networks and infiltrating foreign computer systems – now appears to have been developed as early as 15 years ago, making it among the first major pieces of invasive computer software built to enable government espionage.
The program was revealed last month in reports from security companies Kaspersky Lab and Symantec Corp. Soon thereafter, The Intercept published new leaks from NSA whistleblower Edward Snowden that shed light on how programs such as Regin (pronounced Re-gen) were used to collect sensitive, technical information on more than 70 percent of the world’s cellular networks.
Both the TPP and TISA include provisions that allow personal information companies to freely move, store, and process their data anywhere in the world. The argument goes that such a measure is necessary to ‘knock down protectionist rules’. In a perfect world, this wouldn’t be a cause for concern, but given all of Snowden’s NSA leaks, the world now knows about the global surveillance state that the US has constructed, including how leading information companies like Google cooperate with Washington in order to perfect it.
In all the discussions of what is alleged to be North Korea’s horrible cyber-vandalism against Sony Pictures, I haven’t seen anyone bring up a key issue: The National Security Agency has been for two decades a powerful behind-the-scenes lobby for weak internet encryption and privacy protocols.
Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata.
Bottom line is the government is still collecting your data.
As curious journalists, tabloid writers, and Hollywood watchers pore over the massive trove of hacked Sony data, the public is being given a rare glimpse into the complicated world of Hollywood and politics. Tucked between bitchy emails about Angelina Jolie and snarky comments on Will Smith’s family are details of a chummy relationship between Sony executives and the CIA, as well as rare insight into how Hollywood views potential movies about NSA whistleblower Edward Snowden.
Sony’s plan to make a Snowden movie got rolling in January 2014, when Elizabeth Cantillon, then an executive producer at Sony, sent company Co-Chairman Amy Pascal an email saying she had successfully closed on the rights to the book, “No Place to Hide,” by The Intercept‘s founding editor, Glenn Greenwald. “[Y]ou will be my Oscar date,” Cantillon promised Pascal.
In March of 2014, Sony officially optioned the rights to Greenwald’s book, which chronicles how he broke the Snowden story, and moved forward with plans for a movie.
At what point did the wired world become so inextricably intertwined with everyday life, so much a part of, well, everything else that it started to seem absurd to separate out news about cyber-technology, the Internet and online life from news about, you know, life?
The Guy Fawkes-masked hackers of international activist group Anonymous are stepping in to stop Lizard Squad in its tracks -- not in Lizard Squad's attempts to bring down the gaming networks of Sony and Microsoft but in its plan to take down anonymous Internet browser Tor.
NSA reform died, as did copyright reform, and patent reform. Immigration reform? Kaput. And the recent election axed important politicians who were allied with the tech industry on certain issues. It was a dismal calendar cycle.
Last month David Laufman was named as the head of the Counter Espionage Section of the National Security Division United States Department of Justice.
Wow, what a shock to find out that Facebook had been scanning the private messages of its users. I for one am flabbergasted to discover this…not. It fits in with numerous other privacy issues with Facebook in the past and I tip my hat to the judge for making the company face the potential consequences of its actions. It will be very interesting to see what the financial fallout is for Facebook if it ultimately ends up losing this class action lawsuit.
Retiring Sen. Jay Rockefeller (D-W.Va.) said it is "unacceptable" that no CIA officials will reportedly be punished for breaching computers used by Senate staffers.
Rockefeller, a former Intelligence Committee chairman, said CIA Director John Brennan has continued to impede congressional oversight and will not answer basic questions about the incident. The New York Times reported that the unauthorized search was, at some points, carried out with the support of Brennan. The White House must hold Brennan "accountable" if Brennan called for the search, Rockefeller said.
Take it easy at the Christmas party if you plan to fly the next day. According to the CIA’s secret travel guide for spies, travellers with “shaking or trembling hands, rapid breathing for no apparent reason, cold sweats, pulsating carotid arteries, a flushed face, and avoidance of eye contact” will arouse suspicion.
Secret CIA documents advising undercover American spies on how to move through Europe on fake passports have been published online, revealing growing concern that tighter EU rules could blow the cover of US intelligence agents.
Two documents released by WikiLeaks show that CIA agents are currently able to freely enter and travel through the 26 countries of the Schengen Area with only a “minimal” risk that EU border guards will grow suspicious.
There is little chance of being detected when first entering the Schengen Area because European border guards are focused on “illegal immigration and criminal activities, not counterintelligence”, the CIA documents concluded.
The ACLU presented a letter to U.S. Attorney General Eric Holder Monday demanding an investigation into those responsible for the CIA's torture tactics.
Recent revelations about CIA torture under former President George W. Bush and former Vice President Dick Cheney between 2001-2009 have put the two figures under increased scrutiny.
The ACLU and Human Rights Watch say the offences amount to ‘a vast criminal conspiracy’ and are ‘shocking and corrosive’ to US democracy and credibility
President Barack Obama should appoint a special prosecutor to determine if former Bush administration and CIA officials broke the law by having suspected terrorists abducted and tortured in secret prisons by waterboarding and other brutal interrogation methods, two leading human rights groups said Monday.
Bacteria to infect the enemy, poisons for assassinations, truth drugs for interrogations, germ warfare and brainwashing
For the United States, 2014 was a year of racial violence, rape, war, terrorism, drought and pestilence.
As a recent US Senate report showed, the CIA handed over up to USD 30 million to the secret services of an unnamed country that hosted the “black sites” where terrorist suspects captured in Afghanistan and Iraq were detained without warrant and subjected to “enhanced investigation techniques”, that is, torture, daily Rzeczpospolita reported. - See more at: http://www.thenews.pl/1/10/Artykul/191518,Polish-MPs-to-investigate-CIA-payment-for-torture-sites#sthash.uaNfAO9A.dpuf
Marek Biernacki, head of the Sejm Special Services Committee, stated that it is necessary to investigate where the money allocated for CIA "black sites" in Poland has gone.
This month's acknowledgment by Poland's former president that he allowed the CIA to operate a secret interrogation centre throws the Polish government's appeal against a European court ruling on the jail into disarray.
Zimbabwe is one among a number of African countries that assisted the United States of America’s Central Intelligence Agency (CIA) in its notorious rendition programme. This emerged from a recent report that the USA Senate made public recently. - See more at: http://nehandaradio.com/2014/12/28/new-look-zimbabwe-usa-tortuous-relations-via-cia/#sthash.H0yxACxL.dpuf
This is the story of John Brennan's CIA spying on Congress and getting away with it.
Last March, Senator Dianne Feinstein accused the CIA of spying on the Senate intelligence committee as it labored to finalize its report on the torture of prisoners. “I have grave concerns that the CIA’s search may well have violated the separation of powers principles embodied in the United States Constitution,” she said. “I have asked for an apology and a recognition that this CIA search of computers used by its oversight committee was inappropriate. I have received neither.”
The Senate report on the CIA's interrogation program and the spy agency's official response clash on almost every aspect of the long-secret operation, including the brutality and effectiveness of its methods and the agency's secret dealings with the Bush White House, Congress and the media. Both reports largely agree on one major CIA failure: the agency's mismanagement of the now-shuttered program.
The Senate’s recent report into the CIA’s interrogation methods has prompted new discussions on how the U.S. should be conducting intelligence gathering, and the level of Congress’ oversight. Glenn Hastedt writes that the report raises the prospect of a new era of intelligence politics characterized by a skeptical Congress that more tightly controls and challenges the intelligence community, as well as one of continued leaks. He also argues that concerns over short political time frames will continue to push the intelligence community to retroactively justify its actions.
David Cameron was last night under intense pressure to deliver on his promise to hold a judge-led inquiry into British complicity in torture.
The Obama administration won’t be able to throw the torture issue under the table, as the US Senate report on the CIA’s detention and interrogation program has sparked a global public outcry, the Russian Foreign Ministry's human rights ombudsman told RT.
“It’s to be continued. If you wish, this report is to be continued against the will of those who would like to hush it down,” Konstantin Dolgov stressed.
The Senate Intelligence Committee report on CIA torture following 9/11 will be “discussed in the international forum, including, hopefully, in the UN Council of Human Rights and in some other international formats,” he added.
Two responses to the Senate report have stood out for me. The first was by Republican Senator John McCain. On the floor of the Senate, he described the use of torture as "shameful and unnecessary".
He continued: "The use of torture compromises that which most distinguishes us from our enemies; our belief that all people, even captured enemies, possess basic human rights."
The second response was that of the Conservative MP David Davis. Referring to "the barbarism of the secret CIA torture programme", he went on to state that "our association with torture causes us to lose our moral strength and serves to galvanise those who oppose us".
A panel appointed by Central Intelligence Agency (CIA) Director John Brennan to assess blame for the CIA’s intrusion into Senate Intelligence Committee computers has—no surprise—found that those who broke into the computers shouldn’t be punished.
The handpicked committee, composed of three CIA officers; Robert F. Bauer, who served as White House counsel during President Barack Obama’s first term; and chairman Evan Bayh, a former Democratic senator from Indiana who served on the Senate Intelligence Committee, said the three CIA technology officers and two lawyers who participated in the computer hacking should not be punished.
The United States Obama administration won’t be able to throw the torture issue under the table, as the US Senate report on the CIA’s detention and interrogation program has sparked a global public outcry
“It’s to be continued. If you wish, this report is to be continued against the will of those who would like to hush it down,” , the Russian Foreign Ministry's human rights ombudsman Konstantin Dolgov told the media.
The Senate Intelligence Committee report on CIA torture following 9/11 will be “discussed in the international forum, including, hopefully, in the UN Council of Human Rights and in some other international formats,” he added.
The Bush administration and the CIA tortured al-Qaida suspects because they wanted evidence that linked Saddam Hussein to 9/11 and could be used to justify the 2003 invasion of Iraq, Middle East expert Patrick Cockburn writes at The Independent.
Johnston County leaders say they have no reason and no authority to probe a Smithfield-based company long linked to the CIA's post-9/11 interrogation program.
A Raleigh-based anti-torture group says a recently released Senate Intelligence Committee report names 17 detainees transported by Aero Contractors, a company that leases space at the Johnston County Airport and at the Global TransPark in Kinston. Based on flight logs and other data, the group, North Carolina Stop Torture Now, says Aero Contractors transported another 14 detainees not named in the report.
Tony Braswell, chairman of the Johnston County Board of Commissioners, said he doesn't know much about what Aero Contractors does. He said he does know, however, that the company has always been a "good corporate citizen."
"That's all we know, and we don't know if they committed any crimes in Afghanistan or Pakistan," Braswell said. "Our job is to deal with schools and provide clean drinking water and have a budget for the sheriff."
But Christina Cowger, coordinator of North Carolina Stop Torture Now, said the Senate report confirms that Aero Contractors was vital to the CIA's capture and interrogation of terror suspects using techniques that some consider torture. Now, she said, it's time for elected officials to ask more questions.
Human experimentation was a core feature of the CIA’s torture program. The experimental nature of the interrogation and detention techniques is clearly evident in the Senate Intelligence Committee’s executive summary of its investigative report, despite redactions (insisted upon by the CIA) to obfuscate the locations of these laboratories of cruel science and the identities of perpetrators.
Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot.
Waterboarding: Yes or no? It’s OK to selectively violate the Geneva Convention, right? Spying on Americans is illegal, but aren’t rules made to be broken?
The world is a confusing place and it’s hard for young people to answer complicated questions like these on their own. Fortunately, students at George Mason University in Fairfax, Virginia, have Professor Robert Deitz to help them navigate the contemporary moral morass. “All of us are familiar with basic ethical notions,” he writes in the syllabus for his Spring 2015 course, Ethical Challenges in Public Policy. “We learn from childhood the idea that some conduct is right and other conduct is not right.”
How’d Deitz get so smart about ethics? He’s magna cum laude from Harvard (like President Obama) and then spent eights years as General Counsel at the National Security Agency, serving as the official Yes Man for General Michael Hayden, and after that three years as his Senior Councillor at the Central Intelligence Agency until 2009. At the former post Deitz rubber-stamped NSA surveillance. At the latter, he sought to derail an independent investigation by then-CIA Inspector General John Helgerson into the agency’s torture and rendition of terrorism suspects.
Alissa Starzak will have to wait until after the holidays to find out if accusations she stole and leaked classified Central Intelligence Agency (CIA) documents will scuttle her chances of becoming the U.S. Army’s top lawyer. And her chances could rely on whether Sen. John McCain (R-Ariz.) will back her.
The CIA torture report covers over 100 detainees but that's so pale and insignificant compared with the actual number of detainees who experienced enhanced interrogation techniques, or EITs. That number would run into the thousands, during the period when EITs were deemed legal. Every interrogator was allowed to use them.
There's still no official account of the hundreds, perhaps thousands, of other victims of torture that the CIA is responsible for.
Would the security needs of the United States be better served if the C.I.A. were dismantled?
Star Jeremy Renner and producer Scott Stuber talk about Kill the Messenger, their film about Gary Webb, the Pulitzer Prize-winning investigative reporter. Webb uncovered a CIA plot in the 1980s that funneled cocaine into the United States to finance arms purchases and other operations in Central America, then faced a campaign to undermine and deny his work.
An infamous South African, linked to some of the most shady scandals of this century, has emerged at the centre of a US transcontinental sting operation that netted an alleged drug cartel assassin.
Paul Calder le Roux shopped former American Special Forces-trained sniper Joseph Hunter, who was arrested in Thailand in an operation spearheaded by agents from the US Drug Enforcement Agency (DEA).
For South Africa to own up and come clean on its shameful role in assisting America’s immoral WOT is a matter we will continue to agitate for.
Human rights group Suaram urged Putrajaya to set up an independent commission of inquiry to unravel the authorities' involvement in the United States's torture programmes, following a US Senate report in which Malaysia was implicated.
In a recent piece here on The Monkey Cage, Michael Colaresi discussed the need for change in oversight of the CIA and by extension the entirety of the intelligence community. He suggests that in the wake of the Senate Select Intelligence Committee’s report on CIA torture issued Dec. 9, “current and former CIA officials, as well as President Obama, seem bent on missing the relevant lessons to improve governance of national security. The CIA needs more, not less, oversight” (my emphasis).
Beyond the drama created by the Report’s surviving multiple assassination attempts, what is there that should grab our attention? The CIA designed and conducted a program of systematic torture of those it suspected of being associated with terrorism. It did so at several of the notorious “black sites,” at Guantanamo and probably elsewhere in Iraq and Afghanistan. Torture was the official policy of the United States government as stipulated by President George W. Bush with the unanimous approval of his national security team – including Colin Powell. The torture program continued for years – carried out by the Army as well as the CIA. Several of those tortured were held on basis of no evidence whatsoever, something that did not shield them from abuse and imprisonment under brutal conditions.
Senator John McCain spoke the truth on the Senate floor this month, in response to the release of the Senate Intelligence Committee Report on Torture: “. . . this question isn’t about our enemies; it’s about us. It’s about who we were, who we are, and who we aspire to be.” Many voices insisted that the revelations contained in the report — savage, even murderous treatment of prisoners; illegal renditions; black sites — were not true to the American character. The CIA — having carried out torture; having lied about it at the time; and having lied about it this month in response to the report — was discussed as if it were “not who we are.” But is that true?
American officials, and the American people, know very well what the CIA is, and what it does. It was McCain who, when CIA waterboarding of terror suspects first surfaced as an issue some years ago, recalled that, after World War II, Japanese waterboarding of POW’s — what McCain calls “mock execution” — was one of the war crimes for which Japanese prisoners were hanged. But on the Sunday talk shows after the Senate report’s release, various CIA defenders, including Dick Cheney, talked of such tactics with stoic pride. President Obama decried torture and swore never again, but simultaneously defended the honor of the CIA, and declined to prosecute its war criminals. It comes as no surprise then, that in an NBC/Wall Street Journal poll released last week, a majority of Americans found that “the harsh interrogation practices” laid out in the report were “acceptable under the circumstances.” Really?
As details emerge from the CIA Torture Report, many Americans are finding themselves reeling. Yet we are still getting an incredibly sanitized version of the truth. This is because thousands of photos, taken at these CIA black sites, are being withheld by the government under the guise of ‘national security.’
The photos are currently locked in a court case that has been going on for some time, but last Friday the government was forced to submit reasoning for every photo they wanted to remain classified. NY State Judge Alvin Hellerstein is expected to make a ruling shortly regarding their release, but the United States may still attempt to withhold them.
Senior CIA officer Alfreda Frances Bikowsky has reportedly been described in several articles by large, credible sources as a linchpin figure in the CIA torture program. However, she was unidentified, but The Intercept has named her as being that instrumental figure in the CIA torture program.
After being called a “key apologist,” “The Unidentified Queen of Torture,” noted as “the model for the lead character in ‘Zero Dark Thirty,’” and identified in having a central role in lying to Congress about the CIA’s torture methods, Bikowsky appears to be the main liar. Last week, according to The Intercept, “NBC News reported that one senior CIA officer in particular was responsible for many . . . false claims.”
The report noted that Bikowsky, remaining unnamed, “also participated in ‘enhanced interrogations’ of self-professed 9/11 mastermind Khalid Sheikh Mohammed witnessed the waterboarding of terror suspect Abu Zubaydah and ordered the detention of a suspected terrorist who turned out to be unconnected to al Qaeda, according to the report.”
The CIA’s “enhanced interrogation techniques,” outlined in a controversial report released earlier this month from the Senate Intelligence Committee, was influenced by a Penn professor’s research.
Psychology professor Martin E. P. Seligman famously conducted studies at Penn in the 1960s that revealed a “learned helplessness” in dogs subjected to repeated eletric shocks. Instead of adjusting their behavior upon receiving multiple shocks, the dogs remained in place, providing valuable insight into the workings of depressed or abused persons. Now, his research is being used for torture rather than healing according the the Senate report.
Glenn Carle retired from the CIA after 23 years of service. He participated in the interrogation of top-level members of al-Qaida and refused orders to engage in torture.
For a clue into how out-of-control, un-American, and just plain wrong our CIA’s torture program was, note the frantic and furious reactions by the CIA establishment to reports about its torturous cruelty.
First were flat-out denials. George Tenet, CIA director during the most vigorous period of torturing al Qaeda suspects, almost blew a gasket in 2007, when a “60 Minutes” interviewer pressed him about the agency’s waterboarding of prisoners. “We don’t torture people.” Tenet practically hollered at the reporter – “Let me say that again to you, we don’t torture people. OK?”
Questions are being asked as to why local human rights groups and other non-governmental organisations that fight for people’s rights have remained silent over the US CIA Torture Report.
PAS official mouthpiece, Harakahdaily said there seems to be very little outcry from rights groups everywhere, adding that protest notes have yet to be sent to the US embassy over its treatment of detainees purportedly involved in terrorism.
It is very simple. If the CIA is insubordinate to the president, whom the country elected, then it is insubordinate to all of us.
The narrative is in place. James Mitchell and John “Bruce” Jessen made millions of dollars having convinced the CIA to construct a torture program via reverse-engineering brutal methods of interrogation used in their previous employment in a military program meant to prepare U.S. military and intelligence personnel for torture by a foreign power or terrorist group.
At times, waterboarding rendered al-Qaida terror suspect Abu Zubaydah hysterical. But later, a message to CIA headquarters described an interrogator merely lifting his eyebrow and snapping his fingers, and Zubaydah "slowly walked on his own to the water table" to lie down.
The Pew Research Center's Forum on Religion & Public Life conducted polls in 2009. The surveys discovered that the religious Americans are more likely to believe that torture of suspected terrorists is justifiable.
Five years after the survey was conducted, a new poll was done and it was discovered not much has changed.
The new poll, conducted by the Washington Post and ABC News, found that more Christian Americans, compared to non-Christians, find that CIA "treatment of suspected terrorists" is acceptable.
Researchers and reporters had long counted the total number of prisoners who cycled through Guantanamo at 779, but the Senate intelligence committee’s report on CIA torture revealed that there was one more previously unknown detainee. Ibn al-Shaykh al-Libi, also known as prisoner 212, was held at a secret black site at Guantanamo Bay, according to the report, bringing the total number of detainees to 780.
That al-Libi was held by the CIA is long established. After all, al-Libi’s name is notorious as the source of bad information used by the Bush administration to tie Saddam Hussein to Al-Qaeda to support the US invasion of Iraq — information he provided while being tortured in Egyptian custody, and later recanted.