Tag: Wikileaks

If You Thought TPP Was Bad, You Haven’t Read TISA

The Trade Promotion Authority Act (TPA), aka Fast Track, that the president and the corporatist congress are pushing, covers more than just the TPP.  It will also apply to the equally terrible European TTIP & the Trade In Service Agreement that has just been uncovered by Wikileaks. If you thought TPP was bad, you haven’t read the Trade In Service Agreement. This “trade” agreement is a corporate friendly document that would reshape how everyone in the world does business.

Secret Trade in Services Agreement (TISA) – Financial Services Annex 2014-06-19

Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force.

Despite the failures in financial regulation evident during the 2007-2008 Global Financial Crisis and calls for improvement of relevant regulatory structures2, proponents of TISA aim to further deregulate global financial services markets. The draft Financial Services Annex sets rules which would assist the expansion of financial multi-nationals – mainly headquartered in New York, London, Paris and Frankfurt – into other nations by preventing regulatory barriers. The leaked draft also shows that the US is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data.

TISA negotiations are currently taking place outside of the General Agreement on Trade in Services (GATS) and the World Trade Organization (WTO) framework. However, the Agreement is being crafted to be compatible with GATS so that a critical mass of participants will be able to pressure remaining WTO members to sign on in the future. Conspicuously absent from the 50 countries covered by the negotiations are the BRICS countries of Brazil, Russia, India and China. The exclusive nature of TISA will weaken their position in future services negotiations.

The draft text comes from the April 2014 negotiation round – the sixth round since the first held in April 2013. The next round of negotiations will take place on 23-27 June in Geneva, Switzerland.

Current WTO parties negotiating TISA are: Australia, Canada, Chile, Chinese Taipei (Taiwan), Colombia, Costa Rica, Hong Kong, Iceland, Israel, Japan, Liechtenstein, Mexico, New Zealand, Norway, Pakistan, Panama, Paraguay, Peru, South Korea, Switzerland, Turkey, the United States, and the European Union, which includes its 28 member states Austria, Belgium, Bulgaria, Cyprus, Croatia, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, and the United Kingdom.

China and Uruguay have expressed interest in joining the negotiations but so far are not included.

1] Swiss National Center for Competence in Research: [A Plurilateral Agenda for Services?: Assessing the Case for a Trade in Services Agreement (pdf), Working Paper No. 2013/29, May 2013, p. 10.

2] For example, in June 2012 Ecuador [tabled a discussion (pdf) on re-thinking regulation and GATS rules; in September 2009 the Commission of Experts on Reforms of the International Monetary and Financial System, convened by the President of the United Nations and chaired by Joseph Stiglitz, released its final report (pdf), stating that “All trade agreements need to be reviewed to ensure that they are consistent with the need for an inclusive and comprehensive international regulatory framework which is conducive to crisis prevention and management, counter-cyclical and prudential safeguards, development, and inclusive finance.”

Read the Secret Trade in Services Agreement (TISA) – Financial Services Annex

Read the Analysis Article – Secret Trade in Services Agreement (TISA) – Financial Services Annex

Experts are still pouring over the documents but here is some of the preliminary analysis of what TISA will effect:

Wednesday’s leak provides the largest window yet into TISA and comes on the heels of two other leaks about the accord last year, the first from WikiLeaks and the other from the Associated Whistleblowing Press, a non-profit organization with local platforms in Iceland and Spain.

While analysts are still poring over the contents of the new revelations, civil society organizations released some preliminary analysis of the accord’s potential implications for transportation, communication, democratic controls, and non-participating nations

   Telecommunications: “The leaked telecommunications annex, among others, demonstrate potentially grave impacts for deregulation of state owned enterprises like their national telephone company,” wrote the global network Our World Is Not for Sale (OWINFS) in a statement issued Wednesday.

   Transportation: The International Transport Workers’ Federation (ITF), comprised of roughly 700 unions from more than 150 countries, warned on Wednesday that the just-published documents “foresee consolidated power for big transport industry players and threaten the public interest, jobs and a voice for workers.” ITF president Paddy Crumlin said: “This text would supercharge the most powerful companies in the transport industry, giving them preferential treatment. What’s missing from this equation is any value at all for workers and citizens.”

   Bypassing democratic regulations: “Preliminary analysis notes that the goal of domestic regulation texts is to remove domestic policies, laws and regulations that make it harder for transnational corporations to sell their services in other countries (actually or virtually), to dominate their local suppliers, and to maximize their profits and withdraw their investment, services and profits at will,” writes OWINFS. “Since this requires restricting the right of governments to regulate in the public interest, the corporate lobby is using TISA to bypass elected officials in order to apply a set of across-the-board rules that would never be approved on their own by democratic governments.”

   Broad impact: “The documents show that the TISA will impact even non-participating countries,” wrote OWINFS. “The TISA is exposed as a developed countries’ corporate wish lists for services which seeks to bypass resistance from the global South to this agenda inside the WTO, and to secure and agreement on servcies without confronting the continued inequities on agriculture, intellectual property, cotton subsidies, and many other issues.”

Despite assurances that Fast Track would force the president to reveal the contents of these agreements, it also removes congresses ability to amend, debate or filibuster. Right now, only congress members can view these complex documents. They are not allowed to take notes, ask questions or even discuss the contents amongst themselves, while big corporations are free to read and discuss it. This is not how transparency works, Barrack.

Meanwhile, to promote transparency, Wikileaks is offers $100,000 to anyone who will reveal the missing chapters from the TPP. Only three of the of the 26 chapters have been uncovered so far. It is imperative that Americans and the  world know what our governments are doing in our names.

The Fast Track vote is coming up this week. Help Stop Fast Track

The Untold Story of the Hunt for Snowden

During his interview with Democracy Now!‘s Amy Goodman in London’s Ecuadoran Embassy, Wikileaks’ founder Julian Assange gives the inside story of the grounding of Ecuadoran President Evo Morales’ plane.



Transcript can be read here

How Do You Solve a Problem Like Migration?

The migration of refugees from conflict torn Libya has become a huge humanitarian crisis for European nations, especially Italy. But the solution to stemming the tide of thousands fleeing the region by vessels used by human traffickers isn’t the way.

EU to launch Mediterranean naval mission to tackle migrant crisis

EU ministers have agreed to launch a sea and air mission that could in its later phases destroy vessels used by human traffickers, which have carried an estimated 1,800 migrants to their deaths in the Mediterranean this year.

An intelligence-gathering operation will herald the mission’s first phase, with the UK expected to offer drones and surveillance equipment as a partial riposte to calls for it to take in more refugees.

In later phases, hostile vessels suspected of harbouring migrants could be boarded, searched, seized or disposed of in Libyan territory or international waters – as long as a chapter 7 UN resolution to authorise the use of force to do so is obtained first. [..]

The mission’s rules of engagement have still to be thrashed out and one diplomat described the deployment of such forces as “the next step in terms of operational details”. The level of collateral damage considered acceptable would also be discussed after the mission was up and running, he said.

The operation will have its headquarters in Rome and be run by an Italian rear admiral, Enrico Credendino, with an initial year-long mandate.

Concerns about the militarisation of the migrants issue will probably be raised at the UN, though, with Libya already describing the mission as very worrying, citing concerns over its potential to mistakenly target fishermen’s boats.

Refugee rights groups fear that bombing the escape routes of people fleeing for their lives from Syria, Eritrea and west Africa – where most migrants begin their journeys – will simply lead to more deaths, away from the public spotlight.

During his interview with Democracy Now!‘s Amy Goodman in London’s Ecuadoran Embassy, Wikileaks’ founder Julina Assange revealed that Wikileaks has released documents that detail the EU plans for the military intervention against “refugee boats” in Libya and the Mediterranean

Today, WikiLeaks is releasing two classified EU documents, outlining the planned military intervention against boats travelling from Libya to Italy. The more significant of the two documents was written by the combined military defence chiefs of the EU member states. The plan was formally approved by representatives from all 28 countries on 18 May 2015.

Importantly, one of the documents acknowledges that “the political End State [of the military intervention] is not clearly defined” and recommends that the European Commission issue further guidance.

The documents lay out a military operation against cross-Mediterranean refugee transport networks and infrastructure. It details plans to conduct military operations to destroy boats used for transporting migrants and refugees in Libyan territory, thereby preventing them from reaching Europe. The EU member states’ military chiefs advice is that there is a need to:

   “[draw] on the full range of surveillance, intelligence and information capabilities available to MS [member states] and Partners, and supported by Brussels (inter alia EEAS [European External Action Service] Single Intelligence Analysis Capacity – SIAC)“.

The plan also acknowledges the possibility of EU military use of force against groups such as ISIL “within the Libyan sovereign area”:

   “the threat to the force should be acknowledged, especially during activities such as boarding and when operating on land or in proximity to an unsecured coastline, or during interaction with non-seaworthy vessels. The potential presence of hostile forces, extremists or terrorists such as Da’esh [ISIL] should also be taken into consideration“.

The documents mark a departure from previous EU military strategy in its overt targeting of civilian infrastructure in Libya. Numerous EU countries, including Belgium, Bulgaria, Denmark, France, Greece, Italy, the Netherlands, Romania, Spain, Sweden and the United Kingdom participated in NATO-led air strikes on Libya in 2011.



Transcript can be read here

A Conversation with Julian Assange

It was 5 years ago that Chelsea Manning was arrested for leaking classified information to Wikileaks. A few weeks later, Wkikleaks released thousands of classified documents, the largest breach of security in military history. In an exclusive interview with Wikileaks founder Julian Assange, Democracy Now!‘s Amy Goodman discussed a number of topics from the NSA surveillance programs and the so-called free trade agreements being negotiated by the Obama administration to his life inside the Ecuadoran embassy in London.

Despite Congressional Standoff, NSA Has Secret Authority to Continue Spying Unabated



Transcript can be read here

Trans-Pacific Partnership: Secretive Deal Isn’t About Trade, But Corporate Control



Transcript can be read here

British Nuclear Sub Whistleblower William McNeilly Revealed Major Security Lapses



Transcript can be read here

“Pretrial Punishment”: Julian Assange Remains in Ecuadorean Embassy Fearing Arrest If He Leaves



Transcript can be read here

The Mountain Finally Comes to Mohammed

It’s been nearly 5 years since two women in Sweden lodged charges of rape against Wikileaks founder Julian Assange. The Swedish prosecutors have been seeking his extradition from England to question him regarding the allegations but Mr. Assange fearing that this was a ploy to have him extradited to the United States where he would be arrested and prosecuted for leaking secret documents that exposed US covering up war crimes. Lawyers for Mr. Assange said that the Swedish prosecutors could question him in England and they believe that would end the matter. However the prosecutors, claiming it would be inadequate to question him in England, went to British court seeking extradition. Mr. Assange then sought asylum at the Ecuadoran embassy. Now, after over four years and time running out on the statute of limitations on charging him, the Swedish prosecutor has agreed to question Mr. Assange in England. Frustrated and tired, Mr. Assange’s response was “They could have done this long ago. What took them so long?” The answer is probably the salivating US justice and state departments who would love nothing more that to get him to a country that would extradite him to the US over the espionage charges.

Julian Assange to be questioned by Swedish prosecutors in London

By David Crouch, The Guardian

Lawyers for Wikileaks founder welcome prosecutor’s decision to interview Assange at Ecuadorian embassy in bid to break deadlock

Marianne Ny, who heads the investigation into accusations of rape, coercion and sexual molestation against Assange, made a formal request to interrogate him in the Ecuadorian embassy – the first sign of movement in a case that has been frozen since August 2012.

The prosecutor will also ask the UK government and Ecuador for permission to carry out the interviews at the embassy in London, where Assange has been staying for more than two-and-a-half years to avoid extradition to Sweden, from where he fears being handed over to the US to face espionage charges.

Ny said she had changed her mind because the statute of limitations on several of the crimes of which Assange is suspected runs out in August 2015. [..]

The British Foreign Office said in November it would welcome a request by the Swedish prosecutor to question Assange inside the Ecuadorian embassy. Ecuador’s government has also repeatedly stated that it approves of such a step. Assange has been wanted in Sweden since the accusations were made against him in August 2010.

His lawyers, who are currently appealing against his arrest warrant in Sweden’s highest court, have complained bitterly about the prosecutor’s refusal to travel to London to speak to him – an essential step under Swedish jurisprudence to establish whether Assange can be formally charged. [..]

The prosecutor’s apparent U-turn on Friday came just days after a supreme court judge in Stockholm wrote to the prosecutor general, directing him to give his opinion concerning Assange’s appeal, “especially regarding the investigatory procedure and the principle of proportionality”.

Further pressure on the prosecutor came in November when the appeal court, while rejecting Assange’s arguments, nonetheless directed sharp criticism at Ny for failing in her obligation to move the case forward.

It remains to be seen whether the charges of rape, that were brought by two women who were in a consensual relationship with Mr. Assange at the time, will result in an arrest warrant. There are a lot of questions about the women’s backgrounds and alleged connections with the CIA that would love to get their hands on Mr. Assange.  

‘We’re heading towards a dystopian surveillance society’

MSNBC’s “Now” host Alex Wagner interviewed Julian Assange from his refuge at the Ecuadoran Embassy in London. He discusses the surveillance stata, his exile and Edward Snowden.

Sam Adams Award

Cross posted from The Stars Hollow Gazette

In Russia, NSA whistleblower Edward Snowden appeared in public for the first time since he was grated asylum by the Russian government. He met with other whistleblowers and activists to receive the Sam Adams Award for Integrity in Intelligence.

RT News interviewed whistleblowers and activists Jesselyn Radack, Thomas Andrews Drake, Ray McGovern and Coleen Rowley in their studio after the award was presented.

NSA and GCHQ Make Internet Privacy

Cross posted from The Stars Hollow Gazette

In a joint report by The Guardian, the New York Times, and ProPublica, courtesy of the documents leaked by Edward Snowden, it was revealed how the NSA and British GCHQ broke encryption to unlock unlock encryption used to protect emails, banking and medical records. The detailed article describes how the program, called “Bulrun,” foils the safeguards of our internet privacy:

The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

A cryptographer and research professor at Johns Hopkins University, Michael Green summerizes some of the “bad things” that the NSA and GCHQ have been doing with the joint cost of $250 million per year:

   (1.) Tampering with national standards (NIST is specifically mentioned) to promote weak, or otherwise vulnerable cryptography.

   (2.) Influencing standards committees to weaken protocols.

   (3.) Working with hardware and software vendors to weaken encryption and random number generators.

   (4.) Attacking the encryption used by ‘the next generation of 4G phones‘.

   (5.) Obtaining cleartext access to ‘a major internet peer-to-peer voice and text communications system’ (Skype?)

   (6.) Identifying and cracking vulnerable keys.

   (7.) Establishing a Human Intelligence division to infiltrate the global telecommunications industry.

   (8.) And worst of all (to me): somehow decrypting SSL connections.

Columnist on civil liberties and U.S. national security issues for The Guardian, Glenn Greenwald discussed this latest revelation with Amy Goodman and Juan González of DemocracyNow!.



Transcript can be read here

“It’s what lets you enter your credit card number, check your banking records, buy and sell things online, get your medical tests online, engage in private communications. It’s what protects the sanctity of the Internet.” [..]

“The entire system is now being compromised by the NSA and their British counterpart, the GCHQ,” Greenwald says. “Systematic efforts to ensure that there is no form of human commerce, human electronic communication, that is ever invulnerable to their prying eyes.”

Security technologist and a fellow at the Berkman Center for Internet and Society at Harvard Law School, Bruce Schneiner said, in an article at The Guardian, that the public has been betrayed by the US government and that the NSA has undermined the social contract with the public. He proposes that since it was engineers who built the internet, it is time that they “fix it”.

One, we should expose. If you do not have a security clearance, and if you have not received a National Security Letter, you are not bound by a federal confidentially requirements or a gag order. If you have been contacted by the NSA to subvert a product or protocol, you need to come forward with your story. Your employer obligations don’t cover illegal or unethical activity. If you work with classified data and are truly brave, expose what you know. We need whistleblowers. [..]

Two, we can design. We need to figure out how to re-engineer the internet to prevent this kind of wholesale spying. We need new techniques to prevent communications intermediaries from leaking private information.

We can make surveillance expensive again. In particular, we need open protocols, open implementations, open systems – these will be harder for the NSA to subvert.

Prof. Schneiner also offers a guide to staying secure and gives five piece of advice:

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you’re much better protected than if you communicate in the clear.

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn’t. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it’s harder for the NSA to backdoor TLS than BitLocker, because any vendor’s TLS has to be compatible with every other vendor’s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it’s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

These are some of the programs he has been using: GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit and Password Safe. He also advises the use of a Linux operating system.

Joining the Party

Cross posted from The Stars Hollow Gazette

It was announced last week that The Guardian and The New York Times had formed a partnership to report on the documents the were leaked by Edward Snowden in relationship to the involvement of the UK’s GCHQ. The arrangement came after the British government demanded that The Guardian hand over the NSA files in their possession. Instead, The Guardian choose to destroy the records that were in their UK offices.

Journalists in America are protected by the first amendment which guarantees free speech and in practice prevents the state seeking pre-publication injunctions or “prior restraint”.

It is intended that the collaboration with the New York Times will allow the Guardian to continue exposing mass surveillance by putting the Snowden documents on GCHQ beyond government reach. Snowden is aware of the arrangement.

The collaboration echoes that of the partnership forged in 2010 between the Guardian, the New York Times and Der Spiegel in relation to WikiLeaks’s release of US military and diplomatic documents.

In a more quiet arrangement, ProPublica, a unique nonprofit investigative reporting group of former journalists, has also partnered with The Guardian but it is not yet known on they will focus. ProPublica has won two Pulitzer Prizes for its reporting on national and investigative reporting.

Charles Pierce, at Esquire’s Politics Blog has been following the NSA story and the unique poutrage over Snowden and The Guardian‘s journalist Glenn Greenwald that ignited a laughable mini blog war. He offered a couple of amusingly precise observations on the Snowden effect:

The current state of play seems to be centered on the new family fun game, How Much Of A Dick Is Glenn Greenwald Anyway? I decline to play. It is a stupid, wasteful exercise because, frankly, the vessel doesn’t matter to me. The information that it carries is the only thing that matters. What has Edward Snowden, International Man Of Luggage, revealed that isn’t true? I don’t want to hear that we all knew it already. I don’t want quibbling about how the data sweeps work, and how they might not be as horrible as they’re being made out to be because I don’t trust the people making that argument. I don’t to hear about how the fudging of the details of David Miranda’s arrest somehow lessens the credibility of what we now know. I don’t want to hear how it may have inconvenienced our all-too-human-mistake-prone heroes in the NSA, who are they all, all honorable men. What do we know now because of the revelations that is not true? The fact remains that we do not know any of this without Snowden’s revelations to Greenwald and, thereby, to the world. The national conversation is not even happening. The NSA is not owning up to its all-too-human mistakes. The FISA Court isn’t retroactively flexing to prove it isn’t the intelligence community’s poodle. The authoritarian impulse has not even been given the brief pause we currently enjoy. None of this happens without Snowden and Greenwald and, as a citizen, I could care less that people think Glenn Greenwald is full of himself. Don’t invite him to dinner.

Charles then jogs the memories of those who care to have forgotten how Iran/Contra began:

For the benefit of anyone for whom reading is perhaps not fundamental, Glenn Greenwald’s personality, and the peripatetic globe-trotting of Edward Snowden, are not the story here. If you decide to make them the story, then you are taking yourself off the real story, and that’s your fault, not Greenwald’s or Snowden’s. Unless, of course, you think the Times, and now ProPublica, are acting the way Lyndon LaRouche’s people did. I remind folks who get caught up in the vessel and miss what’s inside that, on November 3, 1986, there was an oddball story in an obscure Lebanese weekly newspaper called al-Shiraa about arms transfers in the Middle East. This story was flatly denied by everyone in this country — including President Ronald Reagan — and al Shiraa was treated as though it was being put out by two guys with a mimeograph machine in their mother’s basement. This, boys and girls, was how the Iran-Contra scandal began. The government “hit back.” It didn’t matter. The story remained the story. And, it could be argued, the country never really caught up with what al Shiraa reported.

The country and the world have Snowden and Greenwald to thank for holding the current administration to its promise of transparency, their personal lives and beliefs are irrelevant.  

A Heavy Price for Our Freedom

Cross posted from The Stars Hollow Gazette

David Coombs, attorney for Army Private Bradley Manning, read Pvt. Manning’s statement to the press after his sentencing to 35 years in prison. Immediately after the sentence was read, Pvt. Manning turned to Mr. Coombs telling him, “It’s okay. It’s alright. I know you did your best. I’m going to be okay. I’m going to get through this.”

Bradley Manning: “Sometimes You Have to Pay a Heavy Price to Live in a Free Society”



Transcript can be read here

Just after the court adjourned and after the press conference, Mr. Coombs  was interviewed by independent journalist Alexa O’Brien which aired exclusively on Democracy Now!

“He Wanted To Help America”: Manning Attorney in First Extended Interview After 35-Year Sentence



Transcript can be read here

Coombs talks about the government’s use of classified evidence, Manning’s reaction to the sentence and how much of the court record was hidden from the public. “I can’t believe that was actually the sentence he received,” Coombs tells O’Brien. “Anyone who sat through the hearing and heard all the evidence, even in the closed sessions, there is not evidence there where you would think 35 years would be the appropriate sentence. I wonder now if there had actually been damaged or if he had really intended to harm the United States or wanted to obtain personal gain from selling classified information, just what the sentence would have been. Because this was a person who had true intentions. He wanted to help America. He wanted to get people to think about what was going on in Iraq. He didn’t have an evil motive in what he did.”

Bradley Manning Sentenced to 35 Years

Cross posted from The Stars Hollow Gazette

Pfc. Bradley Manning was sentenced this morning to  35 years in prison for passing classified documents to Wikileaks that exposed war crimes in Afghanistan and Iraq. None of the those crimes have been investigates and no one has been charges in their commission.

The sentence was more severe than many observers expected, and is much longer than any punishment given to any previous US government leaker.

The 25-year-old soldier was convicted last month of leaking more than 700,000 classified documents and video. The disclosures amounted to the biggest leak in US military history.

He was found guilty of 20 counts, six of them under the Espionage Act, but was acquitted of the most serious charge of “aiding the enemy”. [..]

The 1,294 days Manning has already spent in military custody, since May 2010, will be deducted from his sentence. The figure includes 112 days that is being taken off the sentence as part of a pre-trial ruling in which Lind compensated Manning for the excessively harsh treatment he endured at the Quantico marine base in Virginia.

He has to serve a minimum of a third of his sentence, meaning he will be eligible for parole in just over eight years, and, at the very earliest, could be released under parole soon as 2021. He can earn 120 days per year off his sentence for good behaviour and job performance.

Manning faced a maximum possible sentence of 90 years, although few legal experts expected he would receive anything near that amount.

The sentence will automatically be appealed.

The Center for Constitutional Rights condemned the sentence and praised Manning  as a whistleblower who never should have been prosecuted. This is part of their statement:

We are outraged that a whistleblower and a patriot has been sentenced on a conviction under the Espionage Act. The government has stretched this archaic and discredited law to send an unmistakable warning to potential whistleblowers and journalists willing to publish their information. We can only hope that Manning’s courage will continue to inspire others who witness state crimes to speak up.

There are calls for President Barack Obama to pardon Manning or commute his sentence to time served. Considering Obama had declared Manning guilty before the trial started, there are serious doubts that will happen.  

XKeyscore: Another NSA Program Exposed

Cross posted from The Stars Hollow Gazette

As a hearing on reining in the secret surveillance program was taking place, another “tool” in the NSA’s collection of on-line data was revealed to the public.

Senate Panel Presses N.S.A. on Phone Logs

by Charlie Savage and David E. Sanger, The New York Times

Senators of both parties on Wednesday sharply challenged the National Security Agency’s collection of records of all domestic phone calls, even as the latest leaked N.S.A. document provided new details on the way the agency monitors Web browsing around the world.

At a Senate Judiciary Committee hearing, the chairman, Patrick J. Leahy, Democrat of Vermont, accused Obama administration officials of overstating the success of the domestic call log program. He said he had been shown a classified list of “terrorist events” detected through surveillance, and it did not show that “dozens or even several terrorist plots” had been thwarted by the domestic program.

“If this program is not effective it has to end. So far, I’m not convinced by what I’ve seen,” Mr. Leahy said, citing the “massive privacy implications” of keeping records of every American’s domestic calls.

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

by Glenn Greenwald, The Guardian

• XKeyscore gives ‘widest-reaching’ collection of online data

• NSA analysts require no prior authorization for searches

• Sweeps up emails, social media activity and browsing history

• NSA’s XKeyscore program – read one of the presentations

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

All In host Chris Hayes talks about the new efforts at transparency and the latest NSA revelations courtesy of Edward Snowden with Senator Richard Blumenthal (D-CT) and Glenn Greenwald of The Guardian.

With the crackdown on whistleblowers and failure to pursue the crimes they revealed, one wonders just how far is the US from becoming the Soviet Russia of the 21st century.

Load more