Loi renseignement : le Conseil constitutionnel en valide l’essentiel
▻http://rue89.nouvelobs.com/2015/07/24/loi-renseignement-conseil-constitutionnel-valide-lessentiel-260430
Loi renseignement : le Conseil constitutionnel en valide l’essentiel
▻http://rue89.nouvelobs.com/2015/07/24/loi-renseignement-conseil-constitutionnel-valide-lessentiel-260430
Trois dispositions ont cependant été censurées, dont une qui devait permettre aux services de renseignement, en cas « d’urgence opérationnelle », de déroger à l’autorité du premier ministre. Mais aussi de se passer de l’avis de la Commission nationale de contrôle des techniques de renseignement (#CNCTR), mise en place par cette loi. « Une atteinte manifestement disproportionnée au droit au respect de la vie privée et au secret des correspondances », selon le communiqué du Conseil constitutionnel.
L’institution a rejeté une autre disposition relative aux mesures de surveillance internationale, jugeant ses contours trop flous – le texte ne définissait « ni les conditions d’exploitation, de conservation et de destruction des renseignements collectés (…), ni celles du contrôle par la CNCTR ». Le Conseil constitutionnel a par ailleurs censuré une troisième disposition, moins importante, relative au financement de la CNCTR, car elle relève, selon lui, de la loi de finances.
▻http://lemonde.fr/pixels/article/2015/07/23/le-conseil-constitutionnel-censure-trois-articles-de-la-loi-sur-le-renseigne
#pjlrenseignement officiellement #lrenseignement #surveillance
L’occasion de ressortir :
The (US) government rulebook for labeling you a terrorist
▻https://firstlook.org/theintercept/2014/07/23/blacklisted (juillet 2014)
Discuté lors d’un Democracy Now !
▻http://www.democracynow.org/2014/7/29/jeremy_scahill_leaked_us_terrorist_watchlist
cc : @chirine
Opportun : Quand Axelle Lemaire demandait l’abandon des « boîtes noires » et « hésitait » à démissionner (on nous a déjà fait le coup)
▻http://rue89.nouvelobs.com/2015/07/23/quand-axelle-lemaire-demandait-labandon-boites-noires-260421
S’assurer au mieux que la clé publique #PGP prétendue appartenir à X appartient à X.
Super article de #Micah_Lee sur l’expérience de chiffrement des communications entre Laura Poitras, Greenwald et Snowden. Pratiquement un #tutorial.
Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You.
▻https://firstlook.org/theintercept/2014/10/28/smuggling-snowden-secrets
NSA releases 12 years of damaging oversight reports on Christmas Eve
▻http://www.pbs.org/newshour/rundown/nsa-releases-12-years-surveillance-oversight-reports-christmas-eve
The National Security Agency released documents on Christmas Eve revealing surveillance activities that “may have violated the law for U.S. policy over more than a decade,” reports David Lerman at Bloomberg.
Compelled by an ACLU FOIA request, the agency published 12 years of quarterly reports that were created for the President’s Intelligence Oversight Board between 2001 and mid-2013.
The reports are heavily redacted but include details of intentional and unintentional misuse of the NSA’s signals intelligence gathering systems.
Les rapports ▻https://www.nsa.gov/public_info/declass/IntelligenceOversightBoard.shtml
En gros, chaque fois qu’il y a un truc pas correct, on gronde l’intéressé
Analysts who performed these queries were counseled by their management.
quand c’est plus grave, on le prive temporairement de son outil de travail
The analyst’s database access was temporarily suspended.
voire, on l’envoie en formation
The analyst was instructed to retake intelligence oversight training.
On remarquera que, ayant sans doute fini par se rendre compte que les gros pavés noirs faisaient mauvais genre, la NSA a décidé de changer de couleur de caviardage.
NSA Drops Christmas Eve Surprise - The Intercept
▻https://firstlook.org/theintercept/2014/12/26/nsa-releases-report-internal-abuses-christmas-eve
While the NSA has come under public pressure for openness since high-profile revelations by whistleblower Edward Snowden, the release of the heavily redacted internal reports at 1:30PM on Christmas Eve demonstrates limits to the agency’s attempts to demonstrate transparency. Releasing bad news right before a holiday weekend, often called a “Christmas Eve surprise,” is a common tactic for trying to minimize press coverage.
The reports, released in response to a Freedom of Information Act request submitted by the American Civil Liberties Union, offer few revelations, but contain accounts of internal behavior embarrassing to the agency. In one instance an NSA employee “searched her spouse’s personal telephone directory without his knowledge to obtain names and telephone numbers for targeting”, a practice which previous reports have indicated was common enough to warrant the name “LOVEINT”.
’A lot of These Gomers Didn’t Know Shit’: Former CIA Officer on Torture Report
▻https://firstlook.org/theintercept/2014/12/10/lot-gomers-didnt-know-shit-former-cia-officer-torture-report
At the same time, he said Senate Democrats are being totally disingenuous about their own role in tacitly condoning torture. They gave Bush a blank check when it was politically convenient and now they’re pretending to be shocked about what happened: “I’m familiar with congressional oversight and there’s no way people on the intelligence committees and in the leadership didn’t generally know what was going on. There’s no conceivable circumstances under which they wouldn’t have known. It’s like that scene from Casablanca, they had no idea. They’re lying.”
Bon, oui, voilà ...
▻https://www.youtube.com/watch?v=mOGXZlvOTKw
... mais j’estime que vu de la perspective du sénat c’est plutôt comme dans ce film ...
▻https://www.youtube.com/watch?v=j5lU52aWTJo
Torture report highlights consequences of permanent war
▻http://www.bostonglobe.com/opinion/2014/12/09/torture-report-highlights-consequences-permanent-war/MdEpEx2ilVexZuECsJ88TN/story.html
Critics will accuse Feinstein of endangering the nation’s safety, soiling its reputation, hanging out to dry patriotic agents doing what needed doing in our name. This is all nonsense. Her actual failing is far worse. She and her colleagues are doing what the state always does for itself in these situations: administering a little public slap on the hand, after which an ever-so-quiet return to business as usual will ensue.
War is the health of the state. Headline-grabbing scandals involving the national security apparatus come and go. Today’s is just one more in a long series extending back decades. As long as the individuals and entities comprising that apparatus persist in their commitment to permanent war, little of substance will change.
Il faut suivre la page de Greenwald sur The Intercept, dans laquelle il tient à jour ses « notes » de lecture du rapport sur la torture :
▻https://firstlook.org/theintercept/2014/12/09/live-coverage-release-senate-torture-report
Buried in footnote 857 of the report is this remarkable account of how the CIA rendered a detainee to an unknown country, had him tortured, and then used the false information he provided about Saddam’s WMDs and “alliance” with al Qaeda to justify the U.S. attack, including information used by Colin Powell at his notorious 2003 U.N. speech
#AuroraGold ou comment la #NSA #pirate les #téléphones du monde
▻http://www.mag-securs.com/news/articletype/articleview/articleid/34516/auroragold-ou-comment-la-nsa-pirate-les-telephones-du-monde.aspx
The intercept vient de publier un nouvel article sur l’opération AuroraGold visant à espionner l’ensemble des réseaux cellulaires ou, à tout le moins, se donner la possibilité d’espionner n’importe quel réseau. Pour ce faire, l’agence américaine s’est tout d’abord concentrée sur les messages électroniques de 1200 comptes associés aux opérateurs de télécommunications. Ce faisant, elle a pu obtenir des informations confidentielles à propos de ces réseaux lui permettant de les écouter voire de découvrir des vulnérabilités ou même introduire des failles afin de les exploiter pour la #surveillance. Karsten Nohl, cité par The Intercept indique que l’opération semble destinée à assurer un accès à pratiquement tous les réseaux de téléphonie cellulaire au monde, y compris ceux des pays soi-disant alliés ou amis comme l’Allemagne ou la France.
L’expert va plus loin en indiquant que la NSA a sciemment introduit des failles, ce qui contribue à dégrader la sécurité des réseaux. « Même si vous aimez la NSA et affirmez que vous n’avez rien à cacher, vous devriez être contre une politique qui introduit des failles de sécurité. Car lorsque la NSA introduit une faiblesse, une vulnérabilité, il n’y a pas qu’elle qui peut en tirer parti », précise M. Nohl.
Parmi les sociétés ou organisations espionnées, figure la #GSMA (l’association des fournisseurs GSM) qui représente les intérêts de plus de 800 opérateurs de téléphonie #cellulaire, éditeurs de logiciels ou encore sociétés Internet de 220 pays différents. Les plus grands noms y figurent. Interrogé par le journal, le porte-parole de l’association s’est contenté de déclarer que si quelque chose d’illégal s’était produit, elle en référerait à la police.
Plus encore, The Intercept relève que les pratiques de la NSA sont en contradiction flagrante avec la mission du NIST (National Institute for Standard & Technology), une agence gouvernementale américaine chargée de déterminer les standards US en matière de cybersécurité. Si la NSA a introduit des failles dans les systèmes c’est donc en violation des recommandations de la NIST et même en violation de directives édictées par le président Obama stipulant que la NSA ne devait « en aucun cas subvertir, saper, affaiblir ou rendre vulnérable n’importe quel logiciel commercial ». Un autre panel a enjoint la NSA à prévenir les entreprises lors de la découverte de failles de type Zero-Day.
La directive présidentielle souffre toutefois elle-même d’une faille d’envergure puisqu’il est précisé que l’exploitation secrète des failles est interdite, sauf dans le cas « d’une question de sécurité nationale ou d’application de la loi ». Ce qui laisse libre cours à toute interprétation et peut signifier que c’est interdit sauf lorsque c’est autorisé : une posture très souvent adoptée par la sulfureuse agence.
▻https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones
12 Things to Keep in Mind When You Read the Torture Report
▻https://firstlook.org/theintercept/2014/12/02/x-things-keep-mind-ever-get-read-torture-report
11) The report’s conclusion that torture didn’t do any good is a big deal. You may argue, as I do, that even if torture sometimes “worked”, it’s still immoral, criminal and ultimately counterproductive. As I wrote during the “Zero Dark Thirty” furor, torture is not about extracting information, it’s about power, revenge, rage and cruelty. It’s about stripping people of their humanity. Throughout its history, its only reliable byproduct has been false confessions. But the pro-torture argument is simple: The ends justify the means. So if the evidence is overwhelming that torture achieves nothing — or less than nothing — then we win the argument by default.
“No Justice, No Respect”: Why the Ferguson Riots Were Justified
▻https://firstlook.org/theintercept/2014/12/01/justice-respect-ferguson-riots-justified
#english @rezo #Ferguson
What happened to the humanitarians who wanted to save Libyans with bombs & drones ?
▻https://firstlook.org/theintercept/2014/11/11/happened-humanitarians-wanted-save-libyans-bombs-drones #Libya
Symantec Discovers ’Regin’ Spy Code Lurking on Computer Networks
▻http://bits.blogs.nytimes.com/2014/11/24/symantec-discovers-spy-code-lurking-on-computer-networks
The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.
“In the world of malware threats, only a few rare examples can truly be considered groundbreaking and almost peerless,” Symantec wrote. “What we have seen in Regin is just such a class of malware.”
Second reference (cited in the Guardian article):
Secret Malware in European Union Attack Linked to U.S. and British Intelligence
▻https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq
Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer
▻http://www.wired.com/2014/11/mysteries-of-the-malware-regin
Dubbed “Regin” by Microsoft
But perhaps the most significant aspect of Regin is its ability to target GSM base stations of cellular networks. The malicious arsenal includes a payload that Kaspersky says was used in 2008 to steal the usernames and passwords of system administrators of a telecom somewhere in the Middle East.
Regin: Nation-state ownage of GSM networks
(contains detailed explanations)
▻http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks
Sur Seenthis:
►http://seenthis.net/messages/315454
Glenn Greenwald : il y a des gens sincèrement enthousiastes pour la candidature d’Hillary Clinton (Wall Street, le lobby israélien, les va-t-en-guerre et les néoconservateurs old-school) : Cynics, Step Aside : There is Genuine Excitement Over a Hillary Clinton Candidacy
▻https://firstlook.org/theintercept/2014/11/14/despite-cynicism-genuine-excitement-hillary-clinton-candidacy
It’s easy to strike a pose of cynicism when contemplating Hillary Clinton’s inevitable (and terribly imminent) presidential campaign. As a drearily soulless, principle-free, power-hungry veteran of DC’s game of thrones, she’s about as banal of an American politician as it gets. One of the few unique aspects to her, perhaps the only one, is how the genuinely inspiring gender milestone of her election will (following the Obama model) be exploited to obscure her primary role as guardian of the status quo.
An Innocent Man, Tortured by the U.S., Asks the U.N.: Where’s the Accountability? - The Intercept
▻https://firstlook.org/theintercept/2014/11/11/innocent-man-tortured-u-s-asks-wheres-accountability
(...)
I understand that international human rights laws like the Convention Against #Torture were created so that the people who commit torture are punished. Isn’t that how we can end torture in the world? So why has no U.S. official been held responsible for brutal practices and torture at Guantanamo or other U.S. prisons?
How voter suppression helped produce the lowest turnout in decades
►https://firstlook.org/theintercept/2014/11/07/voter-suppression
#USA #midterms #democracy
How Voter Suppression Helped Produce the Lowest Turnout in Decades
►https://firstlook.org/theintercept/2014/11/07/voter-suppression
On Tuesday, older, white voters — who traditionally support Republicans — went to the polls in droves, while turnout among traditionally Democratic groups — the young, the minoritized, and women — was down. Indeed, overall turnout declined to an estimated 36.6% of eligible voters, the lowest rate of participation since the 1940s, despite the $3 billion spent by candidates, political parties, and super PACs.
Yes, President Barack Obama’s poor performance and approval rating undoubtedly played a role in the lower turnout. But the evidence is piling up that systematic voter suppression, including voter ID laws and dubious vote-fraud prevention software, played a significant part in keeping people from casting ballots, as well.
Take the situation in Texas, where Democrat Wendy Davis lost badly to Republican Greg Abbott in the gubernatorial race. More important than her expected defeat is that the Lone Star State had the lowest voter turnout in the country at 33%, down from 38% four years earlier. It’s difficult to determine to what precise extent Texas’s new voter ID law is to blame for the poor turnout, but “there are somewhere between 600,000 and 1.4 million registered voters in Texas without state ID,” according to Kathleen Unger, whose nonprofit, VoteRiders, works to get people the documents they need to vote.
Des pays arabes s’allieraient face aux islamistes | Métro
▻http://journalmetro.com/monde/587695/des-pays-arabes-sallieraient-face-aux-islamistes
LE CAIRE, Égypte – L’Égypte, l’Arabie saoudite, les Émirats arabes unis et le Koweït envisagent de former une nouvelle alliance militaire pour affronter les militants islamistes, selon ce qu’a appris l’Associated Press.
Cette alliance comprendrait la création d’une force commune pour intervenir à travers le Moyen-Orient.
L’alliance ferait aussi contrepoids à son éternelle rivale, la puissante Iran contrôlée par les Chiites. Un dirigeant militaire égyptien a précisé que la nouvelle force pourrait notamment intervenir en Libye, où des militants islamistes se sont emparés de plusieurs villes, et au Yémen, où des rebelles chiites possiblement associés à l’Iran ont pris le contrôle de la capitale.
The Middle East’s Unholy Alliance - The Intercept
▻https://firstlook.org/theintercept/2014/11/04/middle-easts-counterrevolutionary-alliance
In addition to appropriating America’s post-9/11 rhetoric of anti-terrorism to justify their own foreign policies, these countries also happen to be following a very straightforward pattern of reactionary behavior in the face of popular upheaval. This motley alliance of monarchies and military dictatorships is in many ways replicating the same repressive actions taken by European states in the 19th century when they were confronted with populist movements seeking to upend the existing order. And just as then, the results are likely be both destructive and, ultimately, futile.
Hackers Could Decide Who Controls Congress Thanks to Alaska’s Terrible Internet Ballots
▻https://firstlook.org/theintercept/2014/11/03/alaska-election-nightmare
That sounds great, but even the state acknowledges in an online disclaimer that things could go awry, warning that “when returning the ballot through the secure online voting solution, your are voluntarily waving [sic] your right to a secret ballot and are assuming the risk that a faulty transmission may occur.”
That disclaimer is a pre-emptive admission of failure, says Bruce McConnell, who served until 2013 as the top cybersecurity officer for DHS. “They admit that they are not taking responsibility for the validity of the system,” McConnell told The Intercept. “They’re saying, ‘Your vote may be counted correctly, incorrectly, or may not be counted at all, and we are not taking any responsibility for that.’ That kind of disclaimer would be unacceptable if you saw it on the wall of a polling place.”
Report to U.N. Calls Bullshit on Obama’s ’Look Forward, Not Backwards’ Approach to Torture
▻https://firstlook.org/theintercept/2014/10/30/un-report-slams-obama-protecting-u-s-officials-torture-charges
Months after President Obama frankly admitted that the United States had “tortured some folks” as part of the War on Terror, a new report submitted to the United Nations Committee Against Torture has been released that excoriates his administration for shielding the officials responsible from prosecution.
The report describes the post-9/11 torture program as “breathtaking in scope”, and indicts both the Bush and Obama administrations for complicity in it – the former through design and implementation, and the latter through its ongoing attempts to obstruct justice. Noting that the program caused grievous harm to countless individuals and in many cases went as far as murder, the report calls for the United States to “promptly and impartially prosecute senior military and civilian officials responsible for authorizing, acquiescing, or consenting in any way to acts of torture.”
[…]
It’s also worth remembering that, horrific as it was, the torture regime described in the report was only a tiny part of the wide-ranging human rights abuses the United States committed after 9/11. It doesn’t even account for the network of prisons where hundreds of thousands of people were detained in Iraq and Afghanistan – many of whom suffered beatings, rape and murder at the hands of U.S. soldiers.
BLACKWATER FOUNDER REMAINS FREE AND RICH WHILE HIS FORMER EMPLOYEES GO DOWN ON MURDER CHARGES
▻https://firstlook.org/theintercept/2014/10/22/blackwater-guilty-verdicts
New Zealand Cops Raided Home of Reporter Working on #Snowden Documents - The Intercept
▻https://firstlook.org/theintercept/2014/10/16/nicky-hager-raid
Agents from New Zealand’s national police force ransacked the home of a prominent independent journalist earlier this month who was collaborating with The Intercept on stories from the #NSA archive furnished by Edward Snowden. The stated purpose of the 10-hour police raid was to identify the source for allegations that the reporter, Nicky Hager , recently published in a book that caused a major political firestorm and led to the resignation of a top government minister.
#police #surveillance #nouvelle-zélande
liste du matériel saisi ou cloné :
▻http://s3.documentcloud.org/documents/1314317/police-property-record-sheet-items-siezed-from.pdf
disques durs, clés USB… (y a des mails à moi là-dedans !)
Son site perso, pour en savoir plus sur les histoires qu’il a soulevées (notamment… hum… Echelon)
►http://www.nickyhager.info
Bombing of Kurds Shows Everything That’s Wrong with U.S. Foreign Policy
▻https://firstlook.org/theintercept/2014/10/14/pkk-one-administrations-terrorist-anothers-freedom-fighter
Though hugely counterproductive to containing ISIS, the Turkish strikes neatly illustrate how contradictory and incomprehensible American policy in the Middle East is right now. The United States would surely prefer that Turkey not bomb the PKK right now, but how can it object to attacking a group that the U.S. itself designates as a terrorist organization?
It would likewise be hard for the U.S. to publicly protect other key entities willing and able to fight ISIS, including Al-Qaeda-connected militants like Jabhat al-Nusra, paramilitary groups such as Hezbollah, or countries such as Iran, which is both the the only state to show a commitment to fighting ISIS on the ground and an official state sponsor of terrorism in the eyes of the U.S. State Department.