Saturday, September 07, 2013

N.S.A. Able To Foil Basic Safeguards Of Privacy On Web

On time, and as promised; has the "Paper of Record" finally had enough with the White House criminals or are they seeking redemption for their previous silence    

THE NEW YORK TIMES
By Nicole Perlroth, Jeff Larson and Scott Shane
09/05/2013

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. 
  
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.

The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

“For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”

When the British analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, “those not already briefed were gobsmacked!”

An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.

In recent months, the documents disclosed by Mr. Snowden have described the N.S.A.’s reach in scooping up vast amounts of communications around the world. The encryption documents now show, in striking detail, how the agency works to ensure that it is actually able to read the information it collects.

The agency’s success in defeating many of the privacy protections offered by encryption does not change the rules that prohibit the deliberate targeting of Americans’ e-mails or phone calls without a warrant. But it shows that the agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features.

The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be at serious risk, agency officials say.

Just in recent weeks, the Obama administration has called on the intelligence agencies for details of communications by leaders of Al Qaeda about a terrorist plot and of Syrian officials’ messages about the chemical weapons attack outside Damascus. If such communications can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work.

But some experts say the N.S.A.’s campaign to bypass and weaken communications security may have serious unintended consequences. They say the agency is working at cross-purposes with its other major mission, apart from eavesdropping: ensuring the security of American communications.

Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.

For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).

“The risk is that when you build a back door into systems, you’re not the only one to exploit it,” said Matthew D. Green, a cryptography researcher at Johns Hopkins University. “Those back doors could work against U.S. communications, too.”

Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip.

“And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.

“The intelligence community has worried about ‘going dark’ forever, but today they are conducting instant, total invasion of privacy with limited effort,” he said. “This is the golden age of spying.”

A Vital Capability

The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A.

Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.

The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June.

“Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.

The documents make clear that the N.S.A. considers its ability to decrypt information a vital capability, one in which it competes with China, Russia and other intelligence powers.

“In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” a 2007 document said. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.”

The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of an American Civil War battle. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century.

Unlike some classified information that can be parceled out on a strict “need to know” basis, one document makes clear that with Bullrun, “there will be NO ‘need to know.’ ”

Only a small cadre of trusted contractors were allowed to join Bullrun. It does not appear that Mr. Snowden was among them, but he nonetheless managed to obtain dozens of classified documents referring to the program’s capabilities, methods and sources.

Ties to Internet Companies

When the N.S.A. was founded, encryption was an obscure technology used mainly by diplomats and military officers. Over the last 20 years, it has become ubiquitous. Even novices can tell that their exchanges are being automatically encrypted when a tiny padlock appears next to a Web address.

Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.

According to an intelligence budget document leaked by Mr. Snowden, the N.S.A. spends more than $250 million a year on its Sigint Enabling Project, which “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.” Sigint is the acronym for signals intelligence, the technical term for electronic eavesdropping.

By this year, the Sigint Enabling Project had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by exploiting security flaws, according to the documents. The agency also expected to gain full unencrypted access to an unnamed major Internet phone call and text service; to a Middle Eastern Internet service; and to the communications of three foreign governments.

In one case, after the government learned that a foreign intelligence target had ordered new computer hardware, the American manufacturer agreed to insert a back door into the product before it was shipped, someone familiar with the request told The Times.

The 2013 N.S.A. budget request highlights “partnerships with major telecommunications carriers to shape the global network to benefit other collection accesses” — that is, to allow more eavesdropping.

At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.

Microsoft asserted that it had merely complied with “lawful demands” of the government, and in some cases, the collaboration was clearly coerced. Some companies have been asked to hand the government the encryption keys to all customer communications, according to people familiar with the government’s requests.

N.S.A. documents show that the agency maintains an internal database of encryption keys for specific commercial products, called a Key Provisioning Service, which can automatically decode many messages. If the necessary key is not in the collection, a request goes to the separate Key Recovery Service, which tries to obtain it.

How keys are acquired is shrouded in secrecy, but independent cryptographers say many are probably collected by hacking into companies’ computer servers, where they are stored. To keep such methods secret, the N.S.A. shares decrypted messages with other agencies only if the keys could have been acquired through legal means. “Approval to release to non-Sigint agencies,” a GCHQ document says, “will depend on there being a proven non-Sigint method of acquiring keys.”

Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method.

Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members.

Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.”

“Eventually, N.S.A. became the sole editor,” the memo says.

Even agency programs ostensibly intended to guard American communications are sometimes used to weaken protections. The N.S.A.’s Commercial Solutions Center, for instance, invites the makers of encryption technologies to present their products to the agency with the goal of improving American cybersecurity. But a top-secret N.S.A. document suggests that the agency’s hacking division uses that same program to develop and “leverage sensitive, cooperative relationships with specific industry partners” to insert vulnerabilities into Internet security products.

By introducing such back doors, the N.S.A. has surreptitiously accomplished what it had failed to do in the open. Two decades ago, officials grew concerned about the spread of strong encryption software like Pretty Good Privacy, designed by a programmer named Phil Zimmermann. The Clinton administration fought back by proposing the Clipper Chip, which would have effectively neutered digital encryption by ensuring that the N.S.A. always had the key.

That proposal met a backlash from an unlikely coalition that included political opposites like Senator John Ashcroft, the Missouri Republican, and Senator John Kerry, the Massachusetts Democrat, as well as the televangelist Pat Robertson, Silicon Valley executives and the American Civil Liberties Union. All argued that the Clipper would kill not only the Fourth Amendment, but also America’s global technology edge.

By 1996, the White House backed down. But soon the N.S.A. began trying to anticipate and thwart encryption tools before they became mainstream.

Each novel encryption effort generated anxiety. When Mr. Zimmermann introduced the Zfone, an encrypted phone technology, N.S.A. analysts circulated the announcement in an e-mail titled “This can’t be good.”

But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government’s nuclear department and another’s Internet service by cracking the virtual private networks that protected them.

By 2010, the Edgehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300.

But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence.

A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.

But the agency was concerned that it could lose the advantage it had worked so long to gain, if the mere “fact of” decryption became widely known. “These capabilities are among the Sigint community’s most fragile, and the inadvertent disclosure of the simple ‘fact of’ could alert the adversary and result in immediate loss of the capability,” a GCHQ document warned.

Since Mr. Snowden’s disclosures ignited criticism of overreach and privacy infringements by the N.S.A., American technology companies have faced scrutiny from customers and the public over what some see as too cozy a relationship with the government. In response, some companies have begun to push back against what they describe as government bullying.

Google, Yahoo, Microsoft and Facebook have pressed for permission to reveal more about the government’s requests for cooperation. One e-mail encryption company, Lavabit, closed rather than comply with the agency’s demands for customer information; another, Silent Circle, ended its e-mail service rather than face such demands.

In effect, facing the N.S.A.’s relentless advance, the companies surrendered.

Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”

John Markoff contributed reporting.



Any opinions expressed here are those of the author and do not necessarily reflect those of The 5th Estate.


This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

Americans Remain 'Very Skeptical' About Another War

Americans must now take responsibility for their leaders' illegal wars and put a stop to them once and for all before the United States is completely destroyed    

PRESS TV
09/06/2013

An author and political analyst says that there is a great amount of skepticism among Americans toward military intervention, including the possibility of war with Syria. 


U.S. military now closer to mutiny than any other time in U.S. history
“There’s a great deal of evidence that the American people remain very skeptical about the idea of going forward with a military intervention,” said John Nichols, a columnist at The Nation in Madison, Wisconsin.

“That skepticism comes from many different directions. In some cases from folks who are simply weary with war,” Nichols said in a phone interview with Press TV.

A recent Washington Post-ABC News poll revealed major public opposition in the US to military strikes on Syria.

The poll showed that nearly six in 10 Americans are against launching missile strikes on Syria over accusations that the Syrian government used chemical weapons in the country. 


Tens of thousands of U.S. military personnel have been maimed and killed in the Bush/Cheney/Obama illegal wars, and twenty-two U.S. military veterans commit suicide every day

Nichols said that “the United States has fought many wars over the last decade, obviously most recently in Iraq and Afghanistan, but there’s also been military interventions in Libya and other places.”

“So there is discomfort among many people of the public with going forward with another war.”

Washington and some of its allies want to attack Syria over recent accusations that the Arab country used chemical weapons.

Syrian authorities have categorically rejected the allegation that the country had any role in the chemical attack.

AHT/DT 




Any opinions expressed here are those of the author and do not necessarily reflect those of The 5th Estate.


This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.


U.S. Drone Kills 6 In Pakistan, Fueling Anger

This while U.S. traitor Kerry laments in front of Congress and the world "the horror" of Syrian women and children being killed in a gas attack launched by Obama's CIA FSA murderers    

THE WASHINGTON TIMES
By Cheryl K. Chumley
09/06/2013

An American drone killed at least six people in Pakistan early Friday morning, in a northwestern region known as a hideout for Taliban and al Qaeda militants.


Pakistani children killed in Obama/CIA drone strike while yesterday Obama tells G20 "Over 400 Syrian children were gassed, over 400 children were killed..."
The strike occurred in the North Waziristan tribal area, near the border with Afghanistan. The identities of the killed aren’t yet known, The New York Times reported. Other media put the death toll at four.

The strikes came as the country celebrated Defense Day, an occasion to remember those who were killed in the 1965 war with India. And as news spread, social media outcry grew, The Times reported.

Opposition leader Imran Khan, who heads up the country’s Tehreek-e-Insaf political party and has long spoken out against American drone strikes, said in a Twitter post that he planned to discuss this latest attack with Prime Minister Nawaz Sharif at a planned Sept. 9 meeting of political heads.




U.S. Secretary of State John Kerry has assured that the drone strike program in Pakistan will end as soon as “we have eliminated most of the threat and continue to eliminate it,” he said, during an August television broadcast while visiting the nation.

But the strikes continue to anger Pakistan political leaders, and Mr. Khan has led several protests and rallies in recent months at villages in targeted areas.



Any opinions expressed here are those of the author and do not necessarily reflect those of The 5th Estate.


This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

 

Obama Just Challenged Pathology Of Power

Obama, White House criminals have now challenged the world to stop them, and as with the Nazis the international community will soon come to grips with the fact that they must be stopped at any cost in order to save humanity    

WORLD NEWS
By Dallas Darling
09/03/2013

Given the immensity and enormous power of the U.S. military with its advanced weaponry systems, the greatest threat to global security since the end of World War Two has not been nuclear weapons but the misuse and abuse of presidential military power. It was therefore a stunning surprise for civic constitutionalists when President Barack Obama announced he would seek Congress's approval before using military force against Syria. While opponents dismissed his reversal as indecisiveness, a lame duck presidency, even cowardice-"red lines" to a "yellow streak," did he just challenge a pathological disease in which presidents have unwisely and immorally used military power?
Madman Obama:  "We must kill more innocent Syrian women and children to save them"
The U.S.Constitution states that Congress has the sole power to declare war and to raise and support armies. Yet presidents have used the armed forces in more than 250 instances outside of the U.S.(1), the vast majority of them having occurred in the last one-hundred years and without legislative approval. This prerogative is a pathological addiction in which the uses of military power has become totally attached to, and embedded within, presidents. The mishandling of presidential war-making powers has also been connected to exponential increases in destructive and lethal weapons and their institutions. These abusive and dictatorial powers have endangered both domestic and global freedoms.

"The President shall be Commander in Chief" clause, however, was never meant for the president to use military force if he believed an attack was imminent. Nor did it provide using the military and weaponry to initiate a preemptive conflict without a declaration of war. And since the Commander in Chief's duty was to only defend the borders of the U.S., using coercive military force for the purpose of gaining foreign territories and resources, intervening on behalf of businesses and corporations, enforcing market economies, establishing blockades and no-fly zones, restoring order in other nations, toppling foreign regimes, even striking at terrorists, were never intended.
Obama criminals complete the destruction of the Constitution that Bush/Cheney started
A gradual militant, pathological sickness, or the inability to control and wisely use an ever spreading and cancerous-like militarism that was initially created for the purpose of defending against external threats, has usurped constitutional checks and balances. Since the military-industrial-academic complex has been allowed to have an unreasonably large role in deciding important matters for the U.S. (including political, economical, social, medical, cultural, educational, scientific and foreign policies), civilian control over both the presidency and military has been eliminated. Reason, dissent and theological resistance has been purged, and purity of language and ideas have become militarized.

Up until now, more recent presidents have succumbed to, and then internalized, this pathological disease known as total military power. Without congressional approval, they have preemptively sent armies and military forces around the world to fight short- and long-term conflicts, even major wars costing millions of lives and tens of billions of dollars. They have used their prerogative military powers to intimidate political opponents, Congress and the United Nations. To maintain their popularity, presidents have used misinformation and fear, imaginary threats and intelligence estimates, and authorized military operations that involved overwhelming force against weak opponents.
Retarded war criminal, mass murderer and his cyborg terminator terrorized all that dared question their subversion of the Constitution
The framers of the U.S. Constitution, though, never intended presidents to have privileged military powers. Having only experienced an agricultural-based society consisting of independent freeholders, they believed farmers' interests in retaining their title to land would make them unlikely to support fiscally or militarily unsustainable initiatives.(2) They never envisioned an industrial- and manufacturing- and service- and information-based society dependent on a highly trained and consumptive military, naval and air force. Forces that would someday not only threaten the sovereignty and environments of numerous nations, but the very basic freedoms and survival of the U.S.

Initially, President Obama and Secretary of StateJohn Kerry threatened to militarily attack the Syrian government for allegedly using chemical weapons against the Syrian people. Then they suggested a possible missile attack that would either punish the Syrian regime or destroy several of its military installations. Now, and on the heels of Britain's historic "no" vote in the parliament to not support another mishandling and misuse of military power, President Obama has declared that such an attack or strike against another nation should be debated in Congress and then legislated. He finally recognized that Americans were "weary" of war and the importance of congressional authorization.

Another debate that should occur is an updated amendment detailing articles of impeachment against presidents that abuse their Commander in Chief prerogatives. Is not unrestrained presidential military power, where thousands of citizens are sent to be killed in needless conflicts, treason, or a type of levying war against one's own people? Congress and the courts are also to blame, since they have abdicated their responsibility to preserve the constitutional role of Congress in war making. As for the citizenry (who also share in this pathology of power), new alternatives will have to be imagined while also critically engaging and dismantling the military-industrial-academic complex.

In announcing that the "country will be stronger if we take this course, and our actions will be more effective...if we have this debate," did President Obama just check his temperature and start to challenge the pathology of military power?

Dallas Darling is the author of Politics 501: An A-ZReading on Conscientious Political Thought and Action, Some NationsAbove God: 52 Weekly Reflections On Modern-Day Imperialism, Militarism, And Consumerism in the Context of John's Apocalyptic Vision, and The Other Side Of Christianity: Reflections on Faith, Politics, Spirituality, History, and Peace. He is a correspondent for www.worldnews.com. You can read more of Dallas' writings at www.beverlydarling.com and wn.com//dallasdarling.

(1) Chambers, John Whiteclay. AmericanMilitary History. Oxford, New York: Oxford Publisher, 1999., p. 168.

(2) Barry, John and E. GeneFrankland. International Encylopedia Of Environmental Politics. New York, New York: Routledge Publishers, 2002., p. 294.


Any opinions expressed here are those of the author and do not necessarily reflect those of The 5th Estate.



This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.




British Newspaper Editor Goes Before EU spying Inquiry

Right on time, and as promised; THIS is what the Obama criminals fear most, and only starting WWI in Syria will save them from it; G20 leaders show leadership, tell Obama to stick his attack on fabricated evidence   

EURONEWS
09/05/2-13

A British newspaper editor has called for more protection for whistle blowers, while giving evidence at a European Parliament inquiry into alleged US spying.


American hero Snowden is wht Obama criminals fear most, not bogus, fabricated Syrian chemical attacks
Alan Rusbridger heads up the Guardian, which led on coverage of leaks made by former American intelligence contractor Edward Snowden.

“The combination of the use of punitive laws against whistle blowers and inappropriate legislation to silence the work of journalists. I think people in Western governments ought to think about what kind of signal they are sending to the rest of the world by this kind of behaviour,” he said via a video link.

Earlier this year, British authorities held the partner of the Guardian journalist covering the leaks and reportedly threatened legal action against the newspaper.

“Journalists being harassed in a member state of the European Union. For reporting on a situation with an objective interest of the European public. Of the European ordinary citizens. I am appalled,” said Juan Fernando Lopez Aguilar, Chair of the European Parliament’s Civil Liberties, Justice and Home Affairs Committee.

Once its heard all of the evidence, the Brussels inquiry will decide on any recommendations for boosting protection in the future.  More about: , , ,



Any opinions expressed here are those of the author and do not necessarily reflect those of The 5th Estate.




This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

 

-------------------------------------------------------------------------------------------------------------------

ANDREW KREIG: EXPERTS REJECT FIRE AS CAUSE FOR 9/11 WTC COLLAPSES

The real truth on 9/11 slowly continues to bleed out

 photo
Technical experts are mounting major challenges to official U.S. government accounts of how three World Trade Center skyscrapers collapsed in near-freefall after the 9/11 attacks 15 years ago.

Many researchers are focusing especially on the little-known collapse of

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

The Geopolitics Of The United States, Part 1: The Inevitable Empire

The Empire and the inevitable fall of the Obama criminal regime

 photo
STRATFOR Editor’s Note: This installment on the United States, presented in two parts, is the 16th in a series of STRATFOR monographs on the geopolitics of countries influential in world affairs.

Like nearly all of the peoples of North and South America, most Americans are not originally from the territory that became the United States.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

Geopolitics Of The United States Part 2: American Identity And The Threats of Tomorrow

A look back at 2011 predictions for the future in order to put events of today into perspective

 photo capitalism_zpsah78uy5p.jpg
We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

UPDATED 01/07/2015 : New Analysis Challenges Tamiflu Efficacy; Hong Kong Corona Virus Outbreak

UPDATED 01/07/2015 : FOX NEWS CORPORATE PHARMA SHILL MEGAN KELLY AND FOX NEWS QUACK DOCTOR NOW PUSHING TAMIFLU FOR PREGNANT WOMEN AND CHILDREN;

 photo TAMIFLU_small_zpssojx6okt.jpg
THE 5TH ESTATE UNEQUIVOCALLY WARNS THE PUBLIC NOT TO TAKE OR GIVE THIS PROVEN DANGEROUS, INEFFECTIVE DRUG TO ANYONE

Obama criminals now resulting to biowarfare in quest to destroy Chinese and ASEAN economy; "novel virus substrain" points directly to a Kawaoka / Fouchier / Ernala-Ginting Kobe lab virus weaponized and genetically altered to specifically target and infect the Asian population: Ribavirin...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


 photo WHO02_zpsplmhtlpr.jpg
The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

On October 12, 2002 the Indonesian island of Bali experienced a terrorist attack that rocked the world. It was unquestionably well-coordinated and executed, the largest in the country's history.

READ MORE >>