Category Archives: Surveillance

CIA’s Pakistan drone strikes carried out by regular US air force personnel

CIA’s Pakistan drone strikes carried out by regular US air force personnel

“Brandon Bryant, a former US Predator operator, told the film he decided to speak out after senior officials in the Obama administration gave a briefing last year in which they said they wanted to “transfer” control of the CIA’s secret drones programme to the military.

Bryant said this was disingenuous because it was widely known in military circles that the US air force was already involved.

‘There is a lie hidden within that truth. And the lie is that it’s always been the air force that has flown those missions. The CIA might be the customer but the air force has always flown it. A CIA label is just an excuse to not have to give up any information. That is all it has ever been.'”

 

Advertisements
Tagged , , , , , , , , , , , , , , , , , , , , , , , ,

Obama will never end the War on Terror

Obama will never end the War on Terror

“What began as one horrific attack 13 years ago and a simple, 60-word Authorization for the Use of Military Force three days later has morphed all but unnoticed into a war with no name or parameters—against an enemy that the government will no longer even officially identify, on battlefields that didn’t exist when the measure hurriedly passed Congress.

And as the Yemen strike suggests, the war hardly appears to be winding down. Nor do U.S. forces seem to be getting much better at avoiding “collateral damage.” The grave but very real danger is that this strangest of wars will never end, certainly not before the expiration of Obama’s second term. And his successors may be left with nearly the entire unresolved mess: an open-ended war authorization and inchoate rules for drone and special operations, the promised-but-never-carried-through closing of Guantánamo Bay, and a National Security Agency that’s still not sure whom or what it can spy on.”

 
Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

The NSA’s secret role in the U.S. assassination program

The NSA’s secret role in the U.S. assassination program

“In one tactic, the NSA ‘geolocates’ the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have ‘absolutely’ been killed as a result of the NSA’s increasing reliance on the surveillance tactic.”

Tagged , , , , , , , , , , , , , , , , , , , ,

Killer robot flight: Video of UK’s autonomous drone released

Killer robot flight: Video of UK’s autonomous drone released

“’It would take the robot to be programmed, but once it was set free, it would proceed to make the targeting and kill decisions unless our campaign to stop the killer robots is able to make certain that human beings have to be involved meaningfully in the kill decision,’ she added, calling for a definition of who would bear responsibility in the event of any robotic machines running amok by accident, or by an attack from hackers.”

Tagged , , , , , , , , , , ,

The NSA is Even Spying on Computers That Aren’t Online

Swampland

A computer doesn’t need to be online for the National Security Agency to take a peek.

The spy agency has managed to sneak surveillance software onto almost 100,000 computers worldwide, and is even able to use computers that aren’t connected to the Internet for spying and cyberattacks, the New York Times reports. The NSA relies on secret channels of radio waves that are transmitted from tiny circuits and USB cards implanted by NSA-friendly spies or manufacturers to snoop on offline computers.

The NSA targets include units of the Chinese army, Russian military networks, systems used by the Mexican police and drug cartels, European Union trade institutions, as well as U.S. partners like Saudi Arabia, India and Pakistan, the Times reports, in the latest details to emerge from former NSA contractor Edward Snowden’s leaks.

The spying agency said it does not use implantation software or its radio frequency technology inside…

View original post 32 more words

Tagged , , , , , , , , ,

Calif. Senate Urges Congress To Revisit Vote On NSA Surveillance

CBS Los Angeles

LOS ANGELES (CBSLA.com) — A new piece of legislation is seeking to protect Californians from the U.S. National Security Agency (NSA).

KNX 1070’s Margaret Carrero reports the California State Senate has voted overwhelmingly to approve Senate Bill 828. [cbs-audio url=”http://cbsla.files.wordpress.com/2014/01/ca-spying-bill-1-mca.mp3″ size=”” download=”” name=”State Senate Introduces Bill That Would Prevent Calif. From Aiding NSA ” artist=”Margaret Carrero”]

Passed in a bipartisan 31-1 vote on Monday, Senate Bill 828 bans state agencies, officials and corporations from giving any material support, participation or assistance to any federal agency to collect electronic or metadata — including emails and text messages — of any person unless a warrant is issued that specifically describes the person, place and thing to be searched or seized.

Sen. Ted Lieu, who joint-authored SB 828 with Sen. Joel Anderson (R-San Diego), said the legislation comes in response to recent revelations of the NSA’s “massive phone and internet records collection program on Americans.”

View original post 198 more words

Tagged , , , , , ,

I worked on the U.S. Drone Program–here’s what really happens

I worked on the U.S. Drone Program–here’s what really happens

“What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day with limited cloud and perfect light. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: ‘The feed is so pixelated, what if it’s a shovel, and not a weapon?’ I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if we killed the right people, if we endangered the wrong people, if we destroyed an innocent civilian’s life all because of a bad image or angle.”

Tagged , , , , , , , , , , , , , , , , , , ,

Dirty wars: Jeremy Scahill and Rick Rowley’s new film exposes hidden truths of covert U.S. warfare

Dirty wars: Jeremy Scahill and Rick Rowley’s new film exposes hidden truths of covert U.S. warfare

“If you look at the use of the state secrets privilege; if you look at the way the Obama administration has expanded the drone wars; has empowered special operations forces, including from JSOC, the Joint Special Operations Command, to operate in countries where the United States is not at war; if you look at the way in which the Obama administration has essentially boxed Congress out of any effective oversight role of the covert aspects of U.S. foreign policy, what we really have is a president who has normalized, for many, many liberals in the United States, the policies that they once opposed under the Bush administration. And, you know, this really has been a war presidency.”

Tagged , , , , , , , , , , , , , , , , , ,
%d bloggers like this: