Tag: ek Politics

The Rule of Law

U.S. appeals court says BP bound by Gulf spill accord

By Jonathan Stempel, Reuters

Tue Mar 4, 2014 2:20pm EST

By a 2-1 vote, the 5th U.S. Circuit Court of Appeals in New Orleans late Monday upheld a December 24 ruling by U.S. District Judge Carl Barbier in New Orleans, authorizing the payments on so-called business economic loss claims. It also said an injunction preventing payments should be lifted.



Barbier ruled that BP would have to live with its earlier interpretation of a December 2012 settlement with businesses and individuals harmed by the spill, in which certain businesses claiming losses were presumed to have suffered harm.



“The settlement agreement does not require a claimant to submit evidence that the claim arose as a result of the oil spill,” Circuit Judge Leslie Southwick wrote for the majority.

Terms of the settlement “are not as protective of BP’s present concerns as might have been achievable, but they are the protections that were accepted by the parties and approved by the district court,” the judge added.



Steve Herman and Jim Roy, who represent the business claimants, said in a joint statement: “Today’s ruling makes clear that BP can’t rewrite the deal it agreed to.”

Juneau, in a statement, said the decision “appears to clear the way” for the resumption of payments on business economic loss claims, and that he will resume making such payments upon a formal direction from the district court.

Alan Grayson’s Keystone XL Letter

(h/t Gaius Publius)

Forty-one years ago, when I used to get up at 5 a.m. to get on gas station lines with my parents, I started hearing about “energy independence” – a secure source of supply for our energy needs. Today, energy independence soon will be a reality.

For China. Thanks to the Keystone XL pipeline.

Q. Cui bono? (“Who benefits?”) A. China.

The Chinese economy consists of taking raw materials and energy, making that into stuff, and then selling that stuff – a/k/a “manufacturing.” Chinese leaders understand that in order for that model to work, China needs steady supplies of raw materials and energy. [But] how do you get a steady supply of energy, in a world where those supplies are dominated by a cartel, and are concentrated in a part of the world prone to war? In America, we’ve been trying to puzzle that out for four decades, without success.

Well, the Chinese have figured it out. They’re going to get their energy from Canada, a stable country, and pass it through the United States, another stable country. They will pay the Canadians the world price for oil. They will pay us nothing, or next to nothing. So Uncle Sam is Uncle Sucker.

And not for the first time. For the past decade, China has pursued an utterly unscrupulous and incredibly successful strategy in “trade” with the United States. China has been importing from the United States roughly $50 billion in goods each year, much of it food, raw materials and energy. China has been exporting to the United States roughly $350 billion in goods each year, mostly manufactured goods. And China has been buying roughly $300 billion in U.S. assets each year, mostly U.S. Treasuries. So we buy their stuff, putting their people to work. And they buy our assets, driving us deeper and deeper into debt. America loses – twice.

Now China has peeled off a tiny portion of that trade surplus, just $30 billion, and audaciously is trying to parlay that into permanent energy independence. China has put that money into Canadian tar sands.

Canadian tar sands are easily one of the dirtiest energy sources on Planet Earth. Does China care? No. As Deng Xiaoping used to say, “it doesn’t matter whether a cat is black or white, as long as it catches mice.” China’s leaders are so indifferent to environmental concerns that they have no problem with 8-year-olds in Beijing contracting lung cancer from pollution – but they get upset when the U.S. Embassy in Beijing puts an air quality monitor on the roof, and posts the readings on the internet. Canadian tar sands are a very, very black cat, but China’s leaders care only about catching mice.

Chinese leaders have seized key elements of the world industrial supply chain, like rare earths. According to our government, they engage in pervasive industrial espionage. They have threatened American companies like Apple, Google and Walmart. In short, they know how to play the game.

All of the oil that passes through the Trans-Alaska Pipeline has to be sold in the United States. Why not the same rule for the Keystone XL Pipeline? But instead, we allow a tax-free zone, to facilitate Chinese energy independence at the expense of our own. Why does Uncle Sam have to be Uncle Sucker?

There are plenty of reasons to be against the Keystone XL pipeline. Environmentalists recognize it as the ultimate “bonfire of the vanities” – planet-wide carbon bonfires. The pipeline passes through an active earthquake zone. One bad spill could permanently poison the Ogallala Aquifer, which provides drinking water to millions of people, and 30% of our irrigation.

Here is another reason, perhaps the best reason of all: It doesn’t do us any good. China, yes. The Koch Brothers (who own the refining capacity that would be used), yes. Us, no.

When are we finally going to have a government with the courage to ask that simple question: Does it do us any good? Cui bono?

Courage,

Rep. Alan Grayson

Kappa Beta Phi

Transcript

The Do Nothing DoJ

Credit Suisse helped wealthy Americans cheat the IRS, Senate report says

By Danielle Douglas, Washington Post

Published: February 25

Swiss banking giant Credit ­Suisse helped wealthy Americans hide billions of dollars from U.S. tax collectors for several years and federal prosecutors have done little to hold violators accountable, according to a U.S. Senate subcommittee report due out Wednesday.

The allegations were particularly stunning in the face of the budget cuts and deficits that the United States faces, lawmakers said. The report casts the Justice Department as a hapless enforcer that has dragged its feet in getting Credit Suisse to turn over the names of some 22,000 U.S. customers.

Lawmakers have accused the bank of helping wealthy Americans avoid paying taxes on as much as $12 billion in assets held at the institution. Prosecutors have been aware of the misconduct at Credit Suisse for at least four years, in which time they have indicted seven bankers and launched a probe of the institution, according to the report. But no one has stood trial, and the bank has not been held legally accountable, the report says.

The Most Potent Message

The Golden Rule: Why Bankers Are In Charge

by Ian Welsh

2014 February 26

The most potent message, and the strongest effect on behaviour, is when someone has the right to create money. Money, in our society, is created by borrowing. Banks and other financial institutions which have the right to lend thus have the right to create money. They have to have some form of collateral, even if that collateral is just an expectation of future earnings “great business idea, we’ll lend you money, and use your expected profits as our collateral.”

This money can be loaned out at multiples of the underlying asset. During the 2000s some brokerages were allowed multipliers (leverage) of over 40%. Even better, often whatever you buy with a leveraged loan can then be used as an asset for another round of leverage, leading to extremely high levels of effective leverage.

Some organizations also have access to very low interest rates: they can borrow at close to “prime” the rate the central bank offers to the very best credit risks. Major banks are amongst those who can borrow at this rate. They can then lend out to other people, again, at a higher interest rate, and with leverage.

If you, personally, could borrow money at 1% annual interest rate, and lend out ten times that, do you think you could make a profit? What is your mortgage rate? What is your credit card’s interest rate?



In theory profits are supposed to be self-limiting. If an industry makes more money than other industries, outsiders should see an opportunity, start up businesses, compete and drive down prices.

In the real world, that doesn’t happen as often as it does in theory, because you can’t just start up a bank with access to the Central Bank’s window. You can’t easily start up new pharmaceutical businesses, because it’s vastly expensive and there are huge regulatory hurdles. And when it does happen, why would you compete? Why not take the outsize profits? Why would you drive down profits? How does that benefit you?

The other check is supposed to be diminishing returns. The more money you have, the harder it is to find something to invest in: you run out of mortgages, or you run out of businesses to invest in which can make those returns. This does work, somewhat. It is at the heart of why the financial collapse happened: there weren’t enough assets for all the money chasing them, so widespread fraud occurred (liars loans, for example) and many people were given loans who couldn’t pay them back, while artificial assets were created which were not worth what they were sold for. Eventually this collapsed, but because the financial industry had already bought the political world, they were bailed out at a cost of trillions.



When you make millions in a few years: enough to live on for the rest of your life, in high style, it isn’t important if you’re driving the firm to bankruptcy. You don’t need the bank or the firm to be there, you’ve already made your mint.

Now, as a politician, if you do what the financial industry (or any other wealth industry) wants, they donate to your reelection campaign. They make sure your friends and family have jobs. They invite you to the best parties. And if you’re defeated, and have voted the right way, well, they’ll take care of you afterwards as well, with a cushy job. Bill Clinton, who deregulated Wall Street, is worth 100 million dollars.

Because bankers control a lot of money, they control what other people do.

Trust and Paranoia

So, just how much do you trust the NSA?  Do you even trust it’s “professionalism”?

Your Humble Blogger is the Probable Target of Penny-Ante Cyber Predation

by Yves Smith, Naked Capitalism

Posted on February 26, 2014

I was hacked yesterday.

On the scale of hacks, it was simultaneously trivial but meant to intimidate. Or else hugely inept.

I am on some politically-oriented listservs. They are all Google Groups, hence one has to have a Google account to post to them and receive messages from them. I also have one political correspondent who was very communicative a while back, and so I also filtered his messages into a separate folder. Generally I’m not a fan of filtering (I prefer to get everything in my main mail account) but these were two exceptions where it made sense to put them in a separate place. He uses Gmail. I set up both folders under my Gmail account.

Both those email boxes were gone yesterday. That does not mean the contents were gone, that means the folders were deleted and the messages were gone too (I use IMAP, not POP).

I am highly confident (to use the old Drexel formulation) that I didn’t delete them by accident. First, Macs give you all sorts of warnings for actions like that. Second, I only occasionally access those folders, and you have to highlight those accounts to do something stupid to them. Third, the removal of one could conceivably be an accident, but two? Particularly since these are the only two that are focused solely on political activity (by contrast, my main email box has so much spam, both genuine spam and news-related spamming, that the noise to content ratio is very high).



The more interesting question is therefore what this signifies. Deleting two folders both politically-related, is either very clumsy or intended to send a message. If the latter, even though I regularly harass banks, I doubt they’d be that interested. I don’t do much original reporting, as opposed to interpreting and sharpening public domain information. Banks are more concerned about what runs in the New York Times or the Washington Post or USA Today (or until recently, Rolling Stone). Blogs are ankle-biters at most and I doubt they see them as any threat. By contrast, I’ve been told our efforts have been helpful in at least for now stymieing the TransPacific Partnership, and we’ve also been consistent critics of Obamacare. My sense is the Democratic party feels vulnerable on the Obamacare front, with the Senate majority at risk in the midterm elections and the Republicans pounding on that topic (as confirmed by the frequency of the attacks in Democrat-favoring blogs on the MSM stories critical of Obamacare). So the odds favor this being someone who is not happy with our political writings of late. Note that the Project on Government Oversight, clearly a more influential group than NC, had a break-in that looked designed to intimidate rather than extract information. So this may be the fashion of the month in incursions.

Nevertheless, this sort of incursion is the cyber analogue of the sort of penny-ante predation the banks engage in routinely, like charging 3% for foreign exchange transactions. Yes, you can get a separate no-FX charge card, but if you are busy like me, and you actually do buy once in a while from foreign sites, it’s altogether too easy to forget to check to pay that weirdo card you hardly use and incur more in late fees than the 3% ripoff on your regular card. Or how about the $25 account charge if you balance drops below a certain level? I had that happen all of one day in one month last year and was royally pissed, and it was due to the order in which they credited charges versus deposits that day. Not worth fighting it.

Remember, if my aim was to end vulnerability, I can’t secure my communications by myself. I either have to encrypt (which requires two party cooperation) or at least get my most important correspondents on a more secure mail service. And I can’t participate in these very useful Google Groups. And if you’ve got a determined, well-connected intruder, we now know computers have backdoors at the Bios level. How does a mere mortal like me contend with that when even the hard-core techies seem flummoxed?

So just as we’ve all become resigned to having banks take more than they deserve, most of us are similarly resigned to routine snooping (the capture of data by vendors, use of cookies, etc). Those of us who are more visible on the Web face a correspondingly greater level of exposure. It’s just not possible to be secure and be on the Web, and I may accidentally be a little less at risk than most people in my shoes, not by virtue of great planning or even adequate defenses, but simply by not having migrated as much of my life to the computer or even a stupid phone as have the overwhelming majority of Americans.

Yes, we should be alarmed by documentation that shows spy agencies could be involved in dirty tricks

by digby, Hullabaloo

2/25/2014 01:30:00 PM

I notice that people are complaining about Glenn Greenwald’s latest piece about the spy agencies’ ratfucking operations because of its “tone” and I realize that it’s time to remind people of this little episode in case anyone’s gotten it into their heads that this is just some paranoid conspiracy theory.



If they could give us even one good reason beyond “because we can” and “maybe we might find it useful some day” perhaps people would be less alarmed. But when you have documented misuse of the data by private organizations, documented plans to use propaganda and dirty tricks to discredit dissenters along with not even one example of how these programs have been helpful, it’s just beyond my ken as to why people are still defending the government’s ongoing insistence that this is perfectly above board.



I truly believe that lies at the center of this issue. The national security apparatus and, in particular, the spy agencies, are like a cloistered cult at this point, completely oblivious to the real world implications of what they are doing or how it’s being perceived. They seem to be stunned that anyone would question them — a very bad characteristic for any institution with the kind of power they have. You don’t have to be an oracle to see how that can go sideways very easily. Indeed, all you have to do is look at that Chamber of Commerce gambit to see exactly how it can happen.

Completely True

Conspiracy Theories

CASS R. SUNSTEIN University of Chicago – Law School

ADRIAN VERMEULE  Harvard University – Harvard Law School

January 15, 2008

Of course some conspiracy theories, under our definition, have turned out to be true. The Watergate hotel room used by Democratic National Committee was, in fact,  bugged by Republican officials, operating at the behest of the White House. In the 1950s, the Central Intelligence Agency did, in fact, administer LSD and related drugs under Project MKULTRA, in an effort to investigate the possibility of “mind control.” Operation Northwoods, a rumored plan by the Department of Defense to simulate acts of terrorism and to blame them on Cuba, really was proposed by high-level officials (though the plan never went into effect).



For our purposes, the most useful way to understand the pervasiveness of conspiracy theories is to examine how people acquire information. For most of what they believe that they know, human beings lack personal or direct information; they must rely on what other people think. In some domains, people suffer from a “crippled epistemology,” in the sense that they know very few things, and what they know is wrong. Many extremists fall in this category; their extremism stems not from irrationality, but from the fact that they have little (r elevant) information, and their extremist views are supported by what little they know. Conspiracy theorizing often has the same feature. Those who believe that Israel was responsible for the attacks of 9/11, or that the Central Intelligence Agency killed President Kennedy, may well be responding quite rationally to the informational signals that they receive. Consider here the suggestive fact that terrorism is more likely to arise in nations that lack civil rights and civil liberties. An evident reason for the connection is that terrorism is an extreme form of political protest, and when peo ple lack the usual outlets for registering their protest, they might resort to violence. But consider another  possibility: When civil rights and civil liberties are restricted, little information is available, and what comes from government cannot be trusted. If the trustworthy information justifies conspiracy theories and extremism, and (therefore?) violence, then terrorism is more likely to arise.



Cognitive infiltration

Rather than taking the continued existence of the hard core as a constraint, and addressing itself solely to the third-party mass audience, government might undertake (legal) tactics for breaking up the tight cognitive clusters of extremist theories, arguments and rhetoric that are produced by the hard core and reinforce it in turn. One promising tactic is cognitive infiltration of extremist groups. By this we do not mean 1960s-style infiltration with a view to surveillance and collecting information, possibly for use in future prosecutions. Rather, we mean that government efforts might succeed in weakening or even breaking up the ideological and epistemological complexes that constitute these networks and groups.

How might this tactic work? Recall that extremist networks and groups, including the groups that purvey conspiracy theories, typically suffer from a kind of crippled epistemology. Hearing only conspiratorial accounts of government behavior, their members become ever more prone to believe and generate such accounts. Informational and reputational cascades, group polarization, and selection effects suggest that the generation of ever-more-extreme views within these groups can be dampened or reversed by the introduction of cognitive diversity. We suggest a role for government efforts, and agents, in introducing such diversity. Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action.

In one variant, government agents would openly proclaim, or at least make no effort to conceal, their institutional affiliations. A recent newspaper story recounts that Arabic-speaking Muslim officials from the State Department have participated in dialogues at radical Islamist chat rooms and websites in order to ventilate arguments not usually heard among the groups that cluster around those sites, with some success. In another variant, government officials would participate anonymously or even with false identities. Each approach has distinct costs and benefits; the second is riskier but  potentially brings higher returns. In the former case, where government officials  participate openly as such, hard-core members of the relevant networks, communities and conspiracy-minded organizations may entirely discount what the officials say, right from the beginning. The risk with tactics of anonymous participation, conversely, is that if the tactic becomes known, any true member of the relevant groups who raises doubts may be suspected of government connections. Despite these difficulties, the two forms of cognitive infiltration offer different risk-reward mixes and are both potentially useful instruments.

There is a similar tradeoff along another dimension: whether the infiltration should occur in the real world, through physical penetration of conspiracist groups by undercover agents, or instead should occur strictly in cyberspace. The latter is safer, but  potentially less productive. The former will sometimes be indispensable, where the groups that purvey conspiracy theories (and perhaps themselves formulate conspiracies) formulate their views through real-space informational networks rather than virtual networks. Infiltration of any kind poses well-known risks: perhaps agents will be asked to perform criminal acts to prove their bona fides, or (less plausibly) will themselves  become persuaded by the conspiratorial views they are supposed to be undermining;  perhaps agents will be unmasked and harmed by the infiltrated group. But the risks are generally greater for real-world infiltration, where the agent is exposed to more serious harms.

Indeed, for some sycophantic OLC conception of “It’s legal if the President does it” that was Nixon’s last refuge from the rule of law.  Even England rejected this concept of despotic rule 799 years ago.

Living In A Surveillance State: A Primer

The news today on Government spying has been unrelentingly grim.  Here’s last night’s piece from Jason Jones on living in a Surveillance State.

Destroying Reputations and Disrupting Activity

So earlier today we learned about a system of directed government Internet trolling designed to destroy the reputation of and disrupt the activities of any targeted organization or individual without any judicial process or oversight.

Here are some examples of how these techniques and programs were used against Julian Assange and Wikileaks.

The Real News Network

(Note: Michael Ratner is President Emeritus of the Center for Constitutional Rights (CCR) in New York and Chair of the European Center for Constitutional and Human Rights in Berlin. He is currently a legal adviser to Wikileaks and Julian Assange.)

Transcript

One was that Julian Assange was put on a list called “Manhunting”. [incompr.] say it again: “Manhunting”. And normally on that NSA list there’s people who the NSA, and perhaps and presumably the U.S. government as well, suspects are al-Qaeda terrorists or something like that. This list also had, interestingly enough, Palestinians on it. But it also had Julian Assange on it.

Now, the list is made up of people the U.S. wants to locate, prosecute, and/or kill. In the case of Julian Assange and WikiLeaks, what they wanted to do was get WikiLeaks and Julian Assange prosecuted everywhere they could in the world. Again, this is 2010. This is right after WikiLeaks introduces what are called the Afghan war logs that indicated that thousands and thousands of civilians were killed in Afghanistan. Those war logs come out. Then the NSA documents come out that put Julian Assange on the “Manhunting” list.

And what the substance of it is is it says that we have to make an effort to get Julian Assange prosecuted everywhere in the world. And at that point they pointed to four, maybe five countries–the United Kingdom, Germany, Australia, the U.S., Iceland. Those are the countries that are going to go after him in. And, obviously, there are other countries added as they go along. But this just demonstrates how the U.S. in one set of the documents say, we want to get this journalist if we can.



The second set has this odd name called ANTICRISIS GIRL. Who knows what that means. This interestingly is not an NSA program. This is a program from GCHQ, which is the British intelligence company that’s the corresponding intelligence agency in the U.K. And this is really a nasty piece of business. What the slides show [snip] GCHQ has a system of tapping into fiber optics [snip] from Snowden got before. But this one, they say, we have the ability any time anyone makes a search on their computer for WikiLeaks to find either the website of WikiLeaks or anything else about WikiLeaks, we can find out what computer is making that search, know the IP address from that–that’s the, you know, unique address on every computer–and ultimately find out whose computer that is. That’s everybody in the world who look for WikiLeaks.

Then what they say: we also have the capacity to go onto the WikiLeaks website, or to look at that website, and everybody who visits the WikiLeaks websites, search or not, according to WikiLeaks.org, you visit the website, we have an ability to track their IP addresses. So here you have not just the U.S. intelligence going after WikiLeaks, the NSA, but you have GCHQ as well, and, in this second case, going after anybody who has even an interest in WikiLeaks, even if it’s an interest against WikiLeaks, everybody who looks at WikiLeaks.



And the third program, the third program is what we can call the “malicious foreign actor”. I’ll say that again: “malicious foreign actor”. And there’s a document in here in which the NSA goes to their counsel in the NSA–people in the NSA go to the general counsel and say to the general counsel, we’d like your opinion. We want to classify WikiLeaks as a, quote, malicious foreign actor. It’s a term of art, but it’s interestingly a term of art that none of us who work in this area legally, who look around, you know, try and sue, stop the NSA, have ever heard that term about.

What it apparently means is that the NSA can do the broadest surveillance on that target. In this case, it would be WikiLeaks. They admitted in this document they already had Anonymous targeted like that, and now they were going to go after WikiLeaks like that. We don’t know whether it was approved or not. I suspect, considering what’s been going on with WikiLeaks and considering the documents that came out from WikiLeaks after these programs have been put into place, which include the Afghan war logs, as well as Cablegate, which is what really got the United States, apparently, very angry, that that program has been implemented and that WikiLeaks is more likely than not classified as a “malicious foreign actor”.

So you have those three programs used against, we believe, as an effort to destroy, utterly destroy a publisher and journalism, and destroy not just them but to track, really, and get at all of their supporters and everybody who–anybody who has any interest in WikiLeaks–a very, very nasty piece of business. And what’s important about it is not just to show how the U.S. government, in cahoots with the U.K. government, or together–what I call them is two wings of the same surveillance bird, two wings of the same surveillance bird. That’s these two countries.

Democracy Now

Transcript

Assange: We’ve heard a lot in the propaganda pushed on this issue by Clapper and others in the U.S. national security complex that, of course, this pervasive surveillance is justified by the need to stop U.S.-stop terrorist attacks being conducted on the United States and its allies. But we’ve seen example after example come out over the last few months showing the National Security Agency and its partners, GCHQ, engaged in economic espionage.

And here we have an example where the type of espionage being engaged in is spying on a publisher-WikiLeaks, the publishing organization, and a publisher-me, personally. And the other material that came out in relation to GCHQ was from 2012, and that shows that GCHQ was spying on our service and our readers, so not just the publisher as an organization, not just the publisher as a person, but also the readers of a publisher. And that’s clearly, I believe, not something that the United States population agrees with, let alone other people.



Ratner: Well, what I was really shocked by was the extent the U.S. and U.K. have gone through to try and get and destroy WikiLeaks and Julian Assange and their network of supporters. I mean, it’s astounding. And it’s been going on for years. And it also, as Julian pointed out, tells us why he is in the Ecuadorean embassy and why Ecuador has given him asylum. He has every reason to heavily fear what would happen to him in this country, in the United States, if he were to be ever taken here. So I think, for me, that’s a very, very critical point, justifies every reason why Ecuador gave him asylum.

And the document you’re addressing, Amy, what they call the manhunt timeline, which is extraordinary because it groups him among, you know, a whole bunch of people who the U.S. considers terrorists, it also, interestingly, groups them-groups them among Palestinians, which is pretty interesting in itself. But to have Julian on that list as a manhunt timeline, and it says prosecute him wherever you can get him, is pretty extraordinary. It doesn’t say you necessarily need a good reason to prosecute him; it just says, basically, prosecute him. And what it’s reminiscent, to me, is of the program that took place in this country in the ’60s and the ’70s, COINTELPRO, counterintelligence procedures, when the FBI said, “We have to basically destroy the black civil rights movement, the New Left and others, and prosecute them, get them however you can, get rid of them.” And so, the manhunt timeline, even its name is chilling. But that’s what it is. It’s an effort to try and get WikiLeaks and their personnel, wherever they are in the world.

And, of course, we’ve seen some of that. You’ve had people on this show. When people cross borders who are associates with WikiLeaks, they get stopped. They get surveilled all the time. We’ve seen-we’ve seen efforts to take-to basically destroy WikiLeaks by stealing their laptops on a trip that went from Sweden to Germany. We’ve seen efforts across the board, in country after country. Germany, they surveil conferences when WikiLeaks people speak there, everywhere. So, actually, this program is not just an abstraction. This program has been implemented. And the manhunt timeline, I think, is incredibly significant, considering that the manhunt is an effort to locate, find and destroy-in some cases, kill-kill people.

Government Trolling

Transcript

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By Glenn Greenwald, The Intercept

24 Feb 2014, 6:25 PM EST

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-“independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Load more