Politics of (Dis)Integration? (ft. ex German Amb to NATO Joachim Bitterlich) – Video


Politics of (Dis)Integration? (ft. ex German Amb to NATO Joachim Bitterlich)
The reunification of Germany and the collapse of the Soviet Union ushered in a new paradigm in Europe, one which ultimately sowed the seeds of the current crisis in Ukraine. Why did Europe...

By: WorldsApaRT

See the article here:

Politics of (Dis)Integration? (ft. ex German Amb to NATO Joachim Bitterlich) - Video

Ambassador Hunter talks on NATO and the Ukraine and explains President Obama’s "Pivot to Asia" quote – Video


Ambassador Hunter talks on NATO and the Ukraine and explains President Obama #39;s "Pivot to Asia" quote
In this interview former U.S. Ambassador to NATO (1993-98) Robert E. Hunter, who is a Senior Fellow at the Center for Transatlantic Relations, Johns Hopkins University (SAIS) in Washington,...

By: usbotschaft

Read more:

Ambassador Hunter talks on NATO and the Ukraine and explains President Obama's "Pivot to Asia" quote - Video

‘NATO expansion to Georgia was a real mistake’ – ex German Amb to NATO – Video


#39;NATO expansion to Georgia was a real mistake #39; - ex German Amb to NATO
Watch the full episode here: http://youtu.be/gz3A1wet78M The reunification of Germany and the collapse of the Soviet Union ushered in a new paradigm in Europe, one which ultimately sowed the...

By: RT

Read the original:

'NATO expansion to Georgia was a real mistake' - ex German Amb to NATO - Video

NATO 'respects' results of Scotland's independence referendum

BRUSSELS, Sept. 19 (UPI) -- NATO commented Friday after the results of the Scottish referendum for independence were announced.

Secretary General Anders Fogh Rasmussen issued a statement, wishing the United Kingdom well as it moves forward and expressed confidence the founding NATO member would continue in its "leading role."

"I welcome Prime Minister Cameron's statement that the United Kingdom will go forward as a united country.

"The United Kingdom is a founding member of NATO, and I am confident that the United Kingdom will continue to play a leading role to keep our Alliance strong."

The referendum for independence was held Thursday, with 55 percent of reporting districts in favor of unity.

2014 United Press International, Inc. All Rights Reserved. Any reproduction, republication, redistribution and/or modification of any UPI content is expressly prohibited without UPI's prior written consent.

Read more:

NATO 'respects' results of Scotland's independence referendum

NATO to fast-track rapid-reaction force to deter Russia

SZCZECIN, Poland

NATO's new rapid-reaction "spearhead" force, meant as a deterrent to Russian aggression, should be up and running with initial capabilities in less than a year, a top alliance official said Thursday.

The creation of a 4,000 to 5,000 troop response force, which will be able to respond to a crisis in eastern Europe within two to three days, was a key decision taken by NATO leaders earlier this month in Wales.

The force represents a calculation by NATO that Russian President Vladimir Putin won't risk going head-to-head with the Western alliance.

Deputy Secretary General Alexander Vershbow, the highest-ranking U.S. civilian at NATO, told The Associated Press on the sidelines of a symposium in Poland that military planners were now "working seven days a week" to finalize details of the force.

Those details should be in place to be approved by at defense ministers meeting in February, and implementation will move quickly ahead after that, he said.

"There's an expectation we will have at least an initial capacity with this much more rapid response time in less than a year from the Wales summit," he said. "It won't be all finished, but we recognize that the threats are here, we can't put this on the slow track."

Meanwhile, NATO's Multinational Corps Northeast headquarters, where the symposium was being held, is being upgraded to a "high readiness" force headquarters under the guidance of Germany, Poland and Denmark as part of the moves being made to reassure allies.

Russia seized the Crimean Peninsula from Ukraine earlier this year, and signs indicate that it has been funneling troops, tanks and artillery to the pro-Moscow separatists who have been fighting government forces in eastern Ukraine over the past five months.

Ukraine is not a NATO member and not directly under its defense umbrella, but three other former Soviet republics have joined the alliance since the end of the Cold War, as well as the former Soviet satellite states of Poland, Hungary, the Czech Republic and Slovakia, Romania and Bulgaria.

Read more here:

NATO to fast-track rapid-reaction force to deter Russia

NATO to set up regional centers in east Europe Lithuania

The so-called 'command and control' centers will be launched in 'four or five countries, namely Lithuania, Latvia, Estonia, Poland and Romania'

VILNIUS, Lithuania NATO will set up regional centers in a handful of Eastern European countries, Lithuania said on Friday, September 19, as top military commanders met in the Baltic state's capital.

Defense chiefs from the alliance's 28 nations are taking part in a three-day meeting in Vilnius along with NATO top commander General Philip Breedlove amid anxiety in the region over Russia's actions in Ukraine.

The so-called "command and control" centers will be launched in "four or five countries, namely Lithuania, Latvia, Estonia, Poland and Romania," Lithuania's chief of defense Jonas Vytautas Zukas told reporters in Vilnius.

A meeting during the NATO 2014 summit at the Celtic Manor Hotel in Newport, South Wales, on September 4, 2014. In the photo is UK Prime Minister David Cameron (R). Saul Loeb/AFP

They will each employ up to 120 military personnel and will be responsible for a "multinational battalion" once other allies join the US troops already deployed in Eastern Europe, he said.

Troop contributions from NATO allies could be announced over the weekend, Zukas' spokesman told Agence France-Presse.

"This increases our security," Zukas said, adding that the Lithuanian center would be set up by the end of the year.

Poland and the Baltics have been rattled by Russia's actions in Ukraine, including its March annexation of the Crimean peninsula and suspected backing of rebels in the east.

The four EU and NATO members have repeatedly called for boots on the ground to ward off any potential threat from their Soviet-era master.

See the rest here:

NATO to set up regional centers in east Europe Lithuania

Audio Reveals How Islamofascist Terrorists Plot Attacks (NSA Internet Surveillance Program Useless) – Video


Audio Reveals How Islamofascist Terrorists Plot Attacks (NSA Internet Surveillance Program Useless)
There is shocking new audio from a convicted terrorist talking to a jihadi operative. CNN has obtained tapes showing the secret ways foreign fighters communicate with one another. They talk...

By: Wrath0fKhan

See the rest here:

Audio Reveals How Islamofascist Terrorists Plot Attacks (NSA Internet Surveillance Program Useless) - Video

Posted in NSA

NSA chief has regrets on ISIS intelligence collection

National Security Agency (NSA) Director Adm. Mike Rogers said Thursday that his agency's collection of intelligence on the Islamic State of Iraq and Syria (ISIS, also known as ISIL) could have been "stronger."

"If I'm honest with myself, I wish the transition of ISIL from an insurgency to an organization that was now focused on holding ground, territory, the mechanism of governance....in hindsight I wish we had been a little bit - I'll only speak for me and the NSA - I wish we'd been a little stronger about," he said.

Rogers, who is also the head of U.S. Cyber Command, spoke at an intelligence summit alongside Central Intelligence Agency Director John Brennan and Letitia Long, the director of the National Geospatial-Intelligence Agency.

ISIS' quick rise appeared to take the U.S. by surprise as it swept through northern Iraq, taking hold of vast amounts of territory and virtually erasing the border with Syria. Although U.S. airstrikes in Iraq helped to stem the group's expansion, the U.S. still struggles to collect enough intelligence on the group's activities.

Matt Olsen, who directs the National Counter Terrorism Center, told a House committee Wednesday that intelligence agencies have very little idea where foreign fighters go and what they do once they reach Syria, so they can't estimate how many have joined ISIS or other extremists.

Play Video

CBS News Homeland Security Correspondent Bob Orr and CBS News Senior National Security Analyst Juan Zarate discuss video released by an al Qaeda-...

Foreign fighters from the U.S. and Western Europe who have joined extremists in Syria are particularly alarming to U.S. officials because it is easy for them to re-enter their home countries without raising suspicion and carry out attacks.

Secretary of State John Kerry said Monday that stopping the flow of foreign fighters joining the ISIS will be far more important than airstrikes in the mission to stamp out the extremist group.

"The military piece is one piece. It's one component of this. It's a critical component, but it's only one component," Kerry said from Paris after meeting with representatives from 26 countries to discuss the effort.

See more here:

NSA chief has regrets on ISIS intelligence collection

Posted in NSA

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropoutin his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowdens revelations about the governments intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

John Brooks is now among them.

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadatathe to and from headers and IP addresses spy agencies use to identify and track communicationslong before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although hed made Ricochets code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Ricochet is idiot-proof and anonymous.

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalistss sources and others. Its not just these kind of people whose privacy is harmed by metadata, however; in 2012 it was telltale email metadata that helped unmask former CIA director and war commander General David Petraeus and unravel his affair with Paula Broadwall.

With metadata suddenly in the spotlight, Brooks decided earlier this year to dust off his Ricochet program and tweak it to make it more eleganthe knew hed still have a problem, however, getting anyone to adopt it. He wasnt a known name in the security world and there was no reason anyone should trust him or his program.

Enter Invisible.im, a group formed by Australian security journalist Patrick Gray. Last July, Gray announced that he was working with HD Moore, developer of the Metasploit Framework tool used by security researchers to pen-test systems, and with another respected security professional who goes by his hacker handle The Grugq, to craft a secure, open-source encrypted chat program cobbled together from parts of existing anonymity and messaging systemssuch as Prosody, Pidgin and Tor. They wanted a system that was highly secure, user friendly and metadata-free. Gray says his primary motivation was to protect the anonymity of sources who contact journalists.

At the moment, when sources contact a journalist, theyre going to leave a metadata trail, whether its a phone call record or instant message or email record [regardless of whether or not the content of their communication is encrypted], he says. And that data is currently accessible to authorities without a warrant.

When Brooks wrote to say hed already designed a chat program that eliminated metadata, Gray and his group took a look at the code and quickly dropped their plan to develop their own tool, in favor of working with Brooks to develop his.

More here:

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

Posted in NSA

Angry NSA Employee Denies NSA Collects Information on Americans (Video)

An NSA employee wearing name tag Neal Z. recently attended the the University of New Mexicos Engineering and Science Career Fair.

The NSA rep was trying to recruit college students to work at the controversial agency, which collects tons of metadata, emails, phone calls and various other information on American citizens.

University of New Mexico grad Andy Beale and student Sean Potter asked Neal Z. about the massive collection of information by the NSA, reports The Intercept.

Beale and Potter filmed the incident from two angles (videos below).

Amazingly, Neal Z. claimed, "NSA is not permitted to track or collect intelligence on U.S. persons.

However, after NSA leaker Edward Snowden revealed the mass surveillance of Americans by the NSA, the director of national intelligence, James Clapper, admitted to Sen. Ron Wyden (D-Ore.) in an April letter that the NSA does collect information on Americans, noted The Guardian.

In June, the NSA admitted it was spying on American phone calls, reported CNET, and even the phone habits of the U.S. Congress, according to The New American.

Later, Neal Z. admitted the NSA does collect data under the guidance of the (secret) FISA court, which is not open or accountable to the public.

After Beale and Potter politely debunked several of Neal Z's claims, Neal Z. angrily threatened to call authorities to silence the two Americans: You do not know what youre talking about. If you dont leave soon, Im going to call university security to get you out of my face.

Neal Z. tried to grab Potter's iPhone, but it was Potter and Beale who were removed from the fair by campus police for causing a disturbance.

Here is the original post:

Angry NSA Employee Denies NSA Collects Information on Americans (Video)

Posted in NSA

Top 5 Constitution-Related Searches at FindLaw.com

You probably already knew this, but we have a pretty good idea of what our users are searching for. Sure, it's a little creepy when Google knows your question before you even type it into the box. We don't get that personal, but we do pay attention to frequently searched terms in order to better understand -- and serve -- your needs.

Since today is Constitution Day, we thought we'd share the Top 5 FindLaw.com search terms related to the U.S. Constitution. You'll also find valuable resources for each topic listed below, but feel free to search for more:

1. "Gun Laws" (2nd Amendment) -- Regardless of your personal beliefs, we can all agree that an epidemic of gun-related tragedies has kept this issue on the front burner of our collective conscience. Although the right to bear arms is a federal guarantee, many state laws provide varying restrictions on gun ownership and use. You can learn more about these laws here:

2. "Miranda Rights" (5th Amendment and 6th Amendment) -- Nearly every crime show on TV will have an utterance of the words, "You have the right to remain silent..." Those are referred to as our Miranda rights, named for the U.S. Supreme Court case (Miranda v. Arizona) that requires police to inform arrestees of their constitutional rights. Check out these resources to learn more:

3. "Supreme Court Cases" -- The U.S. Supreme Court is where the constitutionality of laws is tested. Quite a few of our users simply typed "Supreme Court cases" into the search box, but there's a much easier way to find High Court opinions, news, and analysis of both recent and historical cases:

4. "Search and Seizure" (4th Amendment) -- Few constitutional provisions have been challenged and clarified as often as the Fourth Amendment, which protects citizens from unreasonable search and seizure by the police. Searches and seizures have a broad impact on criminal rights and procedures, such as the admissibility of evidence and the legality of arrests.

5. "Due Process" (5th Amendment and 14th Amendment) -- To honor "due process" is to follow the proper course of formal legal proceedings, carried out consistently, fairly, and in line with current laws and regulations. While the Fifth Amendment prohibits the arbitrary denial of life, liberty, or property by the federal government, the Fourteenth Amendment extends these protections to all U.S. citizens under all jurisdictions within the country.

It's hard to believe that a document signed exactly 227 years ago today is not only still valid, but continues to serve as the cornerstone of this great experiment we call the United States of America. FindLaw may not have been around as long as the U.S. Constitution, but we're always here to serve you.

Read the original:

Top 5 Constitution-Related Searches at FindLaw.com

Volokh Conspiracy: Apples dangerous game

Apple has announced that it has designed its new operating system, iOS8, to thwart lawful search warrants. Under Apples old operating system, if an iPhone is protected by a passcode that the government cant bypass, the government has to send the phone to Apple together with a search warrant. Apple will unlock at least some of the contents of the phone pursuant to the warrant. Under the new operating system, however, Apple has devised a way to defeat lawful search warrants. Unlike our competitors, Apples new privacy policy boasts, Apple cannot bypass your passcode and therefore cannot access this data. Warrants will go nowhere, as its not technically feasible for [Apple] to respond to government warrants for the extraction of this data from devices in their possession running iOS 8. Anyone with any iPhone can download the new warrant-thwarting operating system for free, and it comes automatically with the new iPhone 6.

I find Apples new design very troubling. In this post, Ill explain why Im troubled by Apples new approach coded into iOS8. Ill then turn to some important legal issues raised by Apples announcement, and conclude by thinking ahead to what Congress might do in response.

Lets begin with a really important point: In general, cryptography is an awesome thing. Cryptography protects our data from hackers, trespassers, and all sorts of wrongdoers. Thats hugely important. And under Apples old operating system, cryptography protects iPhones from rogue police officers, too. Thanks to the Supreme Courts recent decision in Riley v. California, the Fourth Amendment requires a warrant to search a cell phone. Apples old operating system effectively enforced the warrant requirement technologically by requiring the government to serve a warrant on Apple to decrypt the phone.

Up to that point, I think its all good. But the design of Apples new operating system does something really different.

If I understand how it works, the only time the new design matters is when the government has a search warrant, signed by a judge, based on a finding of probable cause. Under the old operating system, Apple could execute a lawful warrant and give law enforcement the data on the phone. Under the new operating system, that warrant is a nullity. Its just a nice piece of paper with a judges signature. Because Apple demands a warrant to decrypt a phone when it is capable of doing so, the only time Apples inability to do that makes a difference is when the government has a valid warrant. The policy switch doesnt stop hackers, trespassers, or rogue agents. It only stops lawful investigations with lawful warrants.

Apples design change one it is legally authorized to make, to be clear. Apple cant intentionally obstruct justice in a specific case, but it is generally up to Apple to design its operating system as it pleases. So its lawful on Apples part. But heres the question to consider: How is the public interest served by a policy that only thwarts lawful search warrants?

The civil libertarian tradition of American privacy law, enshrined in the Fourth Amendment, has been to see the warrant protection as the Gold Standard of privacy protections. The government cant invade our private spaces without a showing that the invasion is justified by the expectation that the search will recover evidence. And the government must go to a neutral magistrate and make that case before it conducts the search. When the government cant make the showing to a neutral judge, the thinking runs, the public interest in privacy outweighs the public interest in solving crime. But when the government does make that showing, on the other hand, the public interest in solving crime outweighs the privacy interest. Thats the basic balance of the Fourth Amendment, most recently found in the stirring civil libertarian language in Riley just a few months ago.

Apples new policy seems to thumb its nose at that great tradition. It stops the government from being able to access the phone precisely when it has a lawful warrant signed by a judge. Whats the public interest in that?

One counterargument I have heard is that there are other ways the government can access the data at least some of the time. With the warrant required under Riley, agents could take a stab at guessing the passcode. Perhaps the phones owner used one of the popular passwords; according to one study, the top 10 most often-used passcodes will unlock about 15% of phones. Alternatively, if the phones owner has backed up his files using iCloud, Apple will turn over whatever has been backed up pursuant to a lawful warrant.

These possibilities may somewhat limit the impact of Apples new policy. But I dont see how they answer the key question of whats the public interest in thwarting valid warrants. After all, these options also exist under the old operating system when Apple can comply with a warrant to unlock the phone. And while the alternatives may work in some cases, they wont work in other cases. And that brings us back to how its in the public interest to thwart search warrants in those cases when the alternatives wont work. Id be very interested in the answer to that question from defenders of Apples policy. And Id especially like to hear an answer from Apples General Counsel, Bruce Sewell.

View post:

Volokh Conspiracy: Apples dangerous game