Hacking, the Cheap Nuke Against France

The widespread global hacking goes unreported both by the victim and by the media. The depths of destruction are not only hard to measure but identifying the hack is just as difficult.

When hacking is visual for all the world to see, it becomes an epic event and more is expected. Hacking is dark, cheap, highly targeted and often leaves only traces that a full team of experts must investigate for months to find. Ask France.

ISIL carries out ‘unprecedented’ hack of French TV network

PARIS // French television network TV5Monde was forced to broadcast only pre-recorded programmes on Thursday after an “unprecedented” hack by self-proclaimed ISIL militants, who also hijacked its websites and social networks.

The Paris-based company, whose programmes are broadcast in more than 200 countries worldwide, was the target of a cyberattack that is “unprecedented for us and unprecedented in the history of television,” TV5Monde boss Yves Bigot said.

“Since 5:00am, we have only been able to put out a single programme on all our channels. For the moment, we are unable to produce our own programmes. We won’t be back up until 2pm,” Mr Bigot added.

“When you work in television… and you find out that your 11 channels are down, of course that’s one of the most dreadful things that can happen to you,” he said.

The hackers took control of the station and its social media operations late Wednesday, blacking out the TV channels and posting documents on its Facebook page purporting to be the identity cards and CVs of relatives of French soldiers involved in anti-ISIIL operations, along with threats against the troops.

“Soldiers of France, stay away from the Islamic State! You have the chance to save your families, take advantage of it,” read one message on TV5Monde’s Facebook page. “The CyberCaliphate continues its cyberjihad against the enemies of Islamic State,” the message added.

TV5Monde regained control of its social networks by 2:00am on Thursday but television broadcasts were likely to take hours, if not days, to return to normal. The attack would have required weeks of preparation, Mr Bigot added.

Its website was still offline at 11am and displaying an “under maintenance” message.

Prime minister Manuel Valls said the hack was an “unacceptable attack on the freedom of information and expression”, voicing “total solidarity with the editorial staff.”

Senior government members flocked to the station to show their support, with interior minister Bernard Cazeneuve saying: “We are up against determined terrorists … we are determined to fight them.”

Foreign minister Laurent Fabius said: “Everything is being done to find those who carried this out, punish them, re-establish the programmes and prevent cyberterrorists threatening freedom of expression in the future.”

The hackers had accused French president Francois Hollande of committing “an unforgivable mistake” by getting involved in “a war that serves no purpose”.

“That’s why the French received the gifts of Charlie Hebdo and Hyper Cacher in January,” it said on the broadcaster’s Facebook page, referring to attacks by gunmen in Paris on the satirical magazine and Jewish supermarket that left 17 people dead over three days.

France is part of a US-led military coalition carrying out air strikes against ISIL in Iraq and Syria, where the jihadist group has seized swathes of territory and declared a “caliphate”.

Close to 1,500 French nationals have left France to join the militants’ ranks in Iraq and Syria, where they represent almost half the number of European fighters present, according to a report released last Wednesday by the French Senate.

Extremists have become increasingly adept at using the internet to spread propaganda and attack media outlets.

In February, the Twitter feed of Newsweek was briefly hacked and threats were made against president Barack Obama’s family.

And in the immediate aftermath of the Charlie Hebdo attacks, hackers claiming to be Islamists hijacked hundreds of French websites, flooding them with militant propaganda.

“We are putting out an emergency programme so that we’re not left with a black screen. We don’t have emails. The whole IT system is down,” TV5Monde’s human resources director, Jean Corneil, said.

30 Guilty Verdicts, Bomber did not Shed a Tear

17 of the 30 charges carry the death penalty, and Jokar Tsarneav sat in the courtroom listening to each ‘guilty’ verdict being read for all charges. He showed no emotion. The jury was shown every piece of evidence, each video captured, including broken bodies.

Now that the trial is over, the sentencing phase begins as these are all Federal charges. Sentencing will commence next week.

A jihadi….

Legal council for Jokar is Ms. Judy Clarke, a 60-year-old lawyer based in San Diego, is defending Tsarnaev. A “master strategist” in death penalty cases, according to the New York Times, she has represented some of the most difficult clients in recent US history.

“She has stood up to the plate in the kinds of cases that bring the greatest disdain from the public,” as Gerald Goldstein, a Texas lawyer who knows her well, told the newspaper.

She represented Ted Kaczynski, known as the Unabomber, and al-Qaeda operative Zacarias Moussaoui. Another one of her clients, Jared Lee Loughner, shot and killed six people and wounded Congresswoman Gabrielle Giffords.

Profile: Who is Boston bomber Dzhokhar Tsarnaev?

Dzhokhar Tsarnaev has been found guilty of carrying out the 2013 Boston Marathon bombings, but what do we know about him?

A second-year medical student. An all-star wrestler. Recipient of a $2,500 (£1,635) scholarship for promising school children.

These are some of the superlatives that described the man behind the deadliest terror attack on US soil since 9/11.

Tsarnaev and his elder brother, Tamerlan, planted bombs close to the finish line of the Boston Marathon two years ago.

When the brothers’ bombs exploded on 15 April 2013, killing three and injuring over 260 people, friends of Tsarnaev expressed shock at the news and described him as a popular teenager.

The older brother was killed in shootout with police on 18 April. Tsarnaev fled the shootout and was captured a day later, after being found hiding a boat in the backyard of a house in Watertown – a suburb of Boston.

The brothers had been living in the Massachusetts town of Cambridge, home of the prestigious Harvard University. Tsarnaev attended the University of Massachusetts, and, according to his father, was studying medicine with aspirations of becoming a brain surgeon.

Ethnic Chechens, the family emigrated to the US in 2002.

Their route from the troubled Caucasus region of southern Russia to the US is not exactly clear.

They are thought to have lived in Kyrgyzstan, a Central Asian republic which is home to many Chechen refugees who were deported under Stalin. Tsarnaev is thought to have have been born there in 1994.

Chechnya is a predominantly Muslim area that has fought for full independence from Russian in the past.

The family was forced to flee to the neighbouring Russian republic of Dagestan after the Second Chechen War broke out in 1999.

Three years later, they made their way to the US. Tsarnaev became an American citizen in 2012.

Police vehicle
A large manhunt was launched in the days following the bombing

Shortly before the bombing, the brothers’ father, Anzor Tsarnaev, moved back to Dagestan following a divorce from his wife.

In the wake of the bombing, Anzor Tsarnaev told the BBC he believed the secret services had frame his sons.

Both had attended the Cambridge Rindge and Latin School.

Tsarnaev’s Facebook profile listed “Islam” as his world view and said his life goals as “career and money”. On the Russian social networking site VKontakte he was a member of various Chechen groups.

Rolling Stone
Rolling Stone’s decision to feature Mr Tsarnaev on its cover prompted an uproar

Shortly after the bombings, the brothers’ uncle, Ruslan Tsarni, said the brothers had “put shame on our family and on the entire Chechen ethnicity,” and noted that he had not seen his nephews since December 2005.

There had never been any apparent sign of “hatred toward the US” or else he would have turned them over to the police himself, he said.

He went on to describe the brothers as “being losers,” when asked what might have provoked the bombings.

“These are the only reasons I can imagine of. Anything else, anything else to do with religion, with Islam, it’s a fraud, it’s a fake,” he said.

DC was Hacked by Russians?

So today there was a widespread power outage in Washington DC. The State Department, the Air and Space Museum, the Capitol building and even train stations were offline. Immediately officials came out early and said it was not terrorism.

Well that could depend on the definition of terrorism and who was behind it. Somehow the story turned to an explosion at a power station in Maryland. Humm, sounds like a hack of a portioned power grid, or does it? Even the White House is pointing to the Russians. Any other president would consider this an act of war.

How the U.S. thinks Russians hacked the White House

Washington (CNN)Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.

While the White House has said the breach only ever affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say.

The White House in October said it noticed suspicious activity in the unclassified network that serves the executive office of the president. The system has been shut down periodically to allow for security upgrades.

The FBI, Secret Service and U.S. intelligence agencies are all involved in investigating the breach, which they consider among the most sophisticated attacks ever launched against U.S. government systems. ​The intrusion was routed through computers around the world, as hackers often do to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government. A spokesman for the National Security Council declined to comment. Neither the U.S. State Department or the Russian immediately embassy responded to a request for comment.

To get to the White House, the hackers first broke into the State Department, investigators believe.

The State Department computer system has been bedeviled by signs that despite efforts to lock them out, the Russian hackers have been able to reenter the system. One official says the Russian hackers have “owned” the State Department system for months and it is not clear the hackers have been fully eradicated from the system.

As in many hacks, investigators believe the White House intrusion began with a phishing email that was launched using a State Department email account that the hackers had taken over, according to the U.S. officials.

Director of National Intelligence James Clapper, in a speech at an FBI cyberconference in January, warned government officials and private businesses to teach employees what “spear phishing” looks like.

“So many times, the Chinese and others get access to our systems just by pretending to be someone else and then asking for access, and someone gives it to them,” Clapper said.

Related: What is spear fishing?

The ferocity of the Russian intrusions in recent months caught U.S. officials by surprise, leading to a reassessment of the cybersecurity threat as the U.S. and Russia increasingly confront each other over issues ranging from the Russian aggression in Ukraine to the U.S. military operations in Syria.

The attacks on the State and White House systems is one reason why Clapper told a Senate hearing in February that the “Russian cyberthreat is more severe than we have previously assessed.”

The revelations about the State Department hacks also come amid controversy over former Secretary of State Hillary Clinton’s use of a private email server to conduct government business during her time in office. Critics say her private server likely was even less safe than the State system. The Russian breach is believed to have come after Clinton departed State.

But hackers have long made Clinton and her associates targets.

The website The Smoking Gun first reported in 2013 that a hacker known as Guccifer had broken into the AOL email of Sidney Blumenthal, a friend and advisor to the Clintons, and published emails Blumenthal sent to Hillary Clinton’s private account. The emails included sensitive memos on foreign policy issues and were the first public revelation of the existence of Hillary Clinton’s private email address​ now at the center of controversy: [email protected]. The address is no longer in use. ​

Tracking Phone Calls Long Before the Patriot Act

U.S. secretly tracked billions of phone calls for decades

Starting in 1992, the Justice Department amassed logs of virtually all telephone calls from the USA to as many as 116 countries, a model for anti-terror surveillance after Sept. 11, 2001.

WASHINGTON — The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.

For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.

Federal investigators used the call records to track drug cartels’ distribution networks in the USA, allowing agents to detect previously unknown trafficking rings and money handlers. They also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in a wide range of other investigations.

The Justice Department revealed in January that the DEA had collected data about calls to “designated foreign countries.” But the history and vast scale of that operation have not been disclosed until now.

The now-discontinued operation, carried out by the DEA’s intelligence arm, was the government’s first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans’ privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.

More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified.

The DEA program did not intercept the content of Americans’ calls, but the records — which numbers were dialed and when — allowed agents to map suspects’ communications and link them to troves of other police and intelligence data. At first, the drug agency did so with help from military computers and intelligence analysts.

That data collection was “one of the most important and effective Federal drug law enforcement initiatives,” the Justice Department said in a 1998 letter to Sprint asking the telecom giant to turn over its call records. The previously undisclosed letter was signed by the head of the department’s Narcotics and Dangerous Drugs Section, Mary Lee Warren, who wrote that the operation had “been approved at the highest levels of Federal law enforcement authority,” including then-Attorney General Janet Reno and her deputy, Eric Holder.

The data collection began in 1992 during the administration of President George H.W. Bush, nine years before his son, President George W. Bush, authorized the NSA to gather its own logs of Americans’ phone calls in 2001. It was approved by top Justice Department officials in four presidential administrations and detailed in occasional briefings to members of Congress but otherwise had little independent oversight, according to officials involved with running it.

The DEA used its data collection extensively and in ways that the NSA is now prohibited from doing. Agents gathered the records without court approval, searched them more often in a day than the spy agency does in a year and automatically linked the numbers the agency gathered to large electronic collections of investigative reports, domestic call records accumulated by its agents and intelligence data from overseas, it even use 800 numbers for business too!

The result was “a treasure trove of very important information on trafficking,” former DEA administrator Thomas Constantine said in an interview.

The extent of that surveillance alarmed privacy advocates, who questioned its legality. “This was aimed squarely at Americans,” said Mark Rumold, an attorney with the Electronic Frontier Foundation. “That’s very significant from a constitutional perspective.”

Holder halted the data collection in September 2013 amid the fallout from Snowden’s revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day.

Tuesday, Justice Department spokesman Patrick Rodenbush said the DEA “is no longer collecting bulk telephony metadata from U.S. service providers.” A DEA spokesman declined to comment.

HARVESTING DATA TO BATTLE CARTELS

The DEA began assembling a data-gathering program in the 1980s as the government searched for new ways to battle Colombian drug cartels. Neither informants nor undercover agents had been enough to crack the cartels’ infrastructure. So the agency’s intelligence arm turned its attention to the groups’ communication networks.

Calling records – often called “toll records” – offered one way to do that. Toll records are comparable to what appears on a phone bill – the numbers a person dialed, the date and time of the call, its duration and how it was paid for. By then, DEA agents had decades of experience gathering toll records of people they suspected were linked to drug trafficking, albeit one person at a time. In the late 1980s and early 1990s, officials said the agency had little way to make sense of the data their agents accumulated and almost no ability to use them to ferret out new cartel connections. Some agents used legal pads.

“We were drowning in toll records,” a former intelligence official said.

The DEA asked the Pentagon for help. The military responded with a pair of supercomputers and intelligence analysts who had experience tracking the communication patterns of Soviet military units. “What they discovered was that the incident of a communication was perhaps as important as the content of a communication,” a former Justice Department official said.

The military installed the supercomputers on the fifth floor of the DEA’s headquarters, across from a shopping mall in Arlington, Va.

The system they built ultimately allowed the drug agency to stitch together huge collections of data to map trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.

The result “produced major international investigations that allowed us to take some big people,” Constantine said, though he said he could not identify particular cases.

In 1989, President George H.W. Bush proposed in his first prime-time address using “sophisticated intelligence-gathering and Defense Department technology” to disrupt drug trafficking. Three years later, when violent crime rates were at record highs, the drug agency intensified its intelligence push, launching a “kingpin strategy” to attack drug cartels by going after their finances, leadership and communication.

THE START OF BULK COLLECTION

In 1992, in the last months of Bush’s administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence operation.

Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where the government determined drug traffickers operated, current and former officials said.

Barr and Mueller declined to comment, as did Barr’s deputy, George Terwilliger III, though Terwilliger said, “It has been apparent for a long time in both the law enforcement and intelligence worlds that there is a tremendous value and need to collect certain metadata to support legitimate investigations.”

The data collection was known within the agency as USTO (a play on the fact that it tracked calls from the U.S. to other countries).

The DEA obtained those records using administrative subpoenas that allow the agency to collect records “relevant or material to” federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge’s approval. “We knew we were stretching the definition,” a former official involved in the process said.

Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice Department urging them to comply.

After Sprint executives expressed reservations in 1998, for example, Warren, the head of the department’s drug section, responded with a letter telling the company that “the initiative has been determined to be legally appropriate” and that turning over the call data was “appropriate and required by law.” The letter said the data would be used by authorities “to focus scarce investigative resources by means of sophisticated pattern and link analysis.”

The letter did not name other telecom firms providing records to the DEA but did tell executives that “the arrangement with Sprint being sought by the DEA is by no means unique to Sprint” and that “major service providers have been eager to support and assist law enforcement within appropriate bounds.” Former officials said the operation included records from AT&T and other telecom companies.

A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that “we do comply with all state and federal laws regarding law enforcement subpoenas.”

Agents said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11, 2001. The DEA’s public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran.

At first, officials said the DEA gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging “a massive number of calls,” said a former intelligence official who supervised the program.

Former officials said they could not recall the complete list of countries included in USTO, and the coverage changed over time. The Justice Department and DEA added countries to the list if officials could establish that they were home to outfits that produced or trafficked drugs or were involved in money laundering or other drug-related crimes.

The Justice Department warned when it disclosed the program in January that the list of countries should remain secret “to protect against any disruption to prospective law enforcement cooperation.”

At its peak, the operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government recognizes a total of 195 countries.

At one time or another, officials said, the data collection covered most of the countries in Central and South America and the Caribbean, as well as others in western Africa, Europe and Asia. It included Afghanistan, Pakistan, Iran, Italy, Mexico and Canada.

The DEA often — though not always — notified foreign governments it was collecting call records, in part to make sure its agents would not be expelled if the program was discovered. In some cases, the DEA provided some of that information to foreign law enforcement agencies to help them build their own investigations, officials said.

The DEA did not have a real-time connection to phone companies’ data; instead, the companies regularly provided copies of their call logs, first on computer disks and later over a private network. Agents who used the system said the numbers they saw were seldom more than a few days old.

The database did not include callers’ names or other identifying data. Officials said agents often were able to identify individuals associated with telephone numbers flagged by the analysis, either by cross-referencing them against other databases or by sending follow-up requests to the phone companies.

To keep the program secret, the DEA sought not to use the information as evidence in criminal prosecutions or in its justification for warrants or other searches. Instead, its Special Operations Division passed the data to field agents as tips to help them find new targets or focus existing investigations, a process approved by Justice Department lawyers. Many of those tips were classified because the DEA phone searches drew on other intelligence data.

That practice sparked a furor when the Reuters news agency reported in 2013 that the DEA trained agents to conceal the sources of those tips from judges and defense lawyers. Reuters said the tips were based on wiretaps, foreign intelligence and a DEA database of telephone calls gathered through routine subpoenas and search warrants.

As a result, “the government short-circuited any debate about the legality and wisdom of putting the call records of millions of innocent people in the hands of the DEA,” American Civil Liberties Union lawyer Patrick Toomey said.

A BLUEPRINT FOR BROADER SURVEILLANCE

The NSA began collecting its own data on Americans’ phone calls within months of Sept. 11, 2001, as a way to identify potential terrorists within the USA. At first, it did so without court approval. In 2006, after The New York Times and USA TODAY began reporting on the surveillance program, President George W. Bush’s administration brought it under the Foreign Intelligence Surveillance Act, which allows the government to use secret court orders to get access to records relevant to national security investigations. Unlike the DEA, the NSA also gathered logs of calls within the USA.

The similarities between the NSA program and the DEA operation established a decade earlier are striking – too much so to have been a coincidence, people familiar with the programs said. Former NSA general counsel Stewart Baker said, “It’s very hard to see (the DEA operation) as anything other than the precursor” to the NSA’s terrorist surveillance.

Both operations relied on an expansive interpretation of the word “relevant,” for example — one that allowed the government to collect vast amounts of information on the premise that some tiny fraction of it would be useful to investigators. Both used similar internal safeguards, requiring analysts to certify that they had “reasonable articulable suspicion” – a comparatively low legal threshold – that a phone number was linked to a drug or intelligence case before they could query the records.

“The foundation of the NSA program was a mirror image of what we were doing,” said a former Justice Department official who helped oversee the surveillance. That official said he and others briefed NSA lawyers several times on the particulars of their surveillance program. Two former DEA officials also said the NSA had been briefed on the operation. The NSA declined to comment.

There were also significant differences.

For one thing, DEA analysts queried their data collection far more often. The NSA said analysts searched its telephone database only about 300 times in 2012; DEA analysts routinely performed that many searches in a day, former officials said. Beyond that, NSA analysts must have approval from a judge on the Foreign Intelligence Surveillance Court each time they want to search their own collection of phone metadata, and they do not automatically cross-reference it with other intelligence files.

Sen. Patrick Leahy, D-Vt., then the chairman of the Senate Judiciary Committee, complained last year to Holder that the DEA had been gathering phone data “in bulk” without judicial oversight. Officials said the DEA’s database was disclosed to judges only occasionally, in classified hearings.

For two decades, it was never reviewed by the Justice Department’s own inspector general, which told Congress it is now looking into the DEA’s bulk data collections.

A SMALLER SCALE COLLECTION

Holder pulled the plug on the phone data collection in September 2013.

That summer, Snowden leaked a remarkable series of classified documents detailing some of the government’s most prized surveillance secrets, including the NSA’s logging of domestic phone calls and Internet traffic. Reuters and The New York Times raised questions about the drug agency’s own access to phone records.

Officials said the Justice Department told the DEA that it had determined it could not continue both surveillance programs, particularly because part of its justification for sweeping NSA surveillance was that it served national security interests, not ordinary policing. Eight months after USTO was halted, for example, department lawyers defended the spy agency’s phone dragnet in court partly on the grounds that it “serves special governmental needs above and beyond normal law enforcement.”

Three months after USTO was shut down, a review panel commissioned by President Obama urged Congress to bar the NSA from gathering telephone data on Americans in bulk. Not long after that, Obama instructed the NSA to get permission from the surveillance court before querying its phone data collection, a step the drug agency never was required to take.

The DEA stopped searching USTO in September 2013. Not long after that, it purged the database.

“It was made abundantly clear that they couldn’t defend both programs,” a former Justice Department official said. Others said Holder’s message was more direct. “He said he didn’t think we should have that information,” a former DEA official said.

By then, agents said USTO was suffering from diminishing returns. More criminals — especially the sophisticated cartel operatives the agency targeted — were communicating on Internet messaging systems that are harder for law enforcement to track.

Still, the shutdown took a toll, officials said. “It has had a major impact on investigations,” one former DEA official said.

The DEA asked the Justice Department to restart the surveillance program in December 2013. It withdrew that request when agents came up with a new solution. Every day, the agency assembles a list of the telephone numbers its agents suspect may be tied to drug trafficking. Each day, it sends electronic subpoenas — sometimes listing more than a thousand numbers — to telephone companies seeking logs of international telephone calls linked to those numbers, two official familiar with the program said.

The data collection that results is more targeted but slower and more expensive. Agents said it takes a day or more to pull together communication profiles that used to take minutes.

The White House proposed a similar approach for the NSA’s telephone surveillance program, which is set to expire June 1. That approach would halt the NSA’s bulk data collection but would give the spy agency the power to force companies to turn over records linked to particular telephone numbers, subject to a court order.

The UK Just Went Stupid with MEND

To read the Manifesto, click here. Of particular note is page 25, spelling out how the UK is and has been in debt to Qatar, which has bought and paid for epic influence in England’s politics.

Zahir Mahmood is another Islamist preacher on the circuit of MEND, the Islamist political agitation group.  Like Yasir Qadhi and Abu Eesa Niamatullah, Mahmood is an excellent match for MEND.

Consider Mahmood’s enthusiastic backing for Hamas. He was a leader of Viva Palestina, George Galloway’s Hamas support operation. Here he is, very excited, at a Viva Palestina rally.

And the other thing is that we cannot allow the perverted narrative to remain the norm. Hamas are not terrorists. They’re freedom fighters, they’re defending their country.

Alhamdulillah, Ismail Haniyeh [the Hamas leader in Gaza], the prime minister of Palestine, has given all those who went on the convoy Palestinian passports. We are Palestinian nationals! [the audience applauds].

Muslim group with links to extremists boasts of influencing election

A group suspected of being a front for Islamic extremists claims it can control as many as 30 seats in the general election and boasts of acting a “kingmaker”

A front group for Muslim extremists which wants to let British Muslims fight in Syria has boasted that it is “negotiating with the Tory and Labour leadership” to secure some of its demands.

Muslim Engagement and Development (Mend) has built links with both parties – and been chosen as an “official partner” by the Electoral Commission for May’s poll – after claiming to promote “democratic engagement” by Muslims. However, it is actually a facade to win political access and influence for individuals holding extreme, bigoted and anti-democratic views.

Labour’s shadow equalities minister and vice-chair of its national policy forum, Kate Green, spoke at a Mend event last Friday addressed by a man, Abu Eesa Niamatullah, who has called British people “animals,” demanded that women should not work, attacked democracy and said that “the Creator is the one who should decide what the laws should be.”

Baroness Warsi, the former Tory chairman, also spoke at the event.

In new recordings heard by this newspaper, Sufyan Ismail, Mend’s chief executive, describes the group’s strategy to act as “kingmaker” in next month’s election and claims it can control as many as 30 seats.

One Tory candidate in a winnable seat was repeatedly approached by a well-known Muslim figure offering large sums of money for his campaign if he signed up to Mend’s “Muslim manifesto.” The manifesto was launched last month at an event in Parliament attended by at least ten Labour and Conservative MPs, though there is no evidence any of them were paid by Mend. Lynton Crosby, the Conservative campaign director, has attended Mend events.

Mend’s director of engagement, Azad Ali, is an extremist who has supported the killing of British troops, praised the al-Qaeda ideologue Anwar al-Awlaki and said that “democracy, if it means at the expense of not implementing the Sharia, of course no-one agrees with that.”

Mend is holding a series of events this weekend with other extremist, anti-democratic speakers and has close links to the pro-terrorist lobby group Cage.

In a talk seen by the Telegraph at the Zakariyya Central Mosque in Bolton, Mr Ismail said a strong performance by the group’s chosen candidates could make it easier for British citizens to fight in Syria.

“David Cameron recently said that British Jews fighting for the IDF [Israeli army] will not be prosecuted,” Mr Ismail said.

“But British Muslims going to Syria fighting against Assad… will definitely face interrogation. Now do you think that if we landed those 20 seats or 30 seats, he [Cameron] would have the audacity to say that to the Muslim community? Not a chance!”

Mr Ismail also claimed that British society “hates us” and that British law specifically allowed violence against Muslims while protecting other groups.

“It’s not a crime to use violent or threatening words or behaviour [against Muslims],” he said.

“It’s perfectly OK under UK law to hate Islam and Muslims, it’s not a problem…if you’re Muslim, [the law says] you can take liberties big time, that’s why women are getting their hijabs ripped off.”

In fact, there were 550 prosecutions for religiously-aggravated hate crime – most of it anti-Muslim – last year and hundreds more for anti-Muslim crimes under the standard laws against assault and vandalism.

Mr Ismail claimed that a 2013 arson attack which destroyed a Muslim community centre in Muswell Hill had been condoned by the rest of society, saying: “Did you hear one politician condemn it? Even one politician? When was the last time you saw a church burnt to the ground – I bet you can’t think of one.”

The attack was widely condemned by politicians of all parties, including the London mayor, Boris Johnson, who described it as “cowardly” and “pathetic,” the Northern Ireland secretary and local MP, Theresa Villiers, who called it “despicable” and “an attack on all of us” and the shadow home secretary, Yvette Cooper, who said it was a “hate crime.”

At least a dozen churches or church buildings have been burnt to the ground in arson attacks in recent years, and many others seriously damaged.

Mr Ismail also claimed that there were “500 physical attacks” on Muslims, “mainly women,” in London in 2013.

This was the total number of alleged Islamophobic crimes reported to police that year, the vast majority of which were not physical attacks on people.

He cited cases up to eight years old as showing that there was a wave of serious violence happening against Muslims “now” and stated that anti-Muslim hate crime had risen by “more than just about any other hate crime you can imagine.”

In fact, it has risen by less than many other forms of hate crime, including anti-Semitic and homophobic crime, both of which are also far greater per head of population.

The demand to legalise Syria fighters does not appear in Mend’s “Muslim manifesto.”

But the manifesto does demand that Whitehall builds links, cut under the coalition government, with non-violent Islamists.

It also says that “insulting” Islam should be made a criminal offence.

Mend strongly supports Cage and has held joint meetings with it, including in Manchester on November 28 last year. In another talk, at a mosque in Cheadle, Cheshire, Mr Ismail said Cage and another group linked to Syrian jihadis, IERA, “do a really good job.”

As well as Mr Niamatullah, the group also promotes Haitham al-Haddad, a hate preacher who describes democracy as “filthy” and says that “all the kuffar [an insulting term for non-Muslims] will go to hellfire.”

Haddad adds, however, that Muslims are “allowed to vote for a kafir [infidel] system in order to avoid a bigger kafir system taking power.”

Mr Ismail, a tax avoidance millionaire worth a reported £65 million, told the Bolton meeting how the group had organised to “batter the Israeli lobby” in the Commons.

Referring to the election, he said: “Right now, we are negotiating with the Labour leadership, we are negotiating with the Tory leadership and insh’allah [God willing] will start with the Lib Dem leadership as well, where we have a list of manifesto pledges.

“The Muslim vote is worth ten ordinary votes because… we are heavily concentrated in a few areas,” he said.

“Anybody who can give any one party 10, 20, 30 seats, like we can, they have to listen to you.”

Tory sources said Mr Crosby wanted nothing further to do with Mend and did not know why the group was approved to hold a fringe meeting.

However, the party did not respond to questions about Mend’s claim to be in “negotiations” with its leadership.

A Labour spokesman denied any negotiation, saying: “We receive submissions and requests from hundreds of organisations, but it is completely wrong to suggest Mend has any influence over Labour’s manifesto process.”