Glenn Greenwald

Glenn Greenwald: Trump will have vast powers. He can thank Democrats for them.

[Commentary] Liberals are understandably panicked about what President-elect Donald Trump can carry out. “We have a president-elect with authoritarian tendencies assuming a presidency that has never been more powerful,” Franklin Foer wrote. Trump will command not only a massive nuclear arsenal and the most robust military in history, but also the ability to wage numerous wars in secret and without congressional authorization; a ubiquitous system of electronic surveillance that can reach most forms of human communication and activity; and countless methods for shielding himself from judicial accountability, congressional oversight and the rule of law — exactly what the Constitution was created to prevent. President-elect Trump assumes the presidency “at the peak of its imperial powers,” as Foer put it.

Sen Barack Obama certainly saw it that way when he first ran for president in 2008. Limiting executive-power abuses and protecting civil liberties were central themes of his campaign. The former law professor repeatedly railed against the Bush-Cheney template of vesting the president with unchecked authorities in the name of fighting terrorism or achieving other policy objectives. Yet, beginning in his first month in office and continuing through today, President Obama not only continued many of the most extreme executive-power policies he once condemned, but in many cases strengthened and extended them. His administration detained terrorism suspects without due process, proposed new frameworks to keep them locked up without trial, targeted thousands of individuals (including a U.S. citizen) for execution by drone, invoked secrecy doctrines to shield torture and eavesdropping programs from judicial review, and covertly expanded the nation’s mass electronic surveillance.

[Glenn Greenwald, co-founder of the Intercept, led the NSA reporting that won the 2014 Pulitzer Prize for the Guardian.]

The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket

The Associated Press exposed a secret program run by the US Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation.

Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes” -- specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.”

The documents in the former National Security Agency contractor and whistleblower Edward Snowden’s archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their US counterparts. One previously undisclosed top-secret document -- prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the US -- explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files -- provided previously by NSA whistleblower Edward Snowden -- contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.”

The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.