Citizens' Issues
Tarun Tejpal gets regular bail from Supreme Court

While granting regular bail to Tejpal, the apex court warned that violation of any one condition would lead to cancellation of bail

The Supreme Court on Tuesday granted regular bail to Tehelka founder Tarun Tejpal in a sexual assault case.

 

The apex court, however, has put stringent conditions for Tejpal’s release on bail, saying that violation of any one condition would lead to cancellation of bail.

 

The apex court has asked the trial court to complete the trial expeditiously, preferably within eight months from today.

User

BNP Paribas to pay record $8.97 billion penalty to the US

BNP Paribas, the world’s fourth largest bank, agreed to enter a guilty plea and pay a penalty of $8.97 billion  to settle the charges that it 'knowingly and wilfully' processed transactions worth billions of dollars for blacklisted entities from Cuba, Sudan and Iran

BNP Paribas, the world’s fourth largest bank, will pay a record $8.97 billion in penalties to settle the charges that it “knowingly and wilfully” processed transactions worth billions of dollars on behalf of Cuban, Sudanese and Iranian entities that had been blacklisted.

 

BNP Paribas, the financial institution headquartered in Paris, agreed to enter a guilty plea to conspiring to violate the International Emergency Economic Powers Act (IEEPA) and the Trading with the Enemy Act (TWEA), the first time a global bank has agreed to plead guilty to large-scale, systematic violations of US economic sanctions.

 

The plea agreement, subject to approval by the court, provides that BNPP will pay total financial penalties of $8.97 billion, including forfeiture of $8.83 billion and a fine of $140 million.

 

“BNP Paribas went to elaborate lengths to conceal prohibited transactions, cover its tracks, and deceive US authorities. These actions represent a serious breach of US law,” US Attorney General Eric Holder said.

 

Holder said, “Sanctions are a key tool in protecting US national security interests, but they only work if they are strictly enforced. If sanctions are to have teeth, violations must be punished. Banks thinking about conducting business in violation of US sanctions should think twice because the Justice Department will not look the other way.”

 

Manhattan’s top federal prosecutor Preet Bharara said BNPP “banked on never being held to account for its criminal support of countries and entities engaged in acts of terrorism and other atrocities’’.

 

He said the world’s fourth largest bank will pay penalties for “performing the hat trick of sanctions violations, unlawfully opening the doors of the US financial markets to three sanctioned countries, Sudan, Iran and Cuba.

 

“For years, BNPP provided access to billions of dollars to these sanctioned countries, as well as to individuals and groups specifically identified and designated by the US government as being subject to sanctions. The bank did so deliberately and secretly, in ways designed to evade detection by the US authorities,” Bharara said.

 

According to documents, over the course of eight years, BNPP “knowingly and wilfully” moved more than $8.8 billion through the US financial system on behalf of Sudanese, Iranian and Cuban sanctioned entities, in violation of US economic sanctions, including more than $4.3 billion in transactions involving entities on whom the US had slapped economic curbs.

 

The New York County District Attorney’s Office also announced that BNPP pleaded guilty in New York State Supreme Court to falsifying business records and conspiring to falsify business records.

 

In addition, the Board of Governors of the Federal Reserve System said the bank has agreed to a cease and desist order, take certain remedial steps to ensure its compliance with US law in its ongoing operations, and pay a civil monetary penalty of $508 million.

 

The bank has also agreed to terminate or separate from the bank 13 employees, including the Group Chief Operating Officer and other senior executives, suspend US dollar clearing operations through its New York Branch and other affiliates for one year for business lines on which the misconduct centered.

User

The NSA revelations all in one chart

ProPublica plotted the NSA programs, showing which ones fall squarely into the agency's stated mission of foreign surveillance, and which ones are more controversial

Illustrations by Alberto Cairo (special to ProPublica)

This is a plot of the NSA programs revealed in the past year according to whether they are bulk or targeted, and whether the targets of surveillance are foreign or domestic. Most of the programs fall squarely into the agency’s stated mission of foreign surveillance, but some – particularly those that are both domestic and broad-sweeping – are more controversial.

Just as with the New York Magazine approval matrix that served as our inspiration, the placement of each program is based on judgments and is approximate.

For more details, read our FAQ or listen to our podcast. Also, take our quiz to test your NSA knowledge.


 

 

Program Name

Description

Agency

Bulk?

Targeted?

Foreign?

Domestic?

Squeaky Dolphin

A British effort to monitor YouTube video views, URLS "liked" on Facebook and Blogger visits.

NSA

 

 

Optic Nerve

A British program to bulk collect images from Yahoo webcam chats: "It would appear that a surprising number of people use webcam conversations to show intimate parts of their body to the other person."

NSA

 

 

Honey Traps

A British spy effort to conduct covert Internet investigations, including sexual "honey-traps."

NSA

 

 

Hacking Anonymous

A British spy unit to monitor hacktivists such as the group Anonymous.

NSA

 

 

Royal Concierge

A GCHQ program to monitor hotel reservations for "governmental hard targets."

NSA

 

 

Swedish-American surveillance of Russia

A Swedish-American effort to spy on Russian leadership.

NSA

 

 

Turmoil

A large network of clandestine surveillance "sensors" to collect data from satellites, cables, and microwave communications around the world.

NSA

 

 

Turbine

A network of active command and control servers around the world that can be used for "industrial scale exploitation."

NSA

 

 

Internet Metadata

A program, ended in 2011, to sweep up domestic Internet metadata such as the To and From fields in emails.

NSA

   

SecondDate

A so-called man-in-the-middle attack for "mass exploitation" of traffic "passing through network choke points" as well as "surgical target selection."

NSA

 

 

Buddy List, Address Book Spying

An NSA effort to collect hundreds of millions of contact lists from email and instant messaging accounts.

NSA

 

 

Program to Discredit Militants

An NSA effort to spy on targets' online sexual activity.

NSA

 

 

HappyFoot

An NSA effort to use Web cookies and data from phone apps to identify users' devices and physical locations.

NSA

 

 

50,000 implants

An NSA map of the 50,000 computers worldwide it has implanted with surveillance malware.

NSA

 

 

Targeting Embassies

An NSA operation targeting the Italian embassy in Washington D.C.

NSA

 

 

Shotgiant

An NSA program to break into Chinese-owned Huawei networks and products.

NSA

 

 

Wellspring

An NSA program to collect images from emails for facial recognition.

NSA

 

 

Dishfire

An NSA program to collect up to 200 million text messages a day worldwide.

NSA

 

 

Gilgamesh

An NSA program to geolocate people's SIM cards via Predator drones.

NSA

 

 

WillowVixen

An NSA technique to deploy malware by sending out emails that trick targets into clicking a malicious link.

NSA

 

 

Tapping Underseas Cables

Companies - including BT, Vodafone, and Verizon Business - gave GCHQ access to their underseas cables.

NSA

 

 

LinkedIn Hack

Engineers at a Belgian telcom were infected with malware, via a technique called QuantumInsert, when they pulled up their LinkedIn profiles.

NSA

 

 

Cellphone Location Test

In 2010 and 2011, the NSA tested bulk collection of location data from Americans cellphones.

NSA

   

Bullrun

Joint NSA and GCHQ effort to undermine and weaken cryptography standards and tools.

NSA and GCHQ

 

Angry Birds

NSA and GCHQ efforts to intercept information transmitted by phone apps, including Angry Birds.

NSA and GCHQ

 

 

Hacking OPEC

NSA and GCHQ programs to infiltrate the OPEC oil cartel

NSA and GCHQ

 

 

Hacking Al Jazeera

NSA hacked into Al Jazeera's internal communications system.

NSA

 

 

QuantumTheory

NSA programs that inject spyware onto targets' computers through so-called "man on the side" attacks. Variants include QuantumInsert, QuantumBiscuit, and QuantumSmackdown.

NSA

 

 

Hammerchant / Hammerstein

NSA programs to spy on data sent through voice over IP calls and Virtual Private Networks.

NSA

 

 

Surveillance of 2009 U.N. Climate Change conference

NSA surveillance of the 2009 U.N. Climate Change conference.

NSA

 

 

EgotisticalGoat and EgotisticalGiraffe

The Egotistical animal programs are techniques to track users of Tor anonymizing software.

NSA

 

 

Muscular

The NSA and GCHQ have jointly operated a program to intercept data from Yahoo and Google networks.

NSA and GCHQ

 

 

Spying on Gamers

The NSA and GCHQ monitored games including World of Warcraft.

NSA and GCHQ

 

 

Co-Traveler/ FASCIA

The NSA collected 5 billion records a day of cellphone locations worldwide.

NSA

 

 

G8 and G20 Summit Spying

The NSA conducted surveillance during the 2010 G8 and G20 summits in Canada.

NSA

 

 

Cracking cellphone encryption

The NSA has the capability to defeat a widely-used cellphone encryption technology.

NSA

 

 

Hacking Angela Merkel

The NSA targeted German Chancellor Angela Merkel's cellphone.

NSA

 

 

VictoryDance

The NSA tested a technique for using drones to map "the Wi-Fi fingerprint of nearly every major town in Yemen."

NSA

 

 

Prism

The Prism program collects data from the servers of U.S. technology companies.

NSA

   

NoseySmurf, TrackerSmurf, DreamySmurf, ParanoidSmurf

The Smurf programs get inside iPhones and Android devices, turning on microphones, tracking location, and managing power.

NSA

 

 

Upstream

The Upstream program collects communications transiting the Internet via commercial partners codenamed Fairview, Stormbrew, Blarney, and Oakstar.

NSA

 

Phone Metadata

The well-known and controversial program to collect of phone call records - aka metadata - of nearly all Americans.

NSA

   

Tracfin

Tracfin amasses gigabytes of data about credit card purchases.

NSA

 

 

ANT catalog

Various techniques - with names like IronChef and DropoutJeep - used to inject surveillance software into Apple, Cisco, Dell and other products.

NSA

 

 

 

 

 

Courtesy: ProPublica.org

User

We are listening!

Solve the equation and enter in the Captcha field.
  Loading...
Close

To continue


Please
Sign Up or Sign In
with

Email
Close

To continue


Please
Sign Up or Sign In
with

Email

BUY NOW

The Scam
24 Year Of The Scam: The Perennial Bestseller, reads like a Thriller!
Moneylife Magazine
Fiercely independent and pro-consumer information on personal finance
Stockletters in 3 Flavours
Outstanding research that beats mutual funds year after year
MAS: Complete Online Financial Advisory
(Includes Moneylife Magazine and Lion Stockletter)