Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Defense-Manual

Rss Feed Group items tagged

Paul Merrell

Defense Manual Allows for Journalists' Detention | Al Jazeera America - 0 views

  • New Defense Department guidelines allow commanders to punish journalists and treat them as "unprivileged belligerents" if they believe journalists are sympathizing or cooperating with the enemy. The Law of War manual, updated to apply for the first time to all branches of the military, contains a vaguely worded provision that military commanders could interpret broadly, experts in military law and journalism say. Commanders could ask journalists to leave military bases or detain journalists for any number of perceived offenses. "In general, journalists are civilians," the 1,180 page manual says, but it adds that "journalists may be members of the armed forces, persons authorized to accompany the armed forces, or unprivileged belligerents." A person deemed to be an "unprivileged belligerent" is not entitled to the rights afforded by the Geneva Convention. A commander could restrict from certain coverage areas or even hold indefinitely without charges any reporter considered an "unprivileged belligerent." The manual adds, "Reporting on military operations can be very similar to collecting intelligence or even spying. A journalist who acts as a spy may be subject to security measures and punished if captured." It is not specific as to the punishment or under what circumstances a commander can decide to "punish" a journalist.
  • Defense Department officials said the reference to "unprivileged belligerents" was intended to point out that armed group members or spies could be masquerading as reporters. The designation was also made to warn against someone who works publications like Al-Qaeda's "Inspire" magazine that can be used to encourage or recruit adherents. Another provision says that "relaying of information" could be construed as "taking a direct part in hostilities." Officials said that is intended to refer to passing information about ongoing operations, locations of troops or other classified data to an enemy. Army Lt. Col. Joe Sowers, a Pentagon spokesman, said it was not the Defense Department's intent to allow an overzealous commander to block journalists or take action against those who write critical stories.
  • But Ken Lee, an ex-Marine and military lawyer who specializes in "law of war" issues and is now in private practice, said it was worrisome that the detention of a journalist could come down to a commander's interpretation of the law.  If a reporter writes an unflattering story, "does this give a commander the impetus to say, now you're an unprivileged belligerent? I would hope not," Lee said. Defense officials said the manual describes the law for informational purposes and is not an authorization for anyone to take any particular action regarding journalists. The manual also notes that journalists captured by the enemy are supposed to be given the rights of prisoners of war under the Geneva Convention.
Gary Edwards

Alleged US Army doc: Re-education camps and psy-op missions aimed at activists - RT - 0 views

  •  
    Not sure if i had bookmarked this.  The Globalist Establishments assault on American liberty and the Constitution continues.  Now the USA Military is plotting against American liberty, and trampling the Constitution in the process!! excerpt: An American military document just uncovered appears to detail an US Army plan that calls for detaining "political activists" at re-education camps staffed by military-hired "PSYOP officers" in both America and abroad. The website Infowars.com has unearthed the smoking gun, a copy of a United States military manual entitled FM 3-39.40 Internment and Resettlement Operations, which appears to offer Defense Department insiders instructions on dealing with the imprisonment of anyone considered an enemy to the American way of life and how to go about indoctrination them with an "appreciation of US policies and actions" through psychological warfare. The PDF made available is dated February 2010 but has only now been leaked online. A copy of the document has been uploaded to the website PublicIntelligence.net for viewing, and additionally a version appears to be hosted on the US Military's Doctrine and Training Publications page at armypubs.us.army.mil, although access to papers published there are unavailable to those without the Pentagon's authorization, therefore making it impossible to verify the authenticity of the manual at this time. The military site that appears to host a copy has also implemented security measures on its servers that it cautions visitors are "not for your personal benefit or privacy." Further, the title page of the manual warns that the material contained in its 326 pages is be distributed to US Defense Department and its contractors only, and that must be "destroy[ed] by any method that will prevent disclosure of contents or construction of the document."
Paul Merrell

New Intel Doc: Do Not Be 'Led Astray' By 'Commonly Understood Definitions' - The Intercept - 0 views

  • New evidence of the intelligence community’s intentionally deceptive use of the English language was released today in the form of a Defense Intelligence Agency document that instructs analysts to use words that do not mean what they appear to mean. The section of the DIA’s “intelligence law handbook” on the “Collection of Information about United States Persons” opens like this: To begin the journey, it is necessary to stop first and adjust your vocabulary. The terms and words used in DoD 5240.1-R have very specific meanings, and it is often the case that one can be led astray by relying on the generic or commonly understood definitions of a particular word. DoD 5240.1-R — entitled “Procedures Governing the Activities of DOD Intelligence Components that Affect United States Persons” – is the Department of Defense document that implements Executive Order 12333, the unilateral presidential directive first signed by President Reagan that authorizes government agencies to covertly sweep up vast amounts of private data from overseas communications. The plainspoken employee handbook was one several documents about Executive Order 12333 the ACLU obtained through a Freedom of Information Act lawsuit and released today. See also today’s Intercept story: “The Ghost of Ronald Reagan Authorizes Most NSA Spying”
  • Here is the handbook explaining how not to be led astray: For example, “collection of information” is defined in the Dictionary of the United States Army Terms (AR 310- 25) as: “The process of gathering information for all available sources and agencies. ” But, for the purposes of DoD 5240 .1-R, information is “collected” – only when it has been received for use by an employee of a DoD intelligence component in the course of his official duties… (and) an employee takes some affirmative action that demonstrates an intent to use or retain the information. So, we see that “collection of information” for DoD 5240.1-R purposes is more than “gathering” – it could be described as “gathering, plus … “. For the purposes of DoD 5240.1-R, “collection” is officially gathering or receiving information, plus an affirmative act in the direction of use or retention of that information.
  • For good measure, there’s this footnote: In addition, data acquired by electronic means is “collected” only when it is processed into intelligible form…;What constitutes an intelligible form may be somewhat problematic. Analysts can even gather information and keep it for up to six months without it counting as having been “collected”, as long as it’s being “held or forwarded to a supervisory authority, solely for the purpose of making a determination about its collectability.” Although the intelligence community’s astonishing abuse of words has been frequently noted, particularly in the context of surveillance, this may be the first time we’ve actually seen an instruction manual.
  • ...1 more annotation...
  • And as it happens, it comes right in the middle of a couple pieces I’m writing about another linguistic perversion, the non-denial denial. (My exegesis of CIA director John Brennan’s latest ran on Friday; more examples from recent history should be out tomorrow.) The intelligence community’s redefinition of terms inspired the ACLU’s Jameel Jaffer and Brett Max Kaufman last year to author a ”lexicon for decoding the true meaning of what NSA officials say” which includes nifty non-intuitive recastings of terms such as surveillance, relevant, targeted, incidental and inadvertent. There’s also a “Guide to the Deceptions, Misinformation, and Word Games Officials Use to Mislead the Public About NSA Surveillance” that Trevor Timm wrote for the Electronic Frontier Foundation, and Mike Masnick’s more tongue in check “NSA-To-English Dictionary” from Techdirt.
Paul Merrell

ODNI Erects Cost Barrier to Mandatory Declassification - 1 views

  • Anyone who submits a mandatory declassification review request to the Office of the Director of National Intelligence seeking release of classified records “shall be responsible for paying all fees” resulting from the request, according to a new ODNI regulation. And those fees are considerable. A search for a requested document costs from $20-$72 per hour. Document review runs $40-$72 per hour. And photocopying costs fifty cents per page, the new ODNI regulation said. It was published in the Federal Register on Friday, with a request for public comments. The mandatory declassification review (MDR) process was established by executive order 13526 to permit requests for declassification of information that no longer meets the standards for national security classification. The executive order’s implementing directive states that fees may be charged for responding to MDR requests for classified records. But the proposed ODNI fees seem extravagant on their face. No commercial enterprise charges anything close to fifty cents to photocopy a single page. Neither do most of ODNI’s peer agencies.
  • The Department of Defense permits (though it does not require) DoD agencies to charge fees for search, review and reproduction (pursuant to DoD Manual 5230.30-M). But the DoD schedule of fees is well below the proposed ODNI rate. Instead of fifty cents per page, DoD charges thirteen cents. Instead of up to $72 per hour for search and review, DoD charges no more than $52.60 per hour. ODNI wants $10 for a CD, but DoD asks only $1.25. (See DoD 7000.14-R, Volume 11A, Chapter 4, Appendix 2, Schedule of Fees and Rates, at page 4-13). And while ODNI would make requesters liable for “all fees,” DoD says that “Fees will not be charged if the total amount to process your request is $30.00 or less.” Similarly, at the Department of State, “Records shall be duplicated at a rate of $.15 per page.” In a 2011 rule, the Central Intelligence Agency did mandate a fifty cent per page photocopy fee for MDR requests, as well as a $15 minimum charge. But the CIA policy was suspended in response to public criticism and a legal challenge from the non-profit National Security Counselors. That challenge is still pending.
  • “There is nothing unusual about these [search and review] fees,” CIA told a court in 2014 in response to the legal challenge. “And the reproduction costs are similar to those employed by other agencies.” CIA noted that a National Archives regulation sets reproduction costs as high as 75 cents per page. (Last year it reached 80 cents, although a self-service copier is sometimes available for 25 cents per page.) Furthermore, CIA said in 2014, “neither set of costs reimburses the CIA for the full cost of providing the declassification review service to the requester.”
  •  
    Mandatory Declassification Review is now only for the wealthy. Note that the Freedom of Information Act requires that all search and copying fees be waived if the request is in the public interest and the request is for scholarly or news purposes. It looks like Congress should step in here and establish similar requirements for Mandatory Declassification Review. Query, whether the records if sought under both the FOIA and MDR by a scholar or news organization would have to be provided without charge if declassified. 
Gary Edwards

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
Paul Merrell

Secret Docs Reveal Dubious Details of Targeted Killings in Afghanistan - SPIEGEL ONLINE - 0 views

  • Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.
  • The child and his father are two of the many victims of the dirty secret operations that NATO conducted for years in Afghanistan. Their fate is described in secret documents to which SPIEGEL was given access. Some of the documents concerning the International Security Assistance Force (ISAF) and the NSA and GCHQ intelligence services are from the archive of whistleblower Edward Snowden. Included is the first known complete list of the Western alliance's "targeted killings" in Afghanistan. The documents show that the deadly missions were not just viewed as a last resort to prevent attacks, but were in fact part of everyday life in the guerilla war in Afghanistan. The list, which included up to 750 people at times, proves for the first time that NATO didn't just target the Taliban leadership, but also eliminated mid- and lower-level members of the group on a large scale. Some Afghans were only on the list because, as drug dealers, they were allegedly supporting the insurgents.
  • Different rules apply in war than in fighting crime in times of peace. But for years the West tied its campaign in Afghanistan to the promise that it was fighting for different values there. A democracy that kills its enemies on the basis of nothing but suspicion squanders its claim to moral superiority, making itself complicit instead. This lesson from Afghanistan also applies to the conflicts in Syria, Iraq, Pakistan and Yemen. The material SPIEGEL was able to review is from 2009 to 2011, and falls within the term of US President Barack Obama, who was inaugurated in January 2009. For Obama, Afghanistan was the "good" war and therefore legitimate -- in contrast to the Iraq war. The president wanted to end the engagement in Iraq as quickly as possible, but in Afghanistan his aim was to win.
  • ...9 more annotations...
  • After Obama assumed office, the US government opted for a new strategy. In June 2009, then Defense Secretary Robert Gates installed Stanley McChrystal, a four-star general who had served in Iraq, as commander of US forces in Afghanistan. McChrystal promoted the aggressive pursuit of the Taliban. Obama sent 33,000 additional troops to Afghanistan, but their deployment was tied to a demand that military officials provide a binding date for the withdrawal of US forces. At the same time, the president distanced himself from the grand objectives the West had proclaimed when it first marched into Kabul. The United States would not try to make Afghanistan "a perfect place," said Obama. Its new main objective was to fight the insurgency.
  • This marked the beginning of one of the bloodiest phases of the war. Some 2,412 civilians died in Afghanistan in 2009. Two-thirds of them were killed by insurgents and 25 percent by NATO troops and Afghan security forces. The number of operations against the Taliban rose sharply, to between 10 and 15 a night. The operations were based on the lists maintained by the CIA and NATO -- Obama's lists. The White House dubbed the strategy "escalate and exit." McChrystal's successor, General David Petraeus, documented the strategy in "Field Manual 3-24" on fighting insurgencies, which remains a standard work today. Petraeus outlined three stages in fighting guerilla organizations like the Taliban. The first was a cleansing phase, in which the enemy leadership is weakened. After that, local forces were to regain control of the captured areas. The third phase was focused on reconstruction. Behind closed doors, Petraeus and his staff explained exactly what was meant by "cleansing." German politicians recall something that Michael T. Flynn, the head of ISAF intelligence in Afghanistan, once said during a briefing: "The only good Talib is a dead Talib."
  • Under Petraeus, a merciless campaign began to hunt down the so-called shadow governors and local supporters aligned with the Islamists. For the Americans, the fact that the operations often ended in killings was seen as a success. In August 2010, Petraeus proudly told diplomats in Kabul that he had noticed a shifting trend. The figures he presented as evidence made some of the ambassadors feel uneasy. At least 365 insurgent commanders, Petraeus explained, had been neutralized in the last three months, for an average of about four killings a day. The existence of documents relating to the so-called Joint Prioritized Effects List (JPEL) has only been described in vague terms until now. The missions by US special units are mentioned but not discussed in detail in the US Army Afghanistan war logs published by WikiLeaks in 2010, together with the New York Times, the Guardian and SPIEGEL. The documents that have now become accessible provide, for the first time, a systematic view of the targeted killings. They outline the criteria used to determine who was placed on the list and why.
  • According to the NSA document, in October 2008 the NATO defense ministers made the momentous decision that drug networks would now be "legitimate targets" for ISAF troops. "Narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) list for the first time," the report reads. In the opinion of American commanders like Bantz John Craddock, there was no need to prove that drug money was being funneled to the Taliban to declare farmers, couriers and dealers as legitimate targets of NATO strikes.
  • The document also reveals how vague the basis for deadly operations apparently was. In the voice recognition procedure, it was sufficient if a suspect identified himself by name once during the monitored conversation. Within the next 24 hours, this voice recognition was treated as "positive target identification" and, therefore, as legitimate grounds for an airstrike. This greatly increased the risk of civilian casualties. Probably one of the most controversial decisions by NATO in Afghanistan is the expansion of these operations to include drug dealers. According to an NSA document, the United Nations estimated that the Taliban was earning $300 million a year through the drug trade. The insurgents, the document continues, "could not be defeated without disrupting the drug trade."
  • When an operation could potentially result in civilian casualties, ISAF headquarters in Kabul had to be involved. "The rule of thumb was that when there was estimated collateral damage of up to 10 civilians, the ISAF commander in Kabul was to decide whether the risk was justifiable," says an ISAF officer who worked with the lists for years. If more potential civilian casualties were anticipated, the decision was left up to the relevant NATO headquarters office. Bodyguards, drivers and male attendants were viewed as enemy combatants, whether or not they actually were. Only women, children and the elderly were treated as civilians. Even officers who were involved in the program admit that these guidelines were cynical. If a Taliban fighter was repeatedly involved in deadly attacks, a "weighing of interests" was performed. The military officials would then calculate how many human lives could be saved by the "kill," and how many civilians would potentially be killed in an airstrike.
  • In early 2009, Craddock, NATO's Supreme Allied Commander for Europe at the time, issued an order to expand the targeted killings of Taliban officials to drug producers. This led to heated discussions within NATO. German NATO General Egon Ramms declared the order "illegal" and a violation of international law. The power struggle within NATO finally led to a modification of Craddock's directive: Targets related to the drug production at least had to be investigated as individual cases. The top-secret dossier could be highly damaging to the German government. For years, German authorities have turned over the mobile phone numbers of German extremists in Afghanistan to the United States. At the same time, the German officials claimed that homing in on mobile phone signals was far too imprecise for targeted killings. This is apparently an untenable argument. According to the 2010 document, both Eurofighters and drones had "the ability to geolocate a known GSM handset." In other words, active mobile phones could serve as tracking devices for the special units.
  • The classified documents could now have legal repercussions. The human rights organization Reprieve is weighing legal action against the British government. Reprieve believes it is especially relevant that the lists include Pakistanis who were located in Pakistan. "The British government has repeatedly stated that it is not pursuing targets in Pakistan and not doing air strikes on Pakistani territory," says Reprieve attorney Jennifer Gibson. The documents, she notes, also show that the "war on terror" was virtually conflated with the "war on drugs." "This is both new and extremely legally troubling," says Gibson.
  • A 2009 CIA study that addresses targeted killings of senior enemy officials worldwide reaches a bitter conclusion. Because of the Taliban's centralized but flexible leadership, as well as its egalitarian tribal structures, the targeted killings were only moderately successful in Afghanistan. "Morover, the Taliban has a high overall ability to replace lost leaders," the study finds.
Paul Merrell

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Soviet nuclear submarine carrying nuclear weapons sank north of Bermuda - 0 views

  • Top Secret Minutes of Politburo discussion show Soviets learned the lessons of Chernobyl Open U.S.-Soviet communication regarding the accident on the eve of the Reykjavik summit of Reagan and Gorbachev
  • Thirty years ago, a Soviet nuclear submarine with about 30 nuclear warheads on board sank off U.S. shores north of Bermuda as Mikhail Gorbachev and Ronald Reagan were preparing for their historic summit in Reykjavik, Iceland.  But instead of Chernobyl-style denials, the Soviet government reached out to the Americans, issued a public statement, and even received offers of help from Washington, according to the never-before-published transcript of that day’s Politburo session, posted today by the National Security Archive. The submarine, designated K-219, suffered an explosion in one of its missile tubes due to the leakage of missile fuel into the tube on October 3.  The 667-A project Yankee-class boat was armed with 16 torpedoes and 16 ballistic missiles. After the initial explosion, the crew members heroically put out fire and were forced to shut down the nuclear reactors manually because the command-and-control equipment had been damaged.  Three crew members died in the blast and fire. Senior Seaman Sergey Preminin stayed in the reactor compartment to shut down reactors, and could not be evacuated.  The rest escaped safely. Initially, it seemed the submarine could be salvaged; it was attached to the Soviet commercial ship Krasnogvardeisk for towing.  However, the tow cord broke for unknown reasons and the submarine sank.  Submarine Commander Captain Second rank Igor Britanov stayed with the sub until its final moments.  He initially came under investigation at home but all charges were removed in 1987.  According to statements by U.S. Vice Admiral Powell Carter, the submarine did not present a danger of nuclear explosion or radioactive contamination, as was reported by the New York Times.[1]
  • The Politburo also heard a report from Deputy Defense Minister Chief of Navy Admiral Vladimir Chernavin.  Other members present express concerns about a possible U.S. effort to salvage parts of the submarine and gain access to design information.  But Chernavin assures them that the boat design is outdated and therefore is not of any interest to the Americans.  Another major concern raised is the possibility of a nuclear explosion or radioactive contamination due to water pressure at extreme depths.  Chernavin cites Soviet Navy commission experts who ruled out the possibility of a nuclear detonation and concluded that contamination would happen over a long period and would not reach the surface.
  •  
    Oh, great. 30 nuclear warheads slowly leaking radiation off the U.S. East Coast. But not to worry, dilution is the pollution solution! Except that plutonium has no no-effect level, has a half-life in the billions of years, and this simply adds to the radioactive pollution contributed by nuclear weapons testing, various nuclear reactor "accidents," and direct river pollution by weapons manufacturing factories. Now add to that the incredible levels of halogenated hydrocarbon pollution we've pumped into our oceans that have additive and sometimes synergistic effects with radioactive pollution. What happens when you use the planet's oceans as toxic waste dumps? Hint: there's a reason that whales try to beach themselves.
Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
1 - 10 of 10
Showing 20 items per page