Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Der-Spiegel

Rss Feed Group items tagged

Paul Merrell

Surveillance Revelations Shake U.S.-German Ties - NYTimes.com - 0 views

  • Continuing revelations, based on documents leaked by Edward J. Snowden, of sweeping American digital surveillance around the world are rattling the close ties between the United States and Germany.
  • Evidence that the United States has been spying extensively on its allies as well as on its enemies has been among the most significant revelations from Mr. Snowden, along with widespread government surveillance of the telephone and digital communications of American citizens without warrants. The Der Spiegel article on Sunday was not the first to reveal American eavesdropping at the United Nations, which many diplomats have assumed for years was taking place. But it added extensive new detail to what had previously been reported, and it may compound the frictions developing between the United States and its allies over the issue — especially with Germany, where Chancellor Angela Merkel is in the midst of an election campaign. Top German officials traveled to Washington this month to press an unusual demand: to negotiate a new formal agreement with the United States that neither side will spy on the other.
  • In a country scarred by Nazi and Communist pasts, the issue is prompting not just a debate about privacy and data protection, but also demands from German officials that the Berlin-Washington security partnership be put on a new footing. The latest of the Snowden revelations came on Sunday, when the German newsmagazine Der Spiegel published a report, citing documents Mr. Snowden obtained while he worked as a contractor for the National Security Agency, that said the agency had succeeded in tapping into videoconferences at the United Nations in New York, into the European Union’s mission to the United Nations, and into other diplomatic missions around the world.
  • ...1 more annotation...
  • the eavesdropping described in the Snowden documents would have violated agreements that the United States has made. The report said that the N.S.A. succeeded last year in cracking an encrypted video teleconferencing system at the United Nations, and even stumbled across Chinese spies who were apparently invading the same communications system. The magazine also published a floor plan, evidently from N.S.A. files, of the third floor of the European mission to the United Nations on Third Avenue in New York, showing the locations of offices and computer servers. Der Spiegel suggested that the spying on allies and the United Nations made President Obama’s defense of surveillance programs as a counterterrorism effort seem misleading at best.
  •  
    See also further information in the Der Spiegel article at http://tinyurl.com/m2okg6e (translation required).
Paul Merrell

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise ... - 0 views

  • The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies, including everyone from U.S. mainstays Cisco and Juniper to Chinese giant Huawei. But beneath this bombshell of a story from Der Spiegel, you’ll find a rather healthy bit of irony. After all, the United States government has spent years complaining that Chinese intelligence operations could find ways of poking holes in Huawei networking gear, urging both American businesses and foreign allies to sidestep the company’s hardware. The complaints grew so loud that, at one point, Huawei indicated it may abandon the U.S. networking market all together. And, yet, Der Speigel now tells us that U.S. intelligence operations have been poking holes in Huawei networking gear — not to mention hardware sold by countless other vendors in both the States and abroad. “We read the media reports, and we’ve noted the references to Huawei and our peers,” says William Plummer, a Huawei vice president and the company’s point person in Washington, D.C. “As we have said, over and over again — and as now seems to be validated — threats to networks and data integrity can come from any and many sources.”
  • Plummer and Huawei have long complained that when the U.S. House Intelligence Committee released a report in October 2012 condemning the use of Huawei gear in telephone and data networks, it failed to provide any evidence that the Chinese government had compromised the company’s hardware. Adam Segal, a senior fellow for China Studies at the Center for Foreign Relations, makes the same point. And now we have evidence — Der Spiegel cites leaked NSA documents — that the U.S. government has compromised gear on a massive scale. “Do I see the irony? Certainly the Chinese will,” Segal says, noting that the Chinese government and the Chinese press have complained of U.S hypocrisy ever since former government contractor Edward Snowden first started to reveal NSA surveillance practices last summer. “The Chinese government has been hammering home what they call the U.S.’s ulterior motives for criticizing China, and there’s been a steady drumbeat of stories in the Chinese press about backdoors in the products of U.S. companies. They’ve been going after Cisco in particular.”
  • To be sure, the exploits discussed by Der Spiegel are a little different from the sort of attacks Congress envisioned during its long campaign against Huawei and ZTE, another Chinese manufacturer. As Segal and others note, Congress mostly complained that the Chinese government could collaborate with people inside the two companies to plant backdoors in their gear, with lawmakers pointing out that Huawei’s CEO was once an officer in China’s People’s Liberation Army, or PLA, the military arm of the country’s Communist party. Der Spiegel, by contrast, says the NSA is exploiting hardware without help from anyone inside the Ciscos and the Huaweis, focusing instead on compromising network gear with clever hacks or intercepting the hardware as it’s shipped to customers. “For the most part, the article discusses typical malware exploits used by hackers everywhere,” says JR Rivers, an engineer who has built networking hardware for Cisco as well as Google and now runs the networking startup Cumulus Networks. “It’s just pointing out that the NSA is engaged in the practice and has resources that are not available to most people.” But in the end, the two types of attack have the same result: Networking gear controlled by government spies. And over the last six months, Snowden’s revelations have indicated that the NSA is not only hacking into networks but also collaborating with large American companies in its hunt for data.
  • ...2 more annotations...
  • Jim Lewis, a director and senior fellow with the Center for Strategic and International Studies, adds that the Chinese view state-sponsored espionage a little differently than the U.S. does. Both countries believe in espionage for national security purposes, but the Chinese argue that such spying might include the theft of commercial secrets. “The Chinese will tell you that stealing technology and business secrets is a way of building their economy, and that this is important for national security,” says Lewis, who has helped oversee meetings between the U.S. and the Chinese, including officers in the PLA. “I’ve been in the room when they’ve said that. The last time was when a PLA colonel said: ‘In the U.S., military espionage is heroic and economic espionage is a crime. In China, the line is not that clear.’” But here in the United States, we now know, the NSA may blur other lines in the name of national security. Segal says that although he, as an American, believes the U.S. government is on stronger ethical ground than the Chinese, other nations are beginning to question its motives. “The U.S has to convince other countries that our type of intelligence gathering is different,” he says. “I don’t think that the Brazils and the Indias and the Indonesias and the South Africas are convinced. That’s a big problem for us.”
  • The thing to realize, as the revelations of NSA snooping continue to pour out, is that everyone deserves scrutiny — the U.S government and its allies, as well as the Chinese and others you may be more likely to view with skepticism. “All big countries,” Lewis says, “are going to try and do this.”
  •  
    Of course, we now know that the U.S. conducts electronic surveillance for a multitude of purposes, including economic. Check this group's notes tagged "NSA-targets" and/or "NSA-goals".
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • ...5 more annotations...
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Paul Merrell

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
Paul Merrell

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
Paul Merrell

Der Spiegel Tones Down Anti-Putin Hysteria | Consortiumnews - 0 views

  • The mainstream U.S. news media continues to spew out a steady flow of anti-Russian propaganda over the Ukraine crisis, but the prominent German newsmagazine Der Spiegel has begun to temper its belligerent tone, finally reflecting the more nuanced reality, reports Robert Parry.
  •  
    That will help stiffen German backs against the U.S. neocon flood of anti-Putin propaganda. And it will make it more difficult for Angela Merkel to maintain her position backing U.S. sanctions on Russia. 
Paul Merrell

Are US Academics Who Cite WikiLeaks Blackballed? - 0 views

  • Speaking to Germany’s Der Spiegel magazine in July 2015, Assange suggested that institutions within the international relations discipline have failed to understand the intersection between current geopolitical and technological developments. Specifically, Assange charged that the US journal International Studies Quarterly (ISQ), published by the prestigious International Studies Association (ISA), would not accept manuscripts based on WikiLeaks’ material. Professor of international politics Daniel W. Drezner hit back on July 30 in The Washington Post, arguing that there were other explanations for why the journal was not publishing WikiLeaks’ material. However, he did concede that it is possible that the “structural forces” opposing WikiLeaks were so powerful that a scholar would eschew WikiLeaks’ publications for “fear of being blackballed”. For the thousands of undergraduate to PhD students, fellows and academic researchers facing a precarious employment market, self-censorship for fear of freezing one’s career is not unlikely. One publicised incident from November 2010 concerning the office of career services at Columbia University’s School of International and Public Affairs (SIPA), which according to The New York Times “grooms future diplomats”, provides the perfect illustration. That year the office sent an email to students warning them against commenting on or posting WikiLeaks’ documents on social media because “engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government”. The warning came to the office through a SIPA alumnus working at the State Department.
  • Years later, the tone of the warning continued to reverberate through the halls of one of the most reputable universities in the world. In documenting human rights abuses in June 2013 a Columbia University graduate class produced the anonymous academic paper “WikiLeaks and Iraq Body Count: the sum of parts may not add up to the whole — a comparison of two tallies of Iraqi civilian deaths”. The acknowledgements section of their report refers to the 2010 warning email and states that in light of that email it would be “unwise and perhaps unethical to acknowledge all the participating students by name”. Others participating in a peer-review process have cited additional factors curtailing their use of comprehensive and illuminating WikiLeaks publications. Former US presidential candidate for the Green Party Cynthia McKinney, for example, says that she was forced to scrub her PhD dissertation from any reference of WikiLeaks material. However Drezner, who is an ISA member and on the ISQ’s web advisory board, claims that WikiLeaks’ published diplomatic cables “are not nearly as significant as Assange believes” and that the “academic universe is indifferent to WikiLeaks”. A surprising claim, given that international human rights courts have not been indifferent to evidence derived from WikiLeaks’ published cables, including cables that show the insidious ways in which European officials attempt to conceal CIA torture in secret prisons.
  • To help address the gap in scholarly analysis of the more than 2 million US diplomatic cables and State Department records published by WikiLeaks since 2010, WikiLeaks has produced a new book, The WikiLeaks Files: The World According to US Empire, published September 7, 2015. The book brings together journalists, researchers and experts on international law and foreign policy to examine the current cables and records. The documents are extensive. They expose US efforts —  across Bush and Obama administrations — to use bribes and threats to keep the US protected from facing war crimes allegations, conveying the fading effervescence of concepts such as “international justice” or “rule of law” in the face of a superpower that clearly believes that “might makes right”. Analysts review the efforts US diplomats take to maintain ties with dictators. They examine the meaning of human rights in the context of a global “War on Terror”. Like the cables they seek to illuminate, the 18 chapters of the book touch upon most major regions of the world. Experts on US foreign policy such as Robert Naiman, Stephen Zunes and Gareth Porter examine cables that reveal US meddling in Syria, US acceptance of Israeli violations of international law, and how the US dealt with the International Atomic Energy Agency in relation to Iranian nuclear development. The book offers a user guide written by WikiLeaks’ investigations editor Sarah Harrison on how to research WikiLeaks’ cables including meta data and content.
  • ...2 more annotations...
  • Writing in the book’s introduction, Assange proposes that the diplomatic cables provide “the vivisection of a living empire, showing what substance flowed from which state organ and when”. Assange notes in his introduction that academic disciplines outside international relations, and where career aspirations do not go hand in hand with patronage by government institutions, have voluminous coverage of the cables. But the ISA does not accept submissions citing WikiLeaks’ material. Although ISA executive director Mark Boyer denies that the association has a formal policy against publishing WikiLeaks’ material, he says that journal editors have discussed the implications of publishing material that is legally prohibited by the US government. According to Gabriel J. Michael, author of the Yale Law School paper Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research, the ISQ has adopted a “provisional policy” against handling manuscripts that make use of leaked documents if such use could be interpreted as mishandling “classified” material. According to an ISQ editor quoted in Michael’s paper, this policy prohibits direct quotations as well as data mining, and was developed in consultation with legal counsel. Stating that editors are currently “in an untenable position”. According to the editor, ISQ’s policy will remain in place pending broader action from the ISA, which publishes several other disciplinary journals. The ISA and ISQ concerns about handling material that the US government forbids —  which include WikiLeaks’ cables —  amount to throwing the baby out with the bathwater. The cables go into the heart of an empire, and reflect on matters that affect everyone.
  • Without WikiLeaks, the public would still be in the dark about the Trans-Pacific Partnership “agreement” currently being negotiated. The treaty aims to rewrite the global rules on intellectual property rights and would create spheres of trade which would be protected from judicial oversight. Such agreements have the potential to change the fabric of how states operate, and the leaked cables shed light on how states negotiate significant treaties, aiming to keep citizenship participation in politics out. Where academia bans the use of important leaked documents the public loses out.
Paul Merrell

Is there a second NSA leaker after Snowden? | TheHill - 0 views

  • Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.Glenn Greenwald, the journalist most closely associated to Snowden, said he suspects someone else has been involved in leaking out new documents, and other experts have backed up the claim.ADVERTISEMENTThe existence of a second leaker “seems clear at this point,” Greenwald wrote on Twitter over the weekend. “The lack of sourcing to Snowden on this & that last [Der Spiegel] article seems petty telling,” he added, after German broadcasters reported that the NSA was tracking people searching for details about privacy software. 
  • Neither the Der Spiegel article from December nor last week’s story, both of which were partly written by privacy advocate and security researcher Jacob Appelbaum, specifically mentioned that the information emanated from leaks by Snowden.“That's particularly notable given that virtually every other article using Snowden documents - including der Spiegel - specifically identified him as the source,” Greenwald said in an email to The Hill on Monday.Other people who have seen Snowden’s trove of documents have agreed that the documents revealed by German outlets seem to indicate a second source.
  • Bruce Schneier, a cryptologist and cybersecurity expert who has helped the Guardian review Snowden’s disclosures, said he did “not believe that this came from the Snowden documents.”“I think there’s a second leaker out there,” he wrote in a blog post last week. If true, it could add another headache for the NSA, which has struggled for more than a year to contain the fallout from Snowden’s revelations. Defenders of the NSA say that the disclosures have hurt U.S. security and empowered terrorists and other enemies abroad.Among other internal reforms, the spy agency has beefed up its clearance procedures to prevent another employee from passing along secret documents to journalists or governments in Beijing and Moscow.
  • ...1 more annotation...
  • “If in fact this is a post-Snowden NSA leak, then it’s probably just proof that you can always build a bigger mousetrap; that doesn’t mean you’re going to catch the mice,” said Stephen Vladeck, a law professor at American University who specializes in national security issues.Vladeck added that leaks about controversial national security programs are in many ways inevitable, and may not be tied to Snowden’s leaks in any way.For Greenwald, however, a second leaker would be affirmation of Snowden’s actions.“I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward,” he told The Hill. 
Paul Merrell

Germany is the Tell-Tale Heart of America's Drone War - 0 views

  • This is a joint investigation with the German news magazine Der Spiegel.
  • A TOP-SECRET U.S. intelligence document obtained by The Intercept confirms that the sprawling U.S. military base in Ramstein, Germany serves as the high-tech heart of America’s drone program. Ramstein is the site of a satellite relay station that enables drone operators in the American Southwest to communicate with their remote aircraft in Yemen, Somalia, Afghanistan and other targeted countries. The top-secret slide deck, dated July 2012, provides the most detailed blueprint seen to date of the technical architecture used to conduct strikes with Predator and Reaper drones. Amid fierce European criticism of America’s targeted killing program, U.S. and German government officials have long downplayed Ramstein’s role in lethal U.S. drone operations and have issued carefully phrased evasions when confronted with direct questions about the base. But the slides show that the facilities at Ramstein perform an essential function in lethal drone strikes conducted by the CIA and the U.S. military in the Middle East, Afghanistan and Africa.
  • The slides were provided by a source with knowledge of the U.S. government’s drone program who declined to be identified because of fears of retribution. According to the source, Ramstein’s importance to the U.S. drone war is difficult to overstate. “Ramstein carries the signal to tell the drone what to do and it returns the display of what the drone sees. Without Ramstein, drones could not function, at least not as they do now,” the source said. The new evidence places German Chancellor Angela Merkel in an awkward position given Germany’s close diplomatic alliance with the United States. The German government has granted the U.S. the right to use the property, but only under the condition that the Americans do nothing there that violates German law.
  • ...1 more annotation...
  • The U.S. government maintains that its drone strikes against al Qaeda and its “associated forces” are legal, even outside of declared war zones. But German legal officials have suggested that such operations are only justifiable in actual war zones. Moreover, Germany has the right to prosecute “criminal offenses against international law … even when the offense was committed abroad and bears no relation to Germany,” according to Germany’s Code of Crimes against International Law, which passed in 2002. This means that American personnel stationed at Ramstein could, in theory, be vulnerable to German prosecution if they provide drone pilots with data used in attacks. While the German government has been reluctant to pursue such prosecutions, it may come under increasing pressure to do so. “It is simply murder,” says Björn Schiffbauer of the Institute for International Law at the University of Cologne. Legal experts interviewed by Der Spiegel claimed that U.S. personnel could be charged as war criminals by German prosecutors.
Paul Merrell

Hacked Emails Reveal NATO General Plotting Against Obama on Russia Policy - 0 views

  • Retired U.S. Air Force Gen. Philip Breedlove, until recently the supreme commander of NATO forces in Europe, plotted in private to overcome President Barack Obama’s reluctance to escalate military tensions with Russia over the war in Ukraine in 2014, according to apparently hacked emails from Breedlove’s Gmail account that were posted on a new website called DC Leaks. Obama defied political pressure from hawks in Congress and the military to provide lethal assistance to the Ukrainian government, fearing that doing so would increase the bloodshed and provide Russian President Vladimir Putin with the justification for deeper incursions into the country. Breedlove, during briefings to Congress, notably contradicted the Obama administration regarding the situation in Ukraine, leading to news stories about conflict between the general and Obama. But the leaked emails provide an even more dramatic picture of the intense back-channel lobbying for the Obama administration to begin a proxy war with Russia in Ukraine. In a series of messages in 2014, Breedlove sought meetings with former Secretary of State Colin Powell, asking for advice on how to pressure the Obama administration to take a more aggressive posture toward Russia.
  • Breedlove attempted to influence the administration through several channels, emailing academics and retired military officials, including former NATO supreme commander Wesley Clark, for assistance in building his case for supplying military assistance to Ukrainian forces battling Russian-backed separatists.
  • Breedlove did not respond to a request for comment. He stepped down from his NATO leadership position in May and retired from service on Friday, July 1. Breedlove was a four-star Air Force general and served as the 17th Supreme Allied Commander of NATO forces in Europe starting on May 10, 2013. Phillip Karber, an academic who corresponded regularly with Breedlove — providing him with advice and intelligence on the Ukrainian crisis —  verified the authenticity of several of the emails in the leaked cache. He also told The Intercept that Breedlove confirmed to him that the general’s Gmail account was hacked and that the incident had been reported to the government.
  • ...3 more annotations...
  • Der Spiegel reported that Breedlove “stunned” German leaders with a surprise announcement in 2015 claiming that pro-Russian separatists had “upped the ante” in eastern Ukraine with “well over a thousand combat vehicles, Russian combat forces, some of the most sophisticated air defense, battalions of artillery” sent to Donbass, a center of the conflict. Breedlove’s numbers were “significantly higher” than the figures known to NATO intelligence agencies and seemed exaggerated to German officials. The announcement appeared to be a provocation designed to disrupt mediation efforts led by Chancellor Angela Merkel. In previous instances, German officials believed Breedlove overestimated Russian forces along the border with Ukraine by as many as 20,000 troops and found that the general had falsely claimed that several Russian military assets near the Ukrainian border were part of a special build-up in preparation for a large-scale invasion of the country. In fact, much of the Russian military equipment identified by Breedlove, the Germans said, had been stored there well before the revolution in Ukraine.
  • The emails, however, depict a desperate search by Breedlove to build his case for escalating the conflict, contacting colleagues and friends for intelligence to illustrate the Russian threat. Karber, who visited Ukrainian politicians and officials in Kiev on several occasions, sent frequent messages to Breedlove — “per your request,” he noted — regarding information he had received about separatist military forces and Russian troop movements. In several updates, Breedlove received military data sourced from Twitter and social media. Karber, the president of the Potomac Foundation, became the center of a related scandal last year when it was discovered that he had facilitated a meeting during which images of purported Russian forces in Ukraine were distributed to the office of Sen. James Inhofe, R-Okla., and were published by a neoconservative blog. The pictures turned out to be a deception; one supposed picture of Russian tanks in Ukraine was, in fact, an old photograph of Russian tanks in Ossetia during the war with Georgia.
  • The emails were released by D.C. Leaks, a database run by self-described “hacktivists” who are collecting the communications of elite stakeholders such as political parties, major politicians, political campaigns, and the military. The website currently has documents revealing some internal communications of the Hillary Clinton presidential campaign and George Soros’s Open Society Foundation, among others.
  •  
    Four-star general commanding NATO uses Gmail? He must have wanted his emails to be publicized.
Paul Merrell

MH17 might have been shot down from air - chief Dutch investigator - RT News - 0 views

  • The chief Dutch prosecutor investigating the MH17 downing in eastern Ukraine does not exclude the possibility that the aircraft might have been shot down from air, Der Spiegel reported. Intelligence to support this was presented by Moscow in July. The chief investigator with the Dutch National Prosecutors' Office Fred Westerbeke said in an interview with the German magazine Der Spiegel published on Monday that his team is open to the theory that another plane shot down the Malaysian airliner. Following the downing of the Malaysian Airlines MH17 flight in July that killed almost 300 people, Russia’s Defense Ministry released military monitoring data, which showed a Kiev military jet tracking the MH17 plane shortly before the crash. No explanation was given by Kiev as to why the military plane was flying so close to a passenger aircraft. Neither Ukraine, nor Western states have officially accepted such a possibility.
  • Westerbeke said that the Dutch investigators are preparing an official request for Moscow’s assistance since Russia is not part of the international investigation team. Westerbeke added that the investigators will specifically ask for the radar data suggesting that a Kiev military jet was flying near the passenger plane right before the catastrophe. "Going by the intelligence available, it is my opinion that a shooting down by a surface to air missile remains the most likely scenario. But we are not closing our eyes to the possibility that things might have happened differently,” he elaborated.
  • Though the West has accused Eastern Ukrainian militia forces of shooting down the plane, it has provided only circumstantial evidence in support of such claims. Moscow has urged the US to release satellite images that prove its claims. “This may be a coincidence, but the US satellite flew over Ukraine at exactly the same time when the Malaysian airliner crashed,” a Russian Defense ministry spokesman said in a July statement.
  • ...2 more annotations...
  • In his interview to the German media, Westerbeke also called on the US to release proof that supports its claims. “We remain in contact with the United States in order to receive satellite photos,” he said.
  • Westerbeke concluded that in the Netherlands 10 prosecutors are investigating the incident, as well as forensic experts and 80 policemen. While the Dutch also regularly hold meetings with colleagues from Malaysia, Australia and Ukraine.
Paul Merrell

BERLIN: Europe, U.S. at odds over size of Russia's intrusion in Ukraine | Europe | McCl... - 0 views

  • German officials, including some in Merkel’s office, have recently referred to U.S. statements of Russian involvement in the Ukraine fighting as “dangerous propaganda,” and the German newsmagazine Der Spiegel went so far as to ask: “Do the Americans want to sabotage the European mediation attempts in Ukraine led by Chancellor Merkel?”That was a reference to Merkel’s and French President Francois Hollande’s meetings last month in Minsk, Belarus, with Ukrainian President Petro Poroshenko and Russian President Vladimir Putin to hash out a cease-fire. While the separatists completed their takeover of the Ukrainian city of Debaltseve after the cease-fire went into effect, it’s generally considered to be holding.All sides agree that Russia is supporting the separatists, something a NATO official stressed in responding to German frustrations, saying that there’s “broad agreement on the overall situation.”But Germans and other Europeans are concerned that U.S. Air Force Gen. Philip Breedlove – the NATO supreme allied commander, Europe – and Victoria Nuland, the assistant secretary of state for Europe, have been exaggerating the extent of Russian involvement in the conflict.Of particular concern are Breedlove’s figures on the numbers of troops and tanks Russia reportedly has transferred to Ukraine. The numbers Breedlove offers are routinely higher than those of other intelligence agencies, and Europeans fear he’s playing to an American audience, which they think doesn’t advance peace efforts.
  • Der Spiegel reported that the first example came early in the conflict, when Breedlove announced that Russia had massed 40,000 troops at the Ukrainian border, and he called the situation “incredibly alarming.” Other NATO nations detected far fewer troops – some said fewer than 20,000 – and ruled out an invasion, saying the “composition and equipment” of the forces were “not appropriate for an invasion or attack,” according to Der Spiegel.Numerous German news reports also have noted a vast difference between the number of Russian troops that European NATO members have estimated are in Ukraine’s conflicted Donbas region and what American NATO commanders have announced. It’s 600, according to the Europeans, versus the 12,000 to 20,000 estimated by U.S. commanders.Last month, Ukrainian military officials said the Russians had moved 50 tanks and dozens of rocket launchers across the border near Luhansk, and a U.S. general said Russian troops had directly interfered in the battles. But German intelligence could verify only that a few armored vehicles had been moved.According to German media reports, a top-level German government official worried that “partly incorrect claims or exaggerated claims could gamble away trust for the entire West.”
  •  
    McClatchy MSM, no less, reporting accusations that neocon State Dept. official Victoria Nuland USAF General Philip Breedlove --- NATO Supreme Commander --- are issuing "dangerous propaganda" about Russian involvement in the Ukraine War.   
Paul Merrell

Obama Refuses to Pardon Edward Snowden. Trump's New CIA Pick Wants Him Dead. - 0 views

  • President Obama indicated on Friday that he won’t pardon NSA whistleblower Edward Snowden, even as President-elect Donald Trump announced his pick to run the CIA: Kansas congressman Mike Pompeo, who has called for “the traitor Edward Snowden” to be executed.
  • In an interview with Obama published on Friday, German newspaper Der Spiegel asked: “Are you going to pardon Edward Snowden?” Obama replied: “I can’t pardon somebody who hasn’t gone before a court and presented themselves, so that’s not something that I would comment on at this point.” But P.S. Ruckman, editor of the Pardon Power blog said Obama is wrong to suggest he couldn’t pardon Snowden if he wanted to. Ruckman noted that Obama has previously only granted pardons and commutations to people who have already been convicted. “I just think what he may have better said is: ‘I prefer that he present himself to a court and then we’ll talk turkey.’ But technically in terms of the Constitution, there are no restrictions at all.” The operative Supreme Court ruling, from 1886, states that “The power of pardon conferred by the Constitution upon the President is unlimited except in cases of impeachment. It extends to every offence known to the law, and may be exercised at any time after its commission, either before legal proceedings are taken or during their pendency, or after conviction and judgment. The power is not subject to legislative control.”
Paul Merrell

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
Paul Merrell

Secret 'BADASS' Intelligence Program Spied on Smartphones - The Intercept - 0 views

  • British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies.
  • Programmers frequently embed code from a handful of such companies into their smartphone apps because it helps them answer a variety of questions: How often does a particular user open the app, and at what time of day? Where does the user live? Where does the user work? Where is the user right now? What’s the phone’s unique identifier? What version of Android or iOS is the device running? What’s the user’s IP address? Answers to those questions guide app upgrades and help target advertisements, benefits that help explain why tracking users is not only routine in the tech industry but also considered a best practice. For users, however, the smartphone data routinely provided to ad and analytics companies represents a major privacy threat. When combined together, the information fragments can be used to identify specific users, and when concentrated in the hands of a small number of companies, they have proven to be irresistibly convenient targets for those engaged in mass surveillance. Although the BADASS presentation appears to be roughly four years old, at least one player in the mobile advertising and analytics space, Google, acknowledges that its servers still routinely receive unencrypted uploads from Google code embedded in apps.
Paul Merrell

Germany Detains "Double Agent" for "Spying on Spy Investigation" | Global Research - 0 views

  • A member of Germany’s foreign intelligence agency has been detained for possibly spying for the US. The 31-year-old is suspected of giving a US spy agency information about a parliamentary inquiry of NSA activities. (Image: PictureAlliance/DPA))German news outlets on Friday are reporting that a so-called “double agent” has been detained after confessing to investigators that he was paid by U.S. agents to spy on the German parliamentary panel now investigating the extent of U.S. National Security Agency’s surveillance inside the country. According to Deutsche Welle: During questioning, the suspect reportedly told investigators that he had gathered information on an investigative committee from Germany’s lower house of parliament, the Bundestag. The panel is conducting an inquiry into NSA surveillance on German officials and citizens. A spokesperson for the Federal Prosecutor’s office declined to provide further details about the case, according to news agency AFP. German-US relations have been on the rocks since revelations of mass surveillance not only on German citizens, but also on Chancellor Angela Merkel and other politicians made headlines last year.
  • Der Spiegel (Google Translate) notes that initial information indicates the individual—who worked for the Bundesnachrichtendienst (BND), Germany’s equivalent of the NSA—had “been specifically looking for information related to the NSA investigation committee of the Bundestag and given them to his American contact man.” As journalist Glenn Greenwald immediately observed: That’d be the ultimate irony: US Govt spied on German parliamentary investigation into US Govt spying on Germans http://t.co/P9WkGT83oQ — Glenn Greenwald (@ggreenwald) July 4, 2014 And David Meyer, writing for Gigaom, adds: The 31-year-old was originally arrested on suspicion of having contact with Russian intelligence, but then apparently confessed to having reported back at least once to the Americans on the Bundestag committee’s activities. He reportedly did this for money. The reports raise the possibility that he may be lying, but also note that the committee has long suspected it was being spied on. If this is all true, it may turn out to be an even bigger diplomatic scandal than the NSA’s bugging of Chancellor Angela Merkel’s phone, a formal probe into which was announced a month ago.
  • On Thursday, the Bundestag’s investigative committee looking into NSA surveillance heard testimony from two U.S. whistleblowers who worked, Thomas Drake and William Binney, for the spy agency but objected to what they consider its troubling tactics. As Deutsche Welle reports, Binney—who once headed the agencies technology division—accused the NSA of having a “totalitarian mentality” and wanting “total information control” over U.S. citizens and the entirety of the global digital environment. He went on to compare the NSA’s approach to that used by dictators against oppressed populations. According to the Deutsche Presse-Agentur (DPA): Drake said the BND had become a “vermiform appendix of the NSA,” referring to accusations it had been passing data on German citizens on to the American service – an act forbidden under Germany’s constitution. “The silence of the BND is terrible,” Drake told the committee, and said people had a right to know what was going on. “You shouldn’t wait for a German Edward Snowden to lift the veil.”
  •  
    Greenwald quip is great: "That'd be the ultimate irony: US Govt spied on German parliamentary investigation into US Govt spying on Germans "  High comedy on the NSA front. 
Paul Merrell

Saudi Arabia wants missiles for Syrian rebels: report - FRANCE 24 - 0 views

  • Saudi Arabia plans to supply the Syrian opposition with anti-aircraft missiles to counter President Bashar al-Assad's air force, German news weekly Der Spiegel reported Sunday. The article, citing a classified report received by the German foreign intelligence service and the German government last week, said Riyadh was looking at sending European-made Mistral-class MANPADS, or man-portable air-defence systems. Der Spiegel noted the shoulder-launched surface-to-air missiles can target low-flying aircraft including helicopters and had given mujahideen fighters in Afghanistan a decisive edge against Soviet troops in the 1980s.
  • The European Union lifted an embargo on arming the Syrian opposition last month, paving the way for greater Western support for rebels in a civil war that has claimed 93,000 lives.
  •  
    This is troubling news. Saudi Arabia has been supplying weapons to the Jihadi Syrian "rebels", i.e., al-Nusra/al-Qaeda, who are the most potent fighting anti-Syrian government forces. The particular class of anti-aircraft missiles to be provided are equivalent to the currently-deployed American Stinger B. See http://en.wikipedia.org/wiki/Man-portable_air-defense_systems#Third_generation The missiles will not stay in Syria, of course. As soon as al-Qaeda is ready to use them elsewhere, they will be.  Look for Russia to respond by announcing the addition of shoulder-fired missiles to the anti-aircraft missiles already to aid in containing the squadron of U.S. F16s now stationed on the Jordan\Syria border. 
Paul Merrell

The Daily Dot - The NSA has nearly complete backdoor access to Apple's iPhone - 0 views

  • The U.S. National Security Agency has the ability to snoop on nearly every communication sent from an Apple iPhone, according to leaked documents shared by security researcher Jacob Appelbaum and German news magazine Der Spiegel.  An NSA program called DROPOUTJEEP allows the agency to intercept SMS messages, access contact lists, locate a phone using cell tower data, and even activate the device’s microphone and camera. 
  • According to leaked documents, the NSA claims a 100 percent success rate when it comes to implanting iOS devices with spyware. The documents suggest that the NSA needs physical access to a device to install the spyware—something the agency has achieved by rerouting shipments of devices purchased online—but a remote version of the exploit is also in the works. Appelbaum says that presents one of two possibilities: “Either [the NSA] have a huge collection of exploits that work against Apple products, meaning they are hoarding information about critical systems that American companies produce, and sabotaging them, or Apple sabotaged it themselves,” Appelbaum said at the Chaos Communication Conference in Hamburg, Germany. 
  • “Do you think Apple helped them with that?” Appelbaum asked. “I hope Apple will clarify that.”
  •  
    Nice image of a very revealing NSA document and an embedded video of Appelbaum's presentation at the annual Chaos Communication Conference in Hamburg, Germany.  Much of this year's conference was devoted to issues raised by this year's outing of the NSA's activities. 
Paul Merrell

Revealed: How the Nsa Targets Italy - 0 views

  • A special unit operating under cover and protected by diplomatic immunity, assigned to a very sensitive mission: to spy on the communication of the Italian leadership. That is what top secret documents leaked by Edward Snowden and published in Italy exclusively by l'Espresso in collaboration with "la Repubblica" reveal. A file mentions the "Special Collection Service " (SCS) sites in Rome and in Milan, the very same service which, according to the German weekly "Der Spiegel ", spied on the mobile phone of the German Chancellor, Angela Merkel. "Special Collection Sites", reads the file published today by l'Espresso, "provide considerable perishable intelligence on leadership communications largely facilitated by site presence within a national capital". These documents are very important because they contradict recent statements by the Italian Prime Minister reassuring the Italian Parliament. Speaking to the Chamber of Deputies four weeks ago, Enrico Letta said: "Based on the analysis conducted by our intelligence services and our international contacts, we are not aware that the security of the communications of the Italian government and embassies has been compromised, nor are we aware that the privacy of Italian citizens has been compromised". These top secret documents tell a different story, however.
  • The Special Collection Service is likely one of the most sensitive units in U.S. intelligence. The service deploys teams under diplomatic cover, operating in US embassies around the world to control friendly and enemy governments. The top secret NSA document examined by l'Espresso reveals that "in 1988 [SCS] had 88 sites, our peak". The SCS is assigned to a special mission: monitoring the communications of the political, and likely economical, leaders of host nations. For this reason, SCS teams operate within the heart of power: in embassies and consulates, working in close collaboration with the CIA. Also in Rome, in the US embassy located in via Veneto, from those very same roofs which witnessed the Dolce Vita. Snowden's files reveal that, at least until 2010, the Special Collection Service maintained two sites in Italy: one in Rome, a base staffed with agents, and one in Milan, the capital of the Italian economy where, according to a file dated 2010 and originally published in Der Spiegel, the SCS would run an unmanned site. Two sites in a relatively small country like Italy is unusual: only in Germany -- a prime target for NSA in Europe -- does SCS maintain two bases.
  • NSA's mass spying activities did not target our leadership and diplomacy alone, but it possibly also targeted millions of Italian citizens. A file on the top secret programme "Boundless Informant" that is labeled "Italy" reveals that between December 10, 2012 and January 9, 2013, the NSA collected the metadata for 45.893.570 telephone calls. Estimates close to this figure had already circulated, but now the actual document indicates the penetration of this monitoring. All of the metadata gathered in our country between December 10^th and January 9^th 2013 as reflected on this slide relate to phone communication, unlike the slides published in Germany and France, where internet communication metadata were targeted as well.
  • ...1 more annotation...
  • The Snowden file examined by l'Espresso reveals that the collection of phone metadata in Italy between December 10, 2012 and January 9, 2013 reached over four million metadata per day during the period of political crisis that culminated in the resignation of the Mario Monti government.
Paul Merrell

Blowback! U.S. trained ISIS at secret Jordan base - 0 views

  • Members of the Islamic State of Iraq and the Levant, or ISIS, were trained in 2012 by U.S. instructors working at a secret base in Jordan, according to informed Jordanian officials.
  • The officials said dozens of ISIS members were trained at the time as part of covert aid to the insurgents targeting the regime of Syrian President Bashar al-Assad in Syria. The officials said the training was not meant to be used for any future campaign in Iraq.
  • Last March, the German weekly Der Spiegel reported Americans were training Syrian rebels in Jordan. Quoting what it said were training participants and organizers, Der Spiegel reported it was not clear whether the Americans worked for private firms or were with the U.S. Army, but the magazine said some organizers wore uniforms. The training in Jordan reportedly focused on use of anti-tank weaponry. The German magazine reported some 200 men received the training over the previous three months amid U.S. plans to train a total of 1,200 members of the Free Syrian Army in two camps in the south and the east of Jordan. Britain’s Guardian newspaper also reported last March that U.S. trainers were aiding Syrian rebels in Jordan along with British and French instructors.
  • ...2 more annotations...
  • Reuters reported a spokesman for the U.S. Defense Department declined immediate comment on the German magazine’s report. The French foreign ministry and Britain’s foreign and defense ministries also would not comment to Reuters. The Jordanian officials spoke to WND amid concern the sectarian violence in Iraq will spill over into their own country as well as into Syria. ISIS previously posted a video on YouTube threatening to move on Jordan and “slaughter” King Abdullah, whom they view as an enemy of Islam. WND reported last week that, according to Jordanian and Syrian regime sources, Saudi Arabia has been arming the ISIS and that the Saudis are a driving force in supporting the al-Qaida-linked group.
  • WND further reported that, according to a Shiite source in contact with a high official in the government of Iraqi Prime Minister Nouri al-Maliki, the Obama administration has been aware for two months that the al-Qaida-inspired group that has taken over two Iraqi cities and now is threatening Baghdad also was training fighters in Turkey. The source told WND that at least one of the training camps of the group Iraq of the Islamic State of Iraq and the Syria, the ISIS, is in the vicinity of Incirlik Air Base near Adana, Turkey, where American personnel and equipment are located. He called Obama “an accomplice” in the attacks that are threatening the Maliki government the U.S. helped establish through the Iraq war. The source said that after training in Turkey, thousands of ISIS fighters went to Iraq by way of Syria to join the effort to establish an Islamic caliphate subject to strict Islamic law, or Shariah.
1 - 20 of 42 Next › Last »
Showing 20 items per page