Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Dutch

Rss Feed Group items tagged

Paul Merrell

Dutch intelligence agency AIVD hacks internet forums - nrc.nl - 0 views

  • The Dutch intelligence service - AIVD - hacks internet web forums to collect the data of all users. The majority of these people are unknown to the intelligence services and are not specified as targets when the hacking and data-collection process starts. A secret document of former NSA-contractor Edward Snowden shows that the AIVD use a technology called Computer Network Exploitation – CNE – to hack the web forums and collect the data.
  • Nico van Eijk, a Dutch professor in Information Law, is of the opinion that the Dutch intelligence service has crossed the boundaries of Dutch legislation. “They use sweeps to collect data from all users of web forums. The use of these techniques could easily lead to mass surveillance by the government.” IT specialist Matthijs Koot says that the exploitation of this technology can lead to a blurring of the lines between normal citizens and legitimate targets of the intelligence services. The document summarizes a meeting held on February 14, 2013 between officials of the NSA and the Dutch intelligence services - AIVD and MIVD. During this meeting Dutch officials briefed their American counterparts on the way they target web forums with the CNE technique. “They acquire MySQL databases via CNE access”, the document reads. MySQL is free open source software used to build databases for web forums. These databases contain all the posts of all the users of the forum and their personal data. During the meeting Dutch intelligence officers explained how they use the information in the database. In order to identify targets. According to the document the Dutch “are looking at marrying the forum data with other social network info, and trying to figure out good ways to mine the data that they have.”
  • A group of Dutch members of parliament have called for a parliamentary inquiry into the way the secret services are collecting and using data. The Dutch intelligence services have been previously criticised by an oversight committee for the way in which they have used legally intercepted data. According to this committee the search queries the intelligence services used to filter the data, were not specific enough. The use of generic queries, the committee concluded, was “not in accordance with Dutch law”. A spokesperson for the Dutch government refused to comment on the use of data from web forums by the AIVD, but stated that the intelligence services are allowed to hack computers. A spokesperson for the American government stated that the publication of classified information is a threat to US national security.
  •  
    Oooh ... Entire social media SQL databases. Content, user security stuff, the works. Big, big, big haystacks.
Paul Merrell

Dutch MH17 Investigation Omits US "Intel". Fabrications and Omissions Supportive of US-... - 0 views

  • The absence of America’s so-called “intelligence” regarding the downing of Malaysia Airlines MH17 over Ukraine in a 34 page Dutch Safety Board preliminary report raises serious questions about the credibility and legitimacy of both America’s political agenda, and all agencies, organizations, and political parties currently behind it. The report titled, “Preliminary Report: Crash involving Malaysia Airlines Boeing 777-200 flight MH17″ (.pdf), cites a wide variety of evidence in its attempt to determine the cause of flight MH17′s crash and to prevent similar accidents or incidents from occurring again in the future. Among this evidence includes the cockpit voice recorder (CVR), the flight data recorder (FDR), analysis of recorded air traffic control (ATC) surveillance data and radio communication, analysis of the meteorological circumstances, forensic examination of the wreckage (if recovered and possible foreign objects if found), results of the pathological investigation, and analysis of the in-flight break up sequence.
  • Satellite images are referenced in regards to analyzing the crash site after the disaster, however, no where in the report is mentioned any evidence whatsoever of satellite images of missile launchers, intelligence from the United States regarding missile launches, or any information or evidence at all in any regard suggesting a missile had destroyed MH17. In fact, the report concludes by stating: This report is preliminary. The information must necessarily be regarded as tentative and subject to alternation or correction if additional evidence becomes available. Further work will at least include the following areas of interest to substantiate the factual information regarding:
  • The report specifically mentions information collected from Russia, including air traffic control and radar data – both of which were publicly shared by Russia in the aftermath of the disaster. The report also cites data collected from Ukraine air traffic controllers. The United States however, apart from providing technical information about the aircraft itself considering it was manufactured in the US, provided absolutely no data in any regard according to the report.
  • ...3 more annotations...
  • In the wake of the MH17 tragedy, the West would rush through a series of sanctions against Russia as well as justify further military aid for the regime in Kiev, Ukraine and the literal Neo-Nazi militant battalions serving its pro-Western agenda amid a brutal civil war raging in the country’s eastern most provinces. With sanctions in hand, and the war raging on in earnest, the MH17 disaster dropped entirely out of Western narratives as if it never occurred. Surely if the West had solid evidence implicating eastern Ukrainian rebels and/or Russia, the world would never have heard the end of the MH17 disaster until the truth was fully aired before the public. When Dutch investigators published their preliminary report, the West merely reiterated its original claims, simply imposing their contradictory nature upon the report – most likely believing the public would never actually read its 34 pages. For example, Reuters in a report titled, “Malaysia: Dutch report suggests MH-17 shot down from ground,” would brazenly claim:
  • Had the US actually possessed any credible information to substantiate its claims that MH17 was shot down by a missile, such evidence surely would have been submitted to and included in the Dutch Safety Board’s preliminary reporting. That it is predictably missing confirms what commentators, analysts, and politicians around the world had long since suspected – the West’s premature conclusions regarding MH17′s demise were driven by a political agenda, not a factually based search for the truth. The evidence that MH17 was shot down by a missile as the West insisted is missing because it never existed in the first place. That the Dutch Safety Board possesses such a vast amount of information but is still unable to draw anything but the most tentative conclusions, exposes the alleged certainty of Western pundits and politicians in the hours and days after MH17′s loss as an utterly irresponsible, politically motivated, exploitation of tragedy at best, and at worst, exposing the West – NATO in particular – as possible suspects in a crime they clearly stood the most to benefit from.
  • Malaysia Airlines flight MH17 broke apart over Ukraine due to impact from a large number of fragments, the Dutch Safety Board said on Tuesday, in a report that Malaysia’s prime minister and several experts said suggested it was shot down from the ground. The title of Reuters’ propaganda piece directly contradicts its first paragraph which reveals “experts,” not the actual Dutch Safety Board report, claimed it was “shot down from the ground,” while the report itself says nothing of the sort. The experts cited by Reuters in fact had no association whatsoever with the preliminary report and instead are the same mainstay of cherry picked commentators the West constantly defers to while building up and perpetuating utterly fabricated narratives to advance its agenda globally.
Paul Merrell

Dutch Election Debacle: Immigrant Bashing Leads in Polls - WhoWhatWhy - 0 views

  • Geert Wilders, who is often called “the Dutch Donald Trump,” will not necessarily head the government even if he wins the most seats in parliament. But he has taught the current Prime Minister Mark Rutte to pit Dutch voters against immigrants and their children.The American right’s favorite Islamophobe and a columnist for Breitbart news, Wilders is campaigning with the slogan, “The Netherlands Ours Again.” He promises to close all mosques and ban the Qur’an. He also calls for “Nexit” — the Netherlands leaving the European Union.In the wake of Britain’s vote to leave the European Union (Brexit) and Trump’s election as US president, the world is obsessing over Dutch polls to see if “Trumpism” will score a victory in The Netherlands, one of the world’s most democratic countries.Wilders’s anti-Islamic, anti-EU and anti-immigration Party for Freedom (PVV) is in a tight race for the lead with Rutte’s center-right People’s Party for Freedom and Democracy (VVD). At a minimum, Wilders will likely add to his seats in parliament after the March 15 polls. About 40% of voters are undecided, giving hope to Dutch progressives that a left-wing coalition is still possible.
  • It is Rutte, in office since 2010, who has the best chance of forming a new government. Veering right, he is now competing with Wilders to articulate the feelings of a so-called “silent majority,” saying immigrant youth should fit in or pleur op (“fuck off”).The Dutch elections are the first in 2017’s super election year in Europe, with far-right parties in many countries campaigning on an anti-immigrant and anti-EU platform. The next test for populism, only a month away, will be in France, where the far-right leader Marine Le Pen seeks to become president. Germany’s Chancellor, Angela Merkel, faces elections in September and could lose to a challenger from the left.
  • If Wilders gains power, he says the first thing he will do is hold a Brexit-style referendum. Leaving the European Union, the world’s biggest economic trading bloc, would hardly seem to make sense for the Netherlands, a small country that has grown wealthy off trade.Still, a new opinion poll confirms that the Dutch are falling out of love with the EU. It shows a slight majority actually favor Nexit if EU membership could be replaced with “bilateral trade relations.”It should not be forgotten that the Dutch voted down the 2005 EU constitution, which later became the Lisbon Treaty. They also rejected, by a wide margin, an EU treaty with Ukraine in a referendum last spring.
Paul Merrell

Russian MoD: Missiles Shown By MH17 Investigators Were Decommissioned After 2011 - Sput... - 0 views

  • According to the Russian Defense Ministry, it's analyzing videos provided by Dutch investigators on the MH17 downing."The Russian Defense Ministry is analyzing video materials presented on May 24 at a press conference of the Dutch Joint Investigation Team, which is engaged in the investigation of the passenger Boeing's crash in the Ukrainian skies in 2014," the ministry said. All missiles, whose engines were demonstrated by the Dutch team, were disposed of after 2011. "After 25 years of operation, all missiles of the Buk systems are subject to decommissioning and disposal, and further use of these products… poses a direct threat to the life of servicemen. The maximum lifetime of the missile, the engine from which was demonstrated by the Dutch commission last Thursday was 2011 (1986 + 25), after which all the missiles produced that year were seized, decommissioned and sent for disposal," the ministry said. No new anti-aircraft missiles were supplied to Ukraine, which has about 20 battalions of BUK missiles systems since 1991, the ministry said, adding that a special number of the missile allegedly used to down the aircraft shows that it was produced in the Soviet Union in 1986.
  • The ministry further says that the Dutch commission has hushed up information about where and when the engine of the Buk missile was found, as well as about those who handed it over to the investigators. The ministry noted that the Dutch-led Joint Investigation Team (JIT) used the remained casing of a Buk missile engine, which was showcased during Thursday's press conference, as one of the proofs of the Russian armed forces' alleged involvement in the tragedy. "However, the speakers preferred not to mention when and where the engine was found, who handed this item to the investigative commission," the ministry's statement read. The document stressed that the Dutch investigators could have glossed over the source of origin of the missile engine because it could belong to Ukraine's armed forces. "The only reason for the deliberate silencing of the source of origin of the showcased rocket engine, produced in 1986, by the Dutch investigative commission is that it probably belongs to the Ukrainian armed forces," the statement read.
Paul Merrell

MH17 might have been shot down from air - chief Dutch investigator - RT News - 0 views

  • The chief Dutch prosecutor investigating the MH17 downing in eastern Ukraine does not exclude the possibility that the aircraft might have been shot down from air, Der Spiegel reported. Intelligence to support this was presented by Moscow in July. The chief investigator with the Dutch National Prosecutors' Office Fred Westerbeke said in an interview with the German magazine Der Spiegel published on Monday that his team is open to the theory that another plane shot down the Malaysian airliner. Following the downing of the Malaysian Airlines MH17 flight in July that killed almost 300 people, Russia’s Defense Ministry released military monitoring data, which showed a Kiev military jet tracking the MH17 plane shortly before the crash. No explanation was given by Kiev as to why the military plane was flying so close to a passenger aircraft. Neither Ukraine, nor Western states have officially accepted such a possibility.
  • Westerbeke said that the Dutch investigators are preparing an official request for Moscow’s assistance since Russia is not part of the international investigation team. Westerbeke added that the investigators will specifically ask for the radar data suggesting that a Kiev military jet was flying near the passenger plane right before the catastrophe. "Going by the intelligence available, it is my opinion that a shooting down by a surface to air missile remains the most likely scenario. But we are not closing our eyes to the possibility that things might have happened differently,” he elaborated.
  • Though the West has accused Eastern Ukrainian militia forces of shooting down the plane, it has provided only circumstantial evidence in support of such claims. Moscow has urged the US to release satellite images that prove its claims. “This may be a coincidence, but the US satellite flew over Ukraine at exactly the same time when the Malaysian airliner crashed,” a Russian Defense ministry spokesman said in a July statement.
  • ...2 more annotations...
  • In his interview to the German media, Westerbeke also called on the US to release proof that supports its claims. “We remain in contact with the United States in order to receive satellite photos,” he said.
  • Westerbeke concluded that in the Netherlands 10 prosecutors are investigating the incident, as well as forensic experts and 80 policemen. While the Dutch also regularly hold meetings with colleagues from Malaysia, Australia and Ukraine.
Paul Merrell

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Paul Merrell

Growing boycott will "hit each of us in the pocket" warns Israel finance minister | The... - 0 views

  • Israeli finance minister Yair Lapid has become the latest senior official to warn about the serious impact of growing boycott, divestment and sanctions (BDS) campaigns targeting Israel. “The world seems to be losing patience with us,” Lapid told the Hebrew edition of Ynet on 10 January.
  • Lapid, leader of the Yesh Atid faction, is the senior coalition partner of Israeli Prime Minister Benjamin Netanyahu.
  • Lapid added: “We have formulated complete scenarios as to what will happen if the boycott continues and exports are hurt. In all scenarios, things do not look good. The status quo will hit each of us in the pocket, will hurt every Israeli. We are export-oriented, and this [export trade] depends on our global standing.” Lapid was particularly concerned about further announcements by Israel of new tenders for houses in illegal Jewish-only colonies in the occupied West Bank. Lapid’s frank comments come just days after Dutch pensions giant PGGM took the unprecedented decision to divest from all Israeli banks because of their role in the colonization program.
  • ...1 more annotation...
  • Lapid, an alleged “centrist” who has habitually made anti-Arab comments, joins other senior politicians who have warned about the looming threat of boycott. Recently, the chair of the governing coalition’s Habayit Hayehudi party said that boycott was the “greatest threat” Israel faced. Justice minister and war crimes suspect Tzipi Livni also warned that “The boycott is moving and advancing uniformly and exponentially … Those who don’t want to see it, will end up feeling it.”
  •  
    This is the largest part of the real back story on John Kerry's feverish effort to negotiate a two-state solution to the Israel-Palestine apartheid problem. The Palestinian Boycott, Divestment, and Sanctions ("BDS") movement against Israel is growing rapidly, nearly doubling the rate of growth of the former BDS movement that successfully ended apartheid government of South Africa.   Israel has become a pariah state diplomatically because of its war crimes against Palestinians and because of BDS, is increasingly becoming a pariah state economically. At the same time, Israel has illegally colonized Palestine to the extent that a 2-state solution is all but impossible, meaning that the most likely outcome is that Israel will cease being the "Jewish State" and be forced to grant equality to Palestinians as well in a new secular government. The situation became all the more dire for Israel as the "Jewish State" when the U.N. General Assembly granted Palestine observer state status, opening the way for Palestine to, e.g., pursue criminal prosecution of Israeli leaders for war crimes before the International Criminal Court.  That has dramatically increased the Palestinian Authority's leverage in negotiations. Kerry is on a rescue mission to see if he can coerce the Palestinian Authority to cede sufficient land and powers to Israel to make a 2-state solution credible. Kerry's leverage is that the U.S. has been underwriting the Palestinian Authority's expenses and can threaten to withdraw the financial support.  All of which brings it down to the question of Palestinian Authority leadership corruption. If the PA stands tall and refuses to accept Kerry's ridiculous demands, there will almost certainly be no 2-state solution, ever, because Israel continues to colonize Palestine and has locked up most of Palestine's water resources. Further colonization means still less water for an "independent" Palestine state. The Palestine Authority, on the other hand, suffered f
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news... - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
Paul Merrell

Camouflage and Coverup: The Dutch Commission Report on the Malaysian MH17 Crash is "Not... - 0 views

  • “Weasel wording” consists in using “words and phrases aimed at creating an impression that a specific and/or meaningful statement has been made, when in fact only a vague or ambiguous claim has been communicated, enabling the specific meaning to be denied if the statement is challenged.” … “Some weasel words may also have the effect of softening the force of a potentially loaded or otherwise controversial statement through some form of understatement.” (Gary Jason 1988)
  • One thing must be stated outright: This report does not lie. It just can’t lie since there is nothing new in it. I myself have never seen such a meaningless plane crash report. What comes as a surprise, however, is the report’s diplomatic, sophisticated choice of words, which loses itself in ambiguous terminology. It was probably planned this way, so each party can continue to defend their version of what happened with zeal. Let’s take a closer look at this report.
Paul Merrell

MH17: Malaysia's Barring from Investigation Reeks of Cover-up | nsnbc international - 0 views

  • It was a Malaysian jet, carrying Malaysian passengers, flown by Malaysian pilots, yet after Malaysia Airlines flight MH17 was shot down over Ukraine in July 2014, Malaysia has been systematically blocked from participating in the investigation, leaving an overwhelmingly pro-NATO bloc in charge of the evidence, investigation and outcome as well as the manner in which the investigation will be carried out. Despite the integral role Malaysia has played during several pivotal moments in the aftermath of the disaster, it appears that the closer to the truth the investigation should be getting, the further Malaysia itself is being pushed from both the evidence and any influence it has on the likely conclusions of the investigation. With the downed aircraft in question being Malaysian, Malaysia as a partner in the investigation would seem a given. Its exclusion from the investigation appears to be an indication that the investigation’s objectivity has been compromised and that the conclusions it draws will likely be politically motivated.
  • With the Dutch leading the investigation, the logic being that the flight originated from the Netherlands and the majority of the passengers were Dutch, it has formed a Joint Investigation Team (JIT). At the onset of its creation it seemed obvious that Malaysia would too be included, considering it lost the second largest number of citizens to the disaster and the plane itself was registered in Malaysia. Instead, JIT would end up comprised of Belgium, Ukraine, and Australia, specifically excluding Malaysia. Malaysia was both surprised and has protested its exclusion from JIT, and has repeatedly expressed a desire to be included directly in the investigation.
  • The Malaysian Insider cited Malaysian scholar Dr. Chandra Muzaffar who believes the decision to exclude his country from the investigation is politically motivated, aiming at excluding members that may urge caution and objectivity instead of draw conclusions first and bend the investigation’s results around those conclusions. In particular, Dr. Muzaffar believes that the investigations is intentionally being skewed to target Russia. Ukraine’s involvement in the investigation is particularly troublesome. Had MH17 crashed in Ukraine under different circumstances, Ukraine’s role would be welcome. However, it was apparently shot down specifically in a conflict in which Kiev itself is a participant. With both sides of the conflict possessing anti-aircraft weapons and with Kiev itself confirmed to possess weapons capable of reaching the altitude MH17 was flying at when it was allegedly hit, Kiev becomes a possible suspect in the investigation. Kiev’s inclusion in JIT represents a monumental conflict of interest.
  • ...3 more annotations...
  • And to compound this already glaring conflict of interest, it was revealed recently that an alleged “secret deal” was struck by JIT in which any member could bar the release of evidence. With all members of JIT being pro-NATO and decidedly arrayed against Moscow, such a “deal” could prevent crucial evidence from being revealed that would effect an otherwise distorted conclusion drawn by the investigators aimed specifically at advancing their greater political agenda in Eastern Europe. Had Malaysia been a member of JIT, the ability of other members to withhold evidence would have been greatly diminished and it is likely such a bizarre deal would not have been conceivable, real or imaged, in the first place.
  • With the ongoing conflict in Ukraine perceived as a proxy war between NATO and Moscow, JIT’s membership including the NATO-backed Kiev regime itself (a possible suspect), two NATO members (Belgium and the Netherlands) and Australia who has passed sanctions against Russia over the conflict, is a textbook case of conflict of interest.
  • To casual observers, the current investigation led by NATO members and Kiev, a possible suspect, would be no different than the Donetsk People’s Republic and Russia leading it. Few would consider a DPR or Russian led investigation impartial, and few should see a NATO-led investigation as impartial. Had Malaysia been included in the process, an argument could have been made that an actual investigation was taking place rather than a complex propaganda campaign. Malaysia’s exclusion is a troubling sign for the victims of the MH17 disaster, meaning the true culprits will never be known. The overt politically motivated nature of the investigation will on one hand  help fuel NATO’s propaganda war, but on the other hand, fuel the doubts of millions worldwide over the true events that took place in the skies of eastern Ukraine that day. Like so many other events in human history that took place amid a high stake political struggle, the downing of MH17 will be shrouded in mystery, mystery draped over the truth by the irresponsible leadership of NATO, and those in Washington, London and Brussels egging on the conflict in Ukraine to this very day.
Paul Merrell

Bureau files ECHR case challenging UK government over surveillance of journalists' comm... - 0 views

  • The Bureau of Investigative Journalism is asking a European court to rule on whether UK legislation properly protects journalists’ sources and communications from government scrutiny and mass surveillance. The Bureau’s application was filed with the European Court of Human Rights on Friday. If the court rules in favour of the application it will force the UK government to review regulation around the mass collection of communications data. The action follows concerns about the implications to journalists of some of the revelations that have come out of material leaked by Edward Snowden. These have made it clear that by using mass surveillance techniques and programs such as Tempora government agencies can not only collect, store and scrutinise the content of electronic communications but also analyse masses of metadata – the details about where digital communications such as emails originate and the subject area of those communications. Gavin Millar QC, who is working on the case with the Bureau, believes UK authorities are routinely carrying out such data collection and analysis and says this enables a sophisticated picture to be developed of a journalist’s or organisation’s network of contacts, sources and lines of enquiry as well as materials, subjects and persons of interest to them.
  • The Bureau’s Christopher Hird says: “We understand why the government feels the need to have the power of interception. “But our concern is that the existing regulatory regime to control the interception of communications data – such as phone calls and emails – by organisations such as GCHQ does not provide sufficient safeguards to ensure the protection of journalists’ sources, and as a result is a restriction on the operation of a free press.” The collection of data by authorities is governed in the UK by the Regulation of Investigatory Powers Act, known as RIPA. This is primarily focused on internal communications. Many of the investigations undertaken by Bureau journalists involve foreign sources and stories, which are more vulnerable to interception as RIPA does not provide the same safeguards as it does for internal communications. The Bureau is working with lawyers from Doughty Street chambers and law firm Leigh Day, who have advised that there is little protection or rigorous scrutiny provided by current UK legislation for these “external” communications.
  •  
    Note that this case was filed with the ECHR in September 2014.  Quote from a prior decision of the ECHR involving Dutch journalists and government surveillance that will give UK government a steep hill to climb in persuading the ECHR to give GCHQ a pass:  "…where, as here, a power of the executive is exercised in secret, the risks of arbitrariness are evident. Since the implementation in practice of measures of secret surveillance is not open to scrutiny by the individuals concerned or the public at large, it would be contrary to the rule of law for the legal discretion granted to the executive to be expressed in terms of an unfettered power. Consequently, the law must indicate the scope of any such discretion conferred on the competent authorities and the manner of its exercise with sufficient clarity, having regard to the legitimate aim of the measure in question, to give the individual adequate protection against arbitrary interference."
Paul Merrell

'Hatred And Dear Didn't Win': Dutch Relief As Voters Reject Wilders - 0 views

  • Geert Wilders' anti-Muslim Freedom Party falls short of poll predictions but Prime Minister Mark Rutte faces challenge forming new coalition.
Paul Merrell

Asia Times Online :: The Fall of the House of Europe - 0 views

  • There's more, much more. These four characters - Bersani, Monti, Grillo, Berlusconi - happen to be at the heart of a larger than life Shakespearean tragedy: the political failure of the troika (European Commission, European Central Bank and International Monetary Fund), which translates into the politics of the European Union being smashed to pieces. That's what happens when the EU project was never about a political ''union'' - but essentially about the euro as a common currency. No wonder the most important mechanism of European unification is the European Central Bank. Yet abandon all hope of European politicians asking their disgruntled citizens about a real European union. Does anybody still want it? And exactly under what format?
  • All hell is breaking loose in the EU. Le Monde insists Europe is not in agony. Oh yes, it is; in a coma. And yet Brussels (the bureaucrat-infested European Commission) and Berlin (the German government) simply don't care about a Plan B; it's austerity or bust. Predictably, Dutch Finance Minister Jeroen Dijsselbloem - the new head of the spectacularly non-transparent political committee that runs the euro - said that what Monti was doing (and was roundly rejected by Italians) is ''crucial for the entire eurozone''.
  • The verdict is of an Italy ''in the hands of polit-clowns that may shatter the euro or force the country to exit''. Even the liberal-progressive Der Tagesspiegel in Berlin defines Italy as ''a danger to Europe''
  • ...3 more annotations...
  • So whatever government emerges in Italy, the message from Brussels, Berlin and Frankfurt remains the same: if you don't cut, cut and cut, you're on your own. Germany, for its part, has only a plan A. It spells out ''Forget the Club Med''. This means closer integration with Eastern Europe (and further on down the road, Turkey). A free trade deal with the US. And more business with Russia - energy is key - and the BRICS in general. Whatever the public spin, the fact is German think-tanks are already gaming a dual-track eurozone.
  • Philosopher Franco Berardi - who way back in the 1970s was part of the Italian autonomous movements - correctly evaluates that what Europe is living today is a direct consequence of the 1990s, when financial capital hijacked the European model and calcified it under neoliberalism. Subsequently, a detailed case can be made that the financial Masters of the Universe used the aftermath of the 2008 financial crisis to turbo-charge the political disintegration of the EU via a tsunami of salary cuts, job precariousness for the young, the flattening of pensions and hardcore privatization of everything. No wonder roughly 75% of Italians ended up saying ''No'' to Monti and Merkel.
  • What Grillo's movement has already done is to show how ungovernable Europe is under the Monti-Merkel austerity mantra. Now the ball is in the European financial elite's court. Most wouldn't mind letting Italy become the new Greece. So we go back full circle. The only way out would be a political reformulation of the EU. As it is, most of Europe is watching, impotently, the death of the welfare state, sacrificed in the altar of Recession. And that runs parallel to Europe slouching towards global irrelevance - Real Madrid and Bayern Munich notwithstanding. The Fall of the House of Europe might turn into a horror story beyond anything imagined by Poe - displaying elements of (already visible) fascism, neo-Dickensian worker exploitation and a wide-ranging social, civil war. In this context, the slow reconstruction of a socially based Europe may become no more than a pipe dream.
Paul Merrell

Cyprus bail-out: savers will be raided to save euro in future crises, says eurozone chi... - 0 views

  • Savings accounts in Spain, Italy and other European countries will be raided if needed to preserve Europe's single currency by propping up failing banks, a senior eurozone official has announced.
  • The new policy will alarm hundreds of thousands of British expatriates who live and have transferred their savings, proceeds from house sales and other assets to eurozone bank accounts in countries such as France, Spain and Italy. The euro fell on global markets after Jeroen Dijsselbloem, the Dutch chairman of the eurozone, told the FT and Reuters that the heavy losses inflicted on depositors in Cyprus would be the template for future banking crises across Europe.
  • "If there is a risk in a bank, our first question should be 'Okay, what are you in the bank going to do about that? What can you do to recapitalise yourself?'," he said. "If the bank can't do it, then we'll talk to the shareholders and the bondholders, we'll ask them to contribute in recapitalising the bank, and if necessary the uninsured deposit holders." Ditching a three-year-old policy of protecting senior bondholders and large depositors, over €100,000, in banks, Mr Dijsselbloem argued that the lack of market contagion surrounding Cyprus showed that private investors could now be hit to pay for bad banking debts.
  • ...2 more annotations...
  • "If we want to have a healthy, sound financial sector, the only way is to say, 'Look, there where you take on the risks, you must deal with them, and if you can't deal with them, then you shouldn't have taken them on,'" he said. "The consequences may be that it's the end of story, and that is an approach that I think, now that we are out of the heat of the crisis, we should take." The announcement is highly significant as it signals the mothballing of the euro's €700bn bailout fund, the European Stability Mechanism (ESM), which Spain and Ireland wants to be used to recapitalise their troubled banks.
  • he eurozone had been planning to roll out the ESM as a "big bazooka" in mid-2014 that could help save banks and prevent financial turmoil in countries such Spain or Italy, a development that has been delayed by German resistance. Mr Dijesselbloem's comments will alarm countries like Ireland and Spain that had been hoping to access the ESM in order to restructure banks without killing off their financial sector by inflicting huge losses on investors. "I think the approach needs to be, let's deal with the banks within the banks first, before looking at public money or any other instrument coming from the public side," he said. "Banks should basically be able to save themselves, or at least restructure or recapitalise themselves as far as possible."
Paul Merrell

Iceland Wins Major Case Over Failed Bank - NYTimes.com - 0 views

  • Iceland won a landmark case at a European court, ending an acrimonious legacy from the collapse of its banking system more than four years ago.On Monday, the court upheld the country’s refusal to promptly cover the losses of British and Dutch depositors who put more than $10 billion in Icesave, the bankrupt online offshoot of a failed Icelandic bank.In a judgment issued in Luxembourg, the court of the European Free Trade Association, orE.F.T.A., cleared Iceland of complaints that it violated rules governing the protection of depositors drawn up by the European Union. While Iceland is not a member of the union, it is bound by most of its rules as a member of E.F.T.A.
  • The case has attracted widespread attention because it touches on issues of cross-border banking that have been at the center of the European Union’s efforts to ensure the future stability of the region’s financial system. The Iceland banking collapse in 2008 — and the mayhem it caused far beyond the country’s borders — raised issues directly relevant to the 27-nation European Union.Monday’s court ruling in Luxembourg is a significant victory for Iceland. Unlike Ireland, Iceland declined to use taxpayer money to bail out foreign bondholders and depositors. This set off a bitter dispute with Britain, which used antiterrorism rules to take control of assets held in Britain by Icesave’s parent, Landsbanki.
  • In an interview this month with British television, Iceland’s president, Olafur Ragnar Grimsson, denounced the British government’s approach of using antiterrorist rules to seize Icelandic assets. “We were there together with Al Qaeda and the Taliban on that list,” he said. “We have not forgotten that in Iceland.”
Paul Merrell

Wikileaks' Assange Hints Murdered DNC Staffer Was Email-Leaker, Offers $20k Reward For ... - 0 views

  • The mysterious circumstances surrounding the death of 27-year-old Democratic-staffer Seth Rich (shot multiple times, and not robbed, at 420am near his home in Washington D.C., where no homicides have been reported within 1500 feet) have stirred Wikileaks founder Julian Assange to offer a $20,000 reward for information leading to a conviction. But it is Assange's comments during a Dutch TV interview that are most disturbing as he hinted that Rich - who was in charge of DNC voter expansion data - was the email-leaker and his death was a politically-motivated assassination.
  • As we detailed previously, the Clinton related body count so far this election cycle:  Five in just under six weeks - four convenient deaths plus one suicide... 1) Shawn Lucas, Sanders supporter who served papers to DNC on the Fraud Case (DOD August 2, 2016)   2) Victor Thorn, Clinton author (and Holocaust denier, probably the least credible on this list) shot himself in an apparent suicide. Conspiracy theorists at Mystery Writers of America said some guys will do anything to sell books. (DOD August, 2016)   3) Seth Conrad Rich, Democratic staffer, aged 27, apparently on his way to speak to the FBI about a case possibly involving the Clintons. The D.C. murder was not a robbery. (DOD July 8, 2016)   4) John Ashe, UN official who allegedly crushed his own throat while lifting weights, because he watched too many James Bond films and wanted to try the move where the bad guy tries to…oh, never mind. “He was scheduled to testify against the Clintons and the Democrat Party.” (DOD June 22, 2016)   5) Mike Flynn, the Big Government Editor for Breitbart News. Mike Flynn’s final article was published the day he died, “Clinton Cash: Bill, Hillary Created Their Own Chinese Foundation in 2014.” (DOD June 23, 2016) It must be coincidence, right?
Paul Merrell

Ron Wyden: the future of NSA programs is being determined now | World news | theguardia... - 0 views

  • Privacy advocates pressed Barack Obama to end the bulk collection of Americans’ communications data at a series of meetings at the White House on Thursday, seizing their final chance to convince him of the need for meaningful reform of sweeping surveillance practices. A key US senator left one meeting at the White House with the impression that President Obama has yet to decide on specific reforms. “The debate is clearly fluid,” senator Ron Wyden of Oregon, a longtime critic of bulk surveillance, told the Guardian after the meeting. “My sense is the president, and the administration, is wrestling with these issues,” Wyden said. Other groups were meeting presidential aides on Thursday afternoon, including the representatives of the American Civil Liberties Union, the Electronic Privacy Information Center (Epic) and the Open Technology Institute. Expectations were mounting that Obama will propose changing the National Security Agency’s controversial database of all domestic phone call records.
  • Wyden, a member of the Senate intelligence committee, said he viewed the coming days and weeks, ahead of an announcement by Obama about the future scope of surveillance, to be decisive for the debate triggered by NSA whistleblower Edward Snowden.  “What I’d say to Americans is that the future of these programs is being determined now,” Wyden said. “For those like me, who believe that security and liberty are not mutually exclusive, this is the time to weigh in.”
  • Speaking after the meeting with legislators, White House spokesman Jay Carney described the conversation as an opportunity for Obama to “solicit their input”, rather than brief them on his decisions about the future scope of surveillance activities.  The White House held meetings on Wednesday with the leadership of the intelligence agencies, including NSA director Keith Alexander and director of national intelligence James Clapper, as well as with Obama’s privacy and civil liberties advisory group. On Friday, Obama’s staff is expected to meet representatives of major technology firms, ostensibly to continue deliberations.  Shortly before the legislators’ meeting began, two of the attendees, House intelligence committee leaders Mike Rogers of Michigan and Dutch Ruppersberger of Maryland, issued a statement describing a classified Defense Department report that they said alleged that Snowden’s leaks –which they said totaled 1.7m intelligence files and impacted intelligence operations of all military branches – could “gravely impact” US national security. 
  • ...4 more annotations...
  • A spokesman for the Defense Intelligence Agency, which spearheaded the report, said the report was an “initial assessment”, and the work of the Information Review Task Force was “ongoing”. But neither the House intelligence committee leaders nor the DIA would provide additional information substantiating the allegations of Snowden’s impact.  “The report is classified and is not releasable,” said the DIA spokesman, who would not agree to be quoted by name. The classified interim assessment was delivered to the House and Senate intelligence committees on 6 January, and the DIA spokesman said there is no deadline for a final report, nor a mandate to make such a report public. 
  • Snowden's attorney, Ben Wizner, described the report as an attack on the journalism produced by the Snowden disclosures. "In truth, Mike Rogers is only indirectly attacking Snowden. He’s directly attacking the journalists who have reported on these revelations. There is not a shred of evidence that any adversary has had any access to any document other than those published by journalists, and they haven't contradicted that," Wizner told the Guardian. "We shouldn’t have any confidence in the accuracy of this innuendo. The government has shown time and again they have very little idea of what Snowden had access to."
  • Speaking outside the White House after a separate meeting with Obama, senator Rand Paul also stepped up his calls for government leniency toward Snowden, contrasting his treatment with Clapper, who has admitted misleading the Senate about surveillance. "Those who call for some sort of frontier justice for [Snowden] need to understand the laws needs to apply equally," Paul told reporters. "James Clapper by all accounts committed perjury which is punishable by five years in prison and if you want to throw the book at Snowden, it's a little hard to say 'Oh, but we're not going to do anything about James Clapper lying to Congress.'"
  • Asked if he was making a direct comparison, Paul added: "It's not my job to compare them or contrast what they did, but what James Clapper did has greatly harmed the credibility of the intelligence agencies ... he has really greatly damaged the intelligence community. It's arguable." After meeting with Obama, Wyden saw the debate over surveillance winding toward a conclusion. “This is crunch time. The decisions are going to be made in the very near future,” Wyden said. “The president made clear he wanted to hear from us. I’m going to keep urging members of Congress and the public to stand on the side of real reform and end intrusive surveillance practices that in effect violate the liberties of our people without making us safer.”
  •  
    Wyden  says it's time to get involved. Wyden is one of my senators and is about to get an email informing him that if he believes Barack Obama is the person who will decide this issue, he'd better think that over a bit more.  
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
1 - 20 of 39 Next ›
Showing 20 items per page