Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Experts

Rss Feed Group items tagged

6More

Surveillance scandal rips through hacker community | Security & Privacy - CNET News - 0 views

  • One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'" The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?" Where does security innovation go next? The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
  • Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data. "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata. "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?" To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy. Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
  • Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service." Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.
  • ...2 more annotations...
  • The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google. Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship. "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic. It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
  • Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory." Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
  •  
    NSA as the cause of the next major disruption in the social networking service industry?  Grief ahead for Google? Note the point made that: "It's impossible to do a cloud-based ad supported service" where the encryption/decryption takes place on the client side. 
1More

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
10More

U.S. military confirms rebels had sarin - 1 views

  • As part of the Obama administration’s repeated insistence – though without offering proof – that the recent sarin gas attack near Damascus was the work of the Assad regime, the administration has downplayed or denied the possibility that al-Qaida-linked Syrian rebels could produce deadly chemical weapons. However, in a classified document just obtained by WND, the U.S. military confirms that sarin was confiscated earlier this year from members of the Jabhat al-Nusra Front, the most influential of the rebel Islamists fighting in Syria. The document says sarin from al-Qaida in Iraq made its way into Turkey and that while some was seized, more could have been used in an attack last March on civilians and Syrian military soldiers in Aleppo.
  • The document, classified Secret/Noforn – “Not for foreign distribution” – came from the U.S. intelligence community’s National Ground Intelligence Center, or NGIC, and was made available to WND Tuesday. It revealed that AQI had produced a “bench-scale” form of sarin in Iraq and then transferred it to Turkey. A U.S. military source said there were a number of interrogations as well as some clan reports as part of what the document said were “50 general indicators to monitor progress and characterize the state of the ANF/AQI-associated Sarin chemical warfare agent developing effort.” “This (document) depicts our assessment of the status of effort at its peak – primarily research and procurement activities – when disrupted in late May 2013 with the arrest of several key individuals in Iraq and Turkey,” the document said. “Future reporting of indicators not previously observed would suggest that the effort continues to advance despite the arrests,” the NGIC document said.
  • This seizure followed a chemical weapons attack in March on the Khan al-Assal area of rural Aleppo, Syria. In that attack, some 26 people and Syrian government forces were killed by what was determined to be sarin gas, delivered by a rocket attack. The Syrian government called for an investigation by the United Nations. Damascus claimed al-Qaida fighters were behind the attack, also alleging that Turkey was involved. “The rocket came from a place controlled by the terrorists and which is located close to the Turkish territory,” according to a statement from Damascus. “One can assume that the weapon came from Turkey.” The report of the U.S. intelligence community’s NGIC reinforces a preliminary U.N. investigation of the attack in Aleppo which said the evidence pointed to Syrian rebels. It also appears to bolster allegations in a 100-page report on an investigation turned over to the U.N. by Russia. The report concluded the Syrian rebels – not the Syrian government – had used the nerve agent sarin in the March chemical weapons attack in Aleppo.
  • ...7 more annotations...
  • The May 2013 seizure occurred when Turkish security forces discovered a two-kilogram cylinder with sarin gas while searching homes of Syrian militants from the al-Qaida-linked Jabhat al-Nusra Front following their initial detention. The sarin gas was found in the homes of suspected Syrian Islamic radicals detained in the southern provinces of Adana and Mersia. Some 12 suspected members of the al-Nusra Front were arrested. At the time, they were described by Turkish special anti-terror forces as the “most aggressive and successful arm” of the Syrian rebels. In the seizure, Turkish anti-terror police also found a cache of weapons, documents and digital data. At the time of the arrest, the Russians called for a thorough investigation of the detained Syrian militants found in possession of sarin gas.
  • While the contents of the report have yet to be released, sources tell WND the documentation indicates that deadly sarin poison gas was manufactured in a Sunni-controlled region of Iraq and then transported to Turkey for use by the Syrian opposition, whose ranks have swelled with members of al-Qaida and affiliated groups. The documentation that the U.N. received from the Russians indicated specifically that the sarin gas was supplied to Sunni foreign fighters by a Saddam-era general working under the outlawed Iraqi Baath party leader, Izzat Ibrahim al-Douri. Al-Douri was a top aide to Saddam Hussein before he was deposed as Iraqi president. The sarin nerve gas used in the Allepo attack, sources say, had been prepared by former Iraqi Military Industries Brig. Gen. Adnan al-Dulaimi. It then was supplied to Baath-affiliated foreign fighters of the Sunni and Saudi Arabian-backed al-Nusra Front in Aleppo, with Turkey’s cooperation, through the Turkish town of Antakya in Hatay Province. The source who brought out the documentation now in the hands of the U.N. is said to have been an aide to al-Douri. Al-Dulaimi was a major player in Saddam’s chemical weapons production projects, the former aide said. Moreover, Al-Dulaimi has been working in the Sunni-controlled region of northwestern Iraq where the outlawed Baath party now is located and produces the sarin.
  • The NGIC depiction of the variety of sarin as “bench-scale” reinforces an analysis by terrorism expert Yossef Bodansky, who said the recent findings on the chemical weapons attack of Aug. 21 on the outskirts of Damascus, Syria, was “indeed a self-inflicted attack” by the Syrian opposition to provoke U.S. and military intervention in Syria.
  • The terrorism expert said that the jihadist movement has technologies which have been confirmed in captured jihadist labs in both Turkey and Iraq, as well as from the wealth of data recovered from al-Qaida in Afghanistan in 2001 and 2002. He added that the projectiles shown by the opposition, which were tested by U.N. inspectors, are not standard weapons of the Syrian army.
  • Now, a former analyst for the Central Intelligence Agency, Ray McGovern, similarly backs the claim that the Syrian rebels perpetrated the poison gas attack on Aug. 21 McGovern was one of a number of veteran intelligence professionals who recently signed a letter to Obama saying that Damascus wasn’t behind the Aug. 21 chemical attack. As WND recently reported, former U.S. intelligence analysts claim current intelligence analysts have told them Assad was not responsible for the Aug. 21 poison gas attack, saying there was a “growing body of evidence” that reveals the incident was a pre-planned provocation by the Syrian opposition.
  • “Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army and their foreign sponsors,” the analysts said.
  • The VIPS memo to Obama reinforces separate videos, which show foreign fighters associated with the Syrian opposition firing artillery canisters of poison gas. One video shows Nadee Baloosh, a member of an al-Qaida-affiliated group Rioyadh al-Abdeen, admitting to the use of chemical weapons. In the video clip, al-Abdeen, who is in the Latakia area of Syria, said his forces used “chemicals which produce lethal and deadly gases that I possess.”
1More

Intelligence Warnings On Benghazi Were Loud And Clear - Investors.com - 0 views

  •  
    excerpt: "Months before the murder of a U.S. ambassador in Benghazi, American intelligence analysts documented a massive al-Qaida rally a few miles from the ambassador's residence. At that rally, terror leaders called for the murder of American diplomats. Three U.S. intelligence reports, unearthed by the American Media Institute and detailed here for the first time, offer vivid descriptions of the al-Qaida meeting. Flying the black flag of al-Qaida, some 300 armed men gathered in Benghazi's Al-Tahrir Square on June 7 and 8, 2012. They brandished machine guns, rocket launchers and a truck mounted with an anti-aircraft cannon. The two-day meeting, which included outdoor prayers and a parade of armed vehicles, was attended by a baker's dozen of North African al-Qaida affiliates. "It was like a team pep rally before the game, only for jihad," said a U.S. intelligence analyst who monitors North Africa. "Organized and deadly. You saw what followed. People died." In the face of these three reports, the State Department continued to deny requests for additional security for the U.S. ambassador in Libya. At the same time, the State Department issued a travel advisory warning Americans against going to Libya in August 2012. Obama administration officials have long denied any warning before the Sept. 11, 2012, Benghazi attacks. On the campaign trail, the president insisted that al-Qaida was "decimated" and "on the run," while intelligence reports prepared for the president's advisers told a different story - that al-Qaida's menace was growing in Libya and elsewhere. Al-Qaida itself publicly displayed its strength. Al-Qaida posted pictures of the June 2012 Benghazi meeting on its Arabic-language Facebook page and invited the Arabic-language media to cover the event, which many did. The three U.S. intelligence reports documenting the al-Qaida gathering in Benghazi were circulated in August 2012 and earlier among Defense and State Department officials, as well as Americ
8More

New Snowden docs show U.S. spied during G20 in Toronto - Politics - CBC News - 0 views

  • Top secret documents retrieved by U.S. whistleblower Edward Snowden show that Prime Minister Stephen Harper's government allowed the largest American spy agency to conduct widespread surveillance in Canada during the 2010 G8 and G20 summits.
  • The briefing notes, stamped "Top Secret," show the U.S. turned its Ottawa embassy into a security command post during a six-day spying operation by the National Security Agency while U.S. President Barack Obama and 25 other foreign heads of government were on Canadian soil in June of 2010. The covert U.S. operation was no secret to Canadian authorities.
  • Notably, the secret NSA briefing document describes part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers." Documents previously released by Snowden, a former NSA contractor who has sought and received asylum in Russia, suggested that support at other international gatherings included spying on the foreign delegations to get an unfair advantage in any negotiations or policy debates at the summit. It was those documents that first exposed the spying on world leaders at the London summit. More recently, Snowden's trove of classified information revealed Canada's eavesdropping agency had hacked into phones and computers in the Brazilian government's department of mines, a story that touched off a political firestorm both in that country and in Ottawa.
  • ...5 more annotations...
  • The secret documents do not reveal the precise targets of so much espionage by the NSA — and possibly its Canadian partner — during the Toronto summit. But both the U.S. and Canadian intelligence agencies have been implicated with their British counterpart in hacking the phone calls and emails of foreign politicians and diplomats attending the G20 summit in London in 2009 — a scant few months before the Toronto gathering of the same world leaders.
  • The spying at the Toronto summit in 2010 fits a pattern of economic and political espionage by the powerful U.S. intelligence agency and its partners such as Canada. That espionage was conducted to secure meeting sites and protect leaders against terrorist threats posed by al-Qaeda but also to forward the policy goals of the United States and Canada. The G20 summit in Toronto had a lot on its agenda that would have been of acute interest to the NSA and Canada.
  • The world was still struggling to climb out of the great recession of 2008. Leaders were debating a wide array of possible measures including a global tax on banks, an idea strongly opposed by both the U.S. and Canadian governments. That notion was eventually scotched. The secret NSA documents list all the main agenda items for the G20 in Toronto — international development, banking reform, countering trade protectionism, and so on — with the U.S. snooping agency promising to support "U.S. policy goals." Whatever the intelligence goals of the NSA during the Toronto summit, international security experts question whether the NSA spying operation at the G20 in Toronto was even legal.
  • "If CSEC tasked NSA to conduct spying activities on Canadians within Canada that CSEC itself was not authorized to take, then I am comfortable saying that would be an unlawful undertaking by CSEC," says Craig Forcese, an expert in national security at University of Ottawa's faculty of law. By law, CSEC cannot target anyone in Canada without a warrant, including world leaders and foreign diplomats at a G20 summit. But, the Canadian eavesdropping agency is also prohibited by international agreement from getting the NSA to do the spying or anything that would be illegal for CSEC.
  • The NSA warns the more likely security threat would come from "issue-based extremists" conducting acts of vandalism. They got that right. Protest marches by about 10,000 turned the Toronto G20 into an historic melee of arrests by more than 20,000 police in what would become one of the largest and most expensive security operations in Canadian history. By the time the tear gas had cleared and the investigations were complete, law enforcement agencies stood accused of mass-violations of civil rights. Add to that dubious legacy illegal spying by an American intelligence agency with the blessing of the Canadian government.
2More

Email surveillance could reveal journalists' sources, expert claims | Technology | theg... - 0 views

  • Phil Zimmermann, the creator of the email encryption software PGP, has warned that anyone who uses consumer email services needs to be aware of the threats of exposing their metadata to eavesdroppers.
  • That risk also led Zimmermann to develop a new feature for his Silent Phone app, encrypting conversations earlier in the call process. Dubbed "tunnelling", the feature hides the knowledge of who is talking to who from any eavesdroppers. Zimmermann had the idea for the feature “quite a few months before the Edward Snowden revelations”, but its upcoming release will be timely. Where PGP flaws are becoming clearer with time, Zimmermann argues that the core technology holds up just as well. “The first thing I did [after the Guardian published Snowden’s leaks] was review my own designs. "I haven't seen anything in the Snowden revelations that suggests that PGP or the stuff we do now is weak in any way.”
9More

Cover Story: How NSA Spied on Merkel Cell Phone from Berlin Embassy - SPIEGEL ONLINE - 0 views

  • According to SPIEGEL research, United States intelligence agencies have not only targeted Chancellor Angela Merkel's cellphone, but they have also used the American Embassy in Berlin as a listening station. The revelations now pose a serious threat to German-American relations.
  • Research by SPIEGEL reporters in Berlin and Washington, talks with intelligence officials and the evaluation of internal documents of the US' National Security Agency and other information, most of which comes from the archive of former NSA contractor Edward Snowden, lead to the conclusion that the US diplomatic mission in the German capital has not merely been promoting German-American friendship. On the contrary, it is a nest of espionage. From the roof of the embassy, a special unit of the CIA and NSA can apparently monitor a large part of cellphone communication in the government quarter. And there is evidence that agents based at Pariser Platz recently targeted the cellphone that Merkel uses the most. The NSA spying scandal has thus reached a new level, becoming a serious threat to the trans-Atlantic partnership. The mere suspicion that one of Merkel's cellphones was being monitored by the NSA has led in the past week to serious tensions between Berlin and Washington.
  • A "top secret" classified NSA document from the year 2010 shows that a unit known as the "Special Collection Service" (SCS) is operational in Berlin, among other locations. It is an elite corps run in concert by the US intelligence agencies NSA and CIA. The secret list reveals that its agents are active worldwide in around 80 locations, 19 of which are in Europe -- cities such as Paris, Madrid, Rome, Prague and Geneva. The SCS maintains two bases in Germany, one in Berlin and another in Frankfurt. That alone is unusual. But in addition, both German bases are equipped at the highest level and staffed with active personnel. The SCS teams predominantly work undercover in shielded areas of the American Embassy and Consulate, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. They just can't get caught.
  • ...5 more annotations...
  • This would correspond to internal NSA documents seen by SPIEGEL. They show, for example, an SCS office in another US embassy -- a small windowless room full of cables with a work station of "signal processing racks" containing dozens of plug-in units for "signal analysis." On Friday, author and NSA expert James Bamford also visited SPIEGEL's Berlin bureau, which is located on Pariser Platz diagonally opposite the US Embassy. "To me, it looks like NSA eavesdropping equipment is hidden behind there," he said. "The covering seems to be made of the same material that the agency uses to shield larger systems." The Berlin-based security expert Andy Müller Maguhn was also consulted. "The location is ideal for intercepting mobile communications in Berlin's government district," he says, "be it technical surveillance of communication between cellphones and wireless cell towers or radio links that connect radio towers to the network."
  • Campbell refers to window-like indentations on the roof of the US Embassy. They are not glazed but rather veneered with "dielectric" material and are painted to blend into the surrounding masonry. This material is permeable even by weak radio signals. The interception technology is located behind these radio-transparent screens, says Campbell. The offices of SCS agents would most likely be located in the same windowless attic.
  • Wiretapping from an embassy is illegal in nearly every country. But that is precisely the task of the SCS, as is evidenced by another secret document. According to the document, the SCS operates its own sophisticated listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication. The necessary equipment is usually installed on the upper floors of the embassy buildings or on rooftops where the technology is covered with screens or Potemkin-like structures that protect it from prying eyes. That is apparently the case in Berlin, as well. SPIEGEL asked British investigative journalist Duncan Campbell to appraise the setup at the embassy. In 1976, Campbell uncovered the existence of the British intelligence service GCHQ. In his so-called "Echelon Report" in 1999, he described for the European Parliament the existence of the global surveillance network of the same name.
  • Apparently, SCS agents use the same technology all over the world. They can intercept cellphone signals while simultaneously locating people of interest. One antenna system used by the SCS is known by the affable code name "Einstein." When contacted by SPIEGEL, the NSA declined to comment on the matter. The SCS are careful to hide their technology, especially the large antennas on the roofs of embassies and consulates. If the equipment is discovered, explains a "top secret" set of classified internal guidelines, it "would cause serious harm to relations between the United States and a foreign government." According to the documents, SCS units can also intercept microwave and millimeter-wave signals. Some programs, such as one entitled "Birdwatcher," deal primarily with encrypted communications in foreign countries and the search for potential access points. Birdwatcher is controlled directly from SCS headquarters in Maryland.
  • With the growing importance of the Internet, the work of the SCS has changed. Some 80 branches offer "thousands of opportunities on the net" for web-based operations, according to an internal presentation. The organization is now able not only to intercept cellphone calls and satellite communication, but also to proceed against criminals or hackers. From some embassies, the Americans have planted sensors in communications equipment of the respective host countries that are triggered by selected terms.
  •  
    A must-read article offering an in-depth, 3-page view of how badly the Snowden disclosures have poisoned trust between the U.S. and its NATO allies that are not favored members of the Five Eyes club. Details of NSA's surveillance operations in Germany and strong circumstantial evidence that Obama knew -- as recently as June 2013 -- of spy operations being conducted against hundreds of world leaders but denied it.  
3More

Nuke option necessary in case of massive cyberwar, report concludes - Stripes - Indepen... - 0 views

  • The United States should be prepared to use every military option, including nuclear retaliation, in response to a huge computer attack, an independent Department of Defense task force said. But the nation must determine whether its nuclear arsenal can withstand computer hackers, the Defense Science Board warns in a newly declassified report obtained by the Tribune-Review. In a full-scale cyber war, the board's experts say, the United States' weapons could be disabled or turned against its troops. "It would have to be extreme," Paul Kaminski, chair of the Science Board and a member of the President's Intelligence Advisory Board, said about the kind of attack that might trigger a nuclear response. "It would have to be the kind of attack that we would judge would be threatening our survival." The United States must assume that computer attacks will be part of conflicts, said the report from the task force made up of civilian experts with government advisers. Yet, the report said the country cannot be confident that its military's computer systems would still work under attack from a sophisticated adversary nation with a full range of military and intelligence options.
  • Some steps to increase computer defenses could be done "relatively inexpensively," said Brian Hughes, the Science Board's executive director. The report suggests the military segregate some weapons - such as 20 bombers out of a fleet of hundreds - from integrated computer networks. The planes would lose some capability but remain operational if a computer attack grounded the rest of the fleet. Other proposals include adding to the number of "cyber warriors," which Defense plans to do, and spending more time playing war games with launching and defending computer attacks. The military must be ready to launch potentially hundreds of simultaneous, synchronized computer attacks even as it defends against them.
  •  
    So much for the Open Web. R.I.P.
3More

Tikkun Daily Blog » Blog Archive » Obama Suppressing 6,000-Page Report on CIA... - 0 views

  • Over a year ago, the Senate Intelligence Committee voted to adopt a historic, 6,000-page report which contains “startling details” about CIA misdeeds related to its torture program. The report, which cost $40 million to produce and appears to pose no national security threats, has been set for release since December 13, 2012. However, it has yet to see the light of day. The reason: the Obama administration continues to suppress its release, apparently for no reason other than to protect the reputations of the guilty. Per The Atlantic‘s Conor Friedersdorf:
  • [Over a year ago], the Senate Intelligence Committee voted to adopt a 6,000-page report on the CIA rendition, detention, and interrogation program that led to torture. Its contents include details on each prisoner in CIA custody, the conditions of their confinement, whether they were tortured, the intelligence they provided, and the degree to which the CIA lied about its behavior to overseers. Senator Dianne Feinstein declared it one of the most significant oversight efforts in American history, noting that it contains “startling details” and raises “critical questions.” But all these months later, the report is still being suppressed. The Obama Administration has no valid reason to suppress the report. Its contents do not threaten national security, as evidenced by the fact that numerous figures who normally defer to the national-security state want it released with minor redactions. The most prominent of all is Vice President Joe Biden. The Center for Victims of Torture, in advocating for the public’s right to fully understand the CIA’s lawless torture program during the Bush administration, has procured the signatures of 58 national security experts and officials. These signatures include U.S. senators, former Obama administration officials and retired military leaders. President Obama once promised that his White House would be the most transparent in history, and went so far in February to claim that such is indeed the case. This most-transparent-ever administration is now
  • marking the CIA report as classified, determined “to keep secret the most thorough accounting we have of the agency’s lawless, immoral behavior.” Is President Obama bowing to factions within the CIA? Shielding the powerful from rebuke during his own illegal drone program? Protecting past criminals as a down payment on future investigations? To answer those questions would be to speculate. However, what is known is this: if we don’t fully understand those CIA abuses perpetrated in the name of the State and national security, we are more likely to allow those abuses to happen again.
6More

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.
  • The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.
  • ...2 more annotations...
  • The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that "encryption is an essential basis for trust on the Internet," and called for a halt to any NSA efforts to undermine it.
  • From RSA's earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.
  •  
    Reuters gives the NSA's history of introducing backdoors in encryption standards a deep look, focusing on RSA's acceptance of a $10 million NSA bribe post-9/11 to implement the NSA-created Dual Elliptic Curve standard for generating "random" numbers, which had what Bruce Schneier described as a "back door." A tip of the hat to Miro for alerting me to this article.
3More

2014 Press Release - NSA Announces New Civil Liberties and Privacy Officer" - 0 views

  • GEN Keith Alexander - Commander, U.S. Cyber Command/Director, NSA/Chief, CSS - announced today that well-known privacy expert Rebecca Richards will serve as the National Security Agency's new Civil Liberties and Privacy Officer. She most recently worked as the Senior Director for Privacy Compliance at the Department of Homeland Security.
  • Selected to lead the new NSA Civil Liberties and Privacy Office at the agency's Fort Meade headquarters, Ms. Richards' primary job will be to provide expert advice to the Director and oversight of NSA's civil liberties and privacy related activities. She will also develop measures to further strengthen NSA's privacy protections.
  •  
    Softball Interview here. . I wasn't really expecting Obama to reach out to the ACLU and EFF for a good civil liberties lawyer recommendation, but this appointment is lame, the former Director of Privacy for Dept. of Homeland Security, those wonderful folk who keep the homeland safe from terra-ists. The airport gropers, secret no-fly listers, and masters of border protection, where all Constitutional privacy rights do not apply, per the Supreme Court., the coordinators of our glorious "fusion centers," the provisioners of funding for armored cars and surveillance equipment for local police, etc. A sample from her interview linked above that I transcribed (omitting all the umhs and ahs): "When you think about NSA, privacy there for them was privacy of its employees, about contractors, about the average person walking down the street - it was not as concentrated on, this is the big collection that we're getting through these means, and so what this job does is that it brings it up under direct reports to the director of NSA and it is just as a focal point, to bring all of those and -- I walked in the building and people were already asking questions so ..." Heaven help us; has this lassie's brain yet matured to the point of completing her first sentence? This is the lady who is going to keep Admiral Rogers on the straight and narrow path of respecting our civil liberties? I suspect not.  I may return to this inarticulate and non-assertive young lady in later posts. Let it suffice for now to observe that the Dept. of Homeland Security, whose raison d'etre is a virtually non-existent terrorist threat manufactured by the politics of fear, has not exactly been a champion of the People's civil liberties. Moreover, I've had recent occasion to dig rather deeply into exactly what it is that Privacy Officers do and don't do. Telling heads of agencies that they cannot lawfully do what they want to do is no
9More

WASHINGTON: CIA's use of harsh interrogation went beyond legal authority, Senate report... - 0 views

  • A still-secret Senate Intelligence Committee report calls into question the legal foundation of the CIA’s use of waterboarding and other harsh interrogation techniques on suspected terrorists, a finding that challenges the key defense on which the agency and the Bush administration relied in arguing that the methods didn’t constitute torture.The report also found that the spy agency failed to keep an accurate account of the number of individuals it held, and that it issued erroneous claims about how many it detained and subjected to the controversial interrogation methods. The CIA has said that about 30 detainees underwent the so-called enhanced interrogation techniques.
  • The CIA’s claim “is BS,” said a former U.S. official familiar with evidence underpinning the report, who asked not to be identified because the matter is still classified. “They are trying to minimize the damage. They are trying to say it was a very targeted program, but that’s not the case.”The findings are among the report’s 20 main conclusions. Taken together, they paint a picture of an intelligence agency that seemed intent on evading or misleading nearly all of its oversight mechanisms throughout the program, which was launched under the Bush administration after the Sept. 11, 2001, attacks and ran until 2006.
  • Some of the report’s other conclusions, which were obtained by McClatchy, include:_ The CIA used interrogation methods that weren’t approved by the Justice Department or CIA headquarters._ The agency impeded effective White House oversight and decision-making regarding the program._ The CIA actively evaded or impeded congressional oversight of the program._ The agency hindered oversight of the program by its own Inspector General’s Office.
  • ...6 more annotations...
  • The investigation determined that the program produced very little intelligence of value and that the CIA misled the Bush White House, the Congress and the public about the effectiveness of the interrogation techniques, committee members have said.The techniques included waterboarding, which produces a sensation of drowning, stress positions, sleep deprivation for up to 11 days at a time, confinement in a cramped box, slaps and slamming detainees into walls. The CIA held detainees in secret “black site” prisons overseas and abducted others who it turned over to foreign governments for interrogation.The CIA, which contends that it gained intelligence from the program that helped identify al Qaida terrorists and averted plots against the United States, agreed with some of the report’s findings but disputed other conclusions in an official response sent to the committee in June 2013.
  • Some current and former U.S. officials and military commanders, numerous experts and foreign governments have condemned the harsh interrogation methods as violations of international and U.S. laws against torture, a charge denied by the CIA and the Bush administration.They’ve based their defense on a series of top-secret legal opinions issued by the Justice Department beginning in August 2002. At that time, the agency sought advice on whether using the harsh techniques on Zayn al Abidin Muhammad Husayn, a close aide to Osama bin Laden who went by the nom de guerre Abu Zubaydah, would violate U.S. law against torture.The Justice Department’s Office of Legal Counsel found that the methods wouldn’t breach the law because those applying them didn’t have the specific intent of inflicting severe pain or suffering.The Senate report, however, concluded that the Justice Department’s legal analyses were based on flawed information provided by the CIA, which prevented a proper evaluation of the program’s legality.
  • “The CIA repeatedly provided inaccurate information to the Department of Justice, impeding a proper legal analysis of the CIA’s Detention and Interrogation Program,” the report found.Several human rights experts said the conclusion called into question the program’s legal foundations.“If the CIA fundamentally misrepresented what it was doing and that was what led (Justice Department) lawyers to conclude that the conduct was legal, then the legal conclusions themselves were inaccurate,” said Andrea Prasow, senior national security counsel for Human Rights Watch. “The lawyers making those assessments were relying on the facts that were laid before them.”“This just reinforces the view that everyone who has said the torture program was legal has been selling a bill of goods and it’s time to revisit the entire conventional wisdom being pushed by those who support enhanced interrogation that this program was safe, humane and lawful,” said Raha Wala, a lawyer with Human Rights First’s Law and Public Safety Program.
  • Among other findings, the report said that CIA personnel used interrogation methods that weren’t approved by the Justice Department or their headquarters.The conclusion that the CIA provided inaccurate information to the Justice Department reflects the findings of a top-secret investigation of the program by the CIA Inspector General’s Office that was triggered by allegations of abuse.The CIA inspector general’s May 7, 2004, report, which was declassified, found that in waterboarding Zubaydah and Khalid Sheikh Mohammad, deemed the chief architect of the 9/11 attacks, the CIA went beyond the parameters it outlined to the Justice Department’s Office of Legal Counsel, which wrote the legal opinions.Zubaydah was waterboarded 83 times, while Mohammad underwent the procedure 183 times.Those cases clashed with the CIA’s assertion _ outlined in the now-declassified top-secret August 2002 Office of Legal Counsel opinion _ that repetition of the methods “will not be substantial because the techniques generally lose their effectiveness after several repetitions.”
  • The Office of Legal Counsel opinion stated that its finding that the harsh interrogation techniques didn’t constitute torture was based on facts provided by the CIA, and that “if these facts were to change, this advice would not necessarily apply.”The CIA inspector general’s report found that the “continued applicability of the DOJ opinion” was in question because the CIA told the Justice Department that it would use waterboarding in the same way that it was used in training U.S. military personnel to evade capture and resist the enemy. In fact, the inspector general’s report continued, the CIA used waterboarding in a “manner different” from U.S. military training.The CIA also failed to keep track of the number of individuals it captured under the program, the Senate report concluded. Moreover, it said, the agency held people who didn’t meet the legal standard for detention. The report puts that number at 26, McClatchy has learned.
  • “The CIA did not conduct a comprehensive or accurate accounting of the number of individuals it detained and held individuals who did not meet the legal standard for detention,” it found. “The CIA’s claims about the number of detainees held and subjected to its enhanced interrogation techniques were inaccurate.”“The CIA’s records were hazy, inconsistent and at times inaccurate,” said the former U.S. official.
6More

Fearing 'enemies,' Turkey blocks YouTube | Europe | DW.DE | 28.03.2014 - 0 views

  • First Twitter, now YouTube. The Turkish telecoms authority TIB said the move to was an "administrative measure." But only a few hours before the measure came into force, a rather provocative recording was posted on the site. According to the official view, the audio clip is one of the most flagrant among the many that anonymous opponents of the government have been leaking online over the last few months. It exposes the Islamic-conservative government led by Prime Minister Recep Tayyip Erdogan just before the municipal elections scheduled to take place on March 30. The conversation that was leaked this time is between Foreign Minister Ahmet Davutoglu and several heads of the intelligence service and the military. Participants of the conversation were apparently looking for a reason to go to war with Syria.
  • According to reports from the Turkish newspaper Hürriyet, the Turkish foreign ministry has confirmed the authenticity of the recording and has explained that the conversation took place in the foreign ministry. The ministry also emphasized, however, that the contents of the recording were distorted. In a statement issued by the Ministry of Foreign Affairs this explanation was given: "Monitoring such a meeting of a highly confidential nature which was held at a location such as the office of the foreign minister, where the most sensitive security issues of the state are discussed; and releasing these conversations to the public are a despicable attack, an act of espionage and a very serious crime against the national security of Turkey. This incident reveals the extent the threats of cyber and electronic attacks that Turkey encounters." The statement called the perpetrators "enemies of our state" and said they would be identified and severely punished as soon as possible.
  • But according to the legal expert, another aspect of the problem is at stake here. "This is a case of espionage. The alleged conversation took place in a secure location and it is on a very sensitive topic - the question of whether there should or should not be a war with Syria," he says. Tokuzlu added that the content of the conversation was clearly supposed to be released to the public in order to influence the results of this Sunday's (30.03.2014) local elections. But blocking the whole YouTube site was never an appropriate solution, Tokuzlu maintains. "There is no reason to block entire sites. You could block individual accounts or videos; that would be legitimate in this sort of a case," he said. Tokuzlu also explained that blocking YouTube could not be compared with the move to block Twitter: "The Security Council in Turkey held an emergency meeting. Right after, YouTube was blocked. That shows how important this case is."
  • ...2 more annotations...
  • The Turkish radio and television supervisory board RTÜK banned several Turkish media outlets from spreading the video or communicating its contents. According to the newspaper Hürriyet, the Turkish federal prosecutor's office has already initiated investigations against those responsible for the video. Measures taken too far According to legal expert Bertan Tokuzlu, the recording gives the impression that the government wanted to make trouble internationally, in order to distract the public from internal problems. "If the government wanted to create a reason for war, that is absolutely not in keeping with international legal standards," says Tokuzlu.
  • The recording also mentions Turkish arms deliveries to Syrian opposition groups. "If that is the case and we have a war crime to deal with, then the public has a right to know this information, according to the European Court of Human Rights," Tokuzlu stressed, adding that the Turkish government's reaction to the publication of the conversation was very thin-skinned. "If the recording provides evidence of a war crime, then that might mean the government will be brought before a war crimes tribunal in the near future. That is a delicate subject."
  •  
    This article is from 28 March 2014. The Turkish government a few days ago restored access to YouTube and Twitter, after reports that more than 300,000 Turks had thwarted the ban by learning to use Tor and VPN tunneling, posing a long-term obstacle to Turkish intelligence service surveillance. The Foreign Ministry recording was of the Foreign Minister and other high Turkish officials discussing plans for a false flag attack on Turkey to justify Turkey launching its own direct military attacks on Syria. Because Turkey is a member of NATO, an attack on Turkey triggers the obligations of other NATO member nations to join Turkey's "defense." 
4More

The Pentagon gave local cops nearly 12,000 bayonets over the past 8 years - Vox - 0 views

  • Through the 1033 program, the federal government has geared America's local police departments with military-grade equipment — ranging from airplanes to bayonets — worth hundreds of millions of dollars. NPR combed through the transaction data for the program to find out where the equipment went and what kind of gear was involved. Since 2006, the Pentagon distributed more than 79,000 assault rifles, 205 grenade launchers, nearly 12,000 bayonets, nearly 4,000 combat knives, 50 airplanes, 479 bomb detonator robots, and much more to America's local cops. One chart from NPR shows the counties that got the most guns per 1,000 people through the program
  • It's not immediately clear why some of these places would need so much military-grade equipment. With the notable exception of Starr County, Texas, the counties and states on the list have modest crime rates, and they aren't hotbeds for drug or terrorist activity — the two main targets of the federal government's police militarization schemes.* The proliferation of such weapons could soon come to an end. Following outcry against police militarization during the August protests in Ferguson, Missouri, the Obama administration ordered a review that will consider whether local police should have the equipment, whether they need to receive more training if they obtain the gear, and how the federal government can better oversee the equipment's use. The Pentagon said it could even take back some of the equipment if it's deemed necessary.
  • The federal government has been arming local police departments with military-grade equipment for decades through multiple federal schemes, particularly the 1033 program. The 1033 program transfers surplus military-grade equipment from the Pentagon to local police. It does not, however, provide training or oversight for the equipment's use. The program is also loaded with what many experts view as a perverse incentive: to keep the equipment, local police must use it within a year. This incentive, some experts argue, might encourage police to use the weapons even when they're not necessary.
  •  
    Bayonets for police? Good grief! We couldn't even get them in the Army  in Viet Nam.
5More

Russia Holds "De-Dollarization Meeting": China, Iran Willing To Drop USD From Bilateral... - 0 views

  • That Russia has been pushing for trade arrangements that minimize the participation (and influence) of the US dollar ever since the onset of the Ukraine crisis (and before) is no secret: this has been covered extensively on these pages before (see Gazprom Prepares "Symbolic" Bond Issue In Chinese Yuan; Petrodollar Alert: Putin Prepares To Announce "Holy Grail" Gas Deal With China; Russia And China About To Sign "Holy Grail" Gas Deal; 40 Central Banks Are Betting This Will Be The Next Reserve Currency; From the Petrodollar to the Gas-o-yuan and so on). But until now much of this was in the realm of hearsay and general wishful thinking. After all, surely it is "ridiculous" that a country can seriously contemplate to exist outside the ideological and religious confines of the Petrodollar... because if one can do it, all can do it, and next thing you know the US has hyperinflation, social collapse, civil war and all those other features prominently featured in other socialist banana republics like Venezuela which alas do not have a global reserve currency to kick around. Or so the Keynesian economists, aka tenured priests of said Petrodollar religion, would demand that the world believe. However, as much as it may trouble the statists to read, Russia is actively pushing on with plans to put the US dollar in the rearview mirror and replace it with a dollar-free system. Or, as it is called in Russia, a "de-dollarized" world.
  • Voice of Russia reports citing Russian press sources that the country's Ministry of Finance is ready to greenlight a plan to radically increase the role of the Russian ruble in export operations while reducing the share of dollar-denominated transactions. Governmental sources believe that the Russian banking sector is "ready to handle the increased number of ruble-denominated transactions". According to the Prime news agency, on April 24th the government organized a special meeting dedicated to finding a solution for getting rid of the US dollar in Russian export operations. Top level experts from the energy sector, banks and governmental agencies were summoned and a number of measures were proposed as a response for American sanctions against Russia. Well, if the west wanted Russia's response to ever escalating sanctions against the country, it is about to get it. The "de-dollarization meeting” was chaired by First Deputy Prime Minister of the Russian Federation Igor Shuvalov, proving that Moscow is very serious in its intention to stop using the dollar. A subsequent meeting was chaired by Deputy Finance Minister Alexey Moiseev who later told the Rossia 24 channel that "the amount of ruble-denominated contracts will be increased”, adding that none of the polled experts and bank representatives found any problems with the government's plan to increase the share of ruble payments.
  • Further, if you thought that only Obama can reign supreme by executive order alone, you were wrong - the Russians can do it just as effectively. Enter the "currency switch executive order": It is interesting that in his interview, Moiseev mentioned a legal mechanism that can be described as "currency switch executive order”, telling that the government has the legal power to force Russian companies to trade a percentage of certain goods in rubles. Referring to the case when this level may be set to 100%, the Russian official said that "it's an extreme option and it is hard for me to tell right now how the government will use these powers". Well, as long as the options exists. But more importantly, none of what Russia is contemplating would have any practical chance of implementation if it weren't for other nations who would engage in USD-free bilateral trade relations. Such countries, however, do exist and it should come as a surprise to nobody that the two which have already stepped up are none other than China and Iran.
  • ...1 more annotation...
  • Of course, the success of Moscow's campaign to switch its trading to rubles or other regional currencies will depend on the willingness of its trading partners to get rid of the dollar. Sources cited by Politonline.ru mentioned two countries who would be willing to support Russia: Iran and China. Given that Vladimir Putin will visit Beijing on May 20, it can be speculated that the gas and oil contracts that are going to be signed between Russia and China will be denominated in rubles and yuan, not dollars. In other words, in one week's time look for not only the announcement of the Russia-China "holy grail" gas agreement described previously here, but its financial terms, which now appears virtually certain will be settled exclusively in RUB and CNY. Not USD. And as we have explained repeatedly in the past, the further the west antagonizes Russia, and the more economic sanctions it lobs at it, the more Russia will be forced away from a USD-denominated trading system and into one which faces China and India. Which is why next week's announcement, as groundbreaking as it most certainly will be, is just the beginning.
  •  
    Soon to be joined by the other two BRICS?
1More

Economy Roundtable - Coast to Coast AM - 0 views

  •  
    "Date: 05-07-14 Host: George Noory Guests: Catherine Austin Fitts, Gerald Celente, George Ure, Robert Zimmerman This special panel discussion on the economy and related topics featured investment advisor Catherine Austin Fitts, trends analyst Gerald Celente, and consultant George Ure. Currently, the financial system is still being pumped with cheap money, such as $45 billion a month in mortgage-backed securities, and interest rates remain at record lows-- but once those interest rates go back up, the economy will tumble, said Celente. Fitts cited the continued inequality and centralization in the economy as hampering growth, while Ure noted that we're in the bottoming process with the Fed, which is trying to print money fast enough so we don't drop into something like the Great Depression. While the US continues its behind-closed-doors propping up of the economy, "I still believe we're going to see something like a panic level by the end of the second quarter," Celente remarked. America used to be the land of opportunity, but now the wealth is concentrated in the hands of the few, he added. Globalization is lowering the wealth of the middle class, and the reality is "we're automating or outsourcing jobs, and putting people on government checks," Fitts commented. Ure, who studies cyclical patterns of the economy or "long waves," said right now we're seeing a "war on cash," with a huge effort to get people into an electronic system, where all their transactions and investments can be tracked. The revelations by Edward Snowden about America's surveillance state has had a depressing effect on US economic growth, as well as inspiring other countries around the world to pull out of the system, Fitts suggested. "We live in a country where the system of creating money has basically been sublet from Congress to the Federal Reserve...and government is wholesale now, in the business of granting different franchises such as in communications and money operations," Ure detail
11More

Asia Times Online :: It was Putin's missile! - 0 views

  • And here's the spin war verdict: the current Malaysia Airlines tragedy - the second in four months - is "terrorism" perpetrated by "pro-Russian separatists", armed by Russia, and Vladimir Putin is the main culprit. End of story. Anyone who believes otherwise, shut up. Why? Because the CIA said so. Because Hillary "We came, we saw, he died" Clinton said so. Because batshit crazy Samantha "R2P" Power said so - thundering at the UN, everything duly printed by the neo-con infested Washington Post. [1] Because Anglo-American corporate media - from CNN to Fox (who tried to buy Time Warner, which owns CNN) - said so. Because the President of the United States (POTUS) said so. And mostly because Kiev had vociferously said so in the first place.
  • Right off the bat they were all lined up - the invariably hysterical reams of "experts" of the "US intelligence community" literally foaming at their palatial mouths at "evil" Russia and "evil" Putin; intel "experts" who could not identify a convoy of gleaming white Toyotas crossing the Iraqi desert to take Mosul. And yet they have already sentenced they don't need to look any further, instantly solving the MH17 riddle.
  • It doesn't matter that President Putin has stressed the MH17 tragedy must be investigated objectively. And "objectively" certainly does not mean that fictional "international community" notion construed by Washington - the usual congregation of pliable vassals/patsies. And what about Carlos?
  • ...7 more annotations...
  • A simple search at reveals that MH17 was in fact diverted 200 kilometers north from the usual flight path taken by Malaysia Airlines in the previous days - and plunged right in the middle of a war zone. Why? What sort of communication MH17 received from Kiev air control tower? Kiev has been mute about it. Yet the answer would be simple, had Kiev released the Air Traffic Control recording of the tower talking to flight MH17; Malaysia did it after flight MH370 disappeared forever. It won't happen; SBU security confiscated it. So much for getting an undoctored explanation on why MH17 was off its path, and what the pilots saw and said before the explosion. The Russian Defense Ministry, for its part, has confirmed that a Kiev-controlled Buk anti-aircraft missile battery was operational near the MH17's crash. Kiev has deployed several batteries of Buk surface-to-air missile systems with at least 27 launchers; these are all perfectly capable of bringing down jets flying at 33,000 ft.
  • Radiation from a battery's Kupol radar, deployed as part of a Buk-M1 battery near Styla (a village some 30km south of Donetsk) was detected by the Russian military. According to the ministry, the radar could be providing tracking information to another battery which was at a firing distance from MH17's flight path. The tracking radar range on the Buk system is a maximum of 50 miles. MH17 was flying at 500 mph. So assuming the "rebels" had an operational Buk and did it, they would have had not more than five minutes to scan all the skies above, all possible altitudes, and then lock on. By then they would have known that a cargo plane could not possibly be flying that high. For evidence supporting the possibility of a false flag, check here.
  • And then there's the curiouser and curiouser story of Carlos, the Spanish air traffic controller working at Kiev's tower, who was following MH17 in real time. For some Carlos is legit - not a cipher; for others, he's never even worked in Ukraine. Anyway he tweeted like mad. His account - not accidentally - has been shut down, and he has disappeared; his friends are now desperately looking for him. I managed to read all his tweets in Spanish when the account was still online - and now copies and an English translation are available. These are some of his crucial tweets: "The B777 was escorted by 2 Ukrainian fighter jets minutes before disappearing from radar (5.48 pm)" "If the Kiev authorities want to admit the truth 2 fighter jets were flying very close a few minutes before the incident but did not shoot down the airliner (5.54)" "As soon as the Malaysia Airlines B777 disappeared the Kiev military authority informed us of the shooting down. How did they know? (6.00)"
  • "Everything has been recorded on radar. For those that don't believe it, it was taken down by Kiev; we know that here (in traffic control) and the military air traffic control know it too (7.14)" "The Ministry of the Interior did know that there were fighter aircraft in the area, but the Ministry of Defense didn't. (7.15)" "The military confirm that it was Ukraine, but it is not known where the order came from. (7.31)" Carlos's assessment (a partial compilation of his tweets is collected here http://slavyangrad.wordpress.com/2014/07/18/spanish-air-controller-kiev-borispol-airport-ukraine-military-shot-down-boeing-mh17/ ): the missile was fired by the Ukraine military under orders of the Ministry of Interior - NOT the Ministry of Defense. Security matters at the Ministry of the Interior happen to be under Andriy Parubiy, who was closely working alongside US neo-cons and Banderastan neo-nazis on Maidan.
  • Assuming Carlos is legit, the assessment makes sense. The Ukrainian military are divided between Chocolate king President Petro Poroshenko - who would like a d?tente with Russia essentially to advance his shady business interests - and Saint Yulia Timoshenko, who's on the record advocating genocide of ethnic Russians in Eastern Ukraine. US neo-cons and US "military advisers" on the ground are proverbially hedging their bets, supporting both the Poroshenko and Timoshenko factions. So who profits? The key question remains, of course, cui bono? Only the terminally brain dead believe shooting a passenger jet benefits the federalists in Eastern Ukraine, not to mention the Kremlin. As for Kiev, they'd have the means, the motive and the window of opportunity to pull it off - especially after Kiev's militias have been effectively routed, and were in retreat, in the Donbass; and this after Kiev remained dead set on attacking and bombing the population of Eastern Ukraine even from above. No wonder the federalists had to defend themselves.
  • And then there's the suspicious timing. The MH17 tragedy happened two days after the BRICS announced an antidote to the IMF and the World Bank, bypassing the US dollar. And just as Israel "cautiously" advances its new invasion/slow motion ethnic cleansing of Gaza. Malaysia, by the way, is the seat of the Kuala Lumpur War Crimes Commission, which has found Israel guilty of crimes against humanity. Washington, of course, does profit. What the Empire of Chaos gets in this case is a ceasefire (so the disorganized, battered Kiev militias may be resupplied); the branding of Eastern Ukrainians as de facto "terrorists" (as Kiev, Dick Cheney-style, always wanted); and unlimited mud thrown over Russia and Putin in particular until Kingdom Come. Not bad for a few minutes' work. As for NATO, that's Christmas in July. From now on, it all depends on Russian intelligence. They have been surveying/tracking everything that happens in Ukraine 24/7. In the next 72 hours, after poring over a lot of tracking data, using telemetry, radar and satellite tracking, they will know which type of missile was launched, where from, and even produce communications from the battery that launched it. And they will have access to forensic evidence.
  • Unlike Washington - who already knows everything, with no evidence whatsoever (remember 9/11?) - Moscow will take its time to know the basic journalistic facts of what, where, and who, and engage on proving the truth and/or disproving Washington's spin. The historical record shows Washington simply won't release data if it points to a missile coming from its Kiev vassals. The data may even point to a bomb planted on MH17, or mechanical failure - although that's unlikely. If this was a terrible mistake by the Novorossiya rebels, Moscow will have to reluctantly admit it. If Kiev did it, the revelation will be instantaneous. Anyway we already know the hysterical Western response, no matter what; Russia is to blame. Putin is more than correct when he stressed this tragedy would not have happened if Poroshenko had agreed to extend a cease-fire, as Merkel, Hollande and Putin tried to convince him in late June. At a minimum, Kiev is already guilty because they are responsible for safe passage of flights in the airspace they - theoretically - control. But all that is already forgotten in the fog of war, tragedy and hype. As for Washington's hysterical claims of credibility, I leave you with just one number: Iran Air 655.
  •  
    Pepe Escobar again.  Cui bono, indeed. It's the first question that should be asked when investigating any mystery.  
7More

Hackers Stole Secrets of U.S. Government Workers' Sex Lives - The Daily Beast - 0 views

  • It was already being described as the worst hack of the U.S. government in history. And it just got much worse.A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity.Those details, which are now presumed to be in the hands of Chinese spies, are found in the so-called “adjudication information” that U.S. investigators compile on government employees and contractors who are applying for security clearances. The exposure suggests that the massive computer breach at the Office of Personnel Management is more significant and potentially damaging to national security than officials have previously said.
  • Three former U.S. intelligence officials told The Daily Beast that the adjudication information would effectively provide dossiers on current and former government employees, as well as contractors. It gives foreign intelligence agencies a roadmap for finding people with access to the government’s most highly classified secrets.Obama administration officials had previously acknowledged the breach of information that applicants voluntarily disclose on a routine questionnaire, called Standard Form 86, but the theft of the more detailed and wide-ranging adjudication information appears to have gone overlooked.
  • “Whoever compromised the adjudication information is going to have clear knowledge, beyond what’s in the SF86, about who the best targets for espionage are in the United States,” Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command, told The Daily Beast. “This is the most successful cyber attack in the history of the United States,” owing to the amount and quality of the information that was stolen, Adams said. U.S. intelligence officers spend years trying to recruit foreign spies to gather the kinds of details and insights that are contained in adjudication information, one former senior U.S. official said. This official, who requested anonymity, added that adjudication information would give foreign intelligence services “enormous leverage” over U.S. personnel whom they might forcibly interrogate for information or try to recruit.
  • ...4 more annotations...
  • The adjudication process had a broad scope, taking into account the SF86 questionnaire, reports from background investigations, interviews with the applicant's family members and associates, his or her employment history, and for people seeking high-level clearances, the results of polygraph investigations.Seymour said such records “span an employee’s career” and could stretch back as far as 30 years. Officials have said that as many as 18 million people may have been affected by the breach. Asked specifically what information the hackers had obtained, Seymour told lawmakers that she preferred to answer later in a “classified session.” Seymour didn’t specify how many people’s information was stolen. But the OPM oversees background investigations, which comprise a key part of the adjudication process, for more than 90 percent of security clearance applicants, according to the Congressional Research Service. An OPM spokesman didn’t respond to a request for comment in time for publication.
  • A former senior U.S. intelligence official, who asked to remain anonymous, said the OPM breach would cause more damage to national security operations and personnel than the leaks by Edward Snowden about classified surveillance by the National Security Agency.“This is worse than Snowden, because at least programs that were running before the leaks could be replaced or rebuilt,” the former official said. “But OPM, that’s the gift that keeps on giving. You can’t rebuild people.”Adjudicators are in a powerful position because in deciding whether to recommend granting a security clearance, they have access to the entire scope of an applicant’s file and are told to make a subjective analysis.“The adjudication process is the careful weighing of a number of variables known as the whole-person concept,” according to official guidelines. “Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination.”
  • By design, adjudication is an invasive process, meant to unearth risk factors including drug and alcohol abuse, extramarital affairs, a history of violence, and other events that speak to a person’s “trustworthiness” and their susceptibility to blackmail or being recruited to spy for a foreign government.For instance, “compulsive gambling is a concern, as it may lead to financial crimes including espionage,” the guidelines say. Adjudicators are told to note “a pattern of compulsive, self-destructive, or high risk sexual behavior,” “relapse after diagnosis of alcohol abuse,” and “emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior,” among other warning signs in 13 categories. Some of the embarrassing personal details found in some adjudications have been made public. That’s what happens after an applicant who was denied a security clearance launched an appeal.
  • Armed with such intimate details of a person’s worst moments, foreign spies would have unprecedented advantage against their U.S. adversaries. And the news is especially bad for people who hold the highest levels of clearance, which require more rigorous background checks, noted Adams, the computer security expert. “The higher up you go in your sensitivity levels, the more data that’s in your adjudication file,” he said.
6More

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
3More

Moscow News - Reports: Moscow Has Greek, Iranian Approval For Syria Flights - 0 views

  • The Interfax news agency quoted a Russian Embassy official in Tehran as saying on September 9 that Iran approved all of Moscow's requests on flights delivering humanitarian aid to Syria. Separately, a Russian Embassy official in Athens told TASS that Greece granted Russia the right to use its airspace for humanitarian flights to Syria on August 31. Greece said this week that the United States had asked it to close its airspace to Russian aid flights to Syria because of concerns that Moscow might be building up military forces to support Syrian President Bashar al-Assad. Bulgaria's Foreign Minister Daniel Mitov said on September 9 that Sofia could allow Syria-bound Russian planes to cross its airspace if Moscow permits it to inspect the cargo at a Bulgarian airport. Meanwhile, Russia's Foreign Ministry has acknowledged that Russian military experts were present in Syria. Ministry spokeswoman Maria Zakharova said on September 9 that the experts were assisting with Russian arms deliveries to Syria, which Moscow says are aimed at combating terrorism. She also said U.S. requests to Greece and Bulgaria to close their airspace for Russian flights to Syria amount to "international boorishness."
  • The comments come a day after Washington said it was "concerned by reports that Russia may have deployed additional military personnel and aircraft to Syria." White House spokesman Josh Earnest also warned that a Russian military buildup in Syria could lead to a "confrontation" with the U.S.-led coalition carrying out air strikes against the Islamic State (IS) extremist group.
  •  
    Oooh! Two NATO nations, Greece and Bulgaria, being insufficiently servile to U.S. desires. 
« First ‹ Previous 81 - 100 of 403 Next › Last »
Showing 20 items per page