Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Five-Eyes

Rss Feed Group items tagged

Paul Merrell

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
Gary Edwards

The Precinct Project's Blog | Want to really "do something?" Take back the Republican P... - 0 views

  •  
    "Where do the candidates on our primary ballots come from? An estimated 95 per cent of the candidates of the Republican and Democrat parties who win the primary election are those who are endorsed by the leadership of those parties. Do You Know Who Elects The Party Leaders? Did You Elect Them? Who elects the leadership of the parties? Do you know? Are you a registered Republican? Guess what? As a "mere" registered Republican voter, without more, you did not have a vote in the election of the present leadership of the Republican Party. Sorry, but those are the facts. Only elected precinct committeemen get to vote for the leadership of the Party. Do I yet have your attention? Ponder the fact that only elected precinct committeemen get to elect the Party leadership. Don't you want to have a vote in those elections? Getting into position to have that right is easy. About 3,141 counties exist in the United States. Almost all have a county party organization. And, those county organizations almost always endorse candidates in the party primaries. And, usually, those party-endorsed candidates win. Tired of the kind of Republican In Name Only Republicans who are winning the primaries? Then do something real and become a Republican Party precinct committeeman! Guess what? About half of the Republican Party precinct committeeman slots, nationwide, are unfilled! There's about 400,000 slots nationwide and about 200,000 of those slots are vacant. If conservatives filled up all the empty slots they OWN the Party. Precinct Committeemen are the Party. Do I yet have your attention? Has the light bulb above your head clicked on yet? In some counties, like the one where I reside, Maricopa County, Arizona, within which Phoenix sits, TWO-THIRDS of the precinct committeeman slots in the Republican Party sat unfilled on Election Day, 2008. [Well, it's now November, 2012, and we're now at 52 per cent strength instead of where we were back in 2008 at 31 per cent.] Spend a few
Paul Merrell

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the court never authorized and which do not exist in law, he said.“It is clear that the exercise of the court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal Court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
Paul Merrell

Snowden GCSB revelations / Russel Norman says GCSB 'breaking the law' - National - NZ H... - 0 views

  • New Zealand is "selling out" its close relations with the Pacific nations to be close with the United States, author Nicky Hager has said. Hager, in conjunction with the New Zealand Herald and the Intercept news site, revealed today how New Zealand's spies are targeting the entire email, phone and social media communications of the country's closest, friendliest and most vulnerable neighbours. The revelations, based on documents supplied by United States fugitive and whistleblower Edward Snowden, expose a heavy focus on "full-take collection" from the Pacific with nearly two dozen countries around the world targeted by our Government Communications Security Bureau.
  • The Snowden documents show that information from across the Pacific is collected by New Zealand's GCSB but sent on to the United States' National Security Agency to plug holes in its global spying network.
  • READ MORE• The price of joining the Five Eyes club• How foreign spies access the data
  • ...1 more annotation...
  • From there, the documents show information collected by New Zealand is merged with data captured from across the world. It is then able to be accessed by the NSA's XKeyscore computer program through an online shopping-style interface, which allows searching of the world's communications. This morning, Hager told Radio New Zealand that the documents revealed even more countries which New Zealand was spying on, and more information would come. "The Five Eyes countries led by the US are literally trying to spy on every country in the world ... and what we're going to be hearing about in the next few days is New Zealand in all kinds of very surprising ways playing a role in that," he said. MORE: Read the Intercept's NZ story here Hager said New Zealand was "selling out" its close relations with the Pacific nations to be close with the United States. "The reason we spy on those little Pacific countries ... is not because New Zealand cares ... it's just something to take to the table to belong to the [Five Eyes] club."
Gary Edwards

The Daily Bell - Doug Casey on the Continuing Debasement of Money, Language and Banking... - 0 views

  • This isn't going to last because the way you get wealthy is by producing more than you consume and saving the difference – not by consuming more than you produce, and borrowing the difference. With the Fed keeping interest rates at artificially low levels, hoping to increase consumption, they're making it very foolish to save – when you get ½% or 1% on your savings. So people are saving less and they're borrowing more than they otherwise would. This is a formula for making things worse, not better.
  • They are, idiotically, doing exactly the opposite of what they should be.
  • In point of fact, the Fed should be abolished; the market, not bureaucrats, should determine interest rates. We wouldn't be in this pickle to start with if the government wasn't involved in the economy.
  • ...35 more annotations...
  • The Chinese, the Japanese – everybody is selling, trying to pass the Old Maid card of US Government debt, which represents return–free risk. Nobody other than the Fed is buying, and interest rates would skyrocket if they stopped. The more QE there is, the more distortions it will cause, however, making for a bigger disaster the longer it goes on.
  • Will the Fed continue to inflate the money supply? Doug Casey: They have to, because with the huge amount of debt in the world – and the amount of debt in the world has increased something like 40 or 50% just since the Greater Depression started – if they don't keep increasing the amount of money in the world then nobody's going to be able to service the huge amount of debt that is out there. So I don't see anything changing in the years to come. They've truly painted themselves into a corner. They're caught between Scylla and Charybdis, and we don't have Odysseus steering the ship of state.
  • Let me say, again, that the Fed serves no useful purpose and it should be abolished. Central banks create "super money" by buying government or other debt with new currency units that they credit to the sellers' accounts at commercial banks. That's the actual engine of inflation.
  • But it's greatly compounded in the commercial banking system through fractional reserve lending – which would not be possible without a central bank. Fractional reserve lending allows banks to multiply the money supply several times.
  • If $100 of Fed super money, freshly created, is deposited in a commercial bank like Chase or Citibank, then $90 can be lent out with a 10% reserve, the current number. That money is redeposited. They'll then lend out 90% of that $90, or $81, and then 90% of that $81, so it multiplies.
  • Central banking and fractional reserve lending go hand-in-hand.
  • Without a central bank, any bank that engaged in fractional reserve banking would be considered guilty of fraud and, when discovered, would be punished by a bank run, followed by criminal charges. The point to be made here is that the entire banking system today is totally unsound and totally corrupt.
  • In a sound banking system you have two types of deposits – checking account (or demand) deposits, and savings account (or time) deposits. They are completely different businesses. With demand deposits, you pay the bank to store your money securely, and write checks against it. A bank should no more lend out demand deposit money than Allied Storage should lend out the furniture you're paying them to store.
  • Savings accounts are completely different. Here you lend money to a bank, perhaps at 3%, and they relend it at 6%, making 3% to cover costs, risks and profits. A sound bank not only has to match the maturities of its deposits with the maturities of its loans, but must insure loans are both highly secured and self-liquidating.
  • These principles have been totally lost. Today banks operate as hedge funds.
  • As an aside, if someone were to set up a well-capitalized 100% reserve bank in a tax haven, especially using gold as an alternative currency, it would be immensely successful in the years to come – when most all conventional banks will fail.
  • By all historical, normal parameters, the stock market is greatly overvalued.
  • The trillions of new currency units that the Fed is creating are creating bubbles, and one of them is in the stock market. The biggest bubble, of course, is in the bond market – that's a super bubble.
  • Not only does the dollar have no real value but the banks you keep it in are all insolvent.
  • There are few sound investments out there. Today there are no investments; there are only speculations.
  • From the economist's point of view, the bubbles created by central banking are a disaster, but from a speculator's point of view they're a godsend. It's becoming harder and harder to be an investor; I define an investor as someone who allocates capital to productive business. It's hard to be an investor because you now have to spend more money on lawyers than on engineers and workers if you want to produce something. You're increasingly forced to be a speculator in today's climate.
  • Stock and bond markets all over the world are overpriced – with the exception of Russian stocks right now; they could be a very interesting speculation. I wouldn't touch anything in China yet, because all the Chinese banks are going to go bust.
  • The Chinese have been more profligate inflating the yuan than the Americans have been with the dollar. It's fantastic what the Chinese have done since Deng liberalized the economy in the early '80s, but now's not a time to be in their markets.
  • You've got to remember there are two types of people in the world: people who want to control material reality and people who want to control other people.
  • It's that second type who go into politics. They play games – here it's called the Great Game, which dignifies it in a way it shouldn't be – with other people's lives and property. It's been this way ever since the state was created about 5,000 years ago, and I don't think you should play games with other people's lives.
  • On the bright side, there are more scientists and engineers alive today than in all of human history put together, and so technology is advancing more rapidly than ever for that reason. That's a huge plus.
  • The second good thing is that the average person, at least those who aren't on welfare, tries to produce more than he consumes. That creates capital.
  • But I'm afraid that Western civilization reached its peak before World War I. World War I destroyed a huge amount of capital and, more importantly, it changed the moral bases of so many things.
  • Then World War II institutionalized the State as the most important part of society – which is perverse, because the state is actually the enemy of civil society.
  • I think Western civilization reached its peak in 1913, when it reached its maximum geographical extent. That was coincidental with the peak of its technological and philosophical influence on the world, much the way the Roman Empire reached its peak at about the end of the first century, then went down, slowly at first and then quickly. That's what's happening to the West.
  • Relative to the rest of the world, and contribution to world production, our piece of the economic pie is getting smaller and smaller. If we have another serious war it would be absolutely smaller, and the final nail in the coffin. Meanwhile, the US, with its bloated military, is just itching for another war. It's out of control, and unlikely to change at this point. That's a big trend that is in motion that I think is going to stay in motion.
  • Europe is in particularly bad shape. The place is a fascist/socialist disaster.
  • It was possible for the average European to keep his head above water through tax evasion in the past, but now those governments have broken bank secrecy everywhere, and it will destroy a lot of capital.
  • The "nation-state" is a really stupid and dysfunctional idea, and I'm glad it's on its way out.
  • That said, even the US, which from a cultural point of view is as much of a country as any place in the world, should actually break up into at least five or six regions.
  • Canada should break up into at least five or six regions initially.
  • I don't think politically; politics is the problem, not the solution. I think that the ideal solution is for every individual to opt out of the current system. When they give a war, you don't come. When they give a tax, you don't pay. When they give an election, you don't vote. You even try not to use their currency and their banking system. T
  • he ideal thing is to let the system collapse under its own weight as opposed to starting a new political party and then continuing to act politically, which is to say to use force on other people.
  • Market risk is huge today, but political risk is even bigger. One indication of that was, when the banks in Cyprus went bust some months ago, the government essentially confiscated everybody's account above 100,000 euros, in what they called a "bail-in."
  • You need several options. It seems like people haven't learned anything from what happened in Russia in 1917, Germany in 1933, China in 1948, Cuba in 1959, or Vietnam in 1975. Rwanda, Cambodia, Yugoslavia, Zimbabwe, Ukraine, Syria ... there are lots of examples and these things can and will eventually happen almost everywhere. When the chimpanzees go crazy, you don't want to be where they are. You've got to have a Plan B. You've got to have a crib out of that political jurisdiction. Acting like a plant, and staying put, isn't a good survival strategy for a human.
  •  
    "Doug Casey: I don't see a real recovery until they stop debasing the currency, radically cut government spending and taxation and eliminate most regulation. In other words, cease doing the things that caused this depression. And that's not going to happen until there's a collapse of the current order. Things have cyclically improved since the height of the crisis of 2008-09. The trillions of currency units created by the Federal Reserve have jammed the stock market higher and kept the big banks from going under. What surprises me is that retail prices have not moved as significantly as I would have expected. The reason, I believe, is that most of that money is still sitting in financial institutions. It has gone into cash out of fear, into stocks because they represent real wealth with earning power and into various speculative assets like artwork and collectible cars. Real estate has recovered somewhat, not because of strong fundamentals but strictly because of money creation. This isn't going to last because the way you get wealthy is by producing more than you consume and saving the difference - not by consuming more than you produce, and borrowing the difference. With the Fed keeping interest rates at artificially low levels, hoping to increase consumption, they're making it very foolish to save - when you get ½% or 1% on your savings. So people are saving less and they're borrowing more than they otherwise would. This is a formula for making things worse, not better. They are, idiotically, doing exactly the opposite of what they should be. Although, I hasten to add, I hate to pontificate on what the Fed "should" do. In point of fact, the Fed should be abolished; the market, not bureaucrats, should determine interest rates. We wouldn't be in this pickle to start with if the government wasn't involved in the economy. In fact, if it wasn't for the state, I suspect we'd all have a vastly higher standard of living, and would be colonizing the Moon, Mars and
Paul Merrell

Yahoo webcam images from millions of users intercepted by GCHQ | World news | The Guardian - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".
  • GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.
  • "Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
  • ...3 more annotations...
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.
  • Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.
  • The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".
Paul Merrell

New Zealand Targets Trade Partners, Hacks Computers in Spy Operations - The Intercept - 0 views

  • New Zealand is conducting covert surveillance operations against some of its strongest trading partners and has obtained sophisticated malware to infect targeted computers and steal data, newly released documents reveal. The country’s eavesdropping agency, Government Communications Security Bureau, or GCSB, is carrying out the surveillance across the Asia-Pacific region and beyond as part of its membership in the Five Eyes, a spying alliance that includes New Zealand as well as the United States, the United Kingdom, Canada, and Australia. The documents, revealed on Tuesday by the New Zealand Herald in collaboration with The Intercept, expose more details about the scope of New Zealand’s involvement in the Five Eyes, and show that the agency’s reach extends far beyond its previously reported eavesdropping on at least ten small South Pacific nations and territories. According to secret files from the National Security Agency, obtained by The Intercept from whistleblower Edward Snowden, GCSB is targeting about 20 different nations and territories in total and sharing the intercepted data with the NSA. A top-secret document dated from April 2013 notes that the New Zealand agency “provides [the NSA with] collection on China, Japanese/North Korean/Vietnamese/South American diplomatic communications, South Pacific Island nations, Pakistan, India, Iran, and Antarctica.”
  • Aside from eavesdropping on communications through traditional interception methods, such as by capturing signals as they are passing between satellites or phone cables, the New Zealand agency has also become directly involved in more aggressive methods of spying and cyberwar. The newly revealed documents show that it has obtained a malware tool that is part of a platform named WARRIORPRIDE, used by the NSA and other Five Eyes agencies to hack into computers and smartphones, infect them with a bug, and then steal data. The documents note that GCSB “has a WARRIORPRIDE capability that can collect against an ASEAN target.” ASEAN, or Association of Southeast Asian Nations, may be a reference to New Zealand’s operations targeting Vietnam. The surveillance being conducted by the GCSB shines light on a secret variant of New Zealand’s foreign policy that contrasts with its official public foreign policy. Vietnam, for instance, has friendly relations with New Zealand and is a growing trading partner. The New Zealand government describes its relationship with Vietnam as having “flourished in the last 15 years.” The country poses no security or terrorist threat to New Zealand, the traditional explanation for GCSB operations given to the public. Yet its government is still on the GCSB spying list and its diplomatic communications have been eavsedropped on, likely in violation of the 1961 Vienna Convention of Diplomatic Relations, an international treaty ratified by New Zealand that says diplomats’ correspondence is “inviolable.”
  •  
    The Vienna Convention on Diplomatic Relations provides in relevant part: "1.The receiving State shall permit and protect free communication on the part of the mission for all official purposes. In communicating with the Government and the other missions and consulates of the sending State, wherever situated, the mission may employ all appropriate means, including diplomatic couriers and messages in code or cipher. However, the mission may install and use a wireless transmitter only with the consent of the receiving State. "2.The official correspondence of the mission shall be inviolable. Official correspondence means all correspondence relating to the mission and its functions.: I see no relevant loophole.
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Gary Edwards

Doug Casey: All Banks Are Bankrupt - Casey Research - 1 views

  •  
    This interview should be must reading for every citizen of this world.  Doug Casey lays it out, explaining in the simplest of terms the problem of corrupt governments and banksters.  Put this RSS feed right next to Sir Charles' Priced In Gold" blog as essential to start your day with reading. excerpt: "Anyone with any sense should withdraw whatever cash they have in European banks, whether in euros or any other currency, immediately. Cyprus demonstrated that governments are quite willing and able to confiscate money sitting in a bank account in order to preserve the banking system. We live in Bizarro World. L: Why would it spread? Cyprus was said to be particularly vulnerable because of its strong Greek connections; Cypriot banks had bought of lot Greek debt. Would people in Luxembourg be as exposed? Doug: All banks are in effect creatures of the state at this point. They all own a lot of government bonds, which are considered the most secure form of capital. Of course, that's the opposite of the truth; all these governments are bankrupt as well. The Greek government is just more overtly bankrupt than most. Actually, we should take a minute here to discuss what a properly run banking system looks like. Historically, banks offered two types of accounts: demand deposits and time deposits. Demand deposits are what we call checking accounts today, but the original idea was that you'd pay your bank to store your money securely, and you had the right to "demand" your deposit back immediately, and to transfer funds via check. The idea of time deposits, which became savings accounts, was that the bank would pay you interest when you deposited your money with them for a specific period of time. That's why it's called a "time" deposit; you lent the bank your money for a given time, as did other depositors, and the banks would always know how much money they could lend out - at higher interest rates. Furthermore, loans made against time deposits were always short term
Gary Edwards

"War is a Racket" by General Smedly Butler - 1 views

  • by MAJOR GENERAL SMEDLEY D. BUTLER, USMC - Retired TWO-TIME Congressional Medal of Honor Recipient FULL TEXT ON LINE FREE
  • GET THE NEW PAPERBACK EDITION including two bonus titles.
  •  
    An accidental find, the full text online of USMC Maj. Gen. Smedley Butler's 1935 book, War Is a Racket. Butler served in the Marine Corps from 1899 to 1931 and at the time of his retirement was the most-decorated Marine in history, for both valor and accomplishments. Following his retirement, he became a vehement anti-war activist and public speaker.  This book is easily his most-cited and most-quoted published work. You can capture the flavor from an article he published in a magazine that included the following lines: "I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism. I helped make Mexico and especially Tampico safe for American oil interests in 1914. I helped make Haiti and Cuba a decent place for the National City Bank boys to collect revenues in. I helped in the raping of half a dozen Central American republics for the benefit of Wall Street. I helped purify Nicaragua for the International Banking House of Brown Brothers in 1902-1912. I brought light to the Dominican Republic for the American sugar interests in 1916. I helped make Honduras right for the American fruit companies in 1903. In China in 1927 I helped see to it that Standard Oil went on its way unmolested. Looking back on it, I might have given Al Capone a few hints. The best he could do was to operate his racket in three districts. I operated on three continents." http://en.wikipedia.org/wiki/Smedley_Butler#Lectures  I look forward to reading this book. The book was reprinted in 2003 and is available from the linked web site, together with two bonus titles. 
  •  
    "WAR IS A RACKET" - free online book CHAPTER ONE WAR is a racket. It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives. A racket is best described, I believe, as something that is not what it seems to the majority of the people. Only a small "inside" group knows what it is about. It is conducted for the benefit of the very few, at the expense of the very many. Out of war a few people make huge fortunes. In the World War [I] a mere handful garnered the profits of the conflict. At least 21,000 new millionaires and billionaires were made in the United States during the World War. That many admitted their huge blood gains in their income tax returns. How many other war millionaires falsified their tax returns no one knows. How many of these war millionaires shouldered a rifle? How many of them dug a trench? How many of them knew what it meant to go hungry in a rat-infested dug-out? How many of them spent sleepless, frightened nights, ducking shells and shrapnel and machine gun bullets? How many of them parried a bayonet thrust of an enemy? How many of them were wounded or killed in battle? Out of war nations acquire additional territory, if they are victorious. They just take it. This newly acquired territory promptly is exploited by the few - the selfsame few who wrung dollars out of blood in the war. The general public shoulders the bill. And what is this bill? This bill renders a horrible accounting. Newly placed gravestones. Mangled bodies. Shattered minds. Broken hearts and homes. Economic instability. Depression and all its attendant miseries. Back-breaking taxation for generations and generations. For a great many years, as a soldier, I had a suspicion that war was a racket; not until I retired to civil life did I fully realize it. Now that I see the international war clouds g
Paul Merrell

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. It is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. It is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
Paul Merrell

Cover Story: How NSA Spied on Merkel Cell Phone from Berlin Embassy - SPIEGEL ONLINE - 0 views

  • According to SPIEGEL research, United States intelligence agencies have not only targeted Chancellor Angela Merkel's cellphone, but they have also used the American Embassy in Berlin as a listening station. The revelations now pose a serious threat to German-American relations.
  • Research by SPIEGEL reporters in Berlin and Washington, talks with intelligence officials and the evaluation of internal documents of the US' National Security Agency and other information, most of which comes from the archive of former NSA contractor Edward Snowden, lead to the conclusion that the US diplomatic mission in the German capital has not merely been promoting German-American friendship. On the contrary, it is a nest of espionage. From the roof of the embassy, a special unit of the CIA and NSA can apparently monitor a large part of cellphone communication in the government quarter. And there is evidence that agents based at Pariser Platz recently targeted the cellphone that Merkel uses the most. The NSA spying scandal has thus reached a new level, becoming a serious threat to the trans-Atlantic partnership. The mere suspicion that one of Merkel's cellphones was being monitored by the NSA has led in the past week to serious tensions between Berlin and Washington.
  • A "top secret" classified NSA document from the year 2010 shows that a unit known as the "Special Collection Service" (SCS) is operational in Berlin, among other locations. It is an elite corps run in concert by the US intelligence agencies NSA and CIA. The secret list reveals that its agents are active worldwide in around 80 locations, 19 of which are in Europe -- cities such as Paris, Madrid, Rome, Prague and Geneva. The SCS maintains two bases in Germany, one in Berlin and another in Frankfurt. That alone is unusual. But in addition, both German bases are equipped at the highest level and staffed with active personnel. The SCS teams predominantly work undercover in shielded areas of the American Embassy and Consulate, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. They just can't get caught.
  • ...5 more annotations...
  • This would correspond to internal NSA documents seen by SPIEGEL. They show, for example, an SCS office in another US embassy -- a small windowless room full of cables with a work station of "signal processing racks" containing dozens of plug-in units for "signal analysis." On Friday, author and NSA expert James Bamford also visited SPIEGEL's Berlin bureau, which is located on Pariser Platz diagonally opposite the US Embassy. "To me, it looks like NSA eavesdropping equipment is hidden behind there," he said. "The covering seems to be made of the same material that the agency uses to shield larger systems." The Berlin-based security expert Andy Müller Maguhn was also consulted. "The location is ideal for intercepting mobile communications in Berlin's government district," he says, "be it technical surveillance of communication between cellphones and wireless cell towers or radio links that connect radio towers to the network."
  • Campbell refers to window-like indentations on the roof of the US Embassy. They are not glazed but rather veneered with "dielectric" material and are painted to blend into the surrounding masonry. This material is permeable even by weak radio signals. The interception technology is located behind these radio-transparent screens, says Campbell. The offices of SCS agents would most likely be located in the same windowless attic.
  • Wiretapping from an embassy is illegal in nearly every country. But that is precisely the task of the SCS, as is evidenced by another secret document. According to the document, the SCS operates its own sophisticated listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication. The necessary equipment is usually installed on the upper floors of the embassy buildings or on rooftops where the technology is covered with screens or Potemkin-like structures that protect it from prying eyes. That is apparently the case in Berlin, as well. SPIEGEL asked British investigative journalist Duncan Campbell to appraise the setup at the embassy. In 1976, Campbell uncovered the existence of the British intelligence service GCHQ. In his so-called "Echelon Report" in 1999, he described for the European Parliament the existence of the global surveillance network of the same name.
  • Apparently, SCS agents use the same technology all over the world. They can intercept cellphone signals while simultaneously locating people of interest. One antenna system used by the SCS is known by the affable code name "Einstein." When contacted by SPIEGEL, the NSA declined to comment on the matter. The SCS are careful to hide their technology, especially the large antennas on the roofs of embassies and consulates. If the equipment is discovered, explains a "top secret" set of classified internal guidelines, it "would cause serious harm to relations between the United States and a foreign government." According to the documents, SCS units can also intercept microwave and millimeter-wave signals. Some programs, such as one entitled "Birdwatcher," deal primarily with encrypted communications in foreign countries and the search for potential access points. Birdwatcher is controlled directly from SCS headquarters in Maryland.
  • With the growing importance of the Internet, the work of the SCS has changed. Some 80 branches offer "thousands of opportunities on the net" for web-based operations, according to an internal presentation. The organization is now able not only to intercept cellphone calls and satellite communication, but also to proceed against criminals or hackers. From some embassies, the Americans have planted sensors in communications equipment of the respective host countries that are triggered by selected terms.
  •  
    A must-read article offering an in-depth, 3-page view of how badly the Snowden disclosures have poisoned trust between the U.S. and its NATO allies that are not favored members of the Five Eyes club. Details of NSA's surveillance operations in Germany and strong circumstantial evidence that Obama knew -- as recently as June 2013 -- of spy operations being conducted against hundreds of world leaders but denied it.  
Paul Merrell

New Zealand spying on Pacific allies for 'Five Eyes' and NSA, Snowden files show | US n... - 0 views

  • The regional surveillance conducted from the base covers Tuvalu, Nauru, Kiribati, Vanuatu and the Solomon Islands. New Caledonia and French Polynesia, both French overseas territories, are also among the listed countries. Although Samoa, Fiji, Tonga and Vanuatu are named, much of their data is now transmitted via undersea cable links that are not susceptible to Waihopai’s intercept satellites. The revelations are particularly likely to test relations between New Zealand and Fiji, the island nation headed by Frank Bainimarama, the army chief-turned-prime minister. Following elections in Fiji in 2014, the countries have moved towards resuming full diplomatic links for the first time since the military coup led by Bainimarama in 2006. Andrew Little, the leader of the NZ opposition Labour party, said that while he accepted the need for security agencies to protect national interests, he was “stunned at the breadth of the information that’s been collected”.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Gary Edwards

Tomgram: Anand Gopal, How to Create an Afghan Blackwater | TomDispatch - 0 views

  • The Real Afghan War How an American Fantasy Conflict Created Disaster in Afghanistan By Anand Gopal [This essay is taken from chapter five of Anand Gopal’s No Good Men Among the Living: America, the Taliban, and the War Through Afghan Eyes and appears at TomDispatch.com with the kind permission of Metropolitan Books.]
  •  
    "The other day, as I was reading through the New York Times, I came upon this headline: "Powerful Afghan Police Chief Killed in Kabul." His name was Matiullah Khan.  He had once been "an illiterate highway patrol commander" in an obscure southern province of Afghanistan and was taken out in a "targeted suicide bombing" on the streets of the capital -- and I realized that I knew him!  Since I've never been within a few thousand miles of Kabul, I certainly didn't know him in the normal sense. I had, you might say, edited Matiullah Khan. He was one of a crop of new warlords who rose to wealth and power by hitching their ambitions to the American war and the U.S. military personnel sent to their country to fight it.  Khan, in particular, made staggering sums by essentially setting up an "Afghan Blackwater," a hire-a-gun -- in fact, so many guns -- protection agency for American convoys delivering supplies to far-flung U.S. bases and outposts in southern Afghanistan. He became the protector and benefactor of a remarkable Afghan woman who is a key character in Anand Gopal's No Good Men Among the Living: America, the Taliban, and the War Through Afghan Eyes, which I edited and published in the American Empire Project series I co-run for Metropolitan Books. I don't think it's an exaggeration to say that Gopal covered the Afghan War for years in a way no other Western journalist did. He spent time with crucial allies of Afghan President Hamid Karzai and with a Taliban commander, with warlords and American Special Ops guys, politicians and housewives. He traveled rural Afghanistan as few American reporters were capable of doing.  In the process, he made a discovery that was startling indeed and has yet to really sink in here. In a nutshell, in 2001, the invading Americans put al-Qaeda to flight and crushed the Taliban.  From most of its top leadership to its foot soldiers, the Talibs were almost uniformly prepared, even eager, to put down thei
Paul Merrell

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.” By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
  •  
    Government retaliation for exercise of First Amendment rights by covert destruction of reputations.  
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Court gave NSA broad leeway in surveillance, documents show - The Washington Post - 0 views

  • Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information “concerning” all but four countries, according to top-secret documents. The United States has long had broad no-spying arrangements with those four countries — Britain, Canada, Australia and New Zealand — in a group known collectively with the United States as the Five Eyes. But a classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well.
  • The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The NSA is not necessarily targeting all the countries or organizations identified in the certification, the affidavits and an accompanying exhibit; it has only been given authority to do so. Still, the privacy implications are far-reaching, civil liberties advocates say, because of the wide spectrum of people who might be engaged in communication about foreign governments and entities and whose communications might be of interest to the United States.
  • On Friday, the Office of the Director of National Intelligence released a transparency report stating that in 2013 the government targeted nearly 90,000 foreign individuals or organizations for foreign surveillance under the program. Some tech-industry lawyers say the number is relatively low, considering that several billion people use U.S. e-mail services.
  • ...4 more annotations...
  • That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules
  • Still, some lawmakers are concerned that the potential for intrusions on Americans’ privacy has grown under the 2008 law because the government is intercepting not just communications of its targets but communications about its targets as well. The expansiveness of the foreign-powers certification increases that concern.
  • In a 2011 FISA court opinion, a judge using an NSA-provided sample estimated that the agency could be collecting as many as 46,000 wholly domestic e-mails a year that mentioned a particular target’s e-mail address or phone number, in what is referred to as “about” collection. “When Congress passed Section 702 back in 2008, most members of Congress had no idea that the government was collecting Americans’ communications simply because they contained a particular individual’s contact information,” Sen. Ron Wyden (D-Ore.), who has co-sponsored ­legislation to narrow “about” collection authority, said in an e-mail to The Washington Post. “If ‘about the target’ collection were limited to genuine national security threats, there would be very little privacy impact. In fact, this collection is much broader than that, and it is scooping up huge amounts of Americans’ wholly domestic communications.”
  • The only reason the court has oversight of the NSA program is that Congress in 2008 gave the government a new authority to gather intelligence from U.S. companies that own the Internet cables running through the United States, former officials noted. Edgar, the former privacy officer at the Office of the Director of National Intelligence, said ultimately he believes the authority should be narrowed. “There are valid privacy concerns with leaving these collection decisions entirely in the executive branch,” he said. “There shouldn’t be broad collection, using this authority, of foreign government information without any meaningful judicial role that defines the limits of what can be collected.”
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • ...5 more annotations...
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
1 - 20 of 57 Next › Last »
Showing 20 items per page