Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Spiegel

Rss Feed Group items tagged

Paul Merrell

Cover Story: How NSA Spied on Merkel Cell Phone from Berlin Embassy - SPIEGEL ONLINE - 0 views

  • According to SPIEGEL research, United States intelligence agencies have not only targeted Chancellor Angela Merkel's cellphone, but they have also used the American Embassy in Berlin as a listening station. The revelations now pose a serious threat to German-American relations.
  • Research by SPIEGEL reporters in Berlin and Washington, talks with intelligence officials and the evaluation of internal documents of the US' National Security Agency and other information, most of which comes from the archive of former NSA contractor Edward Snowden, lead to the conclusion that the US diplomatic mission in the German capital has not merely been promoting German-American friendship. On the contrary, it is a nest of espionage. From the roof of the embassy, a special unit of the CIA and NSA can apparently monitor a large part of cellphone communication in the government quarter. And there is evidence that agents based at Pariser Platz recently targeted the cellphone that Merkel uses the most. The NSA spying scandal has thus reached a new level, becoming a serious threat to the trans-Atlantic partnership. The mere suspicion that one of Merkel's cellphones was being monitored by the NSA has led in the past week to serious tensions between Berlin and Washington.
  • A "top secret" classified NSA document from the year 2010 shows that a unit known as the "Special Collection Service" (SCS) is operational in Berlin, among other locations. It is an elite corps run in concert by the US intelligence agencies NSA and CIA. The secret list reveals that its agents are active worldwide in around 80 locations, 19 of which are in Europe -- cities such as Paris, Madrid, Rome, Prague and Geneva. The SCS maintains two bases in Germany, one in Berlin and another in Frankfurt. That alone is unusual. But in addition, both German bases are equipped at the highest level and staffed with active personnel. The SCS teams predominantly work undercover in shielded areas of the American Embassy and Consulate, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. They just can't get caught.
  • ...5 more annotations...
  • This would correspond to internal NSA documents seen by SPIEGEL. They show, for example, an SCS office in another US embassy -- a small windowless room full of cables with a work station of "signal processing racks" containing dozens of plug-in units for "signal analysis." On Friday, author and NSA expert James Bamford also visited SPIEGEL's Berlin bureau, which is located on Pariser Platz diagonally opposite the US Embassy. "To me, it looks like NSA eavesdropping equipment is hidden behind there," he said. "The covering seems to be made of the same material that the agency uses to shield larger systems." The Berlin-based security expert Andy Müller Maguhn was also consulted. "The location is ideal for intercepting mobile communications in Berlin's government district," he says, "be it technical surveillance of communication between cellphones and wireless cell towers or radio links that connect radio towers to the network."
  • Wiretapping from an embassy is illegal in nearly every country. But that is precisely the task of the SCS, as is evidenced by another secret document. According to the document, the SCS operates its own sophisticated listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication. The necessary equipment is usually installed on the upper floors of the embassy buildings or on rooftops where the technology is covered with screens or Potemkin-like structures that protect it from prying eyes. That is apparently the case in Berlin, as well. SPIEGEL asked British investigative journalist Duncan Campbell to appraise the setup at the embassy. In 1976, Campbell uncovered the existence of the British intelligence service GCHQ. In his so-called "Echelon Report" in 1999, he described for the European Parliament the existence of the global surveillance network of the same name.
  • Campbell refers to window-like indentations on the roof of the US Embassy. They are not glazed but rather veneered with "dielectric" material and are painted to blend into the surrounding masonry. This material is permeable even by weak radio signals. The interception technology is located behind these radio-transparent screens, says Campbell. The offices of SCS agents would most likely be located in the same windowless attic.
  • Apparently, SCS agents use the same technology all over the world. They can intercept cellphone signals while simultaneously locating people of interest. One antenna system used by the SCS is known by the affable code name "Einstein." When contacted by SPIEGEL, the NSA declined to comment on the matter. The SCS are careful to hide their technology, especially the large antennas on the roofs of embassies and consulates. If the equipment is discovered, explains a "top secret" set of classified internal guidelines, it "would cause serious harm to relations between the United States and a foreign government." According to the documents, SCS units can also intercept microwave and millimeter-wave signals. Some programs, such as one entitled "Birdwatcher," deal primarily with encrypted communications in foreign countries and the search for potential access points. Birdwatcher is controlled directly from SCS headquarters in Maryland.
  • With the growing importance of the Internet, the work of the SCS has changed. Some 80 branches offer "thousands of opportunities on the net" for web-based operations, according to an internal presentation. The organization is now able not only to intercept cellphone calls and satellite communication, but also to proceed against criminals or hackers. From some embassies, the Americans have planted sensors in communications equipment of the respective host countries that are triggered by selected terms.
  •  
    A must-read article offering an in-depth, 3-page view of how badly the Snowden disclosures have poisoned trust between the U.S. and its NATO allies that are not favored members of the Five Eyes club. Details of NSA's surveillance operations in Germany and strong circumstantial evidence that Obama knew -- as recently as June 2013 -- of spy operations being conducted against hundreds of world leaders but denied it.  
Paul Merrell

SPIEGEL Exclusive: NSA Spies on International Bank Transactions - SPIEGEL ONLINE - 0 views

  • The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL. The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called "Follow the Money" (FTM). The collected information then flows into the NSA's own financial databank, called "Tracfin," which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions. Further NSA documents from 2010 show that the NSA also targets the transactions of customers of large credit card companies like VISA for surveillance. NSA analysts at an internal conference that year described in detail how they had apparently successfully searched through the US company's complex transaction network for tapping possibilities.
  • Their aim was to gain access to transactions by VISA customers in Europe, the Middle East and Africa, according to one presentation. The goal was to "collect, parse and ingest transactional data for priority credit card associations, focusing on priority geographic regions." In response to a SPIEGEL inquiry, however, VISA issued a statement in which it said, "We are not aware of any unauthorized access to our network. Visa takes data security seriously and, in response to any attempted intrusion, we would pursue all available remedies to the fullest extent of the law. Further, its Visa's policy to only provide transaction information in response to a subpoena or other valid legal process." The NSA's Tracfin data bank also contained data from the Brussels-based Society for Worldwide Interbank Financial Telecommunication (SWIFT), a network used by thousands of banks to send transaction information securely. SWIFT was named as a "target," according to the documents, which also show that the NSA spied on the organization on several levels, involving, among others, the agency's "tailored access operations" division. One of the ways the agency accessed the data included reading "SWIFT printer traffic from numerous banks," the documents show.
  • But even intelligence agency employees are somewhat concerned about spying on the world finance system, according to one document from the UK's intelligence agency GCHQ concerning the legal perspectives on "financial data" and the agency's own cooperations with the NSA in this area. The collection, storage and sharing of politically sensitive data is a deep invasion of privacy, and involved "bulk data" full of "rich personal information," much of which "is not about our targets," the document says.
  •  
    NSA and GCHQ spying on banksters' transactions? I'll bet that comes to a screeching halt soon. Isn't it unwritten law in the Obama Administration that no government agencies mess with the banksters?
Paul Merrell

NSA Spied on Chinese Government and Networking Firm Huawei - SPIEGEL ONLINE - 0 views

  • According to documents viewed by SPIEGEL, America'a NSA intelligence agency put considerable efforts into spying on Chinese politicians and firms. One major target was Huawei, a company that is fast becoming a major Internet player.
  • The American government conducted a major intelligence offensive against China, with targets including the Chinese government and networking company Huawei, according to documents from former NSA worker Edward Snowden that have been viewed by SPIEGEL. Among the American intelligence service's targets were former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies. But the NSA made a special effort to target Huawei. With 150,000 employees and €28 billion ($38.6 billion) in annual revenues, the company is the world's second largest network equipment supplier. At the beginning of 2009, the NSA began an extensive operation, referred to internally as "Shotgiant," against the company, which is considered a major competitor to US-based Cisco. The company produces smartphones and tablets, but also mobile phone infrastructure, WLAN routers and fiber optic cable -- the kind of technology that is decisive in the NSA's battle for data supremacy. A special unit with the US intelligence agency succeeded in infiltrating Huwaei's network and copied a list of 1,400 customers as well as internal documents providing training to engineers on the use of Huwaei products, among other things.
  • According to a top secret NSA presentation, NSA workers not only succeeded in accessing the email archive, but also the secret source code of individual Huwaei products. Software source code is the holy grail of computer companies. Because Huawei directed all mail traffic from its employees through a central office in Shenzhen, where the NSA had infiltrated the network, the Americans were able to read a large share of the email sent by company workers beginning in January 2009, including messages from company CEO Ren Zhengfei and Chairwoman Sun Yafang. "We currently have good access and so much data that we don't know what to do with it," states one internal document. As justification for targeting the company, an NSA document claims that "many of our targets communicate over Huawei produced products, we want to make sure that we know how to exploit these products." The agency also states concern that "Huawei's widespread infrastructure will provide the PRC (People's Republic of China) with SIGINT capabilities." SIGINT is agency jargon for signals intelligence. The documents do not state whether the agency found information indicating that to be the case.
  • ...2 more annotations...
  • The operation was conducted with the involvement of the White House intelligence coordinator and the FBI. One document states that the threat posed by Huawei is "unique". The agency also stated in a document that "the intelligence community structures are not suited for handling issues that combine economic, counterintelligence, military influence and telecommunications infrastructure from one entity."
  • Editor's note: A longer version of this story will appear in German in the issue of SPIEGEL to be published on Monday.
Paul Merrell

Secret Docs Reveal Dubious Details of Targeted Killings in Afghanistan - SPIEGEL ONLINE - 0 views

  • Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.
  • The child and his father are two of the many victims of the dirty secret operations that NATO conducted for years in Afghanistan. Their fate is described in secret documents to which SPIEGEL was given access. Some of the documents concerning the International Security Assistance Force (ISAF) and the NSA and GCHQ intelligence services are from the archive of whistleblower Edward Snowden. Included is the first known complete list of the Western alliance's "targeted killings" in Afghanistan. The documents show that the deadly missions were not just viewed as a last resort to prevent attacks, but were in fact part of everyday life in the guerilla war in Afghanistan. The list, which included up to 750 people at times, proves for the first time that NATO didn't just target the Taliban leadership, but also eliminated mid- and lower-level members of the group on a large scale. Some Afghans were only on the list because, as drug dealers, they were allegedly supporting the insurgents.
  • Different rules apply in war than in fighting crime in times of peace. But for years the West tied its campaign in Afghanistan to the promise that it was fighting for different values there. A democracy that kills its enemies on the basis of nothing but suspicion squanders its claim to moral superiority, making itself complicit instead. This lesson from Afghanistan also applies to the conflicts in Syria, Iraq, Pakistan and Yemen. The material SPIEGEL was able to review is from 2009 to 2011, and falls within the term of US President Barack Obama, who was inaugurated in January 2009. For Obama, Afghanistan was the "good" war and therefore legitimate -- in contrast to the Iraq war. The president wanted to end the engagement in Iraq as quickly as possible, but in Afghanistan his aim was to win.
  • ...9 more annotations...
  • After Obama assumed office, the US government opted for a new strategy. In June 2009, then Defense Secretary Robert Gates installed Stanley McChrystal, a four-star general who had served in Iraq, as commander of US forces in Afghanistan. McChrystal promoted the aggressive pursuit of the Taliban. Obama sent 33,000 additional troops to Afghanistan, but their deployment was tied to a demand that military officials provide a binding date for the withdrawal of US forces. At the same time, the president distanced himself from the grand objectives the West had proclaimed when it first marched into Kabul. The United States would not try to make Afghanistan "a perfect place," said Obama. Its new main objective was to fight the insurgency.
  • This marked the beginning of one of the bloodiest phases of the war. Some 2,412 civilians died in Afghanistan in 2009. Two-thirds of them were killed by insurgents and 25 percent by NATO troops and Afghan security forces. The number of operations against the Taliban rose sharply, to between 10 and 15 a night. The operations were based on the lists maintained by the CIA and NATO -- Obama's lists. The White House dubbed the strategy "escalate and exit." McChrystal's successor, General David Petraeus, documented the strategy in "Field Manual 3-24" on fighting insurgencies, which remains a standard work today. Petraeus outlined three stages in fighting guerilla organizations like the Taliban. The first was a cleansing phase, in which the enemy leadership is weakened. After that, local forces were to regain control of the captured areas. The third phase was focused on reconstruction. Behind closed doors, Petraeus and his staff explained exactly what was meant by "cleansing." German politicians recall something that Michael T. Flynn, the head of ISAF intelligence in Afghanistan, once said during a briefing: "The only good Talib is a dead Talib."
  • Under Petraeus, a merciless campaign began to hunt down the so-called shadow governors and local supporters aligned with the Islamists. For the Americans, the fact that the operations often ended in killings was seen as a success. In August 2010, Petraeus proudly told diplomats in Kabul that he had noticed a shifting trend. The figures he presented as evidence made some of the ambassadors feel uneasy. At least 365 insurgent commanders, Petraeus explained, had been neutralized in the last three months, for an average of about four killings a day. The existence of documents relating to the so-called Joint Prioritized Effects List (JPEL) has only been described in vague terms until now. The missions by US special units are mentioned but not discussed in detail in the US Army Afghanistan war logs published by WikiLeaks in 2010, together with the New York Times, the Guardian and SPIEGEL. The documents that have now become accessible provide, for the first time, a systematic view of the targeted killings. They outline the criteria used to determine who was placed on the list and why.
  • According to the NSA document, in October 2008 the NATO defense ministers made the momentous decision that drug networks would now be "legitimate targets" for ISAF troops. "Narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) list for the first time," the report reads. In the opinion of American commanders like Bantz John Craddock, there was no need to prove that drug money was being funneled to the Taliban to declare farmers, couriers and dealers as legitimate targets of NATO strikes.
  • The document also reveals how vague the basis for deadly operations apparently was. In the voice recognition procedure, it was sufficient if a suspect identified himself by name once during the monitored conversation. Within the next 24 hours, this voice recognition was treated as "positive target identification" and, therefore, as legitimate grounds for an airstrike. This greatly increased the risk of civilian casualties. Probably one of the most controversial decisions by NATO in Afghanistan is the expansion of these operations to include drug dealers. According to an NSA document, the United Nations estimated that the Taliban was earning $300 million a year through the drug trade. The insurgents, the document continues, "could not be defeated without disrupting the drug trade."
  • When an operation could potentially result in civilian casualties, ISAF headquarters in Kabul had to be involved. "The rule of thumb was that when there was estimated collateral damage of up to 10 civilians, the ISAF commander in Kabul was to decide whether the risk was justifiable," says an ISAF officer who worked with the lists for years. If more potential civilian casualties were anticipated, the decision was left up to the relevant NATO headquarters office. Bodyguards, drivers and male attendants were viewed as enemy combatants, whether or not they actually were. Only women, children and the elderly were treated as civilians. Even officers who were involved in the program admit that these guidelines were cynical. If a Taliban fighter was repeatedly involved in deadly attacks, a "weighing of interests" was performed. The military officials would then calculate how many human lives could be saved by the "kill," and how many civilians would potentially be killed in an airstrike.
  • In early 2009, Craddock, NATO's Supreme Allied Commander for Europe at the time, issued an order to expand the targeted killings of Taliban officials to drug producers. This led to heated discussions within NATO. German NATO General Egon Ramms declared the order "illegal" and a violation of international law. The power struggle within NATO finally led to a modification of Craddock's directive: Targets related to the drug production at least had to be investigated as individual cases. The top-secret dossier could be highly damaging to the German government. For years, German authorities have turned over the mobile phone numbers of German extremists in Afghanistan to the United States. At the same time, the German officials claimed that homing in on mobile phone signals was far too imprecise for targeted killings. This is apparently an untenable argument. According to the 2010 document, both Eurofighters and drones had "the ability to geolocate a known GSM handset." In other words, active mobile phones could serve as tracking devices for the special units.
  • The classified documents could now have legal repercussions. The human rights organization Reprieve is weighing legal action against the British government. Reprieve believes it is especially relevant that the lists include Pakistanis who were located in Pakistan. "The British government has repeatedly stated that it is not pursuing targets in Pakistan and not doing air strikes on Pakistani territory," says Reprieve attorney Jennifer Gibson. The documents, she notes, also show that the "war on terror" was virtually conflated with the "war on drugs." "This is both new and extremely legally troubling," says Gibson.
  • A 2009 CIA study that addresses targeted killings of senior enemy officials worldwide reaches a bitter conclusion. Because of the Taliban's centralized but flexible leadership, as well as its egalitarian tribal structures, the targeted killings were only moderately successful in Afghanistan. "Morover, the Taliban has a high overall ability to replace lost leaders," the study finds.
Paul Merrell

NSA Spies on 500 Million German Data Connections - SPIEGEL ONLINE - 0 views

  • America's National Security Agency (NSA) is apparently spying on Germany more than previously believed. Secret documents from the US intelligence service, which have been viewed by SPIEGEL journalists, reveal that the NSA systematically monitors and stores a large share of the country's telephone and Internet connection data. Internal NSA statistics indicate that the agency stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts. The metadata -- or information about which call or data connections were made and when -- is then stored at the NSA's headquarters in Fort Meade, near Washington, DC.
  • The documents show for the first time the scope of American surveillance in Germany. Previously, it had only been clear that Germany had been one of the major targets of NSA spying. A map published by the Guardian shows that Germany is on a par with targets such as China, Iraq and Saudi Arabia in terms of the intensity of electronic snooping. For weeks now, new details have emerged from documents collected by whistleblower Edward Snowden about the NSA's Prism and Britain's Tempora digital spying programs. The statistics, which SPIEGEL has also seen, show that data is collected from Germany on normal days for up to 20 million telephone calls and 10 million Internet data exchanges. Last Christmas Eve, it collected data on around 13 million phone calls and about half as many online exchanges. On the busiest days, such as January 7 of this year, the information gathered spiked to nearly 60 million communication connections under surveillance.
  • The NSA, it turns out, is more active in Germany than in any other of the EU's 27 member states. By comparison, during the same time frame, the Americans only recorded data on an average of 2 million connections in France each day. The documents also show that the NSA is primarily interested in important Internet hubs in southern and western Germany. Frankfurt, for example, plays an important role in the global Internet infrastructure, and the city is listed as a central base for the country. One top secret document also states that while Germany may be a partner, it is still also a target of the NSA's electronic snooping. According to the document, Germany is a so-called "3rd party foreign partner." The only countries that are explicitly excluded from spying attacks are Australia, Canada, New Zealand and the UK. "We can, and often do, target the signals of most 3d party foreign partners," a slide from an internal presentation states.
Paul Merrell

NSA Spied on Al Jazeera Communications: Snowden Document - SPIEGEL ONLINE - 0 views

  • It makes sense that America's National Security Agency (NSA) would be interested in the Arab news broadcaster Al Jazeera. The Qatar-based channel has been broadcasting audio and video messages from al-Qaida leaders for more than a decade. The United States intelligence agency was so interested, in fact, that it hacked into Al Jazeera's internal communications system, according to documents from former NSA contractor and whistleblower Edward Snowden that have been seen by SPIEGEL.
Paul Merrell

The NSA and American Spies Targeted SPIEGEL - SPIEGEL ONLINE - 0 views

  • Revelations from WikiLeaks published this week show how boundlessly and comprehensively American intelligence services spied on the German government. It has now emerged that the US also conducted surveillance against SPIEGEL.
Paul Merrell

Interview with NSA Experts on US Spying in Germany - SPIEGEL ONLINE - 0 views

  • In a SPIEGEL interview, Edward Snowden's lawyer, Jesselyn Radack, and former NSA contractor Thomas Drake discuss the reasons behind the American spying agency's obssession with collecting data.
  • In a SPIEGEL interview, Edward Snowden's lawyer, Jesselyn Radack, and former NSA contractor Thomas Drake discuss the reasons behind the American spying agency's obssession with collecting data.
  • In its current issue, SPIEGEL conducted two interviews it hopes will contribute to the debate. The first is with two major critics of the NSA's work -- human rights activist and lawyer Jesselyn Radack, who represents Snowden, and former spy Thomas Drake. The second interview is with John Podesta, a special advisor to United States President Barack Obama.
  • ...1 more annotation...
  • SPIEGEL: You yourself worked as a spy for the NSA. What made you become a whistleblower? Drake: It was only months after 9/11. Back then it became clear to me that in order to avoid another failure to protect people we just set aside the rules of law. The NSA violated our constitution by spying on its own people. Today, we have the greatest surveillance platform the world has ever seen. This is why I shudder. National security has become a state religion. They say they want to keep us safe, but from whom?
Paul Merrell

Israel Intelligence Eavesdropped on Phone Calls By John Kerry - SPIEGEL ONLINE - 0 views

  • SPIEGEL has learned from reliable sources that Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations. In addition to the Israelis, at least one other intelligence service also listened in as Kerry mediated last year between Israel, the Palestinians and the Arab states, several intelligence service sources told SPIEGEL. Revelations of the eavesdropping could further damage already tense relations between the US government and Israel. During the peak stage of peace talks last year, Kerry spoke regularly with high-ranking negotiating partners in the Middle East. At the time, some of these calls were not made on encrypted equipment, but instead on normal telephones, with the conversations transmitted by satellite. Intelligence agencies intercepted some of those calls. The government in Jerusalem then used the information obtained in international negotiations aiming to reach a diplomatic solution in the Middle East.
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Paul Merrell

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

Surveillance Revelations Shake U.S.-German Ties - NYTimes.com - 0 views

  • Continuing revelations, based on documents leaked by Edward J. Snowden, of sweeping American digital surveillance around the world are rattling the close ties between the United States and Germany.
  • Evidence that the United States has been spying extensively on its allies as well as on its enemies has been among the most significant revelations from Mr. Snowden, along with widespread government surveillance of the telephone and digital communications of American citizens without warrants. The Der Spiegel article on Sunday was not the first to reveal American eavesdropping at the United Nations, which many diplomats have assumed for years was taking place. But it added extensive new detail to what had previously been reported, and it may compound the frictions developing between the United States and its allies over the issue — especially with Germany, where Chancellor Angela Merkel is in the midst of an election campaign. Top German officials traveled to Washington this month to press an unusual demand: to negotiate a new formal agreement with the United States that neither side will spy on the other.
  • In a country scarred by Nazi and Communist pasts, the issue is prompting not just a debate about privacy and data protection, but also demands from German officials that the Berlin-Washington security partnership be put on a new footing. The latest of the Snowden revelations came on Sunday, when the German newsmagazine Der Spiegel published a report, citing documents Mr. Snowden obtained while he worked as a contractor for the National Security Agency, that said the agency had succeeded in tapping into videoconferences at the United Nations in New York, into the European Union’s mission to the United Nations, and into other diplomatic missions around the world.
  • ...1 more annotation...
  • the eavesdropping described in the Snowden documents would have violated agreements that the United States has made. The report said that the N.S.A. succeeded last year in cracking an encrypted video teleconferencing system at the United Nations, and even stumbled across Chinese spies who were apparently invading the same communications system. The magazine also published a floor plan, evidently from N.S.A. files, of the third floor of the European mission to the United Nations on Third Avenue in New York, showing the locations of offices and computer servers. Der Spiegel suggested that the spying on allies and the United Nations made President Obama’s defense of surveillance programs as a counterterrorism effort seem misleading at best.
  •  
    See also further information in the Der Spiegel article at http://tinyurl.com/m2okg6e (translation required).
Paul Merrell

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise ... - 0 views

  • The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies, including everyone from U.S. mainstays Cisco and Juniper to Chinese giant Huawei. But beneath this bombshell of a story from Der Spiegel, you’ll find a rather healthy bit of irony. After all, the United States government has spent years complaining that Chinese intelligence operations could find ways of poking holes in Huawei networking gear, urging both American businesses and foreign allies to sidestep the company’s hardware. The complaints grew so loud that, at one point, Huawei indicated it may abandon the U.S. networking market all together. And, yet, Der Speigel now tells us that U.S. intelligence operations have been poking holes in Huawei networking gear — not to mention hardware sold by countless other vendors in both the States and abroad. “We read the media reports, and we’ve noted the references to Huawei and our peers,” says William Plummer, a Huawei vice president and the company’s point person in Washington, D.C. “As we have said, over and over again — and as now seems to be validated — threats to networks and data integrity can come from any and many sources.”
  • Plummer and Huawei have long complained that when the U.S. House Intelligence Committee released a report in October 2012 condemning the use of Huawei gear in telephone and data networks, it failed to provide any evidence that the Chinese government had compromised the company’s hardware. Adam Segal, a senior fellow for China Studies at the Center for Foreign Relations, makes the same point. And now we have evidence — Der Spiegel cites leaked NSA documents — that the U.S. government has compromised gear on a massive scale. “Do I see the irony? Certainly the Chinese will,” Segal says, noting that the Chinese government and the Chinese press have complained of U.S hypocrisy ever since former government contractor Edward Snowden first started to reveal NSA surveillance practices last summer. “The Chinese government has been hammering home what they call the U.S.’s ulterior motives for criticizing China, and there’s been a steady drumbeat of stories in the Chinese press about backdoors in the products of U.S. companies. They’ve been going after Cisco in particular.”
  • To be sure, the exploits discussed by Der Spiegel are a little different from the sort of attacks Congress envisioned during its long campaign against Huawei and ZTE, another Chinese manufacturer. As Segal and others note, Congress mostly complained that the Chinese government could collaborate with people inside the two companies to plant backdoors in their gear, with lawmakers pointing out that Huawei’s CEO was once an officer in China’s People’s Liberation Army, or PLA, the military arm of the country’s Communist party. Der Spiegel, by contrast, says the NSA is exploiting hardware without help from anyone inside the Ciscos and the Huaweis, focusing instead on compromising network gear with clever hacks or intercepting the hardware as it’s shipped to customers. “For the most part, the article discusses typical malware exploits used by hackers everywhere,” says JR Rivers, an engineer who has built networking hardware for Cisco as well as Google and now runs the networking startup Cumulus Networks. “It’s just pointing out that the NSA is engaged in the practice and has resources that are not available to most people.” But in the end, the two types of attack have the same result: Networking gear controlled by government spies. And over the last six months, Snowden’s revelations have indicated that the NSA is not only hacking into networks but also collaborating with large American companies in its hunt for data.
  • ...2 more annotations...
  • Jim Lewis, a director and senior fellow with the Center for Strategic and International Studies, adds that the Chinese view state-sponsored espionage a little differently than the U.S. does. Both countries believe in espionage for national security purposes, but the Chinese argue that such spying might include the theft of commercial secrets. “The Chinese will tell you that stealing technology and business secrets is a way of building their economy, and that this is important for national security,” says Lewis, who has helped oversee meetings between the U.S. and the Chinese, including officers in the PLA. “I’ve been in the room when they’ve said that. The last time was when a PLA colonel said: ‘In the U.S., military espionage is heroic and economic espionage is a crime. In China, the line is not that clear.’” But here in the United States, we now know, the NSA may blur other lines in the name of national security. Segal says that although he, as an American, believes the U.S. government is on stronger ethical ground than the Chinese, other nations are beginning to question its motives. “The U.S has to convince other countries that our type of intelligence gathering is different,” he says. “I don’t think that the Brazils and the Indias and the Indonesias and the South Africas are convinced. That’s a big problem for us.”
  • The thing to realize, as the revelations of NSA snooping continue to pour out, is that everyone deserves scrutiny — the U.S government and its allies, as well as the Chinese and others you may be more likely to view with skepticism. “All big countries,” Lewis says, “are going to try and do this.”
  •  
    Of course, we now know that the U.S. conducts electronic surveillance for a multitude of purposes, including economic. Check this group's notes tagged "NSA-targets" and/or "NSA-goals".
Paul Merrell

New Cyber-Spying Discovery Points to NSA and the "Five Eyes" - WhoWhatWhy - 0 views

  • here’s yet another tantalizing clue that the National Security Agency and its “Five Eyes” allies are behind a poweful cyber-espionage tool called Regin, used to spy on friend and enemy alike. That’s the conclusion Russian cybersecurity firm Kaspersky drew after examining the source code of Regin and an innocuously-named spying tool called QWERTY. It’s an appropriate monicker. The malware, known as a keylogger,  vacuums up anything typed on a computer keyboard and sends it back to the programmer controlling it. The crucial clue Kaspersky found is that QWERTY “can only operate as part of the Regin platform.” After tracking Regin across 14 countries for years, Kaspersky and technology firm Symantec identified it in November 2014.  At the time, Symantec said Regin’s “capabilities and the level of resources behind [it] indicate that it is one of the main cyberespionage tools used by a nation state.” 
  • Though neither company said it, suspicion immediately arose that the NSA and its allies had created Regin. It immediately drew comparisons with Stuxnet, the joint U.S.-Israeli computer worm used to damage Iranian nuclear centrifuges in Natanz in 2009. Unlike Stuxnet’s narrow mission of sabotage, Regin is designed for spying in a wide set of environments. It hides in plain sight, disguised as ordinary Microsoft software.
  • The new evidence further points to the Five Eyes. The German news magazine Der Spiegel has a trove of documents from NSA whistleblower Edward Snowden, which included the source code. Der Spiegel gave Kaspersky the code to examine: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the U.S., Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware’s origin. Der Spiegel pointed to five elements they believe suggest Five Eyes authorship: the presence of QWERTY in Snowden’s files, its use in the Belgacom hack by Britain’s GCHQ, references to the sport of cricket in the code, structural similarities to tools outlined in other Snowden documents, and targets consistent with other Five Eyes tools and campaigns.
  • ...1 more annotation...
  • Regin has been used to spy on telecom providers, financial institutions, energy companies, airlines, research institutes and the hospitality industry, and on European Union officials. The 14 countries found to have been penetrated include Russia, Malaysia, Afghanistan, and Fiji. Even though the trail is hot now, security experts say that Regin is still out there committing wholesale espionage. That’s because parts of it like QWERTY help mask other components. Like any good spy, it’s constantly changing disguises.
Paul Merrell

Are US Academics Who Cite WikiLeaks Blackballed? - 0 views

  • Speaking to Germany’s Der Spiegel magazine in July 2015, Assange suggested that institutions within the international relations discipline have failed to understand the intersection between current geopolitical and technological developments. Specifically, Assange charged that the US journal International Studies Quarterly (ISQ), published by the prestigious International Studies Association (ISA), would not accept manuscripts based on WikiLeaks’ material. Professor of international politics Daniel W. Drezner hit back on July 30 in The Washington Post, arguing that there were other explanations for why the journal was not publishing WikiLeaks’ material. However, he did concede that it is possible that the “structural forces” opposing WikiLeaks were so powerful that a scholar would eschew WikiLeaks’ publications for “fear of being blackballed”. For the thousands of undergraduate to PhD students, fellows and academic researchers facing a precarious employment market, self-censorship for fear of freezing one’s career is not unlikely. One publicised incident from November 2010 concerning the office of career services at Columbia University’s School of International and Public Affairs (SIPA), which according to The New York Times “grooms future diplomats”, provides the perfect illustration. That year the office sent an email to students warning them against commenting on or posting WikiLeaks’ documents on social media because “engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government”. The warning came to the office through a SIPA alumnus working at the State Department.
  • Years later, the tone of the warning continued to reverberate through the halls of one of the most reputable universities in the world. In documenting human rights abuses in June 2013 a Columbia University graduate class produced the anonymous academic paper “WikiLeaks and Iraq Body Count: the sum of parts may not add up to the whole — a comparison of two tallies of Iraqi civilian deaths”. The acknowledgements section of their report refers to the 2010 warning email and states that in light of that email it would be “unwise and perhaps unethical to acknowledge all the participating students by name”. Others participating in a peer-review process have cited additional factors curtailing their use of comprehensive and illuminating WikiLeaks publications. Former US presidential candidate for the Green Party Cynthia McKinney, for example, says that she was forced to scrub her PhD dissertation from any reference of WikiLeaks material. However Drezner, who is an ISA member and on the ISQ’s web advisory board, claims that WikiLeaks’ published diplomatic cables “are not nearly as significant as Assange believes” and that the “academic universe is indifferent to WikiLeaks”. A surprising claim, given that international human rights courts have not been indifferent to evidence derived from WikiLeaks’ published cables, including cables that show the insidious ways in which European officials attempt to conceal CIA torture in secret prisons.
  • To help address the gap in scholarly analysis of the more than 2 million US diplomatic cables and State Department records published by WikiLeaks since 2010, WikiLeaks has produced a new book, The WikiLeaks Files: The World According to US Empire, published September 7, 2015. The book brings together journalists, researchers and experts on international law and foreign policy to examine the current cables and records. The documents are extensive. They expose US efforts —  across Bush and Obama administrations — to use bribes and threats to keep the US protected from facing war crimes allegations, conveying the fading effervescence of concepts such as “international justice” or “rule of law” in the face of a superpower that clearly believes that “might makes right”. Analysts review the efforts US diplomats take to maintain ties with dictators. They examine the meaning of human rights in the context of a global “War on Terror”. Like the cables they seek to illuminate, the 18 chapters of the book touch upon most major regions of the world. Experts on US foreign policy such as Robert Naiman, Stephen Zunes and Gareth Porter examine cables that reveal US meddling in Syria, US acceptance of Israeli violations of international law, and how the US dealt with the International Atomic Energy Agency in relation to Iranian nuclear development. The book offers a user guide written by WikiLeaks’ investigations editor Sarah Harrison on how to research WikiLeaks’ cables including meta data and content.
  • ...2 more annotations...
  • Writing in the book’s introduction, Assange proposes that the diplomatic cables provide “the vivisection of a living empire, showing what substance flowed from which state organ and when”. Assange notes in his introduction that academic disciplines outside international relations, and where career aspirations do not go hand in hand with patronage by government institutions, have voluminous coverage of the cables. But the ISA does not accept submissions citing WikiLeaks’ material. Although ISA executive director Mark Boyer denies that the association has a formal policy against publishing WikiLeaks’ material, he says that journal editors have discussed the implications of publishing material that is legally prohibited by the US government. According to Gabriel J. Michael, author of the Yale Law School paper Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research, the ISQ has adopted a “provisional policy” against handling manuscripts that make use of leaked documents if such use could be interpreted as mishandling “classified” material. According to an ISQ editor quoted in Michael’s paper, this policy prohibits direct quotations as well as data mining, and was developed in consultation with legal counsel. Stating that editors are currently “in an untenable position”. According to the editor, ISQ’s policy will remain in place pending broader action from the ISA, which publishes several other disciplinary journals. The ISA and ISQ concerns about handling material that the US government forbids —  which include WikiLeaks’ cables —  amount to throwing the baby out with the bathwater. The cables go into the heart of an empire, and reflect on matters that affect everyone.
  • Without WikiLeaks, the public would still be in the dark about the Trans-Pacific Partnership “agreement” currently being negotiated. The treaty aims to rewrite the global rules on intellectual property rights and would create spheres of trade which would be protected from judicial oversight. Such agreements have the potential to change the fabric of how states operate, and the leaked cables shed light on how states negotiate significant treaties, aiming to keep citizenship participation in politics out. Where academia bans the use of important leaked documents the public loses out.
Paul Merrell

Hacked Emails Reveal NATO General Plotting Against Obama on Russia Policy - 0 views

  • Retired U.S. Air Force Gen. Philip Breedlove, until recently the supreme commander of NATO forces in Europe, plotted in private to overcome President Barack Obama’s reluctance to escalate military tensions with Russia over the war in Ukraine in 2014, according to apparently hacked emails from Breedlove’s Gmail account that were posted on a new website called DC Leaks. Obama defied political pressure from hawks in Congress and the military to provide lethal assistance to the Ukrainian government, fearing that doing so would increase the bloodshed and provide Russian President Vladimir Putin with the justification for deeper incursions into the country. Breedlove, during briefings to Congress, notably contradicted the Obama administration regarding the situation in Ukraine, leading to news stories about conflict between the general and Obama. But the leaked emails provide an even more dramatic picture of the intense back-channel lobbying for the Obama administration to begin a proxy war with Russia in Ukraine. In a series of messages in 2014, Breedlove sought meetings with former Secretary of State Colin Powell, asking for advice on how to pressure the Obama administration to take a more aggressive posture toward Russia.
  • Breedlove attempted to influence the administration through several channels, emailing academics and retired military officials, including former NATO supreme commander Wesley Clark, for assistance in building his case for supplying military assistance to Ukrainian forces battling Russian-backed separatists.
  • Breedlove did not respond to a request for comment. He stepped down from his NATO leadership position in May and retired from service on Friday, July 1. Breedlove was a four-star Air Force general and served as the 17th Supreme Allied Commander of NATO forces in Europe starting on May 10, 2013. Phillip Karber, an academic who corresponded regularly with Breedlove — providing him with advice and intelligence on the Ukrainian crisis —  verified the authenticity of several of the emails in the leaked cache. He also told The Intercept that Breedlove confirmed to him that the general’s Gmail account was hacked and that the incident had been reported to the government.
  • ...3 more annotations...
  • Der Spiegel reported that Breedlove “stunned” German leaders with a surprise announcement in 2015 claiming that pro-Russian separatists had “upped the ante” in eastern Ukraine with “well over a thousand combat vehicles, Russian combat forces, some of the most sophisticated air defense, battalions of artillery” sent to Donbass, a center of the conflict. Breedlove’s numbers were “significantly higher” than the figures known to NATO intelligence agencies and seemed exaggerated to German officials. The announcement appeared to be a provocation designed to disrupt mediation efforts led by Chancellor Angela Merkel. In previous instances, German officials believed Breedlove overestimated Russian forces along the border with Ukraine by as many as 20,000 troops and found that the general had falsely claimed that several Russian military assets near the Ukrainian border were part of a special build-up in preparation for a large-scale invasion of the country. In fact, much of the Russian military equipment identified by Breedlove, the Germans said, had been stored there well before the revolution in Ukraine.
  • The emails, however, depict a desperate search by Breedlove to build his case for escalating the conflict, contacting colleagues and friends for intelligence to illustrate the Russian threat. Karber, who visited Ukrainian politicians and officials in Kiev on several occasions, sent frequent messages to Breedlove — “per your request,” he noted — regarding information he had received about separatist military forces and Russian troop movements. In several updates, Breedlove received military data sourced from Twitter and social media. Karber, the president of the Potomac Foundation, became the center of a related scandal last year when it was discovered that he had facilitated a meeting during which images of purported Russian forces in Ukraine were distributed to the office of Sen. James Inhofe, R-Okla., and were published by a neoconservative blog. The pictures turned out to be a deception; one supposed picture of Russian tanks in Ukraine was, in fact, an old photograph of Russian tanks in Ossetia during the war with Georgia.
  • The emails were released by D.C. Leaks, a database run by self-described “hacktivists” who are collecting the communications of elite stakeholders such as political parties, major politicians, political campaigns, and the military. The website currently has documents revealing some internal communications of the Hillary Clinton presidential campaign and George Soros’s Open Society Foundation, among others.
  •  
    Four-star general commanding NATO uses Gmail? He must have wanted his emails to be publicized.
Paul Merrell

Germany, US to negotiate 'no-spy' agreement | News | DW.DE | 12.08.2013 - 0 views

  • Germany and the US are to start talks on an anti-spying agreement, Germany's chancellery minister Ronald Pofalla has said. The announcement came as he testified on the government's role in the NSA scandal in parliament. Pofalla, who is responsible for coordinating the various intelligence services in Germany, told a parliamentary committee on Monday that the US had offered talks on a no-spy agreement, which showed that the US was serious about adhering to German law on German soil. "This offer could have never been made if the Americans' assurances that they will stick to German law in Germany wasn't actually true," he told the committee. Pofalla insisted that the allegations against the NSA and Germany's foreign intelligence service the BND had been refuted, as the NSA had declared in writing that it is prepared to observe German law in Germany. Pofalla also told parliamentarians that both British and US intelligence agencies had assured the government that there was no comprehensive spying and wiretapping by their services in Germany. "Unlike many erroneous statements to the contrary, the basic rights of millions of Germans are not being violated," Pofalla said, adding that, in the government's view, the spying allegations against the US and the UK were now "off the table."
  •  
    As though anyone could trust anything said by the Obama Administration about NSA programs. Note earlier bookmarked page: "NSA spying is targeting Germany more intensely than previously believed. Secret documents viewed by SPIEGEL reveal that the American intelligence service monitors around half a billion telephone calls, emails and text messages in the country every month." http://www.spiegel.de/international/germany/nsa-spies-on-500-million-german-data-connections-a-908648.html
Paul Merrell

Germany is the Tell-Tale Heart of America's Drone War - 0 views

  • This is a joint investigation with the German news magazine Der Spiegel.
  • A TOP-SECRET U.S. intelligence document obtained by The Intercept confirms that the sprawling U.S. military base in Ramstein, Germany serves as the high-tech heart of America’s drone program. Ramstein is the site of a satellite relay station that enables drone operators in the American Southwest to communicate with their remote aircraft in Yemen, Somalia, Afghanistan and other targeted countries. The top-secret slide deck, dated July 2012, provides the most detailed blueprint seen to date of the technical architecture used to conduct strikes with Predator and Reaper drones. Amid fierce European criticism of America’s targeted killing program, U.S. and German government officials have long downplayed Ramstein’s role in lethal U.S. drone operations and have issued carefully phrased evasions when confronted with direct questions about the base. But the slides show that the facilities at Ramstein perform an essential function in lethal drone strikes conducted by the CIA and the U.S. military in the Middle East, Afghanistan and Africa.
  • The slides were provided by a source with knowledge of the U.S. government’s drone program who declined to be identified because of fears of retribution. According to the source, Ramstein’s importance to the U.S. drone war is difficult to overstate. “Ramstein carries the signal to tell the drone what to do and it returns the display of what the drone sees. Without Ramstein, drones could not function, at least not as they do now,” the source said. The new evidence places German Chancellor Angela Merkel in an awkward position given Germany’s close diplomatic alliance with the United States. The German government has granted the U.S. the right to use the property, but only under the condition that the Americans do nothing there that violates German law.
  • ...1 more annotation...
  • The U.S. government maintains that its drone strikes against al Qaeda and its “associated forces” are legal, even outside of declared war zones. But German legal officials have suggested that such operations are only justifiable in actual war zones. Moreover, Germany has the right to prosecute “criminal offenses against international law … even when the offense was committed abroad and bears no relation to Germany,” according to Germany’s Code of Crimes against International Law, which passed in 2002. This means that American personnel stationed at Ramstein could, in theory, be vulnerable to German prosecution if they provide drone pilots with data used in attacks. While the German government has been reluctant to pursue such prosecutions, it may come under increasing pressure to do so. “It is simply murder,” says Björn Schiffbauer of the Institute for International Law at the University of Cologne. Legal experts interviewed by Der Spiegel claimed that U.S. personnel could be charged as war criminals by German prosecutors.
Paul Merrell

Is there a second NSA leaker after Snowden? | TheHill - 0 views

  • Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.Glenn Greenwald, the journalist most closely associated to Snowden, said he suspects someone else has been involved in leaking out new documents, and other experts have backed up the claim.ADVERTISEMENTThe existence of a second leaker “seems clear at this point,” Greenwald wrote on Twitter over the weekend. “The lack of sourcing to Snowden on this & that last [Der Spiegel] article seems petty telling,” he added, after German broadcasters reported that the NSA was tracking people searching for details about privacy software. 
  • Neither the Der Spiegel article from December nor last week’s story, both of which were partly written by privacy advocate and security researcher Jacob Appelbaum, specifically mentioned that the information emanated from leaks by Snowden.“That's particularly notable given that virtually every other article using Snowden documents - including der Spiegel - specifically identified him as the source,” Greenwald said in an email to The Hill on Monday.Other people who have seen Snowden’s trove of documents have agreed that the documents revealed by German outlets seem to indicate a second source.
  • Bruce Schneier, a cryptologist and cybersecurity expert who has helped the Guardian review Snowden’s disclosures, said he did “not believe that this came from the Snowden documents.”“I think there’s a second leaker out there,” he wrote in a blog post last week. If true, it could add another headache for the NSA, which has struggled for more than a year to contain the fallout from Snowden’s revelations. Defenders of the NSA say that the disclosures have hurt U.S. security and empowered terrorists and other enemies abroad.Among other internal reforms, the spy agency has beefed up its clearance procedures to prevent another employee from passing along secret documents to journalists or governments in Beijing and Moscow.
  • ...1 more annotation...
  • “If in fact this is a post-Snowden NSA leak, then it’s probably just proof that you can always build a bigger mousetrap; that doesn’t mean you’re going to catch the mice,” said Stephen Vladeck, a law professor at American University who specializes in national security issues.Vladeck added that leaks about controversial national security programs are in many ways inevitable, and may not be tied to Snowden’s leaks in any way.For Greenwald, however, a second leaker would be affirmation of Snowden’s actions.“I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward,” he told The Hill. 
1 - 20 of 80 Next › Last »
Showing 20 items per page