Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged british

Rss Feed Group items tagged

Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Smoking gun emails reveal 'deal in blood' George Bush and Tony Blair made as they secre... - 0 views

  • A bombshell White House memo has revealed for the first time details of the ‘deal in blood’ forged by George Bush and Tony Blair over the Iraq War.The damning memo, from secretary of state Colin Powell to president George Bush, was written on March 28, 2002, a week before Bush’s famous summit with Blair at his Crawford ranch in Texas.The Powell document, headed ‘Secret... Memorandum for the President’, lifts the lid on how Blair and Bush secretly plotted the war behind closed doors at Crawford. In it, Powell tells Bush that Blair ‘will be with us’ on military action. Powell assures the president: ‘The UK will follow our lead’.The classified document also discloses that Blair agreed to act as a glorified spin doctor for the president by presenting ‘public affairs lines’ to convince a skeptical public that Saddam had Weapons of Mass Destruction - when none existed.In return, the president would flatter Blair’s ego and give the impression that Britain was not America’s poodle but an equal partner in the ‘special relationship’. 
  • The sensational leak shows that Blair had given an unqualified pledge to sign up to the conflict a year before the invasion started.It flies in the face of the UK Prime Minister’s public claims at the time that he was seeking a diplomatic solution to the crisis.He told voters: ‘We’re not proposing military action’ - in direct contrast to what the secret email now reveals. 
  • The disclosure is certain to lead for calls for Sir John Chilcot to reopen his inquiry into the Iraq War if, as is believed, he has not seen the Powell memo.A second explosive memo from the same cache also reveals how Bush used ‘spies’ in the Labour Party to help him to manipulate British public opinion in favor of the war.The documents, obtained by The Mail on Sunday, are part of a batch of secret emails held on the private server of Democratic presidential candidate Hillary Clinton which U.S. courts have forced her to reveal.Former UK Conservative shadow home secretary David Davis said: ‘The memos prove in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a frontman for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.
  • ...8 more annotations...
  • ‘He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it. And in return for what?'For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves’.Davis was backed by a senior diplomat with close knowledge of Blair-Bush relations who said: ‘This memo shows beyond doubt for the first time Blair was committed to the Iraq War before he even set foot in Crawford.'And it shows how the Americans planned to make Blair look an equal partner in the special relationship to bolster his position in the UK.’Blair’s spokesman insisted last night that Powell’s memo was ‘consistent with what he was saying publicly at the time’.The former Prime Minister has always hotly denied the claim that the two men signed a deal ‘in blood’ at Crawford to embark on the war, which started on March 20, 2003. Powell says to Bush: ‘He will present to you the strategic, tactical and public affairs lines that he believes will strengthen global support for our common cause,’ adding that Blair has the presentational skills to ‘make a credible public case on current Iraqi threats to international peace’.Five months after the summit, Downing Street produced the notorious ‘45 minutes from doom’ dossier on Saddam Hussein’s supposed Weapons of Mass Destruction. After Saddam was toppled, the dossier’s claims were exposed as bogus.Nowhere in the memo is a diplomatic route suggested as the preferred option.
  • Instead, Powell says that Blair will also advise on how to ‘handle calls’ for the ‘blessing’ of the United Nations Security Council, and to ‘demonstrate that we have thought through “the day after” ’ – in other words, made adequate provision for a post-Saddam Iraq.Critics of the war say that the lack of post-conflict planning has contributed to the loss of more than 100,000 lives since the invasion – and a power vacuum which has contributed to the rise of Islamic State terrorism.Significantly, Powell warns Bush that Blair has hit ‘domestic turbulence’ for being ‘too pro-U.S. in foreign and security policy, too arrogant and “presidential” ’, which Powell points out is ‘not a compliment in the British context’.Powell also reveals that the splits in Blair’s Cabinet were deeper than was realized: he says that apart from Foreign Secretary Jack Straw and Defence Secretary Geoff Hoon, ‘Blair’s Cabinet shows signs of division, and the British public are unconvinced that military action is warranted now’.Powell says that although Blair will ‘stick with us on the big issues’, he wants to minimisze the ‘political price’ he would have to pay: ‘His voters will look for signs that Britain and America are truly equity partners in the special relationship.’The president certainly did his best to flatter Blair’s ego during the Crawford summit, where he was the first world leader to be invited into Bush’s sanctuary for two nights.
  • Mystery has long surrounded what was discussed at Crawford as advisers were kept out of a key meeting between the two men.Sir Christopher Meyer, who was present in Crawford as Britain’s ambassador to the U.S., told Chilcot that his exclusion meant he was ‘not entirely clear to this day... what degree of convergence was, if you like, signed in blood at the Crawford ranch’.But in public comments during his time at Crawford, Blair denied that Britain was on an unstoppable path to war.‘This is a matter for considering all the options’, he said. ‘We’re not proposing military action at this point in time’.
  • During his appearance before the Chilcot inquiry in January 2010, Blair denied that he had struck a secret deal with Bush at Crawford to overthrow Saddam. Blair said the two men had agreed on the need to confront the Iraqi dictator, but insisted they did not get into ‘specifics’.‘The one thing I was not doing was dissembling in that position,’ he told Chilcot.‘The position was not a covert position, it was an open position. This isn’t about a lie or a conspiracy or a deceit or a deception. It’s a decision. What I was saying... was “We are going to be with you in confronting and dealing with this threat.” ’Pressed on what he thought Bush took from their meeting, he said the president had realized Britain would support military action if the diplomatic route had been exhausted.In his memoirs, Blair again said it was ‘a myth’ he had signed a promise ‘in blood’ to go to war, insisting: ‘I made no such commitment’.Critics who claimed that Blair acted as the ‘poodle’ of the US will point to a reference in Mr Powell’s memo to the fact Mr Blair ‘readily committed to deploy 1,700 commandos’ to Afghanistan ‘even though his experts warn that British forces are overstretched’.The decision made the previous October in the wake of the September 11 attacks led to widespread concern that the UK was entering an open-ended commitment to a bloody conflict in Afghanistan – a concern many critics now say was well-founded.
  • Mr Powell’s memo goes on to say that a recent move by the U.S. to protect its steel industry with tariffs, which had damaged UK exports, was a ‘bitter blow’ for Blair, but he was prepared to ‘insulate our broader relationship from this and other trade disputes’.The memo was included in a batch of 30,000 emails which were received by Mrs Clinton on her private server when she was US Secretary of State between 2009 and 2013.Another document included in the email batch is a confidential briefing for Powell prepared by the U.S. Embassy in London, shortly before the Crawford summit.The memo, dated ‘April 02’, includes a detailed assessment of the effect on Blair’s domestic position if he backs US military action.The document says: ‘A sizeable number of his [Blair’s] MPs remain at present opposed to military action against Iraq... some would favor shifting from a policy of containment of Iraq if they had recent (and publicly usable) proof that Iraq is developing WMD/missiles... most seem to want some sort of UN endorsement for military action.‘Blair’s challenge now is to judge the timing and evolution of America’s Iraq policy and to bring his party and the British people on board.'There have been a few speculative pieces in the more feverish press about Labor [sic] unease re Iraq policy… which have gone on to identify the beginnings of a challenge to Blair’s leadership of the party.
  • 'Former Cabinet member Peter Mandelson, still an insider, called it all "froth". Nonetheless, this is the first time since the 1997 election that such a story is even being printed’.The paper draws on information given to it by Labour ‘spies’, whose identities have been hidden.It states: ‘[name redacted] told us the intention of those feeding the story is not to bring down Blair but to influence him on the Iraq issue’.‘Some MPs would endorse action if they had proof that Iraq has continued to develop WMD since UN inspectors left.‘More would follow if convinced that Iraq has succeeded in developing significant WMD capability and the missiles to deliver it.'Many more would follow if they see compelling evidence that Iraq intends and plans to use such weapons. A clear majority would support military action if Saddam is implicated in the 9/11 attacks or other egregious acts of terrorism’.‘Blair has proved an excellent judge of political timing, and he will need to be especially careful about when to launch a ramped-up campaign to build support for action against Iraq.'He will want neither to be too far in front or behind US policy... if he waits too long, then the keystone of any coalition we wish to build may not be firmly in place. No doubt these are the calculations that Blair hopes to firm up when he meets the President’.A spokesperson for Blair said: ‘This is consistent with what Blair was saying publicly at the time and with Blair’s evidence given to the Chilcot Inquiry’.
  • Stunning memo proves Blair signed up for Iraq even before Americans - comment by former shadow home secretary David DavisThis is one of the most astonishing documents I have ever read.It proves in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a front man for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it.And in return for what? For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves.Blair was content to cynically use Britain’s international reputation for honest dealing in diplomacy, built up over many years, as a shield against worldwide opprobrium for Bush’s ill-considered policy.Judging from this memorandum, Blair signed up for the Iraq War even before the Americans themselves did. It beggars belief.
  • Blair was telling MPs and voters back home that he was still pursuing a diplomatic solution while Colin Powell was telling President Bush: ‘Don’t worry, George, Tony is signed up for the war come what may – he’ll handle the PR for you, just make him look big in return.’It should never be forgotten that a minimum of 120,000 people died as a direct result of the Iraq War.What is truly shocking is the casualness of it all, such as the reference in the memo to ‘the day after’ – meaning the day after Saddam would be toppled.The offhand tone gives the game away: it is patently obvious nobody thought about ‘the day after’ when Bush and Blair met in Crawford.And they gave it no more thought right through to the moment ‘the day after’ came about a year later when Saddam’s statue fell to the ground.We saw the catastrophic so-called ‘de-Baathification’ of Iraq, with the country’s entire civil and military structure dismantled, leading to years of bloodshed and chaos. It has infected surrounding countries to this day and created the vacuum into which Islamic State has stepped.This may well be the Iraq ‘smoking gun’ we have all been looking for.
Paul Merrell

"De-Dollarization" Continues - China Starts Direct Trade With UK | Zero Hedge - 0 views

  • Following the initial de-dollarization meeting, there has been a slew of anti-dollar moves around the world (including Gazprom's shift of 90% of its clients to non-dollar payments). However, on the heels of the "anti-dollar alliance" discussions yesterday, DW reports that China would start direct trade between the renminbi and the British pound on Thursday. China's Foreign Exchange Trade System (CFETS) confirmed Sterling and yuan would be directly swapped without using the US dollar as an intermediary.   Via DW, China's Foreign Exchange Trade System (CFETS) said Wednesday the Asian nation would start direct trade between the renminbi and the British pound on Thursday.   Sterling and yuan would be directly swapped without using the US dollar as an intermediary, the trade platform noted.   "The move will promote the bilateral trade and investment between China and the United Kingdom and facilitate the use of renminbi and pound in the cross-border trade settlement," CFETS commented.
  •  
    "Following the initial de-dollarization meeting, there has been a slew of anti-dollar moves around the world (including Gazprom's shift of 90% of its clients to non-dollar payments). However, on the heels of the "anti-dollar alliance" discussions yesterday, DW reports that China would start direct trade between the renminbi and the British pound on Thursday. China's Foreign Exchange Trade System (CFETS) confirmed Sterling and yuan would be directly swapped without using the US dollar as an intermediary.   Via DW, China's Foreign Exchange Trade System (CFETS) said Wednesday the Asian nation would start direct trade between the renminbi and the British pound on Thursday.   Sterling and yuan would be directly swapped without using the US dollar as an intermediary, the trade platform noted.   "The move will promote the bilateral trade and investment between China and the United Kingdom and facilitate the use of renminbi and pound in the cross-border trade settlement," CFETS commented.   China has long had direct currency trade with the US and has recently added Japan's yen, the Australian, New Zealand and Canadian dollars, Russia's ruble and the Malaysian ringgit to its options.   Wednesday's announcement came during a visit to the UK by China's Prime Minister Li Keqiang and after the signing of various bilateral business contracts.   Britain for its part has been looking to make London a European hub for overseas yuan trading in competition with Frankfurt and Paris. China's central bank announced Wednesday that a subsidiary of China Construction Bank had been chosen to undertake yuan clearing business in London. Still - there's always Iraq to trade USDs with..."
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

M of A - UK Accuses U.S. Of Supporting Terrorists But Sells Out To Saudi Arabia - 0 views

  • On October 30 an international conference on Syria  agreed on a framework for ending the conflict in Syria. The communiqué states: While substantial differences remain among the participants, they reached a mutual understanding on the following: 1) Syria’s unity, independence, territorial integrity, and secular character are fundamental. ... 6) Da'esh, and other terrorist groups, as designated by the U.N. Security Council, and further, as agreed by the participants, must be defeated.... Ministers will reconvene within two weeks to continue these discussions.” Secretary of State Kerry had already accepted the "secular" point in earlier talks with his Russian colleague. The next meeting this Friday will mainly be about the question of who is a terrorist and must thereby be defeated. Propagandist for the Jihadis call this a "Russian trap".
  • So far the U.S. and its allies have supported various fundamentalist groups who's deeds and proclaimed philosophies surely put them into the same category as the Islamic State and al-Qaeda. The British Foreign Minister accuses the U.S. of supporting such terrorist groups and said that this needs to change: The world powers trying to end the civil war in Syria are drawing up a list of "terrorist" groups, Britain said Tuesday, warning that some countries may have to drop support for allies on the ground. "It will require deep breaths on several sides, including the US side," British Foreign Secretary Philip Hammond warned, speaking to reporters in Washington. Some of the groups that qualify as terrorists, so Hammond, do get support from the U.S. and it will take a "deep breaths" by the U.S. to refrain from further supporting them. As part of this, Hammond said, the countries backing various factions within the country would have to decide which are moderate enough to be included in the political process and which would be excluded. "I'm not so sure I would write off the possibility of agreeing on who is a terrorist," he said, in remarks at the British embassy the morning after talks with US Secretary of State John Kerry. But he warned that there would be horse trading ahead.
  • Can one "horse trade" who is a terrorist? Is it "moderate enough" to only cut off the heads of prisoners of war instead of burning them alive? How much would that "trade" cost? Hammond seems to believe that a money-for-values deal is possible and needed. Here is his horse trade: On one side the Saudis want the Jihadists they support to be recognized as non-terrorists: "The Saudis are never going to sign up to Ansar al-Sham being categorized as terrorists," he said, citing the example of one Sunni armed group reported to receive outside Arab backing. "So we have to see whether we can reach a pragmatic solution on these areas," Hammond added.
  • ...2 more annotations...
  • On the other side Hammond wants to sell more weapons to Saudi Arabia despite its abysmal human rights record: In an interview with Newsnight, Mr Hammond was asked if he would like to see the current £5.4billion of weapons trade with Saudi Arabia increase. He replied: “We’d always like to do more business, more British exports, more British jobs and in this case very high end engineering jobs protected and created by our diplomacy abroad.” So there is the Hammonds "pragmatic solution" - the UK will support the Saudi position on the terrorist groups Ahrar al Shams, which is related to and closely cooperating with al-Qaeda, and the Saudis will buy more British weapons. There is only a slight problem. The framework submitted by the October 30 conference, excerpted above, agreed of the fundamental "secular character" for the Syrian state. But even a now revisionist Ahrar al-Shams insists that Islamic law must the constitutional base of Syria. A state build on Islamic law is certainly not "secular". Unless of course one redefines what secular means. And that is exactly what Hammond, hearing the cash register ringing, now proposes: While Mr. Hammond declined to offer any details on which groups could eventually take part in political negotiations, his comments suggested that the West might be prepared to back Sunni Islamist groups with close ties to allies, including Saudi Arabia. “What we mean by a secular constitution, and what people in the Muslim world will understand by secular will be two different things,” Mr. Hammond said.
  • British orientalism at its finest: The Salafi jihadists of Ahrar al-Shams are not "terrorists" because the Saudis will buy more British weapons. A Syria based on Islamic law will be "secular" because those [censored] Arabs don't even know what that means. Maybe the U.S. should also offer to buy more British weapons? Foreign Minister Hammond would than surely recognize that the terrorists the U.S. supports in Syria are "moderate enough" hardline Islamists to fit his deranged definition of "secular".
  •  
    UK accuses U.S. of supporing terrorist groups in Syria. Whoda'thunk? 
Paul Merrell

Britain Considers Pulling out of European Convention on Human Rights when Armed Forces ... - 0 views

  • Senior Whitehall figures are drawing up controversial plans to ensure that Britain’s armed forces will no longer be subject to legal claims by their enemies over human rights violations.Guaranteed to have Brits in Middle England choking on their morning croissants, Saturday’s claims from right-wing mouthpiece, The Telegraph, insisted that taxpayers are facing a bill of £150 million to defend British soldiers being sued by “enemy fighters” for breaching their human rights. The Telegraph claimed that over 2,000 compensation claims and judicial reviews are being prepared by lawyers in the aftermath of the wars in Afghanistan and Iraq as part of a growing litigation culture that is encroaching on the ability of the armed forces to do their jobs.So far, 500 judicial review applications have been lodged, with 1,200 claims for compensation against the Ministry of Defense for alleged abuse, unlawful detention, and unlawful killing in Iraq.Further, an estimated 800 compensation cases from Afghanistan could follow.
  • Defence secretary Michael Fallon is so dismayed at what he calls the “increasing encroachment of human rights law into the battlefield,” that he is determined to take steps to stem the tide of legal action.Some of the planned fightback by ministers should concern everyone:Pulling out of the European Convention: Ministers could declare a temporary withdrawal from the European Convention on Human Rights (ECHR) before sending British forces into action in future.Taking legal action against law firms that have brought “bogus” cases against the Armed Forces: This includes referring lawyers to legal watchdogs and bringing fraud prosecutions against firms found to have made false allegations.A time limit on legal action to stop compensation claims being made years after incidents occur: Further reforms would end legal aid for claimants who are living outside the U.K.Planned new laws would also allow the government to recover the costs of “bogus judicial reviews,”  but one proposal is the most worrying of all:
  • A new Bill of Rights: Michael Gove is working on a British Bill of Rights to replace the Human Rights Act, according to ministers. It will reportedly include safeguards for the Armed Forces to protect them from being sued.In contrast to Michael Fallon’s indignation, a report by Stop The War claims “The long history of British abuse and torture in Kenya, Malaya, Aden, Cyprus, Northern Ireland and Afghanistan cannot be explained as the work of a few ‘bad apples.’”.BottomResponsiveBanner{width:300px;height:250px}@media (min-width:420px){.BottomResponsiveBanner{width:336px;height:280px}}@media (min-width:1300px){.BottomResponsiveBanner{width:728px;height:90px}} The report lists abuses committed by British forces and also references the “loss of the moral compass evident in the behaviour of British forces in Iraq and Afghanistan.”Some might say that by scrapping the Human Rights Act, the government fears being challenged and wants to take away the public’s ability to contest decisions and policies. One thing is for sure: without it, the British government will be allowed to act with almost complete impunity.
Paul Merrell

Lavon Affair - Wikipedia, the free encyclopedia - 0 views

  • The Lavon Affair refers to a failed Israeli covert operation, code named Operation Susannah, conducted in Egypt in the Summer of 1954. As part of the false flag operation,[1] a group of Egyptian Jews were recruited by Israeli military intelligence for plans to plant bombs inside Egyptian, American and British-owned civilian targets, cinema, library and American educational center. The attacks were to be blamed on the Muslim Brotherhood, Egyptian Communists, "unspecified malcontents" or "local nationalists" with the aim of creating a climate of sufficient violence and instability to induce the British government to retain its occupying troops in Egypt's Suez Canal zone.[2] The operation caused no casualties, except for those members of the cell who committed suicide after being captured.
  • After Israel publicly denied any involvement in the incident for 51 years, the surviving agents were officially honored in 2005 by being awarded certificates of appreciation by Israeli President Moshe Katzav.[3]
  • In the early 1950s, the United States initiated a more activist policy of support for Egyptian nationalism; this was often in contrast with British policies of maintaining its regional hegemony. Israel feared that this policy, which encouraged Britain to withdraw its military forces from the Suez Canal, would embolden Egyptian President Nasser's military ambitions towards Israel. Israel first sought to influence this policy through diplomatic means but was frustrated.[4] In the summer of 1954 Colonel Binyamin Gibli, the chief of Israel's military intelligence, Aman, initiated Operation Susannah in order to reverse that decision. The goal of the Operation was to carry out bombings and other acts of terrorism in Egypt with the aim of creating an atmosphere in which the British and American opponents of British withdrawal from Egypt would be able to gain the upper hand and block the British withdrawal from Egypt.
  • ...8 more annotations...
  • According to historian Shabtai Teveth, who wrote one of the more detailed accounts, the assignment was "To undermine Western confidence in the existing [Egyptian] regime by generating public insecurity and actions to bring about arrests, demonstrations, and acts of revenge, while totally concealing the Israeli factor. The team was accordingly urged to avoid detection, so that suspicion would fall on the Muslim Brotherhood, the Communists, 'unspecified malcontents' or 'local nationalists'."[2]
  • The top-secret cell, Unit 131,[5] which was to carry out the operation, had existed since 1948 and under Aman since 1950. At the time of Operation Susannah, Unit 131 was the subject of a bitter dispute between Aman (military intelligence) and Mossad (national intelligence agency) over who should control it. Unit 131 operatives had been recruited several years before, when the Israeli intelligence officer Avram Dar arrived in Cairo undercover as a British citizen of Gibraltar called John Darling. He had recruited several Egyptian Jews who had previously been active in illegal emigration activities and trained them for covert operations.
  • Aman decided to activate the network in the Spring of 1954. On July 2, the cell firebombed a post office in Alexandria,[6] and on July 14, it bombed the libraries of the U.S. Information Agency in Alexandria and Cairo and a British-owned theater.
  • Before the group began the operation, Israeli agent Avri Elad (Avraham Zeidenberg) was sent to oversee the operations. Elad assumed the identity of Paul Frank, a former SS officer with Nazi underground connections. Avri Elad allegedly informed the Egyptians, resulting in the Egyptian Intelligence Service following a suspect to his target, the Rio Theatre, where a fire engine was standing by. Egyptian authorities arrested this suspect, Philip Natanson, when his bomb accidentally ignited prematurely in his pocket. Having searched his apartment, they found incriminating evidence and names of accomplices to the operation.
  • Several suspects were arrested, including Egyptian Jews and undercover Israelis. Colonel Dar and Elad had managed to escape. Two suspects, Yosef Carmon and Hungarian-born Israeli Meir Max Bineth committed suicide in prison.
  • The Egyptian trial began on December 11 and lasted until January 27, 1955; two of the accused (Moshe Marzouk and Shmuel Azar) were condemned to execution by hanging, two were acquitted, and the rest received lengthy prison terms. The trial was criticised in Israel as a show trial, although strict Israeli military censorship of the press, at the time, meant that the Israeli public was kept in the dark about the facts of the case and, in fact, were led to believe that the defendants were innocent.[7] There were allegations that evidence had been extracted by torture.[8] After serving seven-year jail sentences, two of the imprisoned operatives (Meir Meyuhas and Meir Za'afran) were released in 1962. The rest were eventually freed in February 1968, in a secret addendum to a prisoner of war exchange.
  • Soon after the affair, Mossad chief Isser Harel expressed suspicion to Aman concerning the integrity of Avri Elad. Despite his concerns, Aman continued using Elad for intelligence operations until 1956, when he was caught trying to sell Israeli documents to the Egyptians. Elad was tried in Israel and sentenced to 10 years imprisonment. During Elad's imprisonment in Ayalon Prison, the media were only able to refer to him as the "The Third Man" or "X" due to government censorship.[9] In 1976, whilst living in Los Angeles, Elad publicly identified himself as the "Third Man" from the Lavon Affair.[9] In 1980, Harel publicly revealed evidence that Elad had been turned by the Egyptians even before Operation Susannah.
  • Operation Susannah and the Lavon Affair turned out to be disastrous for Israel in several ways: Israel lost significant standing and credibility in its relations with the United Kingdom and the United States that took years to repair.[11] The political aftermath caused considerable political turmoil in Israel that affected the influence of its government.[12] In March 2005, Israel publicly honored the surviving operatives, and President Moshe Katsav presented each with a certificate of appreciation for their efforts on behalf of the state, ending decades of official denial by Israel.[13]
Paul Merrell

ISIS Executioner Emwazi claims Harassment by MI5: Forced Recruitment Methods | nsnbc in... - 0 views

  • The ISIS executioner who appeared in several execution videos, speaking with British accent, has been identified as the 26-year-old Mohammed Emwazi who claims that he had been harassed and intimidated by MI5. How are Western intelligence services recruiting targeted persons? Mohammed Emwazi, a.k.a. Jihadi John” from the British capital London has, according to the guardian  been harassed by the British intelligence service MI5.
  • In an article entitled “How Mohammed Emwazi went from fresh Graduate to knife-wielding killer” the newspaper would report that his ordeal began when he traveled to Tanzania in 2009. The domestic British intelligence service MI5 was reportedly already in touch with Emwazi before he left the UK and began appearing in ISIS videos. Emwazi reportedly stated that he had been harassed to such a degree that he filed a complaint with the Independent Police Complaints Commission over his treatment.
  • What is the most common Forced Recruitment Strategy of the UK’s MI5, the German Verfassunsschutz and other Western European Intelligence Services?  One of the most common recruitment techniques among European intelligence services is to single out persons who committed minor crimes, threaten them with severe consequences or with the possibility to “set them up and let them serve major prison sentences”. After this first round of intimidation they are then approached by a domestic intelligence service who will offer them that “all problems could easily disappear if they cooperate; or else”. Especially the UK’s MI5 and the German Federal as well as State Verfassungsschutz (Constitutional Protection Police) have perfected this recruitment method. The most common “targets” for this recruitment method are individuals of special interest. During the 1960s – 70s this would typically be Communists, Socialists. Since the 1980s and after the end of the so-called cold war in the 90s, the Western European intelligence services began to focus on the new “enemy”, Muslims.
  • ...1 more annotation...
  • British and most major corporate and State-funded Western media would focus on whether Emwazi’s claims were exaggerated or not; or whether the authorizations granted by the UK’s Counter-terrorism and Security Act violate the rights of citizens and contribute to radicalizing people rather than preventing terrorism. The questions almost all media shun are: Has MI5 used the above described or a similar method to force Emwazi into becoming cooperative? Has he been forced into the role of Jihadi John or is he a willing executioner / actor? Is he still handled by British or eventually NATO intelligence services? Are the revelations by the guardian a limited hangout to crate a new “legend” after inconsistencies in previous ISIS videos and “convenient timing” of executions had become too blatantly obvious?
  •  
    "Is he still handled by British or eventually NATO intelligence services?" That's a very good question. How Emwazi finally managed to leave the UK despite being placed on a "no foreign travel" list remains a mystery. With MI5's assistance is a distinct possibility given the UK's collaboration with the U.S. in creating and managing ISIL 
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

British Spies Allowed to Access U.S. Data Without a Warrant - NationalJournal.com - 0 views

  • British authorities are capable of tapping into bulk communications data collected by other countries' intelligence services—including the National Security Agency—without a warrant, according to secret government documents released Tuesday. The agreement between the NSA and Britain's spy agency, known as Government Communications Headquarters or GCHQ, potentially puts the Internet and phone data of Americans in the hands of another country without legal oversight when obtaining a warrant is "not technically feasible."   The data, once obtained, can be kept for up to two years, according to internal policies disclosed by the British government. GCHQ was forced to reveal that it can request and receive vast quantities of raw, unanalyzed data collected from foreign governments it partners with during legal proceedings in a closed court hearing in a case brought by various international human-rights organizations, including Privacy International, Liberty U.K., and Amnesty International. The suit challenges certain aspects of GCHQ's surveillance practices.
  • It is well known that the NSA and GCHQ closely share intelligence data with one another, as part of a long-standing surveillance partnership. Some details of the agencies' spy pact were exposed by former NSA contractor Edward Snowden last year, including the existence of GCHQ's Tempora program, which taps into fiber-optic cables to scoop up online and telephone traffic across the Web for up to 30 days. But this is the first time the British government has disclosed that it does not require a warrant to access data collected and maintained by its American counterparts. The revelation appears to counter statements made by an oversight committee of the British Parliament in July of last year that "in each case where GCHQ sought information from the U.S., a warrant for interception, signed by a minister, was already in place."   It is unclear whether any restrictions on Britain's access to NSA surveillance data is imposed by the U.S. However, documents provided by Snowden to The Guardian last year reveal that the NSA shares raw intelligence data with Israel without removing information about U.S. citizens.
  • In a statement, the NSA said it works with a number of partner countries to further its "foreign intelligence mission." But it did not specify whether it was aware of or condoned Britain's apparent warrantless access of its data. "Whenever NSA shares intelligence information, we comply with all applicable rules, including rules designed to safeguard U.S. person information," the agency said. "NSA does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself." American privacy advocates quickly condemned any warrantless access of U.S. communications data by British authorities.   "The 'arrangement' disclosed today suggests that the two countries are circumventing even the very weak safeguards that have been put in place," Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said in a statement to National Journal. "It underscores both the inadequacy of existing oversight structures and the pressing need for [surveillance] reform."
  •  
    Note that this came out in a court case; it is not a Snowden leak. 
Paul Merrell

US comments about British army raise vital questions about defence spending | UK news |... - 0 views

  • The British military does not normally take kindly to comments from American counterparts about the state UK forces. Any such intervention is usually met, as it has been the case since at least the second world war, with a dismissive comment about American military prowess. But British military chiefs will welcome the intervention at the weekend of the US army chief of staff, General Raymond Odierno, who told the Telegraph he was worried about a scaled-down British army. With the Ministry of Defence almost certain to face deep cuts after the election, regardless of which party wins, Odierno said: “I would be lying to you if I did not say that I am very concerned about the GDP investment in the UK.” Odierno’s comments are in line with what British military chiefs have been saying for months, both publicly and privately. Although there is an election still to be fought, the next chancellor, whether Labour or Conservative, will be looking for deep budget cuts. Defence, in contrast with protected budgets for health and overseas development, is among the most vulnerable for further reductions. The British army, already coming to terms with a round of cuts reducing the army from 100,000 to just over 80,000, faces the prospect of being scaled down even further, to estimates of around 60,000.
  • Such cuts would mean the army would not be able to contribute to a US coalition as it did in Iraq and Afghanistan, which is what Odierno is concerned about. But this is part of a bigger debate to be had. Should Britain start behaving like the small island state it is rather than maintaining the pretensions of being a significant world player? It is a reasonable debate for voters in May to decide they would rather see Britain play a smaller role in the world and shift more money from defence to welfare. Britain at present is the fifth biggest spender on defence in the world. US spending is mammoth, then China, Saudi Arabia, Russia and the UK. France is not too far behind the UK, but then there is a big gap to Japan in seventh place, India, Germany, South Korea, Brazil and Italy, which spends about a third of the UK on defence.
  • In spite of such spending levels by the UK, its has become less visible on the international stage over the last few years, in part because of public hostility towards military intervention post-Iraq. The contributions, at least in terms of ground troops, to recent confrontations, has been minimal: a symbolic 75 troops this year for the Ukraine-Russia war and a small force to Kurdistan and a handful to Baghdad for the fight against Islamic State. David Cameron, in response to Odierno, said on Monday that Britain is still “a very strong partner for the US”. But that is a long way short of saying he will commit to maintaining defence spending at 2% of GDP and his Conservative colleagues such as former foreign secretary, William Hague, and former defence secretary, Liam Fox, know this, opening up another faultline in the Tory party.
Paul Merrell

BREAKING: 14 US-Led Coalition Military Advisers Captured by Syrian Special Forces in Al... - 0 views

  • At least 14 US-led coalition military advisers have been captured by the Syrian Special Forces in a bunker in the city of Aleppo, according to media reports.The event allegedly took place in the morning on December 16, 2016 (Voltaire.net):“The Security Council is sitting in private on Friday, December 16, 2016, at 17:00 GMT, while NATO officers were arrested this morning by the Syrian Special Forces in a bunker in East Aleppo.”21stcenturywire.com also provided a list of names of the coalition’s military advisers captured in Aleppo, citing a Syrian member of Parliament:Fares Shehabi, a prominent Syrian Parliamentarian and head of Aleppo’s Chamber of Commerce published the names of the Coalition officers on his Facebook page on the 15th December (emphasis added):Mutaz Kanoğlu – Turkey David Scott Winer – USA David Shlomo Aram – Israel Muhamad Tamimi – Qatar Muhamad Ahmad Assabian – Saudi Abd-el-Menham Fahd al Harij – Saudi Islam Salam Ezzahran Al Hajlan – Saudi Ahmed Ben Naoufel Al Darij – Saudi Muhamad Hassan Al Sabihi – Saudi Hamad Fahad Al Dousri – Saudi Amjad Qassem Al Tiraoui – Jordan Qassem Saad Al Shamry – Saudi Ayman Qassem Al Thahalbi – Saudi Mohamed Ech-Chafihi El Idrissi – Moroccan
  • Damascus-based Syrian journalist Said Hilal Alcharifi also reported on the issue in his Facebook account:Very urgent The Syrian authorities were able, thanks to information thorough, arrive at the headquarters of senior officers and western regional in the basement of a district of Aleppo-is, and capture them all alive. A few names have already been ex filtered to Syrian journalists including me. Seen the nationalities (us, French, British, German, Israelis, Turks, Saudis, Moroccans, Qatari, etc.. etc) of these scumbags and their military ranks, I assure you Syria holds in this moment a big treasures to carry out the negotiations with the countries that have destroyed.Earlier in December, SF already noted that the US despearate attempts to push a “diplomatic solution” in Aleppo could indicate that the Obama administration stalling for time to extricate US mercenaries and special service members from the Aleppo pocket:
  • Considering that US-led coalition military advisers have been widely operating across Syria, training and assisting to the so-called “moderate opposition” openly linked with al-Qaeda, the recently appeared reports are likely true.For isntance, British military advisers have officially arrived to Syria to restore combat capability of the ‘moderate’ opposition, retreated from Aleppo:British military advisers have arrived to Syria in order to restore combat capability of units of the ‘moderate’ opposition, retreated from Aleppo, the Izvestiya newspaper reported, citing a statement of UK Defense Minister Michael Fallon. According to Fallon, 20 British military instructors, who will train the opposition forces, involved in the fight against the Islamic State (IS) terrorist group, have already arrived at the destination.The dispatch of British advisers was announced in October, long before the recapture of Aleppo by the Syrian government forces. Initially, they had a task to train recruits to conduct combined arms combat, as well as to teach them the basics of tactical medicine and combat engineering. However, the situation changed and the task was changed too.
Paul Merrell

MI6 gets off scot-free over rendition of suspected Islamists to Libya | World news | Th... - 0 views

  • So after more than four years of Scotland Yard investigations, and months of agonising within the Crown Prosecution Service, ministers and MI6 are getting off scot-free over the abduction and subsequent torture of two suspected Islamists. Abdel Hakim Belhaj and Sami al-Saadi were enemies of Muammar Gaddafi delivered to Tripoli, courtesy of MI6 and the CIA, in 2004 when Tony Blair’s government was cuddling up to the Libyan dictator. Gaddafi had promised to abandon his nuclear and chemical weapons programme and as a reward for British friendship – including the secret rendition of his opponents – he agreed to huge and lucrative oil deals for BP.
  • In one of the deepest ironies in the history of British intelligence, clear evidence of British involvement in the rendition of Belhaj, Saadi and their families to Tripoli’s jails emerged in 2001. They were spelled out in a letter from Sir Mark Allen, then head of MI6 counter-terrorism operations, to Moussa Koussa, Gaddafi’s intelligence chief, written in March 2004. In it, Allen trumpeted MI6’s role in the operation. The letter was found among documents in Moussa’s office destroyed by Nato bombs. Saadi accepted £2.2m compensation from the British government. Belhaj chose to fight on, demanding an apology. The supreme court is soon due to deliver judgment on his claim that Britain must take responsibility for his abduction. Lawyers for the government argue that British courts have no right to hear the case since the agents of foreign intelligence agencies – notably the CIA – were also involved in the operation. Eliza Manningham-Buller, then head of MI5 – MI6’s sister service responsible for British security as opposed to spying abroad – was so angry with what MI6 had been up to, that, as the Guardian reported last week, she fired off a letter to Blair complaining about it, saying its actions may have compromised the security and safety of MI5 officers and their informants. Such was her fury that she ejected MI6 staff from MI5’s headquarters, Thames House.
  • After the Allen letter came to light, Blair said he had “no recollection at all” of the Libyan rendition. Jack Straw, then foreign secretary responsible for MI6, told MPs in 2005 – a year after the Libyan abductions – that “there is simply no truth in the claims that the United Kingdom has been involved in rendition full stop.” After the Allen letter emerged, Straw said: “No foreign secretary can know all the details of what its intelligence agencies are doing at any one time.” Government officials have insisted that the operation was in response to “ministerially authorised government policy”. Sir Richard Dearlove, head of MI6 at the time, has said: “It was a political decision, having very significantly disarmed Libya, for the government to cooperate with Libya on Islamist terrorism.” Referring to MI6’s links with Gaddafi, Manningham-Buller has stated: “There are clearly questions to be answered about the various relationships that developed afterwards and whether the UK supped with a sufficiently long spoon.” Section 7 of the 1994 Intelligence Services Act, sometimes described as the “James Bond clause”, protects MI6 officers from prosecution for actions anywhere in the world that would otherwise be illegal. They would be protected as long as their actions were authorised in writing by the secretary of state.
Paul Merrell

Craig Murray » Blog Archive » UK Moves to Block US Senate Report to Protect B... - 0 views

  • From a British diplomatic source I learn that Britain has lobbied the United States against the publication of the Senate Intelligence Committee report on torture and extraordinary rendition.  The lobbying has been carried out “at all levels” – White House, State Department and CIA.  The British have argued that at the very least the report must be emasculated before publication. The British argument is that in a number of court cases including the Belhadj case, the British government has successfully blocked legal action by victims on the grounds that this would weaken the US/UK intelligence relationship and thus vitally damage national security, by revealing facts the American intelligence service wish hidden.  [We will leave aside for the moment the utter shame of our servile groveling judges accepting such an argument].  The British Government are now pointing out to the Americans that this argument could be fatally weakened if major detail of the full horror and scope of torture and extraordinary rendition is revealed by the Senate Intelligence Committee.  The argument runs that this could in turn lead to further revelations in the courts and block the major defence against prosecutions of Blair, Straw and Dearlove, among others, potentially unleashing a transatlantic wave of judicial activism. The unabashed collusion of two torturing security states in concealing the truth of their despicable acts – including complicity in the torture of women and minors – and blocking criminal prosecution of the guilty is a sign of how low public ethics have sunk.  Fortunately there are still a few people in the British Foreign Office disgusted enough to leak it.
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Paul Merrell

Israel Hayom | British special forces land in Iraq to fight ISIS - 0 views

  • Troops from the Royal British Army's elite SAS unit and Special Reconnaissance Regiment have landed in Iraq and are pursuing Islamic State fighters, particularly the U.K. citizen known as "Jihadi John" who beheaded the American journalist James Foley on camera last week. The Sunday Mail reported that the British commandos were employing advanced technologies to find the killer. "It is possible to identify British jihadis on the battlefield by intercepting their radio messages. When they're captured by the Iraqis or Kurds we'll take a close interest in their questioning," an SAS member told the weekly paper. It already appears that the U.S. and U.K. are close to identifying the British-accented terrorist who killed Foley. "We're not in a position to say exactly who this is, but I think we are close," British Ambassador to the U.S. Sir Peter Westmacott told NBC's "Meet the Press."
Paul Merrell

Vodafone-Linked Company Aided British Mass Surveillance - The Intercept - 0 views

  • They flow deep underneath the Atlantic Ocean and into the United Kingdom below the golden sands of idyllic beaches. But the internet cables that come ashore at the coast of Cornwall, England, are not just used to connect the country with the rest of the world. According to new reports based on documents from National Security Agency whistleblower Edward Snowden, the cables have become an integral part of the global mass surveillance system operated by the British spy agency Government Communications Headquarters, intimately assisted by a company now owned by Vodafone, the world’s third largest cellphone network provider.
  • The latest details about the extent of the spying were revealed on Thursday by the British Channel 4 News, the German newspaper Süddeutsche Zeitung, and the German broadcaster WDR, who worked in partnership with Intercept founding editor Laura Poitras. The Intercept obtained a preview of the revelations in advance of their publication. According to the reports, British telecommunications firms have helped GCHQ dramatically scale-up the volume of internet data it collects from undersea cables. In the five years leading up to 2012, there was a 7,000-fold increase in the amount of data the agency was sweeping up, with its computers monitoring some 46 billion private communications “events” every day, according to documents cited in the reports. The data swept up from the cables would include content from emails, online messages, browsing sessions, and calls made using internet chat tools.
  • British telecommunications company Cable & Wireless played a leading role in the secret cable tapping operation, according to the reports, and the collaboration appears to have gone further than simply complying with the law in helping implement the surveillance. The company provided GCHQ with updates on opportunities it could give the agency to tap into internet traffic, and in February 2009 a GCHQ employee was assigned to work within Cable & Wireless in a “full-time project management” role. The British government paid Cable & Wireless more than £5 million ($9 million) of taxpayers’ money as part of an annual lease for GCHQ to access the cables. The agency described the company a “partner” and designated it the codename Gerontic.
  • ...1 more annotation...
  • According to the reports, Cable & Wireless also appears to have helped GCHQ obtain data from a rival foreign communications company, India’s Reliance Communications, enabling the spies to sweep up communications sent by millions of internet users worldwide through a Reliance-owned cable that stretches from England across Asia and the Middle East. This so-called “access point” for GCHQ was named Nigella and located near an agency surveillance base in Bude, Cornwall (pictured above). Reliance did not respond to a request for comment. In July 2012, the multinational phone company Vodafone bought Cable & Wireless for about $1.5 billion. The documents indicate that the Nigella surveillance access point remained active as of April 2013. Vodafone said in a statement that it complies with the law and does not give “direct access” to its cables. The company says it is compelled to provide certain access to data based on warrants issued by the government.
Paul Merrell

UK ordered to hold inquests into civilian deaths during Iraq war | UK news | guardian.c... - 0 views

  • A series of public inquests should be held into the deaths of civilians who are alleged to have been killed unlawfully by the British military following the 2003 invasion of Iraq, the high court has ruled.In a ground-breaking judgment that could have an impact on how the British military is able to conduct operations among civilians in the future, the court ruled on Friday that up to 161 deaths should be the subject of hearings modelled upon coroners' inquests.In practice, a series of hearings – possibly amounting to more than 100 – are likely to be held as a result of the judgment, which follows a three-year legal battle on behalf of the Iraqis' families.
  • Each hearing must involve a "full, fair and fearless investigation accessible to the victim's families and to the public", the court ruled, and should examine not only the immediate circumstances but other issues surrounding each death.As a first step, the court ordered Philip Hammond, the defence secretary, to announce within six weeks whether any of the deaths are to result in prosecutions, or to explain any further delays over prosecuting decisions.After years of judicial review proceedings, and in the face of determined opposition from the Ministry of Defence, which appeared anxious to maintain control over any investigative process, the court concluded that hearings modelled upon coroners' inquests were the best way for the British authorities to meet their obligations under article 2 of the European convention on human rights (ECHR), which protects the right to life.
  • The court also ruled that this should be just the start of the process by which public hearings will examine the alleged misconduct of some members of the British armed forces who served in Iraq.Following the completion of the Article 2 hearings – into allegedly unlawful killings – further hearings should be established in order to meet the UK's obligations under Article 3 of the ECHR, the court said. These will inquire into allegations of torture and lesser mistreatment of individuals detained by British troops in Iraq, focusing on a sample of the most serious of the 700-plus cases in which such allegations have been made.In December last year the MoD said it had paid out £14m in compensation and costs to 205 Iraqis who alleged unlawful imprisonment and mistreatment, and that it was negotiating a further 196 payments. Several hundred more claims were expected to be lodged.
  • ...1 more annotation...
  • The court said it had examined "allegations of the most serious kind involving murder, manslaughter, the wilful infliction of serious bodily injury, sexual indignities, cruel inhuman and degrading treatment and large scale violation of international humanitarian law".The judgment from Sir John Thomas, president of the Queen's Bench Division, and Mr Justice Silber, added that there was evidence to support claims that some of the abuse had been systemic, and questioned whether responsibility for poor training and a failure to investigate promptly lay with senior officers and figures in government
  •  
    These UK proceedings are under authority of the E.U. Convention on Human Rights, whose relevant provisions echo those of the UN Convention on Human Rights, which both the U.K. and the U.S. are party to.  The Brits' willingness to prosecute its own soldiers, senior officers, and figures in government for war crimes sharply contrasts to the U.S., where Barack Obama immediately upon taking office rejected calls for the Iraqi war crimes investigation and prosecution of U.S. military members and Executive Branch officials, saying that he wanted to look forward, not back.  This was a very thin answer to the nation's Nuremburg Prosecution principles later embodied in international law at the instigation of the U.S. Good on the Brits. Shame on the U.S.   
Paul Merrell

Investigations - 0 views

  • The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites, including YouTube, all without the knowledge or consent of the companies.Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter.
  • Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.”Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data, and would be able to extract some key data about specific users as well.
Paul Merrell

Snowden Docs: British Spies Used Sex and 'Dirty Tricks' - NBC News.com - 0 views

  • ritish spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications. advertisement Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
  • ritish spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.
  • In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here and here. The documents are being published with minimal redactions.
  •  
    Glenn Greenwald adds another dollop to the brew. 
1 - 20 of 396 Next › Last »
Showing 20 items per page