Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged capabilities

Rss Feed Group items tagged

Paul Merrell

Air Force Awards Contract for Long Range Strike Bomber > U.S. DEPARTMENT OF DEFENSE > A... - 0 views

  • The Air Force announced today the contract award of engineering and manufacturing development and early production for the Long Range Strike Bomber, or LRS-B, to Northrop Grumman Corp. 
  • Air Force Secretary Deborah Lee James said the LRS-B is critical to national defense and is a top priority for the Air Force. “We face a complex security environment,” she said. “It’s imperative our Air Force invests in the right people, technology, capability, and training to defend the nation and its interests – at an affordable cost.” The future threat will evolve through the introduction of advanced air defense systems and development of more capable surface to air missile systems. The LRS-B is designed to replace the Air Force’s aging fleets of bombers – ranging in age from 50+ years for the B-52 to 17+ years for the B-2 – with a long range, highly survivable bomber capable of penetrating and operating in tomorrow’s anti-access, area denial environment. The LRS-B provides the strategic agility to launch from the United States and strike any target, any time around the globe. “The LRS-B will provide our nation tremendous flexibility as a dual-capable bomber and the strategic agility to respond and adapt faster than our potential adversaries,” said Gen. Mark A. Welsh III, Chief of Staff of the Air Force. “We have committed to the American people to provide security in the skies, balanced by our responsibility to affordably use taxpayer dollars in doing so. This program delivers both while ensuring we are poised to face emerging threats in an uncertain future.”
  • The Long Range Strike Bomber contract is composed of two parts. The contract for the Engineering and Manufacturing Development, or EMD, phase is a cost-reimbursable type contract with cost and performance incentives. The incentives minimize the contractor’s profit if they do not control cost and schedule appropriately. The independent estimate for the EMD phase is $21.4 billion in 2010 dollars. The second part of the contract is composed of options for the first 5 production lots, comprising 21 aircraft out of the total fleet of 100. They are fixed price options with incentives for cost.  Based on approved requirements, the Average Procurement Unit Cost (APUC) per aircraft is required to be equal to or less than $550 million per aircraft in 2010 dollars when procuring 100 LRS-B aircraft. The APUC from the independent estimate supporting today’s award is $511 million per aircraft, again in 2010 dollars.
  •  
    Here we go again, another cost overrun nightmare 
Paul Merrell

A Secret Catalogue of Government Gear for Spying on Your Cellphone - 0 views

  • HE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.
  • The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.) A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages. Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.
  • ANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages. In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.
  • ...2 more annotations...
  • “We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”
  • But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.
Gary Edwards

The Real Reason for the Iraq War | VICE United Kingdom - 1 views

  • Like most lefty journalists, I assumed that George Bush and Tony Blair invaded Iraq to buy up its oil fields, cheap and at gun-point, and cart off the oil. We thought we knew the neo-cons true casus belli: Blood for oil. But the truth in the Options for Iraqi Oil Industry was worse than "Blood for Oil". Much, much worse.
  • Within days, our chief of investigations, Ms Badpenny, delivered to my shack in the woods outside New York a 323-page, three-volume programme for Iraq's oil crafted by George Bush's State Department and petroleum insiders meeting secretly in Houston, Texas. I cracked open the pile of paper – and I was blown away.
  • I'd already had in my hands a 101-page document, another State Department secret scheme, first uncovered by Wall Street Journal reporter Neil King, that called for the privatisation, the complete sell-off of every single government-owned asset and industry. And in case anyone missed the point, the sales would include every derrick, pipe and barrel of oil, or, as the document put it, "especially the oil". That plan was created by a gaggle of corporate lobbyists and neo-cons working for the Heritage Foundation. In 2004, the plan's authenticity was confirmed by Washington power player Grover Norquist. (It's hard to erase the ill memory of Grover excitedly waving around his soft little hands as he boasted about turning Iraq into a free-market Disneyland, recreating Chile in Mesopotamia, complete with the Pinochet-style dictatorship necessary to lock up the assets – while behind Norquist, Richard Nixon snarled at me from a gargantuan portrait.) The neo-con idea was to break up and sell off Iraq's oil fields, ramp up production, flood the world oil market – and thereby smash OPEC and with it, the political dominance of Saudi Arabia.
  • ...6 more annotations...
  • General Jay Garner also confirmed the plan to grab the oil. Indeed, Secretary of Defense Donald Rumsfeld fired Garner, when the General, who had lived in Iraq, complained the neo-con grab would set off a civil war. It did. Nevertheless, Rumsfeld replaced Garner with a new American viceroy, Paul Bremer, a partner in Henry Kissinger's firm, to complete the corporate takeover of Iraq's assets – "especially the oil".
  • But that was not to be. While Bremer oversaw the wall-to-wall transfer of Iraqi industries to foreign corporations, he was stopped cold at the edge of the oil fields. How? I knew there was only one man who could swat away the entire neo-con army: James Baker, former Secretary of State, Bush family consiglieri and most important, counsel to Exxon-Mobil Corporation and the House of Saud.
  • There was no way in hell that Baker's clients, from Exxon to Abdullah, were going to let a gaggle of neo-con freaks smash up Iraq's oil industry, break OPEC production quotas, flood the market with six million bbd of Iraqi oil and thereby knock the price of oil back down to $13 a barrel where it was in 1998.
  • Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields – and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil – he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil – END OF STATEMENT." Carroll then passed off control of Iraq's oil to Bob McKee of Halliburton, Cheney's old oil-services company, who implemented the Baker "enhance OPEC" option anchored in state ownership.
  • This week, VICE readers can download, for free, Greg Palast's investigation of the war in Iraq in the BBC film, Bush Family Fortunes, at www.GregPalast.com – as well as the illustrated poster of "The Secret History of War over Oil in Iraq" from Palast's international bestseller, Armed Madhouse, also at www.GregPalast.com
  • Some oil could be released, mainly to China, through limited, but lucrative, "production sharing agreements". And that's how George Bush won the war in Iraq. The invasion was not about "blood for oil", but something far more sinister: blood for no oil. War to keep supply tight and send prices skyward. Oil men, whether James Baker or George Bush or Dick Cheney, are not in the business of producing oil. They are in the business of producing profits. And they've succeeded. Iraq, capable of producing six to 12 million barrels of oil a day, still exports well under its old OPEC quota of three million barrels. The result: As we mark the tenth anniversary of the invasion this month, we also mark the fifth year of crude at $100 a barrel. As George Bush could proudly say to James Baker: Mission Accomplished!
  •  
    The Sherman Act forbids conspiracies in restraint of trade and is at its zenith in price-fixing cases. This looks to be the mother of all price-fixing cases, to say the least.   
  •  
    Wow, Marbux has it right.  This report from the legendary Greg Palast of the BBC News Network is a stunning reversal of what everyone believed to be the truth.  To wit, the militarist and global strategist - resource control hungry neocon contingent of the Repubican party was always thought to be behind the Iraqi war.  For control of cheap, plentiful oil and, the protection / destruction of Israel's enemies.   Funny, but it turns out America was fighting for higher oil prices and limited supplies.  Just as in the first Gulf War, Americans were fighting to protect Saudi and big oil profits. excerpt: Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields - and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil - he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil - END OF STATEMENT." Carroll then passed off control
Paul Merrell

Russian warships enter Mediterranean to form permanent task force - RT News - 0 views

  • Warships from Russia’s Pacific Fleet have entered the Mediterranean for the first time in decades. Russia’s Navy Chief says the task force may be reinforced with nuclear submarines, as the country starts building up a permanent fleet in the region.
  • The Mediterranean has recently become a hotspot of military muscle flexing as global powers seemingly vie for influence. NATO has been staging major naval war games involving several countries, last October holding an exercise code-named Noble Mariner 12. Russia held its largest naval exercises in the region this January, with drills spanning both the Black and Mediterranean Seas. The media quickly linked both the NATO and Russian war games to the situation in Syria. Another recent naval display, seen as provocative by Israel, was the deployment of the Iranian Navy’s 24th Fleet to patrol the Mediterranean and convey a “message of peace.” Since then, Israel has acquired its fifth Dolphin-class submarine allegedly capable of launching cruise missiles with nuclear warheads. China has also been increasing its involvement in the area, with the country’s warships sailing through the Suez Canal, and several key ports of the region becoming partially China-owned.
  •  
    On top of this, Israel has just launched its fifth submarine capable of firing nuclear missiles. 
Gary Edwards

Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabili... - 0 views

  •  
    "Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities July 16, 2012 in National Security Agency The following sworn declaration of William Binney, a former employee of the NSA and specialist in traffic analysis, was filed July 2, 2012 in support of the Electronic Frontier Foundation's case against the National Security Agency (Jewel v. NSA) regarding their illegal domestic surveillance programs which, according to Binney "are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications" inside the U.S.  Thanks to Jacob Appelbaum for originally drawing attention to the declaration." DECLARATION OF WILLIAM E. BINNEY IN SUPPORT OF PLAINTIFFS' MOTION FOR PARTIAL SUMMARY JUDGMENT REJECTING THE GOVERNMENT DEFENDANTS' STATE SECRET DEFENSE
Paul Merrell

U.S. House passes bill to ensure Israel can 'remove existential threats' - Diplomacy & ... - 0 views

  • The U.S. House of Representatives passed a defense authorization bill that would make it U.S. policy to take “all necessary steps” to ensure Israel is able to “remove existential threats,” among them nuclear facilities in Iran. “It is the policy of the United States to take all necessary steps to ensure that Israel possesses and maintains an independent capability to remove existential threats to its security and defend its vital national interests,” said the amendment to the National Defense Authorization Act passed Friday.
  • The amendment, initiated by Rep. Peter Roskam (R-Ill.) and first reported by Americans for Peace Now weekly legislative roundup, would require the president to report every 90 days on how the policy is being implemented. That report would identify “all aerial refueling platforms, bunker-buster munitions, and other capabilities and maintenance by Israel of a robust independent capability to remove existential security threats, including nuclear and ballistic missile facilities in Iran, and defend its vital national interests.”
  • The language must survive the reconciliation process with the Senate and then be signed by the president in order to become law. The amendment is similar to a non-binding resolution passed in April in the Senate that urged the president to provide “diplomatic, military, and economic support” to Israel should it be “compelled” to strike Iran’s suspected nuclear weapons program. The House version of the defense authorization act already included a number of Israel-related measures, including tripling Obama’s request for missile defense cooperation funding from $96 million to $284 million. The whole act passed Friday 315-108 and Roskam’s amendment passed by voice vote.
  •  
    House authorizes pre-emptive strike against the non-existent Iranian nuclear weapons.
Paul Merrell

US Intel Vets Dispute Russia Hacking Claims - Consortiumnews - 0 views

  • As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. Veteran Intelligence Professionals for Sanity MEMORANDUM Allegations of Hacking Election Are Baseless A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.
  • We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking: Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did. Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data. All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient. In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
  • These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources. The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network. The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked. The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.
  • ...1 more annotation...
  • As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking. For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)
Paul Merrell

BREAKING: 14 US-Led Coalition Military Advisers Captured by Syrian Special Forces in Al... - 0 views

  • At least 14 US-led coalition military advisers have been captured by the Syrian Special Forces in a bunker in the city of Aleppo, according to media reports.The event allegedly took place in the morning on December 16, 2016 (Voltaire.net):“The Security Council is sitting in private on Friday, December 16, 2016, at 17:00 GMT, while NATO officers were arrested this morning by the Syrian Special Forces in a bunker in East Aleppo.”21stcenturywire.com also provided a list of names of the coalition’s military advisers captured in Aleppo, citing a Syrian member of Parliament:Fares Shehabi, a prominent Syrian Parliamentarian and head of Aleppo’s Chamber of Commerce published the names of the Coalition officers on his Facebook page on the 15th December (emphasis added):Mutaz Kanoğlu – Turkey David Scott Winer – USA David Shlomo Aram – Israel Muhamad Tamimi – Qatar Muhamad Ahmad Assabian – Saudi Abd-el-Menham Fahd al Harij – Saudi Islam Salam Ezzahran Al Hajlan – Saudi Ahmed Ben Naoufel Al Darij – Saudi Muhamad Hassan Al Sabihi – Saudi Hamad Fahad Al Dousri – Saudi Amjad Qassem Al Tiraoui – Jordan Qassem Saad Al Shamry – Saudi Ayman Qassem Al Thahalbi – Saudi Mohamed Ech-Chafihi El Idrissi – Moroccan
  • Damascus-based Syrian journalist Said Hilal Alcharifi also reported on the issue in his Facebook account:Very urgent The Syrian authorities were able, thanks to information thorough, arrive at the headquarters of senior officers and western regional in the basement of a district of Aleppo-is, and capture them all alive. A few names have already been ex filtered to Syrian journalists including me. Seen the nationalities (us, French, British, German, Israelis, Turks, Saudis, Moroccans, Qatari, etc.. etc) of these scumbags and their military ranks, I assure you Syria holds in this moment a big treasures to carry out the negotiations with the countries that have destroyed.Earlier in December, SF already noted that the US despearate attempts to push a “diplomatic solution” in Aleppo could indicate that the Obama administration stalling for time to extricate US mercenaries and special service members from the Aleppo pocket:
  • Considering that US-led coalition military advisers have been widely operating across Syria, training and assisting to the so-called “moderate opposition” openly linked with al-Qaeda, the recently appeared reports are likely true.For isntance, British military advisers have officially arrived to Syria to restore combat capability of the ‘moderate’ opposition, retreated from Aleppo:British military advisers have arrived to Syria in order to restore combat capability of units of the ‘moderate’ opposition, retreated from Aleppo, the Izvestiya newspaper reported, citing a statement of UK Defense Minister Michael Fallon. According to Fallon, 20 British military instructors, who will train the opposition forces, involved in the fight against the Islamic State (IS) terrorist group, have already arrived at the destination.The dispatch of British advisers was announced in October, long before the recapture of Aleppo by the Syrian government forces. Initially, they had a task to train recruits to conduct combined arms combat, as well as to teach them the basics of tactical medicine and combat engineering. However, the situation changed and the task was changed too.
Paul Merrell

New Report: FBI Can Access Hundreds of Millions of Face Recognition Photos | Electronic... - 0 views

  • Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has access to hundreds of millions more photos than we ever thought. And the Bureau has been hiding this fact from the public—in flagrant violation of federal law and agency policy—for years. According to the GAO Report, FBI’s Facial Analysis, Comparison, and Evaluation (FACE) Services unit not only has access to FBI’s Next Generation Identification (NGI) face recognition database of nearly 30 million civil and criminal mug shot photos, it also has access to the State Department’s Visa and Passport databases, the Defense Department’s biometric database, and the drivers license databases of at least 16 states. Totaling 411.9 million images, this is an unprecedented number of photographs, most of which are of Americans and foreigners who have committed no crimes. The FBI has done little to make sure that its search results (which the Bureau calls “investigative leads”) do not include photos of innocent people, according to the report. The FBI has conducted only very limited testing to ensure the accuracy of NGI's face recognition capabilities. And it has not taken any steps to determine whether the face recognition systems of its external partners—states and other federal agencies—are sufficiently accurate to prevent innocent people from being identified as criminal suspects. As we know from previous research, face recognition is notoriously inaccurate across the board and may also misidentify African Americans and ethnic minorities, young people, and women at higher rates than whites, older people, and men, respectively.
  • The GAO’s findings are especially shocking, given the timing. Just over a month ago the FBI demanded its face recognition capabilities be exempt from several key provisions of the federal Privacy Act—and provided the public with only 30 days to respond.
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

IC ON THE RECORD * ODNI STATEMENT on the Unauthorized Disclosure of... - 1 views

  • September 6, 2013 It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption.  Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities.  Our intelligence community would not be doing its job if we did not try to counter that.  While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news. Indeed, NSA’s public website states that its mission includes leading “the U.S. Government in cryptology … in order to gain a decision advantage for the Nation and our allies.” The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity. Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.
  •  
    Director of National Intelligence James Clapper is displeased by the disclosures of its decryption capabilities revealed by the New York Times, based on Edward Snowden-leaked documents.  http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all&_r=0 Noticeably absent from DNI Clapper's reaction is the slightest hint of respect for privacy rights of American citizens. Isn't it past time that this gentleman lose his job, to be replaced by a strong civil libertarian? 
Paul Merrell

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data | World news ... - 0 views

  • The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect
  • Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets. Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
  • Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, marital status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world – meaning that just by taking tower ID from a handset, location information could be gleaned.A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information.So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system."
  • ...3 more annotations...
  • One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled "Golden Nugget!" – sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?"The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location".
  • The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information.The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets".The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms.The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds – which has reportedly been downloaded more than 1.7bn times – as a case study.
  • Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises.
  •  
    Don't miss the linked companion articles at New York Times and ProPublica. 
Paul Merrell

Obama orders US to draw up overseas target list for cyber-attacks | World news | thegua... - 0 views

  • Top-secret directive steps up offensive cyber capabilities to 'advance US objectives around the world'• Read the secret presidential directive here
  • Top-secret directive steps up offensive cyber capabilities to 'advance US objectives around the world'• Read the secret presidential directive here
  • Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals.The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging".It says the government will "identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power".The directive also contemplates the possible use of cyber actions inside the US, though it specifies that no such domestic operations can be conducted without the prior order of the president, except in cases of emergency.
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

NSA Director Alexander Defends Surveillance at Black Hat | Threatpost - 0 views

  •  
    "There are allegations [the NSA] listen to all our emails; that's wrong. We don't," Alexander said, adding that of 54 different terrorist-related activities identified through PRISM, 42 of which were disrupted, including 13 in the U.S., and 25 in Europe. "And if we did, we would be held accountable. There is 100 percent auditability on what we do." Technically accurate but materially misleading (only those with text-to-voice capabilities "listen" to emails). Meanwhile, assuming that Alexandeer meant to say "reading" instead of "listening to," the linked Guardian UK reporting on the NSA XScore program brands Gen. Alexander as a liar. 
Paul Merrell

Private firms selling mass surveillance systems around world, documents show | World ne... - 0 views

  • Private firms are selling spying tools and mass surveillance technologies to developing countries with promises that "off the shelf" equipment will allow them to snoop on millions of emails, text messages and phone calls, according to a cache of documents published on Monday.The papers show how firms, including dozens from Britain, tout the capabilities at private trade fairs aimed at offering nations in Africa, Asia and the Middle East the kind of powerful capabilities that are usually associated with government agencies such as GCHQ and its US counterpart, the National Security Agency.The market has raised concerns among human rights groups and ministers, who are poised to announce new rules about the sale of such equipment from Britain.
  • The documents are included in an online database compiled by the research watchdog Privacy International, which has spent four years gathering 1,203 brochures and sales pitches used at conventions in Dubai, Prague, Brasilia, Washington, Kuala Lumpur, Paris and London. Analysts posed as potential buyers to gain access to the private fairs.The database, called the Surveillance Industry Index, shows how firms from the UK, Israel, Germany, France and the US offer governments a range of systems that allow them to secretly hack into internet cables carrying email and phone traffic.The index has details from 338 companies, including 77 from the UK, offering a total of 97 different technologies.
  • The documents include a brochure from a company called Advanced Middle East Systems (AMES), based in Dubai. It has been offering a device called Cerebro – a DIY system similar to the Tempora programme run by GCHQ – that taps information from fibre-optic cables carrying internet traffic.AMES describes Cerebro as a "core technology designed to monitor and analyse in real time communications … including SMS (texting), GSM (mobile calls), billing data, emails, conversations, webmail, chat sessions and social networks."The company brochure makes clear this is done by attaching probes to internet cables. "No co-operation with the providers is required," it adds."Cerebro is designed to store several billions of records – metadata and/or communication contents. At any time the investigators can follow the live activity of their target with advanced targeting criteria (email addresses, phone numbers, key words)," says the brochure.
  • ...2 more annotations...
  • Another firm selling similar equipment is VASTech, based in South Africa, which has a system called Zebra. Potential buyers are told it has been designed to help "government security agencies face huge challenges in their combat against crime and terrorism".VASTech says Zebra offers "access to high volumes of information generated via telecommunication services for the purposes of analysis and investigation".It has been designed to "intercept all content and metadata of voice, SMS, email and fax communications on the connected network, creating a rich repository of information".
  • It is now possible, from a single laptop computer, to locate where a mobile phone is calling from anywhere in the world, with an accuracy of between 200 metres and a mile. This is not done by attaching probes, and it is not limited to the area where the laptop is working from. The "cross border" system means it is now theoretically possible to locate a mobile phone call from a town abroad from a laptop in London.
Paul Merrell

The Coming Drone Wars: Iran Unveils its own Drone, with a 1200-mile Range | Informed Co... - 0 views

  • It was foreseeable that when the United States began deploying drones wherever it likes, its rivals would also develop that capability. In fact, you wonder if sending the drones around doesn’t create an opportunity for others to capture them and reverse-engineer them. Iran captured a US Predator drone last winter and claimed to have gotten data from it. Instead of being cautious and prudent about a technology that could harm US citizens, the US government has rushed to deploy drones in several countries with which the US is not at war. So now Iran has announced a new “Fotros” drone in the same class with the Predator, with a 1200-mile range (2000 km). You wonder how the US will feel if Iran deploys it in nearby countries of the Middle East, just as Washington itself has done.
  •  
    Further detail in the article: Iran claims its Fotros drone has a much longer operational radius (1,100 miles with payload than the U.S. Predator (675 miles) and can stay aloft longer, bringing the whole of Israel and many U.S. bases in the Mideast within its reach. Moreover, it "is capable of being equipped with air-to-surface missiles and rockets of all kinds to carry out combat missions in addition to carrying out reconnaissance and surveillance missions."  Recently it was reported that some 80 nations now have drones in their military arsenals, so a new arms race in drones as a weapons, intelligence, and surveillance platform.  
Paul Merrell

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
Paul Merrell

White House OKd spying on allies, U.S. intelligence officials say - latimes.com - 0 views

  • The White House and State Department signed off on surveillance targeting phone conversations of friendly foreign leaders, current and former U.S. intelligence officials said Monday, pushing back against assertions that President Obama and his aides were unaware of the high-level eavesdropping. Professional staff members at the National Security Agency and other U.S. intelligence agencies are angry, these officials say, believing the president has cast them adrift as he tries to distance himself from the disclosures by former NSA contractor Edward Snowden that have strained ties with close allies. The resistance emerged as the White House said it would curtail foreign intelligence collection in some cases and two senior U.S. senators called for investigations of the practice. France, Germany, Italy, Mexico and Sweden have all publicly complained about the NSA surveillance operations, which reportedly captured private cellphone conversations by German Chancellor Angela Merkel, among other foreign leaders.
  • On Monday, as Spain joined the protest, the fallout also spread to Capitol Hill.
  • Until now, members of Congress have chiefly focused their attention on Snowden's disclosures about the NSA's collection of U.S. telephone and email records under secret court orders. "With respect to NSA collection of intelligence on leaders of U.S. allies — including France, Spain, Mexico and Germany — let me state unequivocally: I am totally opposed," said Sen. Dianne Feinstein (D-Calif.), who chairs the Senate Intelligence Committee. "Unless the United States is engaged in hostilities against a country or there is an emergency need for this type of surveillance, I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers," she said in a statement. Feinstein said the Intelligence Committee had not been told of "certain surveillance activities" for more than a decade, and she said she would initiate a major review of the NSA operation. She added that the White House had informed her that "collection on our allies will not continue," although other officials said most U.S. surveillance overseas would not be affected. Sen. John McCain (R-Ariz.), ranking minority member of the Armed Services Committee, said Congress should consider creating a special select committee to examine U.S. eavesdropping on foreign leaders.
  • ...5 more annotations...
  • "Obviously, we're going to want to know exactly what the president knew and when he knew it," McCain told reporters in Chicago. "We have always eavesdropped on people around the world. But the advance of technology has given us enormous capabilities, and I think you might make an argument that some of this capability has been very offensive both to us and to our allies."
  • Precisely how the surveillance is conducted is unclear. But if a foreign leader is targeted for eavesdropping, the relevant U.S. ambassador and the National Security Council staffer at the White House who deals with the country are given regular reports, said two former senior intelligence officials, who spoke on condition of anonymity in discussing classified information. Obama may not have been specifically briefed on NSA operations targeting a foreign leader's cellphone or email communications, one of the officials said. "But certainly the National Security Council and senior people across the intelligence community knew exactly what was going on, and to suggest otherwise is ridiculous." If U.S. spying on key foreign leaders was news to the White House, current and former officials said, then White House officials have not been reading their briefing books. Some U.S. intelligence officials said they were being blamed by the White House for conducting surveillance that was authorized under the law and utilized at the White House. "People are furious," said a senior intelligence official who would not be identified discussing classified information. "This is officially the White House cutting off the intelligence community."
  • Any decision to spy on friendly foreign leaders is made with input from the State Department, which considers the political risk, the official said. Any useful intelligence is then given to the president's counter-terrorism advisor, Lisa Monaco, among other White House officials. Jay Carney, the White House press secretary, said Monday that Obama had ordered a review of surveillance capabilities, including those affecting America's closest foreign partners and allies. "Our review is looking across the board at our intelligence gathering to ensure that as we gather intelligence, we are properly accounting for both the security of our citizens and our allies and the privacy concerns shared by Americans and citizens around the world," Carney said.
  • Caitlin Hayden, spokeswoman for the National Security Council, said the review would examine "whether we have the appropriate posture when it comes to heads of state, how we coordinate with our closest allies and partners, and what further guiding principles or constraints might be appropriate for our efforts." She said the review should be completed this year.
  • Intelligence officials also disputed a Wall Street Journal article Monday that said the White House had learned only this summer — during a review of surveillance operations that might be exposed by Snowden — about an NSA program to monitor communications of 35 world leaders. Since then, officials said, several of the eavesdropping operations have been stopped because of political sensitivities.
  •  
    Good. The Intelligence community is calling BS on Obama's claim that he didn't know about the spying on foreign heads of allied states. And McCain says we need a select Congressional committee to look into what the president knew and when he knew it. That's an implicit slam of the Feinstein-led Senate Select Committee on Intelligence's oversight of the intelligence agencies and a signal that there is a scandal lurking here. More importantly, a new select committee would not have the same membership as the existing Intelligence Community, which has largely functioned as a rubber stamp for what the intelligence agencies want. We have been down this road before, in the mid-70s, when the Defense Dept. intelligence agencies were caught spying on Americans, leading to the Select Committee investigation headed by former Sen. Frank Church and to the initial passage of the Foreign Intelligence Surveillance Act, among other legislation delivering a strong message to the intelligence agencies that what happens within the U.S. is off-limits to them. But that was a lesson forgotten as new technology came along for NSA to play with. If Obama is smart, he will promptly respond to the LA Times article with a clarification that top members of his staff knew and the previous statement dealt only with his personal knowledge. But the Obama Administration has overwhelmingly demonstrated an inability to head off scandals and a big tendency to cover-up rather than get out in front of story, particularly in matters involving the NSA. So we may see a major scandal emerge from this already enormous scandal that is laid directly at Barack Obama's feet, a cover-up scandal.   Who knew what when, where, why, and how? My favorite question. 
Paul Merrell

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet - The In... - 0 views

  • The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
  • he “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities: • “Change outcome of online polls” (UNDERPASS) • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH) • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO) • “Find private photographs of targets on Facebook” (SPRING BISHOP) • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE) • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM) • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR) • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • ...1 more annotation...
  • • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE) • “Ability to spoof any email address and send email under that identity” (CHANGELING) • “For connecting two target phone together in a call” (IMPERIAL BARGE) While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
‹ Previous 21 - 40 of 386 Next › Last »
Showing 20 items per page