Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged encryption

Rss Feed Group items tagged

Paul Merrell

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
Paul Merrell

Israel Intelligence Eavesdropped on Phone Calls By John Kerry - SPIEGEL ONLINE - 0 views

  • SPIEGEL has learned from reliable sources that Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations. In addition to the Israelis, at least one other intelligence service also listened in as Kerry mediated last year between Israel, the Palestinians and the Arab states, several intelligence service sources told SPIEGEL. Revelations of the eavesdropping could further damage already tense relations between the US government and Israel. During the peak stage of peace talks last year, Kerry spoke regularly with high-ranking negotiating partners in the Middle East. At the time, some of these calls were not made on encrypted equipment, but instead on normal telephones, with the conversations transmitted by satellite. Intelligence agencies intercepted some of those calls. The government in Jerusalem then used the information obtained in international negotiations aiming to reach a diplomatic solution in the Middle East.
Paul Merrell

Snowden leaks spur new crop of secure phones, communications | Reuters - 0 views

  • (Reuters) - Public concerns about the U.S. government's secretive surveillance programs exposed by Edward Snowden have spawned a slew of encryption products and privacy services that aim to make electronic spying more difficult.
Paul Merrell

ISPs take GCHQ to court in UK over mass surveillance | World news | theguardian.com - 0 views

  • Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging that it uses "malicious software" to break into their networks.The claims from seven organisations based in six countries – the UK, Netherlands, US, South Korea, Germany and Zimbabwe – will add to international pressure on the British government following Edward Snowden's revelations about mass surveillance of the internet by UK and US intelligence agencies.The claims are being filed with the investigatory powers tribunal (IPT), the court in London that assesses complaints about the agencies' activities and misuse of surveillance by government organisations. Most of its hearings are held at least partially in secret.
  • The IPT is already considering a number of related submissions. Later this month it will investigate complaints by human rights groups about the way social media sites have been targeted by GCHQ.The government has defended the security services, pointing out that online searches are often routed overseas and those deemed "external communications" can be monitored without the need for an individual warrant. Critics say that such a legal interpretation sidesteps the need for traditional intercept safeguards.The latest claim is against both GCHQ, located near Cheltenham, and the Foreign Office. It is based on articles published earlier this year in the German magazine Der Spiegel. That report alleged that GCHQ had carried out an attack, codenamed Operation Socialist, on the Belgian telecoms group, Belgacom, targeting individual employees with "malware (malicious software)".One of the techniques was a "man in the middle" attack, which, according to the documents filed at the IPT, bypasses modern encryption software and "operates by interposing the attacker [GCHQ] between two computers that believe that they are securely communicating with each other. In fact, each is communicating with GCHQ, who collect the communications, as well as relaying them in the hope that the interference will be undetected."The complaint alleges that the attacks were a breach of the Computer Misuse Act 1990 and an interference with the privacy rights of the employees under the European convention of human rights.
  • The organisations targeted, the submission states, were all "responsible and professional internet service providers". The claimants are: GreenNet Ltd, based in the UK, Riseup Networks in Seattle, Mango Email Service in Zimbabwe, Jinbonet in South Korea, Greenhost in the Netherlands, May First/People Link in New York and the Chaos Computer Club in Hamburg.
  • ...1 more annotation...
  • Among the programs said to have been operating were Turbine, which automates the injection of data and can infect millions of machines and Warrior Pride, which enables microphones on iPhones and Android devices to be remotely activated.
Paul Merrell

Congress Is Irrelevant on Mass Surveillance. Here's What Matters Instead. - The Intercept - 0 views

  • The “USA Freedom Act”—the proponents of which were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill. The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP senator after the next—led by ranking intelligence committee member Saxby Chambliss of Georgia (pictured above)—stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point.
  • So the pro-NSA Republican senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult. The boredom of this spectacle was simply due to the fact that this has been seen so many times before—in fact, every time in the post-9/11 era that the U.S. Congress pretends publicly to debate some kind of foreign policy or civil liberties bill. Just enough members stand up to scream “9/11″ and “terrorism” over and over until the bill vesting new powers is passed or the bill protecting civil liberties is defeated.
  • Eight years ago, when this tawdry ritual was still a bit surprising to me, I live-blogged the 2006 debate over passage of the Military Commissions Act, which, with bipartisan support, literally abolished habeas corpus rights established by the Magna Carta by sanctioning detention without charges or trial. (My favorite episode there was when GOP Sen. Arlen Specter warned that “what the bill seeks to do is set back basic rights by some nine hundred years,” and then voted in favor of its enactment.) In my state of naive disbelief, as one senator after the next thundered about the “message we are sending” to “the terrorists,” I wrote: “The quality of the ‘debate’ on the Senate floor is so shockingly (though appropriately) low and devoid of substance that it is hard to watch.” So watching last night’s Senate debate was like watching a repeat of some hideously shallow TV show. The only new aspect was that the aging Al Qaeda villain has been rather ruthlessly replaced by the show’s producers with the younger, sleeker ISIS model. Showing no gratitude at all for the years of value it provided these senators, they ignored the veteran terror group almost completely in favor of its new replacement. And they proceeded to save a domestic surveillance program clearly unpopular among those they pretend to represent.
  • ...8 more annotations...
  • Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. Those limitations are going to come from—are now coming from —very different places:
  • All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy.
  • There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95 percent of the planet called “non-Americans”). There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court to contest the claims of the government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.
  • 1) Individuals refusing to use internet services that compromise their privacy.
  • 2) Other countries taking action against U.S. hegemony over the internet.
  • 3) U.S. court proceedings.
  • 4) Greater individual demand for, and use of, encryption.
  • The “USA Freedom Act”—which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill.
  •  
    Glenn Greenwald on why the death of the USA Freedom Act is actually a Very Good Thing. I couldn't agree more.
Paul Merrell

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus - The Intercept - 0 views

  • “Is this related to what we talked about before?” Bencsáth said, referring to a previous discussion they’d had about testing new services the company planned to offer customers. “No, something else,” Bartos said. “Can you come now? It’s important. But don’t tell anyone where you’re going.” Bencsáth wolfed down the rest of his lunch and told his colleagues in the lab that he had a “red alert” and had to go. “Don’t ask,” he said as he ran out the door. A while later, he was at Bartos’ office, where a triage team had been assembled to address the problem they wanted to discuss. “We think we’ve been hacked,” Bartos said.
  • They found a suspicious file on a developer’s machine that had been created late at night when no one was working. The file was encrypted and compressed so they had no idea what was inside, but they suspected it was data the attackers had copied from the machine and planned to retrieve later. A search of the company’s network found a few more machines that had been infected as well. The triage team felt confident they had contained the attack but wanted Bencsáth’s help determining how the intruders had broken in and what they were after. The company had all the right protections in place—firewalls, antivirus, intrusion-detection and -prevention systems—and still the attackers got in.
  • Bencsáth was a teacher, not a malware hunter, and had never done such forensic work before. At the CrySyS Lab, where he was one of four advisers working with a handful of grad students, he did academic research for the European Union and occasional hands-on consulting work for other clients, but the latter was mostly run-of-the-mill cleanup work—mopping up and restoring systems after random virus infections. He’d never investigated a targeted hack before, let alone one that was still live, and was thrilled to have the chance. The only catch was, he couldn’t tell anyone what he was doing. Bartos’ company depended on the trust of customers, and if word got out that the company had been hacked, they could lose clients. The triage team had taken mirror images of the infected hard drives, so they and Bencsáth spent the rest of the afternoon poring over the copies in search of anything suspicious. By the end of the day, they’d found what they were looking for—an “infostealer” string of code that was designed to record passwords and other keystrokes on infected machines, as well as steal documents and take screenshots. It also catalogued any devices or systems that were connected to the machines so the attackers could build a blueprint of the company’s network architecture. The malware didn’t immediately siphon the stolen data from infected machines but instead stored it in a temporary file, like the one the triage team had found. The file grew fatter each time the infostealer sucked up data, until at some point the attackers would reach out to the machine to retrieve it from a server in India that served as a command-and-control node for the malware.
  • ...1 more annotation...
  • Bencsáth took the mirror images and the company’s system logs with him, after they had been scrubbed of any sensitive customer data, and over the next few days scoured them for more malicious files, all the while being coy to his colleagues back at the lab about what he was doing. The triage team worked in parallel, and after several more days they had uncovered three additional suspicious files. When Bencsáth examined one of them—a kernel-mode driver, a program that helps the computer communicate with devices such as printers—his heart quickened. It was signed with a valid digital certificate from a company in Taiwan (digital certificates are documents ensuring that a piece of software is legitimate). Wait a minute, he thought. Stuxnet—the cyberweapon that was unleashed on Iran’s uranium-enrichment program—also used a driver that was signed with a certificate from a company in Taiwan. That one came from RealTek Semiconductor, but this certificate belonged to a different company, C-Media Electronics. The driver had been signed with the certificate in August 2009, around the same time Stuxnet had been unleashed on machines in Iran.
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Paul Merrell

Leaks Damaged U.S. Intelligence, Official Says - 0 views

  • Unauthorized disclosures of classified information by Edward Snowden have damaged U.S. intelligence capabilities, National Counterterrorism Center director Nicholas J. Rasmussen told Congress last week. “Due to the Snowden leaks and other disclosures, terrorists also have a great understanding of how we seek to conduct surveillance including our methods, our tactics and the scope and scale of our efforts. They’ve altered the ways in which they communicate and this has led to a decrease in collection,” Mr. Rasmussen said at a February 12 hearing of the Senate Select Committee on Intelligence. “We have specific examples which I believe we have shared with the committee and the committee staff in classified session — specific examples of terrorists who have adopted greater security measures such as using various new types of encryption, terrorists who have dropped or changed email addresses, and terrorists who have simply stopped communicating in ways they had before, in part because they understand how we collected,” he said. This is not terribly persuasive, particularly since Mr. Rasmussen did not specify which leaks resulted in which changes by which terrorists at what cost to U.S. security. Nor is a public statement by an intelligence official before the Senate Intelligence Committee entitled any longer to a presumption of accuracy since the Committee permits errors to stand uncorrected.
Paul Merrell

U.S. Embedded Spyware Overseas, Report Claims - NYTimes.com - 0 views

  • The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted in Iran, Russia, Pakistan, China, Afghanistan and other countries closely watched by American intelligence agencies, according to a Russian cybersecurity firm.In a presentation of its findings at a conference in Mexico on Monday, Kaspersky Lab, the Russian firm, said that the implants had been placed by what it called the “Equation Group,” which appears to be a veiled reference to the National Security Agency and its military counterpart, United States Cyber Command.
  • It linked the techniques to those used in Stuxnet, the computer worm that disabled about 1,000 centrifuges in Iran’s nuclear enrichment program. It was later revealed that Stuxnet was part of a program code-named Olympic Games and run jointly by Israel and the United States.Kaspersky’s report said that Olympic Games had similarities to a much broader effort to infect computers well beyond those in Iran. It detected particularly high infection rates in computers in Iran, Pakistan and Russia, three countries whose nuclear programs the United States routinely monitors.
  • Some of the implants burrow so deep into the computer systems, Kaspersky said, that they infect the “firmware,” the embedded software that preps the computer’s hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls, Kaspersky reported, making it virtually impossible to wipe out.
  • ...1 more annotation...
  • In many cases, it also allows the American intelligence agencies to grab the encryption keys off a machine, unnoticed, and unlock scrambled contents. Moreover, many of the tools are designed to run on computers that are disconnected from the Internet, which was the case in the computers controlling Iran’s nuclear enrichment plants.
Paul Merrell

Google warns of US government 'hacking any facility' in the world | Technology | The Gu... - 0 views

  • Google is boldly opposing an attempt by the US Justice Department to expand federal powers to search and seize digital data, warning that the changes would open the door to US “government hacking of any facility” in the world. In a strongly worded submission to the Washington committee that is considering the proposed changes, Google says that increasing the FBI’s powers set out in search warrants would raise “monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide”. The search giant warns that under updated proposals, FBI agents would be able to carry out covert raids on servers no matter where they were situated, giving the US government unfettered global access to vast amounts of private information.
  • In particular, Google sounds the alarm over the FBI’s desire to “remotely” search computers that have concealed their location – either through encryption or by obscuring their IP addresses using anonymity services such as Tor. Those government searches, Google says, “may take place anywhere in the world. This concern is not theoretical. ... [T]he nature of today’s technology is such that warrants issued under the proposed amendment will in many cases end up authorizing the government to conduct searches outside the United States.”
  • The Justice Department itself has tried to assuage anxieties about its proposed amendment. In its comment to the committee, DoJ officials say that federal agents would only request the new type of warrants where there was “probable cause to search for or seize evidence, fruits, or instrumentalities of crime”. But civil liberties and legal groups remain unconvvinced, insisting that the language is so vaguely worded that it would have draconian and global implications. In its submission, the American Civil Liberties Union said that the proposed changes could violate the fourth amendment of the US constitution, which bans unreasonable searches and seizures. The ACLU’s principal technologist, Christopher Soghoian, said: “The government is seeking a troubling expansion of its power to surreptitiously hack into computers, including using malware. Although this proposal is cloaked in the garb of a minor procedural update, in reality it would be a major and substantive change that would be better addressed by Congress.”
  •  
    Fourth Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly* describing *the place to be searched,* and the persons or things to be seized." The Justice Department proposed amendment to the rules would abolish the emphasized portion of the Amendment, substituting in its place the "general warrant" that the Amendment was intended to forbid. I'm coming to realize more and more that it's my own government, not terrorists™, that needs more surveillance.  
Paul Merrell

Yemen as Vietnam or Afghanistan | Consortiumnews - 0 views

  • Yemen as Vietnam or Afghanistan April 1, 2015 With U.S. intelligence help, Saudi Arabia has launched air strikes into Yemen and wants Egypt and Pakistan to invade, threatening to turn a long-simmering civil war into a regional conflict, a scenario that reminded retired U.S. diplomat William R. Polk of his work for President Kennedy on an earlier Yemeni war.By William R. PolkAs the events unfold with the Saudi and Egyptian engagement in Yemen, I was reminded of my discussion with Egypt’s President Gamal Abdel Nasser on “his” Yemen war, sometimes called the North Yemen Civil War that began in 1962, became a stalemate and finally ended in 1970. As Mark Twain may have said, “history doesn’t repeat but sometimes it rhymes.” The rhymes, at least, seem unmistakable.In the course of our first lengthy talk on Yemen, Nasser (rather angrily) replied to one of my comments, “you don’t think I will win the war, do you?”
  • “No, Mr. President,” I replied, “I don’t.”
  • “Well,” Nasser retorted, “you American’s think you know all about everything, and you don’t even have any of your people in Sanaa and none up in the north where the fighting is going on. You don’t know anything about Yemen.” Then, without thinking of the implication, I suppose, he said, ” You should go see.”“Mr. President,” I quickly said. “I regard that as an invitation.” Impolitely, I then stood up. He looked at me with narrow, angry eyes. He obviously had not meant what I had inferred.“All right, go see,” he said. “I will give instructions that you can go anywhere you want, talk to anyone you want, see everything..”“But, of course, I cannot even get there without your help,” I said.“You can have my plane.”Rather off-handedly and not warmly, we shook hands. I said goodbye and rushed back to our embassy and wrote an “eyes only” message to  President John Kennedy. I did not want it scattered around our government so I prevailed upon the CIA station chief to send it by his rather more restricted route. It was encrypted and sent in three batches. Before the second batch got sent, a reply came back: “go.”
  • ...2 more annotations...
  • s I was leaving, Nasser took me out to my car and even opened the car door for me. His guards were as astonished as I was, Apparently, he had never before done this. As we shook hands, he said, “Well, Bill, where are you off to this time?”“This time, Mr. President, I am not going to tell you!”He burst out laughing as did I. We did not meet again but our frankness and respect later enabled me to work out the 1970 ceasefire on Suez with him shortly before his death.
  • It is hard to believe that history now seems to be repeating with Egypt and Saudi Arabia again engaged in a counter-guerrilla war in Yemen! For Nasser, it was Egypt’s Vietnam. Will the new Yemen war be Egypt’s (and Saudi Arabia’s) Afghanistan? I think it is very likely. All of the signs point in that direction.And, as I have laid out in numerous essays on Afghanistan, Iraq, Syria, Somalia, Mali and Algeria, and in my little book Violent Politics, guerrilla wars are almost never “won” but usually drain the supposedly dominant power of its wealth, moral position and political unity.
Paul Merrell

Director Of National Intelligence Confirms Smart Devices May Be Used To Spy On Americans - 0 views

  • Director of National Intelligence James Clapper stated to the Senate Armed Services Committee that the Internet of Things (IoT) — so-called “smart” devices, vehicles, and appliances which employ various computer technologies — may be used to spy and keep tabs on people in the future. “In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” Clapper’s prepared testimony claimed. Though his remarks were ostensibly, and not surprisingly, directed toward the fight against ‘terrorism,’ the potential implications for all civilians cannot be ignored — particularly considering the IoT comprises everything from smart cars and fitness tracking devices to televisions and Barbie dolls. Clapper warns the threat from Russia, China, Iran, North Korea, and such non-state actors as ISIL and al-Qaeda. can be expected in the form of cyber attacks, gathering information about individuals, and even psy-ops, which make the IoT vulnerable to malicious intent — and ideal for U.S. intelligence-gathering purposes. “Future cyber operations will almost certainly include an increased emphasis on changing or manipulating data to compromise its integrity (i.e., accuracy and reliability) … Broader adoption of IoT devices and AI [artificial intelligence] — in settings such as public utilities and health care — will only exacerbate these potential effects,” said Clapper.
  • No matter the possible veracity in concerns of National Intelligence, the agency’s desire to thwart terrorism with an exponential increase in surveillance should be disquieting to all civilians wishing to maintain a modicum of privacy. As researchers with the Berkman Center for Internet & Society at Harvard warned in their recent report, Don’t Panic: “The Internet of Things promises a new frontier for networking objects, machines, and environments in ways that we [are] just beginning to understand. When, say, a television has a microphone and a network connection, and is reprogrammable by its vendor, it could be used to listen in to one side of a telephone conversation taking place in its room — no matter how encrypted the telephone service itself might be. These forces are on a trajectory towards a future with more opportunities for surveillance.” In fact, the Nest is a home automation producer of programmable, self-learning, sensor-driven, Wi-Fi-enabled thermostats, smoke detectors, and other security systems. It’s also one of the devices can be used to spy on people in their homes. Clapper’s testimony carefully constructs a potential legal justification for expanding surveillance via, say, your dishwasher, in his assertion that homegrown violent extremists — who have now earned an acronym, HVEs — present the greatest looming threat inside the United States. According to his remarks:
Paul Merrell

Apple Submits Brief Opposing U.S. Government's 'Unprecedented' iPhone Request - 0 views

  • (Reuters) - Apple Inc <AAPL.O> on Thursday struck back in court against a U.S. government request to unlock an encrypted iPhone belonging to one of the San Bernardino shooters, arguing such a move would violate its free speech rights and require the company to devote significant resources to comply.
  • Read the brief:
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

The Arab Spring: Made in the USA | Global Research - Centre for Research on Globalization - 0 views

  • Arabesque$: Enquête sur le rôle des États-Unis dans les révoltes arabes (Investigation into the US Role in the Arab Uprisings) is an update of Ahmed Bensaada’s 2011 book L’Arabesque Américaine. It concerns the US government role in instigating, funding and coordinating the Arab Spring “revolutions.” Most of this history has been carefully suppressed by the western media.The new book devotes much more attention to the personalities leading the 2011 uprisings. Some openly admitted to receiving CIA funding. Others had no idea because it was deliberately concealed from them. A few (in Egypt and Syria) were officially charged with espionage. In Egypt, seven sought refuge in the US embassy in Cairo and had to be evacuated by the State Department.
  • According to Bensaada, the MENA Arab Spring revolutions have four unique features in common: None were spontaneous – all required careful and lengthy (5+ years) planning, by the State Department, CIA pass through foundations, George Soros, and the pro-Israel lobby.1 All focused exclusively on removing reviled despots without replacing the autocratic power structure that kept them in power. No Arab Spring protests made any reference whatsoever to powerful anti-US sentiment over Palestine and Iraq. All the instigators of Arab Spring uprisings were middle class, well educated youth who mysteriously vanished after 2011.
  • Follow the Money Relying mainly on Wikileaks cables and the websites of key CIA pass through foundations (which he reproduces in the appendix), Bensaada methodically lists every State Department conference and workshop the Arab Spring heroes attended, the dollar amounts spent on them by the State Department and key “democracy” promoting foundations3, the specific involvement of Google, Facebook, Twitter and Obama’s 2008 Internet campaign team in training Arab Spring cyperactivists in encryption technologies and social media skills, US embassy visits, and direct encounters with Hillary Clinton,  Condoleezza Rice, John McCain, Barack Obama and Serbian trainers from CANVAS (the CIA-backed organization that overthrew Slobodan Milosevic in 2000). Bensaada focuses most heavily on the Tahrir Square uprising in Egypt. TheWashington Post has estimated approximately 10,000 Egyptians took part in NED and USAID training in social media and nonviolent organizing techniques. For me the most astonishing information in this chapter concerned the role of an Egyptian exile (a former Egyptian policeman named Omar Afifi Suleiman) in coordinating the Tahrir Square protests from his office in Washington DC. According to Wikileaks, NED paid Suleiman a yearly stipend of $200,000+ between 2008-2011.
  • ...2 more annotations...
  • When Nonviolence Fails Arabesques$ devotes far more attention to Libya, Syria and Yemen than Bensaada’s first book. In the section on Libya, Bensaada zeroes in on eleven key US assets who engineered the overthrow of Gaddafi. Some participated in the same State Department trainings as the Middle East opposition activists and instigated nonviolent Facebook and Twitter protests to coincide with the 2011 uprisings in Tunisian and Egypt. Others, in exile, underwent guerrilla training sponsored by the CIA, Mossad, Chad and Saudi Arabia. A few months after Gaddafi’s assassination, some of these same militants would lead Islamic militias attempting to overthrow Assad in Syria. Between 2005 and 2010, the State Department funneled $12 million to opposition groups opposed to Assad. The US also financed Syrian exiles in Britain to start an anti-government cable TV channel they beamed into Syria. In the section on Syria, Bensaada focuses on a handful of Syrian opposition activists who received free US training in cyberactivism and nonviolent resistance beginning in 2006. One, Ausama Monajed, is featured in the 2011 film How to Start a Revolution about a visit with Gene Sharp in 2006. Monajed and others worked closely with the US embassy, funded by the Middle East Partnership Initiative (MEPI). This is a State Department program that operates in countries (such as Libya and Syria) where USAID is banned. In February 2011, these groups posted a call on Twitter and Facebook for a Day of Rage. Nothing happened. When Sharpian techniques failed to produce a sizable nonviolent uprising, as in Libya, they and their allies (Saudi Arabia, Turkey, Qatar and Jordan) were all set up to introduce Islamic mercenaries (many directly from Libya) to declare war on the Assad regime.
  • Dr. Bramhall is a retired American psychiatrist and political refugee in New Zealand. She has published a free, downloadable non-fiction ebook 21st Century Revolution.
  •  
    Alas, the book is apparently available only in French. 
Paul Merrell

Russian options against a US attack on Syria | The Vineyard of the Saker - 0 views

  • The tensions between Russia and the USA have reached an unprecedented level. I fully agree with the participants of this CrossTalk show – the situation is even worse and more dangerous than during the Cuban Missile Crisis. Both sides are now going to the so-called “Plan B” which, simply put, stand for, at best, no negotiations and, at worst, a war between Russia and the USA.
  • In theory, these are, very roughly, the possible levels of confrontation: A military standoff à la Berlin in 1961. One could argue that this is what is already taking place right now, albeit in a more long-distance and less visible way. A single military incident, such as what happened recently when Turkey shot down a Russian SU-24 and Russia chose not to retaliate. A series of localized clashes similar to what is currently happening between India and Pakistan. A conflict limited to the Syrian theater of war (say like the war between the UK and Argentina over the Malvinas Islands). A regional or global military confrontation between the USA and Russia. A full scale thermonuclear war between the USA and Russia During my years as a student of military strategy I have participated in many exercises on escalation and de-escalation and I can attest that while it is very easy to come up with escalatory scenarios, I have yet to see a credible scenario for de-escalation. What is possible, however, is the so-called “horizontal escalation” or “asymmetrical escalation” in which one side choses not to up the ante or directly escalate, but instead choses a different target for retaliation, not necessarily a more valuable one, just a different one on the same level of conceptual importance (in the USA Joshua M. Epstein and Spencer D. Bakich did most of the groundbreaking work on this topic).
  • The main reason why we can expect the Kremlin to try to find asymmetrical options to respond to a US attack is that in the Syrian context Russia is hopelessly outgunned by the US/NATO, at least in quantitative terms. The logical solutions for the Russians is to use their qualitative advantage or to seek “horizontal targets” as possible retaliatory options. This week, something very interesting and highly uncharacteristic happened: Major General Igor Konashenkov, the Chief of the Directorate of Media service and Information of the Ministry of Defence of the Russian Federation, openly mentioned one such option. Here is what he said: “As for Kirby’s threats about possible Russian aircraft losses and the sending of Russian servicemen back to Russia in body bags, I would say that we know exactly where and how many “unofficial specialists” operate in Syria and in the Aleppo province and we know that they are involved in the operational planning and that they supervise the operations of the militants. Of course, one can continue to insist that they are unsuccessfully involved in trying to separate the al-Nusra terrorists from the “opposition” forces. But if somebody tries to implement these threats, it is by no means certain that these militants will have to time to get the hell out of there.” Nice, no? Konashenkov appears to be threatening the “militants” but he is sure to mention that there are plenty of “unofficial specialists” amongst these militants and that Russia knows exactly where they are and how many of them there are. Of course, officially, Obama has declared that there are a few hundred such US special advisors in Syria. A well-informed Russian source suggests that there are up to 5’000 foreign ‘advisors’ to the Takfiris including about 4’000 Americans. I suppose that the truth is somewhere between these two figures.
  • ...4 more annotations...
  • So the Russian threat is simple: you attack us and we will attack US forces in Syria. Of course, Russia will vehemently deny targeting US servicemen and insist that the strike was only against terrorists, but both sides understand what is happening here. Interestingly, just last week the Iranian Fars news agency reported that such a Russian attack had already happened: 30 Israeli, Foreign Intelligence Officers Killed in Russia’s Caliber Missile Attack in Aleppo: “The Russian warships fired three Caliber missiles at the foreign officers’ coordination operations room in Dar Ezza region in the Western part of Aleppo near Sam’an mountain, killing 30 Israeli and western officers,” the Arabic-language service of Russia’s Sputnik news agency quoted battlefield source in Aleppo as saying on Wednesday. The operations room was located in the Western part of Aleppo province in the middle of sky-high Sam’an mountain and old caves. The region is deep into a chain of mountains. Several US, Turkish, Saudi, Qatari and British officers were also killed along with the Israeli officers. The foreign officers who were killed in the Aleppo operations room were directing the terrorists’ attacks in Aleppo and Idlib.” Whether this really happened or whether the Russians are leaking such stories to indicate that this could happen, the fact remains that US forces in Syria could become an obvious target for Russian retaliation, whether by cruise missile, gravity bombs or direct action operation by Russian special forces. The US also has several covert military installations in Syria, including at least one airfield with V-22 Osprey multi-mission tiltrotor aircraft.
  • Another interesting recent development has been the Fox News report that Russians are deploying S-300V (aka “SA-23 Gladiator anti-missile and anti-aircraft system”) in Syria. Check out this excellent article for a detailed discussion of the capabilities of this missile system. I will summarize it by saying that the S-300V can engage ballistic missiles, cruise missiles, very low RCS (“stealth”) aircraft and AWACS aircraft. This is an Army/Army Corps -level air defense system, well capable of defending most of the Syrian airspace, but also reach well into Turkey, Cyprus, the eastern Mediterranean and Lebanon. The powerful radars of this system could not only detect and engage US aircraft (including “stealth”) at a long distance, but they could also provide a tremendous help for the few Russian air superiority fighters by giving them a clear pictures of the skies and enemy aircraft by using encrypted datalinks. Finally, US air doctrine is extremely dependent on the use of AWACS aircraft to guide and support US fighters. The S-300V will forces US/NATO AWACS to operate at a most uncomfortable distance. Between the longer-range radars of the Russian Sukhois, the radars on the Russian cruisers off the Syrian coast, and the S-300 and S-300V radars on the ground, the Russians will have a much better situational awareness than their US counterparts. It appears that the Russians are trying hard to compensate for their numerical inferiority by deploying high-end systems for which the US has no real equivalent or good counter-measures.
  • There are basically two options of deterrence: denial, when you prevent your enemy from hitting his targets and retaliation, when you make the costs of an enemy attack unacceptably high for him. The Russians appear to be pursuing both tracks at the same time. We can thus summarize the Russian approach as such Delay a confrontation as much as possible (buy time). Try to keep any confrontation at the lowest possible escalatory level. If possible, reply with asymmetrical/horizontal escalations. Rather then “prevail” against the US/NATO – make the costs of attack too high. Try to put pressure on US “allies” in order to create tensions inside the Empire. Try to paralyze the USA on a political level by making the political costs of an attack too high-end. Try to gradually create the conditions on the ground (Aleppo) to make a US attack futile To those raised on Hollywood movies and who still watch TV, this kind of strategy will elicit only frustration and condemnation. There are millions of armchair strategists who are sure that they could do a much better job than Putin to counter the US Empire. These folks have now been telling us for *years* that Putin “sold out” the Syrians (and the Novorussians) and that the Russians ought to do X, Y and Z to defeat the AngloZionist Empire. The good news is that none of these armchair strategists sit in the Kremlin and that the Russians have stuck to their strategy over the past years, one day at a time, even when criticized by those who want quick and “easy” solutions. But the main good news is that the Russian strategy is working. Not only is the Nazi-occupied Ukraine quite literally falling apart, but the US has basically run out of options in Syria (see this excellent analysis by my friend Alexander Mercouris in the Duran).
  • The only remaining logical steps left for the USA in Syria is to accept Russia’s terms or leave. The problem is that I am not at all convinced that the Neocons, who run the White House, Congress and the US corporate media, are “rational” at all. This is why the Russians employed so many delaying tactics and why they have acted with such utmost caution: they are dealing with professional incompetent ideologues who simply do not play by the unwritten but clear rules of civilized international relations. This is what makes the current crisis so much worse than even the Cuban Missile Crisis: one superpower has clearly gone insane. Are the Americans crazy enough to risk WWIII over Aleppo? Maybe, maybe not. But what if we rephrase that question and ask Are the Americans crazy enough to risk WWIII to maintain their status as the “world’s indispensable nation”, the “leader of the free world”, the “city on the hill” and all the rest of this imperialistic nonsense? Here I would submit that yes, they potentially are.
  •  
    This is a must-read. We are at a perilous moment in history.
« First ‹ Previous 121 - 136 of 136
Showing 20 items per page