Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged hardware

Rss Feed Group items tagged

Paul Merrell

Syrian army moves Scud missiles to avoid strike - 0 views

  • President Bashar Assad's forces have removed several Scud missiles and dozens of launchers from a base north of Damascus, possibly to protect the weapons from a Western attack, opposition sources said on Thursday.
  • At the headquarters of the army's 155th Brigade, a missile unit whose base sprawls along the western edge of Syria's main highway running north from the capital to Homs, rebel scouts saw dozens mobile Scud launchers pulling out early on Thursday.Rebel military sources said spotters saw missiles draped in tarpaulins on the launchers, as well as trailer trucks carrying other rockets and equipment. More than two dozen Scuds — 35-foot-long ballistic missiles with ranges of 200 miles and more — were fired from the base in the Qalamoun area this year, some of which hit even Aleppo in the far north.The base was among a list of suggested targets presented by the rebel Syrian National Coalition to Western envoys in Istanbul earlier this week, opposition sources said. Scud units, of Soviet or North Korean manufacture, are designed to be mobile and so could still be set up quickly to fire from new positions.
  • Assad's forces appeared already by Wednesday to have evacuated most personnel from army and security command headquarters in central Damascus, residents and opposition sources in the capital said.In the Qalamoun area, an activist calling himself Amer al-Qalamouni told Reuters by telephone: "Most of the personnel in the base appear to have left.He added that trailer trucks loaded with military equipment were also seen on the Damascus ring road to the south: "Either the hardware is being transported to be stored elsewhere or it will remain constantly on the move to avoid being hit," he said.Captain Firas Bitar of the Tahriri al-Sham rebel force, who is from the Qalamoun area but is based in a Damascus suburb, said two other missile units based near the 155th in the districts of Qutaifa and Nasiriya were also moving rockets out.He said they could be move northwest to loyalist strongholds near Homs or further into the coastal mountain heartland of Assad's minority Alawite sect.Opposition sources also suspected the evacuation of another missile unit based in Sahya, just south of Damascus."The Sahya barracks have been hitting the southern suburbs with rockets and artillery non-stop," said rebel commander Abu Ayham of the Ansar al-Islam brigade. "Since yesterday, nothing has been fired from the camp, suggesting it has been emptied."
  •  
    Have you noticed that there has been no Obama Administration call for investigation, identification, and prosecution of the White House leakster who leaked the targets for the allegedly planned U.S. strike on Syria? A very kind way of saying to Assad, "would you be so kind as to move your weapons out of our targeted areas so we cause as little damage as we can while still showing the world that Obama doesn't back down from his red lines." Apparently that is precisely what Assad is doing.
Paul Merrell

2013 mass surveillance disclosures - Wikipedia, the free encyclopedia - 0 views

  • 1 Historical context 1.1 Origins of clandestine surveillance in the United States (1919–78) 1.2 Mass surveillance in a global context (1988-2000) 1.3 9/11 and its implications on mass surveillance (2001–2009) 1.4 Acceleration of media leaks (2010–present) 2 Summary of NSA surveillance 2.1 Purposes 2.2 Targets 2.3 International cooperation 3 2013 Disclosures by category 3.1 Court Orders, Memos and Policy Documents 3.2 Reports 3.3 Collection and Analysis Programs or Hardware 3.4 Relationships with Corporate Partners 3.5 NSA Databases 3.6 Signals Intelligence Directorates (SIDs) 3.7 Technical Directorates 3.8 Names associated with specific targets 3.9 Uncategorized or insufficiently described codenames. 3.10 GCHQ Operations 3.11 NSA Operations 3.12 NSA Relationships with Foreign Intelligence services 3.13 Unrelated to Edward Snowden 4 Media reports 4.1 Chronology 4.2 Disclosures 4.3 Violation of civil liberties and international law 5 Fallout 5.1 Counter-terrorism and national security 5.2 Impact on foreign relations 5.3 Amash/Conyers Amendment 5.4 Public reaction 5.4.1 Petitions 5.4.2 Protests 6 Media related to the disclosures 7 See also 8 References 9 Further reading
  •  
    Wikipedia begins pulling its act together on coverage of the NSA scandal. This article is, at least for the time being, a major NSA scandal research resource. But wait to see how soon NSA sock puppets bowdlerize it. The occasional snapshot downloaded or stored in e.g., Zotero, is advisable.   
  •  
    Wow. Diigo handled the markup just fine in My Library but decided to display the raw HTML here. That's got to be a bug. Click through to Wikipedia and look at the table of contents. That's what buried in the markup above.
Paul Merrell

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • ...2 more annotations...
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
Paul Merrell

EU spy chief rules out Russian military presence in Ukraine - RT News - 0 views

  • There is no large Russian military presence in East Ukraine, head of EU intelligence, Commodore Georgij Alafuzoff, has said. The spy chief has dismissed multiple accusations from the West alleging Russian involvement in the unrest in the region. In an interview with Finnish national news broadcaster, Yle, Alafuzoff said the Russian military had nothing to do with the seizing of government buildings in eastern Ukraine. “In my opinion, it’s mostly people who live in the region who are not satisfied with the current state of affairs,” said Alafuzoff, referring to the situation in East Ukraine. He went on to say that the people are worried for the welfare of those who speak Russian as their first language in the region. Alafuzoff echoed the words of the Russian government which has categorically denied interfering in the ongoing unrest. Russian Foreign Minister Sergey Lavrov said in a press conference on Monday that Moscow is not interested in destabilizing Ukraine and wants the country to remain united. Anti-Kiev activists in the southeast of Ukraine have seized local government buildings as a mark of protest against the coup-appointed Ukrainian government. In response to the unrest, Ukraine’s interim President Aleksandr Turchinov announced the beginning of an “anti-terrorist” operation in eastern Ukraine.
  • On Tuesday, military hardware and troops began to mass on the outskirts of the eastern city of Slavyansk. Sightings of groups of military vehicles have been reported in the neighboring Kharkov and Lugansk regions, where pro-Russian and anti-Kiev sentiment is high. Moscow has condemned Kiev’s operation as “anti-constitutional” and “criminal” and indicative of the government’s unwillingness to open dialogue with the regions. “We are deeply concerned over the military operation launched by the Ukrainian Special Forces with support by the army. There have already been victims,” the Russian Foreign Ministry said in a statement on Tuesday. Anti-Kiev sentiment is, meanwhile, spreading across Ukraine. On Wednesday the anti-Maidan movement in the city of Odessa called for a day of protests and declared the creation of a “people’s republic” in the region.
  •  
    This report is in stark contrast to the barrage of propaganda coming out of Washington, D.C. and NATO HQ claiming that Russian forces are massed on the Ukraine border for invasion, propaganda Moscow has denied. Russia has also said that 22 satellite photos purporting to show Russian troops poised on the Ukraine border were taken last August during routine military training exercises, not in recent days as claimed.  An independent news team that toured the Russian border area reported that it could find no signs of the claimed build-up of Russian troops in the locations identified by NATO. Therefore, there is a strong suspicion that the NATO/White House claims are no more than pro-war propaganda or fear-mongering.
Paul Merrell

House of Representatives moves to ban NSA's 'backdoor search' provision | World news | ... - 0 views

  • Surveillance reform gained new congressional momentum as the US House of Representatives unexpectedly and overwhelmingly endorsed stripping a major post-9/11 power from the National Security Agency late Thursday night.By a substantial and bipartisan margin, 293 to 121, representatives moved to ban the NSA from searching warrantlessly through its troves of ostensibly foreign communications content for Americans' data, the so-called "backdoor search" provision revealed in August by the Guardian thanks to leaks from Edward Snowden.The move barring funds for warrantless searches "using an identifier of a United States person" came as an amendment added by Zoe Lofgren, Democrat of California, and Thomas Massie, Republican of Kentucky, to the annual defense appropriations bill, considered a must-pass piece of legislation to fund the US military. Also banned is the NSA's ability, disclosed through the Snowden leaks, to secretly insert backdoor access to user data through hardware or communications services.
  •  
    The most detailed report on the lopsided House vote in favor of reining in NSA's authority. But note that as worded: [i] the prohibition applies to NSA, CIA, and FBI; [ii] but the provision bans spending from this particular Defense Spending Act appropriation only. A more permanent statute will be needed later.  The text of the amendment is here. http://repcloakroom.house.gov/uploadedfiles/massie.pdf According to the Huffington Post, another amendment passed forbidding Obama from launching "sustained combat" in Iraq.
Paul Merrell

NSA router bugging: Glenn Greenwald - 0 views

  • An excerpt of investigative reporter Glenn Greenwald's new book No Place to Hide published today in The Guardian asserts that the National Security Agency "routinely" bugs computer network equipment made in the United States and sent to customers abroad: A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers. Advertisement The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)". The excerpt doesn't say whether the bugging was done to entire shipments of equipment (as opposed to individual items ordered by specific surveillance targets).
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

U.S. Defense Industry Outperforms S&P by 100 Percent | The Fiscal Times - 0 views

  • story in The New York Times over the weekend raised the possibility of a new arms race in the Middle East, as increased sectarian fighting and proxy wars in Yemen, Syria, and Iraq create new demand for advanced weapons and weapon systems.The article pointed out, as others have, that the primary beneficiaries of the increased demand for planes, missile, tanks, and other military hardware will be U.S. military contractors – the Lockheed-Martins, General Atomics, and Boeings of the world. But the expected increase in orders from Middle Eastern countries looking to control jihadist groups like ISIS, and rebel groups such as Yemen’s Houthi tribe, will be more of an extension of a gravy train that’s already rolling than some sort of new start.
  • Just how well have U.S. defense firms done in the past few years? To put it in context, in the past 24 months, the U.S. stock market has been on a nearly unprecedented tear. Since April of 2013, the Standard & Poor’s 500 index has soared, increasing in value by more than 30 percent.Compared to a broad index of the defense industry, the S&P 500 looks like a bad investment. Since April of 2013, the Dow Jones U.S. Aerospace and Defense Total Stock Market Index has grown at double the rate of the S&P, increasing in value by 60 percent.Making the performance of defense firms even more remarkable is the fact that their share prices continued to surge even as the U.S. Budget sequester took hold, slashing the Pentagon’s budget by tens of billions of dollars. In 2014, for example, U.S. military spending fell by 6.5 percent, according to the Stockholm International Peace Research Institute.The reason for defense firms’ continued success, according to a report issued this month by SIPRI, is that the U.S. has been the outlier in that respect recently. “Excluding the USA, total military expenditure for the ‘rest of the world’ has increased continuously since 1998 and was up by 3.1 per cent in 2014,” the report concluded.
  • In the Middle East in particular, defense spending has continued at a strong pace, with several countries in the region dedicating more than 5 percent of their GDP to defense spending, while Oman and Saudi Arabia both spend more than 10 percent of GDP on national security.A huge share of that money goes toward buying sophisticated weaponry from developed countries, particularly U.S. firms, when it comes to countries allied with the U.S. policy toward jihadist and terrorist groups.As ISIS continues to pillage Iraq and Syria, and the Houthis rage across Yemen, it seems the arms business will be a profitable one for the foreseeable future.
  •  
    George Washington: "There is such a thirst for gain [among military suppliers]... that it is enough to make one curse their own Species, for possessing so little virtue and patriotism."
Paul Merrell

Exclusive: U.S. tech industry appeals to Obama to keep hands off encryption | Reuters - 0 views

  • As Washington weighs new cybersecurity steps amid a public backlash over mass surveillance, U.S. tech companies warned President Barack Obama not to weaken increasingly sophisticated encryption systems designed to protect consumers' privacy.In a strongly worded letter to Obama on Monday, two industry associations for major software and hardware companies said, "We are opposed to any policy actions or measures that would undermine encryption as an available and effective tool."The Information Technology Industry Council and the Software and Information Industry Association, representing tech giants, including Apple Inc, Google Inc, Facebook Inc, IBM and Microsoft Corp, fired the latest salvo in what is shaping up to be a long fight over government access into smart phones and other digital devices.
Paul Merrell

WikiLeaks' Julian Assange warns: Google is not what it seems - 1 views

  • Back in 2011, Julian Assange met up with Eric Schmidt for an interview that he considers the best he’s ever given. That doesn’t change, however, the opinion he now has about Schmidt and the company he represents, Google.In fact, the WikiLeaks leader doesn’t believe in the famous “Don’t Be Evil” mantra that Google has been preaching for years.Assange thinks both Schmidt and Google are at the exact opposite spectrum.“Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation. But Google has always been comfortable with this proximity,” Assange writes in an opinion piece for Newsweek.
  • “Long before company founders Larry Page and Sergey Brin hired Schmidt in 2001, their initial research upon which Google was based had been partly funded by the Defense Advanced Research Projects Agency (DARPA). And even as Schmidt’s Google developed an image as the overly friendly giant of global tech, it was building a close relationship with the intelligence community,” Assange continues.Throughout the lengthy article, Assange goes on to explain how the 2011 meeting came to be and talks about the people the Google executive chairman brought along - Lisa Shields, then vice president of the Council on Foreign Relationship, Jared Cohen, who would later become the director of Google Ideas, and Scott Malcomson, the book’s editor, who would later become the speechwriter and principal advisor to Susan Rice.“At this point, the delegation was one part Google, three parts US foreign-policy establishment, but I was still none the wiser.” Assange goes on to explain the work Cohen was doing for the government prior to his appointment at Google and just how Schmidt himself plays a bigger role than previously thought.In fact, he says that his original image of Schmidt, as a politically unambitious Silicon Valley engineer, “a relic of the good old days of computer science graduate culture on the West Coast,” was wrong.
  • However, Assange concedes that that is not the sort of person who attends Bilderberg conferences, who regularly visits the White House, and who delivers speeches at the Davos Economic Forum.He claims that Schmidt’s emergence as Google’s “foreign minister” did not come out of nowhere, but it was “presaged by years of assimilation within US establishment networks of reputation and influence.” Assange makes further accusations that, well before Prism had even been dreamed of, the NSA was already systematically violating the Foreign Intelligence Surveillance Act under its director at the time, Michael Hayden. He states, however, that during the same period, namely around 2003, Google was accepting NSA money to provide the agency with search tools for its rapidly-growing database of information.Assange continues by saying that in 2008, Google helped launch the NGA spy satellite, the GeoEye-1, into space and that the search giant shares the photographs from the satellite with the US military and intelligence communities. Later on, 2010, after the Chinese government was accused of hacking Google, the company entered into a “formal information-sharing” relationship with the NSA, which would allow the NSA’s experts to evaluate the vulnerabilities in Google’s hardware and software.
  • ...1 more annotation...
  • “Around the same time, Google was becoming involved in a program known as the “Enduring Security Framework” (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies at network speed.’’Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF,” Assange writes.Assange seems to have a lot of backing to his statements, providing links left and right, which people can go check on their own.
  •  
    The "opinion piece for Newsweek" is an excerpt from Assange's new book, When Google met Wikileaks.  The chapter is well worth the read. http://www.newsweek.com/assange-google-not-what-it-seems-279447
Paul Merrell

IETF Begins To Work On Designing A Surveillance-Resistant Net | Techdirt - 0 views

  • Edward Snowden's leaks show that the NSA and GCHQ have been systematically subverting key technologies that underlie the Internet. That betrayal of trust has prompted some soul-searching by the Net engineering community, which realizes that it needs to come up with more surveillance-resistant approaches. This story from Radio Netherlands Worldwide (RNW) provides information about the kind of thing they are working on in one key group, the Internet Engineering Task Force (IETF). It reports on a speech given by the IETF's chair, Jari Arkko, at the recent Internet Governance Forum in Bali, Indonesia.
  • Firstly, the IETF wants to eventually apply encryption to all web traffic. "Today, security only gets switched on for certain services like banking," Arkko explained, referring to IETF-developed standards like SSL -- the little lock that appears in the upper left corner of your browser to secure online purchases. "If we work hard, we can make [the entire internet] secure by default." To this end, the IETF might make encryption mandatory for HTTP 2.0, a new version of the basic web protocol. Secondly, the IETF plans to remove weak algorithms and strengthen existing algorithms behind encryption. This means that the US National Security Agency and other surveillors will find it harder to crack current forms of encryption.
  • Putting that in context, Axl Pavlik, the managing director of Europe's Internet Registry (RIPE NCC), notes that you can never stop surveillance completely, but you can make it more expensive: "You and I have limited resources, and the surveillor has limited resources -- maybe more than we have -- but if millions of users of the internet raise the bar a little bit, the requirements to surveil every little bit of internet traffic would be much higher," he explained to RNW. Mandatory use of encryption helps do that. And here's another good reason for adopting it: The IETF's plans also benefit people who are already encrypting their online activities themselves, argued Marco Hogewoning, technical adviser to RIPE NCC. According to him, these people currently stick out like a sore thumb to the very surveillors they hope to evade.
  • ...1 more annotation...
  • He has a great analogy: "If you see an armoured car now on the street, you know there must be something valuable inside," Hogewoning explained. "If everybody drives around in an armoured car, I can go around and put a lot of effort into breaking into each and every car, and hope I get lucky and find something valuable inside, but it might be empty. If everybody encrypts everything, all you can see is armoured cars." However, valuable as these moves will be in raising the cost of surveillance, there is always the problem of the endpoints: While the IETF might be able to secure the pipes through which users' data travel, users must also be able to trust the parties where their data is stored: software, hardware and services such as Cisco, Gmail and Facebook. These parties can hand over user data directly to government agencies. To address that, technical improvements aren't enough -- we need political solutions, too. Unfortunately, those are rather more difficult to engineer.
  •  
    Oh, goody some more!
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Paul Merrell

Minsk -2: A Rotting Corpse | nsnbc international - 0 views

  • The Minsk-2 ceasefire agreement is dead but no one wants to bury the rotting corpse. Since it was signed in February of this year the Donbas governments and Russia have bent over backward to comply with the terms of that agreement hoping against hope that the Kiev junta would do the same. They hoped in vain.
  • Poroshenko and his fascist allies instead have refused to change the constitution to accommodate the concerns of the Donbas republics, have tried to suppress the Communist Party and other parties in opposition, have refused to withdraw heavy weaponry from the line of contact, have maintained increasingly heavy artillery attacks on the civilian populations and areas and cut off routes for essential foodstuffs, medical aid and technical equipment. Rather than enjoying a ceasefire, the peoples of the Donbas are under a state of siege. Poroshenko openly calls for a military solution to the crisis and has increased the draft in the west. The NATO alliance continues to pour in its forces disguised as “advisers” and “mercenaries” and puts additional pressure on Russia with multiple military exercises from the Baltic to Bulgaria, where more tanks have been recently dispatched to “send Russia a message.” The reality of the situation was stated on the 18th of August when President Putin stated, “It was the Donbas militias that suggested withdrawing all military equipment with calibre under 100mm. Unfortunately, the opposite side didn’t do that. On the contrary, according to the available data, it is concentrating its units there, including those reinforced with military hardware.” He continued to pay lip service to the Minsk-2 agreement, stating, “As for the Minsk-2 agreement, I believe there is no alternative for resolving the situation and that peace will prevail in the long run… “ and continued with “Our task is to minimize the losses with which we will come to this peace.”
  • There can be no doubt that the Minsk-2 agreements do provide the framework for a peaceful settlement of the impasse but there is also no doubt that the Kiev and NATO forces have no intention of abiding by its terms and are preparing for another offensive. Putin also stated, “I hope that it will not come to direct large scale clashes.” Yet, the people of the Donbas would be surprised to be told that the thousands of shells raining down on them from the Kiev junta’s artillery in order to provoke those clashes do not count. Bu what is the purpose of this state of siege? Since the Donbas forces have proved their strength and resilience the Kiev regime has little hope of achieving the total destruction of those forces and imposing its will on the Donbas. Kiev and NATO also know that Russia does not want to be drawn into a direct clash with NATO that could lead to a general war. In consequence the Kiev-NATO axis have decided to engage in operations that have direct political repercussions designed to disrupt the Russian-Donbas alliance or to paralyze it and try to enlist new allies. At the same time they have decided to make the war more costly for the Donbas and Russia both in military and economic terms, and to try to bring about a gradual exhaustion of their physical and moral resistance. We see this strategy being played out with the constant increase of economic warfare against Russia, which is clearly the ultimate target, the increasing use of propaganda including the planting in the media of the most absurd stories about Russia and its government, the use, once again of the OSCE observes as intelligence agents for NATO as happened in the Yugoslav war, and, in the political sphere, attempts by the United States and Britain to humiliate Russia with the politically motivated attempt to set up a tribunal regarding the downing of flight MH17.
Paul Merrell

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
Gary Edwards

Tomgram: Michael Klare, Superpower in Distress | TomDispatch - 0 views

  • In response, the Obama administration dispatched thousands of new advisers and trainers and began shipping in piles of new weaponry to re-equip the Iraqi army.  It also filled Iraqi skies with U.S. planes armed with their own munitions to destroy, among other things, some of that captured U.S. weaponry.  Then it set to work standing up a smaller version of the Iraqi army.  Now, skip nearly a year ahead and on a somewhat lesser scale the whole process has just happened again.  Less than two weeks ago, Islamic State militants took Ramadi, the capital of Anbar Province.  Iraqi army units, including the elite American-trained Golden Division, broke and fled, leaving behind -- you’ll undoubtedly be shocked to hear -- yet another huge cache of weaponry and equipment, including tanks, more than 100 Humvees and other vehicles, artillery, and so on. The Obama administration reacted in a thoroughly novel way: it immediately began shipping in new stocks of weaponry, starting with 1,000 antitank weapons, so that the reconstituted Iraqi military could take out future “massive suicide vehicle bombs” (some of which, assumedly, will be those captured vehicles from Ramadi).  Meanwhile, American planes began roaming the skies over that city, trying to destroy some of the equipment IS militants had captured.
  • Notice anything repetitive in all this -- other than another a bonanza for U.S. weapons makers?  Logically, it would prove less expensive for the Obama administration to simply arm the Islamic State directly before sending in the air strikes
  • In any case, what a microcosm of U.S. imperial hubris and folly in the twenty-first century all this training and equipping of the Iraqi military has proved to be.  Start with the post-invasion decision of the Bush administration to totally disband Saddam’s army and instantly eject hundreds of thousands of unemployed Sunni military men and a full officer corps into the chaos of the “new” Iraq and you have an instant formula for creating a Sunni resistance movement.  Then, add in a little extra “training” at Camp Bucca, a U.S. military prison in Iraq, for key unemployed officers, and -- Voilà! -- you’ve helped set up the petri dish in which the leadership of the Islamic State movement will grow.  Multiply such stunning tactical finesse many times over globally and, as TomDispatch regular Michael Klare makes clear today, you have what might be called the folly of the “sole superpower” writ large. Tom
  • ...9 more annotations...
  • Delusionary Thinking in Washington The Desperate Plight of a Declining Superpower By Michael T. Klare
  • Take a look around the world and it’s hard not to conclude that the United States is a superpower in decline. Whether in Europe, Asia, or the Middle East, aspiring powers are flexing their muscles, ignoring Washington’s dictates, or actively combating them. Russia refuses to curtail its support for armed separatists in Ukraine; China refuses to abandon its base-building endeavors in the South China Sea; Saudi Arabia refuses to endorse the U.S.-brokered nuclear deal with Iran; the Islamic State movement (ISIS) refuses to capitulate in the face of U.S. airpower. What is a declining superpower supposed to do in the face of such defiance? This is no small matter. For decades, being a superpower has been the defining characteristic of American identity. The embrace of global supremacy began after World War II when the United States assumed responsibility for resisting Soviet expansionism around the world; it persisted through the Cold War era and only grew after the implosion of the Soviet Union, when the U.S. assumed sole responsibility for combating a whole new array of international threats. As General Colin Powell famously exclaimed in the final days of the Soviet era, “We have to put a shingle outside our door saying, ‘Superpower Lives Here,’ no matter what the Soviets do, even if they evacuate from Eastern Europe.”
  • The problem, as many mainstream observers now acknowledge, is that such a strategy aimed at perpetuating U.S. global supremacy at all costs was always destined to result in what Yale historian Paul Kennedy, in his classic book The Rise and Fall of the Great Powers, unforgettably termed “imperial overstretch.” As he presciently wrote in that 1987 study, it would arise from a situation in which “the sum total of the United States’ global interests and obligations is… far larger than the country’s power to defend all of them simultaneously.”
  • The first of two approaches to this conundrum in Washington might be thought of as a high-wire circus act.  It involves the constant juggling of America’s capabilities and commitments, with its limited resources (largely of a military nature) being rushed relatively fruitlessly from one place to another in response to unfolding crises, even as attempts are made to avoid yet more and deeper entanglements. This, in practice, has been the strategy pursued by the current administration.  Call it the Obama Doctrine.
  • In other words, whoever enters the Oval Office in January 2017 will be expected to wield a far bigger stick on a significantly less stable planet. As a result, despite the last decade and a half of interventionary disasters, we’re likely to see an even more interventionist foreign policy with an even greater impulse to use military force.
  • The first step in any 12-step imperial-overstretch recovery program would involve accepting the fact that American power is limited and global rule an impossible fantasy.
  • Accepted as well would have to be this obvious reality: like it or not, the U.S. shares the planet with a coterie of other major powers -- none as strong as we are, but none so weak as to be intimidated by the threat of U.S. military intervention.
  • Having absorbed a more realistic assessment of American power, Washington would then have to focus on how exactly to cohabit with such powers -- Russia, China, and Iran among them -- and manage its differences with them without igniting yet more disastrous regional firestorms. 
  • fewer military entanglements abroad, a diminishing urge to garrison the planet, reduced military spending, greater reliance on allies, more funds to use at home in rebuilding the crumbling infrastructure of a divided society, and a diminished military footprint in the Middle East.
  •  
    Thanks Marbux! "Think of this as a little imperial folly update -- and here's the backstory.  In the years after invading Iraq and disbanding Saddam Hussein's military, the U.S. sunk about $25 billion into "standing up" a new Iraqi army.  By June 2014, however, that army, filled with at least 50,000 "ghost soldiers," was only standing in the imaginations of its generals and perhaps Washington.  When relatively small numbers of Islamic State (IS) militants swept into northern Iraq, it collapsed, abandoning four cities -- including Mosul, the country's second largest -- and leaving behind enormous stores of U.S. weaponry, ranging from tanks and Humvees to artillery and rifles.  In essence, the U.S. was now standing up its future enemy in a style to which it was unaccustomed and, unlike the imploded Iraqi military, the forces of the Islamic State proved quite capable of using that weaponry without a foreign trainer or adviser in sight."
Paul Merrell

'Top Secret' emails found as Clinton probe expands to key aides | McClatchy DC - 0 views

  • As pressure builds on Hillary Clinton to explain her official use of personal email while serving as secretary of state, she faced new complications Tuesday. It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as “Top Secret.”The inspector general for the Intelligence Community notified senior members of Congress that two of four classified emails discovered on the server Clinton maintained at her New York home contained material deemed to be in one of the highest security classifications - more sensitive than previously known. The notice came as the State Department inspector general’s office acknowledged that it is reviewing the use of “personal communications hardware and software” by Clinton’s former top aides after requests from Congress.
  • The expanding inquiry threatens to further erode Clinton’s standing as the front-runner for the Democratic presidential nomination. Since her reliance on private email was revealed in March, polls in crucial swing states show that increasing numbers of voters say Clinton is not honest and trustworthy, in part, because of her use of private emails.
  • Sen. Chuck Grassley, the Republican chairman of the Judiciary Committee, wants Clinton and her aides to “come clean and cough up” information about their personal email use. “Both the State Department and Intelligence Community inspectors general should be looking into the staff use of the Clinton private server for official State Department business. This means giving both inspectors general access and custody of all emails that haven’t already been deleted,” said Grassley of Iowa. “From what is publicly known, it appears that the investigation thus far has focused so much on the former secretary of state, that it’s gotten lost that high-level staff apparently also used this server too.” State Department spokesman John Kirby referred to the Intelligence Community’s disclosure as a recommendation to “upgrade” the two emails’ classification to “Top Secret.” In a statement, he said that “while we work with the Director of National Intelligence to resolve whether, in fact, this material is actually classified, we are taking steps to ensure the information is protected and stored appropriately.”
  • ...1 more annotation...
  • At least four top aides have turned over records, including copies of work emails on personal accounts, to the State Department, which is collecting them in response to a subpoena from Capitol Hill, according to the department. Lawmakers have demanded records, including personal emails, from six other aides, but it’s unknown whether they used personal email for work.
Paul Merrell

French-UAE Intel Satellite Deal in Doubt | Defense News | defensenews.com - 0 views

  • A United Arab Emirates (UAE) deal to purchase two intelligence satellites from France worth almost 3.4 billion dirhams (US $930 million) is in jeopardy after the discovery of what was described as “security compromising components.”A high-level UAE source said the two high-resolution Pleiades-type Falcon Eye military observation satellites contained two specific US-supplied components that provide a back door to the highly secure data transmitted to the ground station.
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

No Weapons Seen Crossing Russian-Ukrainian Border - OSCE | Politics | RIA Novosti - 0 views

  • The Organization for Security and Cooperation in Europe's Special Monitoring Mission working on the Russian-Ukrainian border has not seen any weapons crossing between the countries, an OSCE spokesman working on the Russian side of the border said Tuesday. “We have not seen any weapons. There was a question of whether we saw military vehicles crossing the border. Yesterday at two [border crossing] points, we didn’t see any military vehicles crossing the border,” Paul Picard said at a briefing. On August 15, Ukrainian President Petro Poroshenko claimed Ukrainian artillery destroyed Russian military hardware that had allegedly crossed into Ukraine at night.
  • The Russian Defense Ministry refuted the allegations, calling the claims a 'fantasy' that is not worth discussing. The Russian Border Guard Service also stressed that the reports are not based on reality and explained that cross-border regions were indeed being patrolled by mobile teams of border guards, but only on the Russian side of the border. On August 17, the Special Monitoring Mission (SMM) working in Ukraine under the auspice of the OSCE also could not confirm the reports of Russian military convoys crossing the Ukrainian border. On August 18, Russian Foreign Minister Sergei Lavrov said that Moscow supports the idea of equipping the OSCE monitoring mission with unmanned aerial vehicles (UAVs) to improve the monitoring of the border.
Paul Merrell

How 2 shadowy ISIS commanders designed their Iraq campaign - McClatchy DC News - The Sa... - 1 views

  • The attack in Mosul wasn’t particularly surprising, according to Wameed, an Iraqi soldier who’d been assigned to the city’s main highway that night. It began June 9 with suicide bombers in cars and machine gun fire directed at checkpoints leading to the main thoroughfares of Iraq’s second largest city.
  • “All checkpoints were being attacked from all sides, and not just from Daash,” he said. “Then our commanders turned off their mobile phones. We knew this was big. . . . There were just 20 of us on the highway. What could we do alone? We ran.”In the following days as much as half the Iraqi army drew the same conclusion and effectively disbanded; by some accounts less than half of the army remains combat effective. Despite its 10 to 1 numerical advantage, the army fled.
  • It was one of biggest collapses of a conventional military in modern times. It also said much about the evolution of ISIS, which until the capture of Mosul and its blitzkrieg-like advance across northern and central Iraq, had been known to the world largely as a terrorist organization that had used car bombs to fight the United States in Iraq and adopted even more brutal tactics when it moved to Syria to battle the government of President Bashar Assad.In the conquest of Mosul, however, ISIS unveiled itself as a conventional fighting force with clear tactical and strategic goals _ and the patience to execute them. Its announcement Sunday that it was establishing an Islamic caliphate has taken virtually everyone in the region by surprise _ except for perhaps two men.Those would be Abu Bakr al Baghdadi, who took over the leadership of the group in 2010, and a shadowy former intelligence officer from the toppled regime of Saddam Hussein who’s known only by a pseudonym, Hajj Bakr.Assembling a coherent picture of how ISIS executed its transformation is something U.S. intelligence officials will be striving to do in coming weeks as they examine what happened to the U.S.-trained Iraqi army.
  • ...1 more annotation...
  • But interviews with a wide range of people _ including a former British military officer with ties to Saddam-era Iraqi officers, activists with ties to ISIS, and an intelligence officer for the Kurdish peshmerga militia _ provide an imperfect but consistent picture of how ISIS became the most powerful and effective non-state military organization on the planet, with access to billions of dollars in military hardware, territory that includes millions of residents, and something few jihadist groups have ever had: a coherent strategy for establishing an Islamic state. The story of ISIS’s transformation begins, according to these accounts, with a decision Baghdadi made to put Hajj Bakr in charge of reorganizing the group’s leadership.
  •  
    Fascinating in-depth look at the military strategy used by ISIL to take most of Sunni Iraq, including the crucial role of former Baathist Iraqi military commanders. 
« First ‹ Previous 41 - 60 of 70 Next ›
Showing 20 items per page