Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged manual

Rss Feed Group items tagged

Paul Merrell

Defense Manual Allows for Journalists' Detention | Al Jazeera America - 0 views

  • New Defense Department guidelines allow commanders to punish journalists and treat them as "unprivileged belligerents" if they believe journalists are sympathizing or cooperating with the enemy. The Law of War manual, updated to apply for the first time to all branches of the military, contains a vaguely worded provision that military commanders could interpret broadly, experts in military law and journalism say. Commanders could ask journalists to leave military bases or detain journalists for any number of perceived offenses. "In general, journalists are civilians," the 1,180 page manual says, but it adds that "journalists may be members of the armed forces, persons authorized to accompany the armed forces, or unprivileged belligerents." A person deemed to be an "unprivileged belligerent" is not entitled to the rights afforded by the Geneva Convention. A commander could restrict from certain coverage areas or even hold indefinitely without charges any reporter considered an "unprivileged belligerent." The manual adds, "Reporting on military operations can be very similar to collecting intelligence or even spying. A journalist who acts as a spy may be subject to security measures and punished if captured." It is not specific as to the punishment or under what circumstances a commander can decide to "punish" a journalist.
  • Defense Department officials said the reference to "unprivileged belligerents" was intended to point out that armed group members or spies could be masquerading as reporters. The designation was also made to warn against someone who works publications like Al-Qaeda's "Inspire" magazine that can be used to encourage or recruit adherents. Another provision says that "relaying of information" could be construed as "taking a direct part in hostilities." Officials said that is intended to refer to passing information about ongoing operations, locations of troops or other classified data to an enemy. Army Lt. Col. Joe Sowers, a Pentagon spokesman, said it was not the Defense Department's intent to allow an overzealous commander to block journalists or take action against those who write critical stories.
  • But Ken Lee, an ex-Marine and military lawyer who specializes in "law of war" issues and is now in private practice, said it was worrisome that the detention of a journalist could come down to a commander's interpretation of the law.  If a reporter writes an unflattering story, "does this give a commander the impetus to say, now you're an unprivileged belligerent? I would hope not," Lee said. Defense officials said the manual describes the law for informational purposes and is not an authorization for anyone to take any particular action regarding journalists. The manual also notes that journalists captured by the enemy are supposed to be given the rights of prisoners of war under the Geneva Convention.
Gary Edwards

Alleged US Army doc: Re-education camps and psy-op missions aimed at activists - RT - 0 views

  •  
    Not sure if i had bookmarked this.  The Globalist Establishments assault on American liberty and the Constitution continues.  Now the USA Military is plotting against American liberty, and trampling the Constitution in the process!! excerpt: An American military document just uncovered appears to detail an US Army plan that calls for detaining "political activists" at re-education camps staffed by military-hired "PSYOP officers" in both America and abroad. The website Infowars.com has unearthed the smoking gun, a copy of a United States military manual entitled FM 3-39.40 Internment and Resettlement Operations, which appears to offer Defense Department insiders instructions on dealing with the imprisonment of anyone considered an enemy to the American way of life and how to go about indoctrination them with an "appreciation of US policies and actions" through psychological warfare. The PDF made available is dated February 2010 but has only now been leaked online. A copy of the document has been uploaded to the website PublicIntelligence.net for viewing, and additionally a version appears to be hosted on the US Military's Doctrine and Training Publications page at armypubs.us.army.mil, although access to papers published there are unavailable to those without the Pentagon's authorization, therefore making it impossible to verify the authenticity of the manual at this time. The military site that appears to host a copy has also implemented security measures on its servers that it cautions visitors are "not for your personal benefit or privacy." Further, the title page of the manual warns that the material contained in its 326 pages is be distributed to US Defense Department and its contractors only, and that must be "destroy[ed] by any method that will prevent disclosure of contents or construction of the document."
Paul Merrell

60 Minutes Hearts the NSA -- Daily Intelligencer - 0 views

  • Last night’s episode of 60 Minutes on CBS included what basically amounted to an uncritical commercial for the embattled National Security Agency, led by a journalist who used to be a government colleague. While the show — which has faced recent problems of its own, from the Benghazi debacle to the Amazon drone PR stunt — celebrated its own “unprecedented access to NSA headquarters,” it’s clear the meeting was on the NSA’s terms. In fact, NSA Director General Keith Alexander “made the call to invite us in,” a 60 Minutes producer admitted. They pretty much let him say his piece, nodding along excitedly. “Full disclosure, I once worked in the office of the director of National Intelligence where I saw firsthand how secretly the NSA operates,” said the reporter John Miller at the start of the segment.
  • While no critics of the NSA programs were given a chance to make the case against the potentially extralegal spying, which has resulted in international outrage, CBS did assist in the discrediting of master leaker Edward Snowden. Take, for example, this galling exchange with the head of the Snowden task force within the NSA, following Miller’s dismissive description of Snowden as a “twentysomething-year-old, high-school-dropout contractor”: John Miller: Did you sit in his chair?Rick Ledgett: I did not. I couldn’t bring myself to do that. […] At home, they discovered Snowden had some strange habits. Rick Ledgett: He would work on the computer with a hood that covered the computer screen and covered his head and shoulders, so that he could work and his girlfriend couldn't see what he was doing.John Miller: That's pretty strange, sitting at your computer kind of covered by a sheet over your head and the screen?Rick Ledgett: Agreed.
  • Media observers, some less personally involved in the Snowden leaks than others, could not believe what they were watching: 60 Minutes forgot to ask about how James Clapper & Keith Alexander routinely lied to Congress & FISA courts - just ran out of time.— Glenn Greenwald (@ggreenwald) December 16, 2013 Wow, the 60 Minutes piece about the NSA was just embarrassing. Kudos to the NSA communications staff. You guys should get a raise.— Ryan Lizza (@RyanLizza) December 16, 2013
  • ...3 more annotations...
  • "NSA Doing Great Job, NSA Says" - 60 Minutes— Dave Itzkoff (@ditzkoff) December 16, 2013 This 60 Minutes episode has been a pretty good infomercial for the NSA so far. Did anyone catch that 1-800 number so I can order?— Andy Greenberg (@a_greenberg) December 16, 2013 That time a 60 Minutes correspondent asked an NSA analyst to solve a Rubik's cube. #journalism pic.twitter.com/9fgJkLB1oK— Dave Itzkoff (@ditzkoff) December 16, 2013
  • CBS’s John Miller, though, knew what he was doing. “General Alexander agreed to talk to us because he believes the NSA has not told its story well,” he explained in a behind-the-scenes segment. “I think we asked the hardest questions we could ask,” he said. “We’ve heard plenty from the critics. We’ve heard a lot from Edward Snowden.” Still, “You also don’t want this to be a puff piece,” he added. We got one anyway.
  • The cherry on top is that Miller is currently in the running, reportedly, for a “top counterterrorism or intelligence role” in the NYPD when his old pal Bill Bratton takes over, something that was not disclosed by 60 Minutes.  He's certainly qualified. (Miller held a similar job as chief of counterterrorism under Bratton at the LAPD in addition to his work in national intelligence.) “He wants the badge, the gun and the adrenaline — to be in the center of the action,” a source told the New York Post of Miller, calling it “a 99.44 percent done deal.” And on top of describing Bill Bratton as “one of my best friends,” this was a great audition.  [CBS News] [HuffPost] [Poynter]
  •  
    I'm glad I didn't miss anything important that I haven't heard before too many times. Filmed before a federal judge and Obama's blue ribbon committee report on DoD intelligence community digital spying both in effect branded Alexander as a liar again. 
Paul Merrell

Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept - 0 views

  • When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept. We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”
  • The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software. Hacking Team’s efforts include a visible push into the U.S. Though Remote Control System is sold around the world — suspected clients include small governments in dozens of countries, from Ethiopia to Kazakhstan to Saudi Arabia to Mexico to Oman — the company keeps one of its three listed worldwide offices in Annapolis, Maryland, on the edge of the federal intelligence and law-enforcement cluster around the nation’s capital; has sent representatives to American homeland security trade shows and conferences, where it has led training seminars like “Cyber Intelligence Solutions to Data Encryption” for police; and has even taken an investment from a firm headed by America’s former ambassador to Italy. The United States is also, according to two separate research teams, far and away Hacking Team’s top nexus for servers, hosting upwards of 100 such systems, roughly a fifth of all its servers globally.
Gary Edwards

Sheriff…Time to arrest members of Congress! | Scanned Retina Blog - 0 views

  • Title 26, USC, is a private law that applies to “U.S. corporate ‘citizens’”, all employees of the corporation identified at 28 USC, section 3002.
    • Gary Edwards
       
      There is no explanation or quote to explain Title 26 and 28 USC, section 3002!  At the least we should be provided with a link here.
  • When the Sheriff seizes property from a Citizen under the non-authority of the IRS agent, the Sheriff has committed a Second Degree Felony, Conversion of Property.
  • Tyranny is defined as:
  • ...26 more annotations...
  • Dominance through threat of punishment and violence, oppressive rule, abusive government, cruelty and injustice. What better definition than this fits the abusive IRS.
  • Title 12, USC
  • The Federal Reserve Notes in use are mere evidence of a debt.
  • The legal definition of “dollar” is “a gold or silver coin of a specific weight and with specific markings
  • The Federal Reserve Banking system is a private cartel that has usurped the authority of the Congress to coin Money.
  • Article I, section 8, we find that only Congress was given the authority “To coin money, regulate the Value thereof, and of foreign Coin, and fix the Standard of Weights and Measures”.
  • The Federal Reserve Act is a “private law” passed by four Congressmen after the Congressional session closed in December of 1913.
  • The “Killing Blow”, the coup de grace[pronounced gra] was delivered upon the American People by Franklin D. Roosevelt in 1933 by removing the Gold Standard from the American economy.  FDR assisted the FRB in heisting the gold supply from this country right out from under our noses. 
  • If you still refuse to pay, the IRS will file a document called a “Notice of Federal Tax Lien” in the local County Clerk’s office.
  • a “Notice” is not the “Lien” itself. The “Lien” is a totally separate and distinct document from the “Notice”.
  • The County Clerk, through abysmal ignorance files the “Notice of Federal Tax Lien” as if it was an actual “Lien”. These are two separate and distinct documents. The County Clerk never requests the actual “Lien” from the IRS agent.
  • The Seventh Amendment of the Bill of Rights of this Constitution for the united States of America guarantees you the Right of Trial by Jury in any controversy where the amount shall exceed twenty dollars.
  • You have never owed any money to the IRS. The IRS is simply the enforcer, the debt collector for the Federal Reserve Banking System. However, because you are using a private credit system, wherein the medium of exchange are fancy pieces of paper called Federal Reserve Notes, you owe the Federal Reserve Bank a “user fee”.
  • All the current paycheck garnishments in the entire country could be stopped by having your employer request the above mentioned documents, to wit:
  • A copy of the Driver’s License of the IRS agent A copy of the “Pocket Commission” showing the authority of the IRS agent A copy of the assessment shown on form 23C against the American Citizen A copy of the “Abstract of the Court Judgment” that verifies that you had a trial by jury.
  • As Sheriff of San Miguel County, I will provide educational classes to the County Clerk and the employers who are currently garnishing wages and paychecks to identify areas where they may have broken the law and unwittingly stolen their employees Federal Reserve Notes and thus committed “Conversion of Property”, a second degree felony. Furthermore, I will work closely with the County Clerk through education and knowledge so that the Clerk can stop breaking the law and committing financial terrorism against the Citizens of San Miguel County.
  • When the Citizens of San Miguel County elect me as their new Sheriff in town, I will ban the IRS from San Miguel County, and if I catch an IRS agent within the boundaries of the county, without my permission, I will arrest them for TRESPASSING.
  • In the 1950’s, with the stroke of the pen, the BIR was transformed into the current notorious IRS and brought onto the 50 united States.
  • The IRS is formerly the Bureau of Internal Revenue (BIR) situated in and with authority only in the Philippine Islands (Trust Fund # 61), and moved into Puerto Rico (Trust Fund # 62).
  • Here it is in a nutshell. The IRS is a private, debt collection agency for the private banking system known as the Federal Reserve Bank. The IRS is not a government agency. I repeat, the IRS is not a government agency. Never has been, never will be.
  • This was done without any Congressional authority whatsoever.
  • the IRS is the “Private, debt collection agency for the private banking system known as the Federal Reserve Banks”.
  • Title 26, Internal Revenue Code, is the “Debt Collection Manual” for the IRS.  This manual has nothing with “Constitutitonal Rights”.
  • The IRS does not collect an “income tax”.  The IRS is simply collecting a user fee due to the Federal Reserve Banks because we, Americans, are using a private credit systeem.
  • Title 26, United States Code, is “non-positive” law, which means that no American Citizen is subject to it.  However, all “U.S. citizens” are subject to it.  In order to understand “U.S. citizen” you must go to 28 USC, section 3002.
  • Most American Citizens have voluntarily given up their Sovereignty in exchange for “immunities and privileges” of the 14th Amendment.
  •  
    On accessing federal law, two sites to bookmark: Legal Information Institute, Cornell University, http://www.law.cornell.edu/lii/get_the_law Justia.com, http://www.justia.com/ A further resource, the Jureeka extension for Chrome and Firefox will automatically link legal citations in your brower's display to the corresponding web pages on the LII site. http://www.law.cornell.edu/jureeka/download/
Paul Merrell

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones | Zero Hedge - 0 views

  • The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.
  • And here is the full press release from WikiLeaks: Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.   Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.   "DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.   Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.   Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.   While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
Paul Merrell

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
Gary Edwards

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
Paul Merrell

Fukushima - A Global Threat That Requires a Global Response - 0 views

  • The story of Fukushima should be on the front pages of every newspaper. Instead, it is rarely mentioned. The problems at Fukushima are unprecedented in human experience and involve a high risk of radiation events larger than any that the global community has ever experienced. It is going to take the best engineering minds in the world to solve these problems and to diminish their global impact. When we researched the realities of Fukushima in preparation for this article, words like apocalyptic, cataclysmic and Earth-threatening came to mind. But, when we say such things, people react as if we were the little red hen screaming "the sky is falling" and the reports are ignored. So, we’re going to present what is known in this article and you can decide whether we are facing a potentially cataclysmic event.
  • There are three major problems at Fukushima: (1) Three reactor cores are missing; (2) Radiated water has been leaking from the plant in mass quantities for 2.5 years; and (3) Eleven thousand spent nuclear fuel rods, perhaps the most dangerous things ever created by humans, are stored at the plant and need to be removed, 1,533 of those are in a very precarious and dangerous position. Each of these three could result in dramatic radiation events, unlike any radiation exposure humans have ever experienced.  We’ll discuss them in order, saving the most dangerous for last.
  • Missing reactor cores:  Since the accident at Fukushima on March 11, 2011, three reactor cores have gone missing.  There was an unprecedented three reactor ‘melt-down.’ These melted cores, called corium lavas, are thought to have passed through the basements of reactor buildings 1, 2 and 3, and to be somewhere in the ground underneath.  Harvey Wasserman, who has been working on nuclear energy issues for over 40 years, tells us that during those four decades no one ever talked about the possibility of a multiple meltdown, but that is what occurred at Fukushima.  It is an unprecedented situation to not know where these cores are. TEPCO is pouring water where they think the cores are, but they are not sure. There are occasional steam eruptions coming from the grounds of the reactors, so the cores are thought to still be hot. The concern is that the corium lavas will enter or may have already entered the aquifer below the plant. That would contaminate a much larger area with radioactive elements. Some suggest that it would require the area surrounding Tokyo, 40 million people, to be evacuated. Another concern is that if the corium lavas enter the aquifer, they could create a "super-heated pressurized steam reaction beneath a layer of caprock causing a major 'hydrovolcanic' explosion." A further concern is that a large reserve of groundwater which is coming in contact with the corium lavas is migrating towards the ocean at the rate of four meters per month. This could release greater amounts of radiation than were released in the early days of the disaster.
  • ...15 more annotations...
  • Radioactive water leaking into the Pacific Ocean:  TEPCO did not admit that leaks of radioactive water were occurring until July of this year. Shunichi Tanaka the head of Japan’s Nuclear Regulation Authority finally told reporters this July that radioactive water has been leaking into the Pacific Ocean since the disaster hit over two years ago. This is the largest single contribution of radionuclides to the marine environment ever observed according to a report by the French Institute for Radiological Protection and Nuclear Safety.  The Japanese government finally admitted that the situation was urgent this September – an emergency they did not acknowledge until 2.5 years after the water problem began. How much radioactive water is leaking into the ocean? An estimated 300 tons (71,895 gallons/272,152 liters) of contaminated water is flowing into the ocean every day.  The first radioactive ocean plume released by the Fukushima nuclear power plant disaster will take three years to reach the shores of the United States.  This means, according to a new study from the University of New South Wales, the United States will experience the first radioactive water coming to its shores sometime in early 2014.
  • One month after Fukushima, the FDA announced it was going to stop testing fish in the Pacific Ocean for radiation.  But, independent research is showing that every bluefin tuna tested in the waters off California has been contaminated with radiation that originated in Fukushima. Daniel Madigan, the marine ecologist who led the Stanford University study from May of 2012 was quoted in the Wall Street Journal saying, "The tuna packaged it up (the radiation) and brought it across the world’s largest ocean. We were definitely surprised to see it at all and even more surprised to see it in every one we measured." Marine biologist Nicholas Fisher of Stony Brook University in New York State, another member of the study group, said: "We found that absolutely every one of them had comparable concentrations of cesium 134 and cesium 137." In addition, Science reports that fish near Fukushima are being found to have high levels of the radioactive isotope, cesium-134. The levels found in these fish are not decreasing,  which indicates that radiation-polluted water continues to leak into the ocean. At least 42 fish species from the area around the plant are considered unsafe.  South Korea has banned Japanese fish as a result of the ongoing leaks.
  • As bad as the ongoing leakage of radioactive water is into the Pacific, that is not the largest part of the water problem.  The Asia-Pacific Journal reported last month that TEPCO has 330,000 tons of water stored in 1,000 above-ground tanks and an undetermined amount in underground storage tanks.  Every day, 400 tons of water comes to the site from the mountains, 300 tons of that is the source for the contaminated water leaking into the Pacific daily. It is not clear where the rest of this water goes.   Each day TEPCO injects 400 tons of water into the destroyed facilities to keep them cool; about half is recycled, and the rest goes into the above-ground tanks. They are constantly building new storage tanks for this radioactive water. The tanks being used for storage were put together rapidly and are already leaking. They expect to have 800,000 tons of radioactive water stored on the site by 2016.  Harvey Wasserman warns that these unstable tanks are at risk of rupture if there is another earthquake or storm that hits Fukushima. The Asia-Pacific Journal concludes: "So at present there is no real solution to the water problem."
  • The most recent news on the water problem at Fukushima adds to the concerns. On October 11, 2013, TEPCO disclosed that the radioactivity level spiked 6,500 times at a Fukushima well.  "TEPCO said the findings show that radioactive substances like strontium have reached the groundwater. High levels of tritium, which transfers much easier in water than strontium, had already been detected." Spent Fuel Rods:  As bad as the problems of radioactive water and missing cores are, the biggest problem at Fukushima comes from the spent fuel rods.  The plant has been in operation for 40 years. As a result, they are storing 11 thousand spent fuel rods on the grounds of the Fukushima plant. These fuel rods are composed of highly radioactive materials such as plutonium and uranium. They are about the width of a thumb and about 15 feet long. The biggest and most immediate challenge is the 1,533 spent fuel rods packed tightly in a pool four floors above Reactor 4.  Before the storm hit, those rods had been removed for routine maintenance of the reactor.  But, now they are stored 100 feet in the air in damaged racks.  They weigh a total of 400 tons and contain radiation equivalent to 14,000 times the amount released by the Hiroshima atomic bomb.
  • The building in which these rods are stored has been damaged. TEPCO reinforced it with a steel frame, but the building itself is buckling and sagging, vulnerable to collapse if another earthquake or storm hits the area. Additionally, the ground under and around the building is becoming saturated with water, which further undermines the integrity of the structure and could cause it to tilt. How dangerous are these fuel rods?  Harvey Wasserman explains that the fuel rods are clad in zirconium which can ignite if they lose coolant. They could also ignite or explode if rods break or hit each other. Wasserman reports that some say this could result in a fission explosion like an atomic bomb, others say that is not what would happen, but agree it would be "a reaction like we have never seen before, a nuclear fire releasing incredible amounts of radiation," says Wasserman. These are not the only spent fuel rods at the plant, they are just the most precarious.  There are 11,000 fuel rods scattered around the plant, 6,000 in a cooling pool less than 50 meters from the sagging Reactor 4.  If a fire erupts in the spent fuel pool at Reactor 4, it could ignite the rods in the cooling pool and lead to an even greater release of radiation. It could set off a chain reaction that could not be stopped.
  • What would happen? Wasserman reports that the plant would have to be evacuated.  The workers who are essential to preventing damage at the plant would leave, and we will have lost a critical safeguard.  In addition, the computers will not work because of the intense radiation. As a result we would be blind - the world would have to sit and wait to see what happened. You might have to not only evacuate Fukushima but all of the population in and around Tokyo, reports Wasserman.  There is no question that the 1,533 spent fuel rods need to be removed.  But Arnie Gundersen, a veteran nuclear engineer and director of Fairewinds Energy Education, who used to build fuel assemblies, told Reuters "They are going to have difficulty in removing a significant number of the rods." He described the problem in a radio interview: "If you think of a nuclear fuel rack as a pack of cigarettes, if you pull a cigarette straight up it will come out — but these racks have been distorted. Now when they go to pull the cigarette straight out, it’s going to likely break and release radioactive cesium and other gases, xenon and krypton, into the air. I suspect come November, December, January we’re going to hear that the building’s been evacuated, they’ve broke a fuel rod, the fuel rod is off-gassing."
  • Wasserman builds on the analogy, telling us it is "worse than pulling cigarettes out of a crumbled cigarette pack." It is likely they used salt water as a coolant out of desperation, which would cause corrosion because the rods were never meant to be in salt water.  The condition of the rods is unknown. There is debris in the coolant, so there has been some crumbling from somewhere. Gundersen  adds, "The roof has fallen in, which further distorted the racks," noting that if a fuel rod snaps, it will release radioactive gas which will require at a minimum evacuation of the plant. They will release those gases into the atmosphere and try again. The Japan Times writes: "The consequences could be far more severe than any nuclear accident the world has ever seen. If a fuel rod is dropped, breaks or becomes entangled while being removed, possible worst case scenarios include a big explosion, a meltdown in the pool, or a large fire. Any of these situations could lead to massive releases of deadly radionuclides into the atmosphere, putting much of Japan — including Tokyo and Yokohama — and even neighboring countries at serious risk."  
  • This is not the usual moving of fuel rods.  TEPCO has been saying this is routine, but in fact it is unique – a feat of engineering never done before.  As Gundersen says: "Tokyo Electric is portraying this as easy. In a normal nuclear reactor, all of this is done with computers. Everything gets pulled perfectly vertically. Well nothing is vertical anymore, the fuel racks are distorted, it’s all going to have to be done manually. The net effect is it’s a really difficult job. It wouldn’t surprise me if they snapped some of the fuel and they can’t remove it." Gregory Jaczko, Former Chairman of the U.S. Nuclear Regulatory Commission concurs with Gundersen describing the removal of the spent fuel rods as "a very significant activity, and . . . very, very unprecedented." Wasserman sums the challenge up: "We are doing something never done before – bent, crumbling, brittle fuel rods being removed from a pool that is compromised, in a building that is sinking, sagging and buckling, and it all must done under manual control, not with computers."  And the potential damage from failure would affect hundreds of millions of people.
  • The first thing that is needed is to end the media blackout.  The global public needs to be informed about the issues the world faces from Fukushima.  The impacts of Fukushima could affect almost everyone on the planet, so we all have a stake in the outcome.  If the public is informed about this problem, the political will to resolve it will rapidly develop. The nuclear industry, which wants to continue to expand, fears Fukushima being widely discussed because it undermines their already weak economic potential.  But, the profits of the nuclear industry are of minor concern compared to the risks of the triple Fukushima challenges. 
  • The second thing that must be faced is the incompetence of TEPCO.  They are not capable of handling this triple complex crisis. TEPCO "is already Japan’s most distrusted firm" and has been exposed as "dangerously incompetent."  A poll found that 91 percent of the Japanese public wants the government to intervene at Fukushima. Tepco’s management of the stricken power plant has been described as a comedy of errors. The constant stream of mistakes has been made worse by constant false denials and efforts to minimize major problems. Indeed the entire Fukushima catastrophe could have been avoided: "Tepco at first blamed the accident on ‘an unforeseen massive tsunami’ triggered by the Great East Japan Earthquake on March 11, 2011. Then it admitted it had in fact foreseen just such a scenario but hadn’t done anything about it."
  • The reality is Fukushima was plagued by human error from the outset.  An official Japanese government investigation concluded that the Fukushima accident was a "man-made" disaster, caused by "collusion" between government and Tepco and bad reactor design. On this point, TEPCO is not alone, this is an industry-wide problem. Many US nuclear plants have serious problems, are being operated beyond their life span, have the same design problems and are near earthquake faults. Regulatory officials in both the US and Japan are too corruptly tied to the industry. Then, the meltdown itself was denied for months, with TEPCO claiming it had not been confirmed.  Japan Times reports that "in December 2011, the government announced that the plant had reached ‘a state of cold shutdown.’ Normally, that means radiation releases are under control and the temperature of its nuclear fuel is consistently below boiling point."  Unfortunately, the statement was false – the reactors continue to need water to keep them cool, the fuel rods need to be kept cool – there has been no cold shutdown.
  • TEPCO has done a terrible job of cleaning up the plant.  Japan Times describes some of the problems: "The plant is being run on makeshift equipment and breakdowns are endemic. Among nearly a dozen serious problems since April this year there have been successive power outages, leaks of highly radioactive water from underground water pools — and a rat that chewed enough wires to short-circuit a switchboard, causing a power outage that interrupted cooling for nearly 30 hours. Later, the cooling system for a fuel-storage pool had to be switched off for safety checks when two dead rats were found in a transformer box."  TEPCO has been constantly cutting financial corners and not spending enough to solve the challenges of the Fukushima disaster resulting in shoddy practices that cause environmental damage. Washington’s Blog reports that the Japanese government is spreading radioactivity throughout Japan – and other countries – by burning radioactive waste in incinerators not built to handle such toxic substances. Workers have expressed concerns and even apologized for following order regarding the ‘clean-up.’
  • Indeed, the workers are another serious concern. The Guardian reported in October 2013 the plummeting morale of workers, problems of alcohol abuse, anxiety, loneliness, Post-Traumatic Stress Disorder and depression. TEPCO cut the pay of its workers by 20 percent in 2011 to save money even though these workers are doing very difficult work and face constant problems. Outside of work, many were traumatized by being forced to evacuate their homes after the Tsunami; and they have no idea how exposed to radiation they have been and what health consequences they will suffer. Contractors are hired based on the lowest bid, resulting in low wages for workers. According to the Guardian, Japan's top nuclear regulator, Shunichi Tanaka, told reporters: "Mistakes are often linked to morale. People usually don't make silly, careless mistakes when they're motivated and working in a positive environment. The lack of it, I think, may be related to the recent problems." The history of TEPCO shows we cannot trust this company and its mistreated workforce to handle the complex challenges faced at Fukushima. The crisis at Fukushima is a global one, requiring a global solution.
  • In an open letter to the United Nations, 16 top nuclear experts urged the government of Japan to transfer responsibility for the Fukushima reactor site to a worldwide engineering group overseen by a civil society panel and an international group of nuclear experts independent from TEPCO and the International Atomic Energy Administration , IAEA. They urge that the stabilization, clean-up and de-commissioning of the plant be well-funded. They make this request with "urgency" because the situation at the Fukushima plant is "progressively deteriorating, not stabilizing." 
  • The problems at Fukushima are in large part about facing reality – seeing the challenges, risks and potential harms from the incident. It is about TEPCO and Japan facing the reality that they are not equipped to handle the challenges of Fukushima and need the world to join the effort. 
  •  
    Excellent roundup of evidence that the Fukushima disaster recovery process has gone badly awry and is devolving quickly to looming further disasters. Political momentum is gathering to wrest the recovery efforts away from the Japanese government and to place its leadership in the hands of an international group of experts. The disaster was far worse than its portrayal in mainstream media, is continuing, and even worse secondary disasters now loom. 
Paul Merrell

Sorry for letting them snoop? Dell apologizes for 'inconvenience' caused by NSA backdoo... - 0 views

  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
  • Spreading viruses and malware to infect targets and eavesdrop on their communications is just one of the ways the United States’ spy firm conducts surveillance, Appelbaum said. Along with those exploits, he added, the NSA has been manually inserting microscopic computer chips into commercially available products and using custom-made devices like hacked USB cables to silently collect intelligence. One of the most alarming methods of attack discussed during his address, however, comes as a result of all but certain collusion on the part of major United States tech companies. The NSA has information about vulnerabilities in products sold by the biggest names in the US computer industry, Appelbaum said, and at the drop off a hat the agency has the ability of launching any which type of attack to exploit the flaws in publically available products.
  • The NSA has knowledge pertaining to vulnerabilities in computer servers made by Dell and even Apple’s highly popular iPhone, among other devices, Appelbaum told his audience. “Hey Dell, why is that?” Appelbaum asked. “Love to hear your statement about that.”
  • ...4 more annotations...
  • Appelbaum didn’t leave Dell off the hook after revealing just that one exploit known to the NSA, however. Before concluding his presentation, he displayed a top-secret document in which the agency makes reference to a hardware implant that could be manually installed onto Dell PowerEdge servers to exploit the JTAG debugging interface on its processor — a critical circuitry component that apparently contains a vulnerability known to the US government. “Why did Dell leave a JTAG debugging interface on these servers?” asked Appelbaum. “Because it’s like leaving a vulnerability in. Is that a bugdoor, or a backdoor or just a mistake? Well hopefully they will change these things or at least make it so that if you were to see this, you would know that you have some problems. Hopefully Dell will release some information about how to mitigate this advance persistent threat.” Appelbaum also provoked Apple by acknowledging that the NSA boasts of being able to hack into any of their mobile devices running the iOS operating system. “Either they have a huge collection of exploits that work against Apple products — meaning they are hoarding information about critical systems American companies product and sabotaging them — or Apple sabotages it themselves,” he said.
  • @DellCares @dellcarespro Inconvenience? You got to be F*ckin kidding me! You place an NSA bug in our servers and call it an inconvenience? — Martijn Wismeijer (@twiet) December 31, 2013
  • TechDirt reporter Mike Masnick noticed early Tuesday that Dell’s official customer service Twitter account opted to issue a cookie-cutter response that drips of insincerity. “Thanks you for reaching out and regret the inconvenience,” the Dell account tweeted to Wismeijer. “Our colleagues at @DellCaresPro will be able to help you out.” “Inconvenience? You got to be F*ckin kidding me!” Wismeijer responded. “You place an NSA bug in our servers and call it an inconvenience?”
  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
Paul Merrell

Asia Times Online :: Middle East News, Iraq, Iran current affairs - 0 views

  • And why did Islamic State, formerly ISIS, become winners? Because the "West" regimented, schooled, trained, logistically helped and weaponized most of IS's Takfiri goons with a mission at hand: to destroy Syria. The "West" lauded them as "Syrian rebels". Freedom fighters. Washington even promoted Jabhat al-Nusra (the official al-Qaeda franchise in Syria, and a "terrorist organization", according to the State Department) as "good" jihadis, as well as the preferred Saudi combo, the Islamic Front.
  • The House of Saud, directly and indirectly, and the proverbial wealthy Gulf Cooperation Council donors are the Mom and Dad of ISIS. All duly vetted/approved by the industrial-military-Orwellian-Panopticon complex. And yet "Assad must go" had other ideas for Syria. He didn't go. He and his army resisted and counter-attacked. So the original mission in Syria morphed across the (non-existent) desert border towards Iraq. ISIS kept expanding - via extortion, kidnapping, captured oil fields, tribal smuggling networks.
  • How convenient that IS strategy is totally divide and rule. Totally balkanization of Iraq. Totally mum on Israel's slow-motion ethnic cleansing of Gaza. Totally useful in wagging the (beheading) dog to make the world forget about Gaza. Moroever, IS/ISIS strategy, stripped to the bone, is Pentagon manual; clear, hold and build - then expand (to an area larger than Great Britain). It's even Pentagon manual redux - as in building "coalitions of the willing" (see the alliance with "remnants" - Rummy talk - of the Saddam regime propelling their northern Iraq summer offensive.) How convenient that the mighty Orwellian/Panopticon complex satellite maze could not identify a long convoy of gleaming white Toyotas crossing the desert towards their summer conquests. And how convenient that a Briton beheading an American - what a "special relationship" plot twist! - fully sanctions the Return of Iraq Bombing ("for months", in Obama's words); more strikes; more drones; perhaps more boots on the ground; perhaps, in the near future, a Syria extension. IS also took over Tikrit, the birthplace of Saddam, in their summer adventure. Now Baghdad's military are trying to take it back. IS welcomed them with minefields, booby-trapped buildings, an array of snipers and hardcore mortar fire. How convenient that Obama's "humanitarian" bombs are not involved in R2P ("responsibility to protect") Saddam's birthplace. What really matters is the US consulate in Erbil, scores of CIA operatives and vast Big Oil interests in Iraqi Kurdistan.
  •  
    Pepe Escbar catches a whiff of the same rat Tony Cartalucci caught, but sees it ending badly for the House of Saud. I've said it before, but I'll say it again: Escobar has earned very high credibility with me. 
Paul Merrell

Obama's crackdown views leaks as aiding enemies of U.S. | McClatchy - 0 views

  • Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions. President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
  • Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.
  • Employees must turn themselves and others in for failing to report breaches. “Penalize clearly identifiable failures to report security infractions and violations, including any lack of self-reporting,” the strategic plan says.The Obama administration already was pursuing an unprecedented number of leak prosecutions, and some in Congress – long one of the most prolific spillers of secrets – favor tightening restrictions on reporters’ access to federal agencies, making many U.S. officials reluctant to even disclose unclassified matters to the public. The policy, which partly relies on behavior profiles, also could discourage creative thinking and fuel conformist “group think” of the kind that was blamed for the CIA’s erroneous assessment that Iraq was hiding weapons of mass destruction, a judgment that underpinned the 2003 U.S. invasion. “The real danger is that you get a bland common denominator working in the government,” warned Ilana Greenstein, a former CIA case officer who says she quit the agency after being falsely accused of being a security risk. “You don’t get people speaking up when there’s wrongdoing. You don’t get people who look at things in a different way and who are willing to stand up for things. What you get are people who toe the party line, and that’s really dangerous for national security.”
  • ...3 more annotations...
  • The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.
  • The program, however, gives agencies such wide latitude in crafting their responses to insider threats that someone deemed a risk in one agency could be characterized as harmless in another. Even inside an agency, one manager’s disgruntled employee might become another’s threat to national security. Obama in November approved “minimum standards” giving departments and agencies considerable leeway in developing their insider threat programs, leading to a potential hodgepodge of interpretations. He instructed them to not only root out leakers but people who might be prone to “violent acts against the government or the nation” and “potential espionage.”
  • The Department of Education, meanwhile, informs employees that co-workers going through “certain life experiences . . . might turn a trusted user into an insider threat.” Those experiences, the department says in a computer training manual, include “stress, divorce, financial problems” or “frustrations with co-workers or the organization.”An online tutorial titled “Treason 101” teaches Department of Agriculture and National Oceanic and Atmospheric Administration employees to recognize the psychological profile of spies.
Paul Merrell

The Forgotten Coup: Hillary Clinton's "Dirty Hands" in the 2009 Honduran Coup | Geopoli... - 0 views

  • On June 28th 2009, Honduran soldiers marched into the bedroom of Honduran President Manuel Zelaya while he was in his pajamas and forced him at gunpoint to walk into a waiting jet and exiled him to Costa Rica. Then-Secretary of State Hillary Clinton condemned the ouster of the Honduran President as a coup as she called for “the full restoration of democratic order in Honduras.” The “democratic order” Clinton was suggesting was not to restore Zelaya as the legitimate president but a president (or more like a U.S. Puppet) that Washington finds suitable for its interests. Roberto Micheletti replaced Zelaya as an interim president. Micheletti lived in the U.S. (Florida) early in his life. Hillary Clinton’s involvement in the overthrow of the democratically elected president of Honduras Manual Zelaya is clear while most of the main-stream media ignores Clinton’s involvement in destroying yet another democracy in Central America by the U.S. government. Central America has experienced U.S. orchestrated coups and civil wars in the past including Guatemala (1954), Costa Rica (mid 1950’’s and 1970-71) and civil wars in Nicaragua (1981-90) and El Salvador (1981-92).
Paul Merrell

USS Pueblo: LBJ Considered Nuclear Weapons, Naval Blockade, Ground Attacks in Response ... - 0 views

  • Washington, DC, January 23, 2014 – Forty-six years ago today - well before Edward Snowden was born - the National Security Agency suffered what may still rank as the most significant compromise ever of its code secrets when the American spy ship USS Pueblo was captured by communist forces off the coast of North Korea on January 23, 1968. The U.S. Navy signals intelligence ship was on a mission to intercept radio and electronic transmissions, and apparently sailing in international waters, when North Korean naval units opened fire, then boarded the vessel and took its crew hostage for almost a year, sparking a major international crisis. Beyond the dramatic political ramifications of the seizure and hostage-taking for the Lyndon Johnson administration and U.S. world standing, the incident resulted in the capture of a dozen top secret encryption devices, maintenance manuals, and other code materials. Because it involved actual encryption equipment rather than just papers and briefing materials, the Pueblo affair may have produced a much greater loss than the recent disclosures of former NSA contract employee Edward Snowden.
  • Recently declassified documents posted today by the National Security Archive describe tense U.S. internal reactions to the Pueblo seizure, and include previously withheld high-level political and military deliberations over how to respond to the episode in an atmosphere fraught with the dangers of a superpower conflict. Military contingency plans, which President Lyndon Johnson eventually rejected, included a naval blockade, major air strikes and even use of nuclear weapons against North Korea.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

How The NSA Targets Tor - Slashdot - 0 views

  • The Guardian has released new documents from Edward Snowden showing how the U.S. National Security Agency targets internet anonymity tool Tor to gather intelligence. One of the documents, a presentation titled "Tor Stinks," bluntly acknowledges how effective the tool is: "We will never be able to de-anonymize all Tor users all the time. With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user in response to a TOPI request/on demand." (Other documents: presentation 1, presentation 2.) The NSA is able to extract information sometimes, though, and Bruce Schneier details what we know of that process in an article of his own. "The NSA creates 'fingerprints' that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see "almost everything" a target does on the internet. ... After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user's computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems." Schneier explains in a related article why it's important that we figure out exactly what the NSA is doing. "Given how inept the NSA was at protecting its own secrets, it's extremely unlikely that Edward Snowden was the first sysadmin contractor to walk out the door with a boatload of them. And the previous leakers could have easily been working for a foreign government."
  •  
    Sorry, added the last one without going to the permalink page.
Paul Merrell

Slashdot (15) - 0 views

  • The Guardian has released new documents from Edward Snowden showing how the U.S. National Security Agency targets internet anonymity tool Tor to gather intelligence. One of the documents, a presentation titled "Tor Stinks," bluntly acknowledges how effective the tool is: "We will never be able to de-anonymize all Tor users all the time. With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user in response to a TOPI request/on demand." (Other documents: presentation 1, presentation 2.) The NSA is able to extract information sometimes, though, and Bruce Schneier details what we know of that process in an article of his own. "The NSA creates 'fingerprints' that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see "almost everything" a target does on the internet. ... After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user's computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems." Schneier explains in a related article why it's important that we figure out exactly what the NSA is doing. "Given how inept the NSA was at protecting its own secrets, it's extremely unlikely that Edward Snowden was the first sysadmin contractor to walk out the door with a boatload of them. And the previous leakers could have easily been working for a foreign government."
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Progra... - 0 views

  • While we've been disappointed that Senator Chuck Grassley appears to have a bit of a double standard with his staunch support for whistleblowers when it comes to Ed Snowden, it is true that he has fought for real whistleblower protections for quite some time. Lately, he's been quite concerned that the White House's "Insider Threat Program" (ITP) is really just a cover to crack down on whistleblowers. As we've noted, despite early promises from the Obama administration to support and protect whistleblowers, the administration has led the largest crackdown against whistleblowers, and the ITP suggests that the attack on whistleblowers is a calculated response. The program documentation argues that any leak can be seen as "aiding the enemy" and encourages government employees to snitch on each other if they appear too concerned about government wrong-doing. Despite all his high minded talk of supporting whistleblowers, President Obama has used the Espionage Act against whistleblowers twice as many times as all other Presidents combined. Also, he has never -- not once -- praised someone for blowing the whistle in the federal government.
  • Given all of that, Senator Grassley expressed some concern about this Insider Threat Program and how it distinguished whistleblowers from actual threats. He asked the FBI for copies of its training manual on the program, which it refused to give him. Instead, it said it could better answer any questions at a hearing. However, as Grassley explains, when questioned about this just 10 minutes into the hearing, the FBI abruptly got up and left: Meanwhile, the FBI fiercely resists any efforts at Congressional oversight, especially on whistleblower matters. For example, four months ago I sent a letter to the FBI requesting its training materials on the Insider Threat Program. This program was announced by the Obama Administration in October 2011. It was intended to train federal employees to watch out for insider threats among their colleagues. Public news reports indicated that this program might not do enough to distinguish between true insider threats and legitimate whistleblowers. I relayed these concerns in my letter. I also asked for copies of the training materials. I said I wanted to examine whether they adequately distinguished between insider threats and whistleblowers.
  • In response, an FBI legislative affairs official told my staff that a briefing might be the best way to answer my questions. It was scheduled for last week. Staff for both Chairman Leahy and I attended, and the FBI brought the head of their Insider Threat Program. Yet the FBI didn’t bring the Insider Threat training materials as we had requested. However, the head of the Insider Threat Program told the staff that there was no need to worry about whistleblower communications. He said whistleblowers had to register in order to be protected, and the Insider Threat Program would know to just avoid those people. Now I have never heard of whistleblowers being required to “register” in order to be protected. The idea of such a requirement should be pretty alarming to all Americans. Sometimes confidentiality is the best protection a whistleblower has. Unfortunately, neither my staff nor Chairman Leahy’s staff was able to learn more, because only about ten minutes into the briefing, the FBI abruptly walked out. FBI officials simply refused to discuss any whistleblower implications in its Insider Threat Program and left the room. These are clearly not the actions of an agency that is genuinely open to whistleblowers or whistleblower protection.
  • ...2 more annotations...
  • And yes, it's equally troubling that the FBI insists that as long as someone "registers" as a whistleblower, the FBI will suddenly, magically agree to stop investigating them as a "threat." We already know that's almost certainly bullshit. The stories of Thomas Drake and John Kiriakou are both clear examples of whistleblowers, who then had the DOJ search through basically everything they'd ever done to try to concoct some sort of Espionage Act case against them. In both cases, the eventual charges were totally ridiculous and unrelated to the whistleblowing they had done, but clearly the only reason they had been investigated was because of their status as whistleblowers. Drake was charged with having a classified document, which was just a meeting agenda and was both improperly classified and then declassified soon after. Kiriakou was charged with revealing the name of a CIA operative to a reporter, where the person in question was already widely known to journalists as working for the CIA. Meanwhile, while Grassley still hasn't come out in support of Snowden as a whistleblower, he does seem reasonably concerned that James Clapper's plans to stop the next Snowden will have severe consequences for whistleblowers:
  • Director of National Intelligence James Clapper seems to have talked about such procedures when he appeared before the Senate Armed Services Committee on February 11, 2014. In his testimony, he said: We are going to proliferate deployment of auditing and monitoring capabilities to enhance our insider threat detection. We’re going to need to change our security clearance process to a system of continuous evaluation. . . . What we need is . . . a system of continuous evaluation, where . . . we have a way of monitoring their behavior, both their electronic behavior on the job as well as off the job, to see if there is a potential clearance issue. . . . Director Clapper’s testimony gives me major pause. It sounds as though this type of monitoring would likely capture the activity of whistleblowers communicating with Congress. As Marcy Wheeler notes in her post (linked above, which called my attention to all this), by declaring war on whistleblowers, the administration is almost guaranteeing that many fewer will use "official channels" to blow the whistle. That just makes them targets with the likelihood of getting no results. Instead, all this does is incentivize people to go the Chelsea Manning/Ed Snowden route of going directly to journalists to make sure the stories get out.
1 - 20 of 37 Next ›
Showing 20 items per page