Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged map

Rss Feed Group items tagged

Paul Merrell

Visualizing the U.S.-Mexico Border - 0 views

  • What does the southern border of the United States look like? For all the talk of “securing the border” and “building a wall,” there is surprisingly little visual material that conveys just how vast this stretch of space is. In total, the U.S.-Mexico border spans 1,954 miles. According to Google Maps, it would take 34 hours to drive its entire length. In places, there already is a border fence — more than 650 miles of it. Pushed and pulled by various forces, some 1 million people are estimated to pass through the official ports of entry every day. But what does the geography of this landscape look like? Is it industrial? Desolate? Populated? All of the above? Using the geographic coordinates of the international boundary line, in addition to location data for the existing border fence (which has been mapped by journalists at NPR and the Center for Investigative Reporting), I wrote a small computer script to download satellite imagery for the entire border. I ended up with about 200,000 images.
  • Using a command-line tool called ffmpeg, I programmatically stitched the images together, and then worked with Laura Poitras and her team at Field of Vision to edit them into a short film. Jace Clayton, the artist and author known as DJ /rupture, developed an original score for the piece.
  •  
    Great video demonstrating just how preposterous Trump's southern border wall proposal is. Even if it could be done, what a waste. With our nation's bridges crumbling, we should want to build a wall? Why not fix the bridges instead and keep commerce moving. Not to mention the rest of our nation's infrastructure.
Gary Edwards

U.S. to Become Tax Debtors' Prison - 0 views

  •  
    International Passports could be held in lew of back taxes if Senate Bill 1813, the deliciously named "Moving Ahead for Progressives" Act, gets through the House. excerpt: A bill authored by a Southland lawmaker that could potentially allow the federal government to prevent any Americans who owe back taxes from traveling outside the U.S. is one step closer to becoming law. Senate Bill 1813 was introduced back in November by Senator Barbara Boxer (D-Los Angeles) to "reauthorize Federal-aid highway and highway safety construction programs, and for other purposes". After clearing the Senate on a 74 - 22 vote on March 14, SB 1813 is now headed for a vote in the House of Representatives, where it's expected to encounter stiffer opposition among the GOP majority. In addition to authorizing appropriations for federal transportation and infrastructure programs, the "Moving Ahead for Progress in the 21st Century Act" or "MAP-21″ includes a provision that would allow for the "revocation or denial" of a passport for anyone with "certain unpaid taxes" or "tax delinquencies". Section 40304 of the legislation states that any individual who owes more than $50,000 to the Internal Revenue Service may be subject to "action with respect to denial, revocation, or limitation of a passport". The bill does allow for exceptions in the event of emergency or humanitarian situations or limited return travel to the U.S., or in cases when any tax debt is currently being repaid in a "timely manner" or when collection efforts have been suspended. However, there does not appear to be any specific language requiring a taxpayer to be charged with tax evasion or any other crime in order to have their passport revoked or limited - only that a notice of lien or levy has been filed by the IRS.
Gary Edwards

NSA Whistleblower William Binney Explains NSA Surveillance - Business Insider - 0 views

  •  
    Wow.  I watched this short film and listened carefully to what William Binney had to say.  This is incredible stuff and his explanation of how it cam to be is easy enough to follow.  I hope Americans will pay attention and in the ground swell to take back our country will forcefully oppose the requthorization of NSA in December 2012.  Just a month after elections. excerpt: "National Security Agency whistleblower William Binney explains how the secretive agency run its pervasive domestic spying apparatus in a new piece by Laura Poitras in The New York TImes. Binney-one of the best mathematicians and code breakers in NSA history-worked for the Defense Department's foreign signals intelligence agency for 32 years before resigning in late 2001 because he "could not stay after the NSA began purposefully violating the Constitution." In a short video called "The Program," Binney explains how the agency took part of one of the programs he built and started using it to spy on virtually every U.S. citizen without warrants under the code-name Stellar Wind. Binney details how the top-secret surveillance program, the scope of which has never been made public, can track electronic activities-phone calls, emails, banking and travel records, social media-and map them to collect "all the attributes that any individual has" in every type of activity and build a profile based on that data."
Gary Edwards

Have a T-P Pre-Primary to avoid sure defeat // Implement a drive to recruit and organiz... - 1 views

  •  
    "This discussion needs your direct support or direct critique that I might respond.  Other idea's please start in a new discussion (note: this has been revised after 400+ comments, but if possible read all of them) thank you for your time: (revised July 20th,'13) I thought it would be helpful (stike that, it's absolutely imperative!!!!)  to have a T Party pre-primary prior to the RINO primary so we wouldn't split our vote.  That thread sort of grew to the following two steps: The following two step approach would require a temporary meeting of the minds from the various larger conservative Tea Party factions for the following purposes:: 1. Having a pre-primary to avoid the late RINO primary so we avoid splitting our vote and being able to get out there now to campaign because we have some serious hills to climb (our message, government news and funding etc.). But the main point here is that we always split our votes in the regular RINO primary, we need to avoid this.  We need some sort of (temporary or other) unified effort of all the un-unified groups for this purpose.  Make sure you don't miss a word utilized here and that the whole 'idea' is understood.  Along with this we also need to have the above bonded with the following item number 2, as follows: 2. Implement a plan to organize and recruit deep into every precinct of the T-Party. This would include the larger T-P groups to supply their associated local smaller groups with solid information to be distributed and used as a means to educate both door to door and if possible via ads in their local news papers when feasible. (with an increase in some recruiting, this can work - I've checked out the cost). We have great web sites on the internet but many republican's, democrats and independents don't go there.  We need a serious ground team for all of our upcoming elections.  Many of our small groups are getting smaller and many not associated would like to be contacted by us.  Our idea's
Paul Merrell

Al-Qaeda might attack Guantanamo, claims US - Human Rights - Al Jazeera English - 0 views

  • In a 13-page brief filed on Friday in federal court in Washington, DC, government lawyers assert that a June 3 declaration signed by Guantanamo prison warden Colonel John Bogdan, which sought to justify the rationale behind the genital search policy , contains details about "operational-security and force-protection procedures" that, if made public, "would better enable our enemies to attack the detention facilities at Guantanamo or undermine security at the facility".
  • The government made these claims in response to a motion to intervene  filed by this reporter in federal court last month which sought to unseal Bogdan's six-page declaration. Journalists can intervene in court cases and argue for the release of certain materials on the grounds that the public has a right of access to judicial records. The warden's declaration was submitted by the government - under seal - in response to a lawsuit filed by Guantanamo attorneys, who argued the genital search policy Bogdan enacted at the height of a mass hunger strike in April interfered with prisoners' access to their lawyers. The new procedures required prisoners to agree to have their genitals searched whenever they left their cells to meet with attorneys, and upon return, to ensure they were not transporting "contraband". Rather than submit to the searches, numerous prisoners declined to meet with their lawyers.
  • Last month, US District Court Judge Royce Lamberth banned the searches, calling them "religiously and culturally abhorrent". Lamberth said the protocol Bogdan implemented under the guise of security was actually intended to deter prisoners from meeting with their lawyers. The judge noted the "government is a recidivist when it comes to denying counsel access" to the prisoners. Three days after Lamberth issued his opinion, this reporter's Washington, DC-based attorney, Jeffrey Light, filed a motion to intervene to unseal Bogdan's declaration. The following week a federal appeals court reversed Lamberth's decision while the government prepared a formal appeal.
  • ...1 more annotation...
  • Secret, or not secret? In response to the court filing, the government on Friday released a partially redacted version of Bogdan's declaration, and argued that the blacked-out passages in the document should remain secret - because they contained sensitive "operational-security information" about Guantanamo. But it appears government lawyers were unaware that another version of Bogdan's declaration - one that contained a different set of redactions - was publicly released last month, in documents filed with the federal appeals court when the government asked Lamberth's decision to be put on hold. Redacted passages that the government says needs to remain secret are unredacted in the earlier version filed on the public record as part of the government's appeal. At the same time, some unredacted passages in the declaration submitted on Friday are redacted in the public version of Bogdan's declaration filed with the appeals court last month.
  •  
    Today's free giggle, courtesy of the U.S. Dept. of Justice and Dept. of Defense. So sensitive that it would make Gitmo more susceptible to terrorist attack, Judge. Just ignore that Google Maps view of Gitmo and think about how important it is that we be allowed to fondl ... er, probe those genitals and anuses for contraband and weapons, Judge.  What's that, you say, the intervenor already published the document? We released it last week? Judge ... :-) 
Paul Merrell

Exclusive: CIA Files Prove America Helped Saddam as He Gassed Iran - By Shane Harris an... - 0 views

  • The U.S. government may be considering military action in response to chemical strikes near Damascus. But a generation ago, America's military and intelligence communities knew about and did nothing to stop a series of nerve gas attacks far more devastating than anything Syria has seen, Foreign Policy has learned.
  • In 1988, during the waning days of Iraq's war with Iran, the United States learned through satellite imagery that Iran was about to gain a major strategic advantage by exploiting a hole in Iraqi defenses. U.S. intelligence officials conveyed the location of the Iranian troops to Iraq, fully aware that Hussein's military would attack with chemical weapons, including sarin, a lethal nerve agent. The intelligence included imagery and maps about Iranian troop movements, as well as the locations of Iranian logistics facilities and details about Iranian air defenses. The Iraqis used mustard gas and sarin prior to four major offensives in early 1988 that relied on U.S. satellite imagery, maps, and other intelligence. These attacks helped to tilt the war in Iraq's favor and bring Iran to the negotiating table, and they ensured that the Reagan administration's long-standing policy of securing an Iraqi victory would succeed. But they were also the last in a series of chemical strikes stretching back several years that the Reagan administration knew about and didn't disclose.
Paul Merrell

Obama's Gun-Running Operation: Weapons and Support for "Islamic Terrorists" in Syria an... - 0 views

  • Newly disclosed Pentagon documents prove what we’ve known for a while now: the Obama administration knew as early as 2012 that weapons were being sent from Benghazi, Libya, to rebels in Syria. The U.S. government also knew at the time that: “the Salafist, the Muslim Brotherhood, and [Al Qaeda in Iraq were] the major forces driving the insurgency in Syria.” But did they just “know” or was it part of the plan? These official documents of the Obama administration add to the large  amount of evidence proving that the actual chaos and havoc wreaked by extremist groups in the Middle East was deliberately created by the U.S. and its allies and is not the result of a “failed foreign policy”.
  • Although the documents do not reveal who was responsible for sending weapons to Syria, it is quite obvious from the language used in the documents that it was a US initiative and the CIA presence in Benghazi at the time suggests that US intelligence was behind this gun-running operation.
  •  
    A must-read. The alternative press is on to Obama's "secret" strategy to overthrow the Syrian government and trifurcate Iraq. This article provides lots of links to support its conclusion.
Paul Merrell

Why Won't the FBI Tell the Public About its Drone Program? | Electronic Frontier Founda... - 0 views

  • Today we’re publishing—for the first time—the FBI’s drone licenses and supporting records for the last several years. Unfortunately, to say that the FBI has been less than forthcoming with these records would be a gross understatement. Just yesterday, Wired broke the story that the FBI has been using drones to surveil Americans. Wired noted that, during an FBI oversight hearing before the Senate Judiciary Committee, FBI Director Robert Mueller let slip that the FBI flies surveillance drones on American soil. Mueller tried to reassure the senators that FBI’s drone program “is very narrowly focused on particularized cases and particularized leads.” However, there’s no way to check the Director on these statements, given the Bureau’s extreme lack of transparency about its program.
  • EFF received these records as a result of our Freedom of Information lawsuit against the Federal Aviation Administration (FAA) for the licenses the FAA issues to all public entities wishing to fly drones in the national airspace. As detailed in prior posts and on our drone map, we have already received tens of thousands of pages of valuable information about local, state and federal agencies’ drone flights. However, unlike other federal agencies, including the US Air Force, the Bureau has withheld almost all information within its documents—even including the dates the FAA’s Certificates of Authorization (COAs) were issued. As you can see from the two examples linked below—the first from the Air Force and the second from the FBI—the FBI is withholding information, including something as basic as the city and state of the Bureau’s point of contact, that could in no way be expected to risk circumvention of the law (the applicable test under FOIA, 5 U.S.C. § 552 (b)(7)(E)).
  • The FBI has even withheld information from standard documents that all agencies file with the FAA to support their COA applications, many of which come directly from the drone manufacturer. (Compare, for example, the Air Force’s “LOST_LINK_MISSION” or “AIRCRAFT_SYSTEM” documents with the FBI’s versions of the same documents.) One interesting fact is that the Bureau has withheld most of the records under several statutes and regulations related to the arms exports and the International Traffic in Arms Regulations (ITAR) (see statutes and regulations here, here, and here.) This is surprising because, although ITAR does apply explicitly to drones, not even the US Military has claimed these statutes in withholding information from its drone records. Given the FBI’s past abuses and the information recently revealed about how the Bureau exploits specious interpretations of federal law to help out the NSA’s spying program, we have good reason to be concerned about the FBI’s lack of transparency here. We hope Senator Feinstein will follow up on her concerns about the FBI’s apparent lack of “strictures” in place to protect Americans’ privacy in connection to FBI drone use and demand a full accounting of how, when, where and why the Bureau has been using drones to monitor the public. Download the zip files of the documents here, here, and here.
Paul Merrell

Is an Ukronazi attack imminent? Yes! So what else is new? | The Vineyard of the Saker - 0 views

  • Novorussian officials have called a press conference today to warn about the high risks of an Ukronazi assault on Novorussia in the very near future.  I have asked our translation team and friends to subtitle the video of this press conference and I hope to get it in the next 24 hours or less. The press conference was unique in that Edward Basurin, the Deputy Defense Minister and spokesman for the Novorussian armed forces showed a map with what he described as the Ukrainian attack plans:
  • While I don’t doubt for one second that the Novorussians have pretty much near perfect intelligence about the situation in the Nazi-occupied Ukraine and the plans of the junta (all that provided courtesy of the Russian GRU), I have to say that what this maps shows is extremely predictable too and not fundamentally different from what the Ukronazis tried last year: surrounding and cutting off Donetsk from Lugansk and taking control of key parts (or even all) of the Ukrainian-Russian border.  Basurin also quoted the figures for the junta forces and those are in line with what others, including Cassad, have reported.  The Ukronazi force is most definitely numerically large. Basurin also warned that the attack would be preceded by a false flag attack organized by the junta and blamed on the Novorussians.  Again, nothing new here. To be honest, we are all getting used to ‘cry wolf’ about an impending Ukronazi attack.  And this is hardly our fault.  Such an attack has, indeed, been impending for a long while already and the junta’s bellicose rhetoric has only reinforced this sense of imminent danger.  Furthermore, the recent visit of the British Defense Minister in Kiev only made things worse as the junta always does something ugly when western dignitaries visit Kiev.  Add to this that Poroshenko is scheduled to meet with his German and French counterparts next week and the sense of crisis will be total.  And logically so. So while the tensions are real and definitely based in reality, they are also nothing new here, really.  You could also legitimately that all this panic is nothing else but business as usual and that it will remain so until the regime of Nazi freaks in Kiev is finally replaced by something more or less civilized.  This will inevitably happen but, alas, not in the near future.
  • So we are left with this exhausting and frustrating situation where yet another Ukronazi attack might happen anytime but where it also might not.  That is the inevitable consequence of having evil, weak and insecure psychopaths in charge of an entire country. Yesterday a rumor was started indicating that the Novorussians were planning to organize a referendum to join Russia.  I still don’t know if that rumor is based in reality or not, but I will note that this kind of rumor could also serve as a perfect pretext for a Ukronazi attack. It is clear to me that something has to give, probably soon.  The Ukrainian economy is dead, the stocks of basic goods and energy for next winter are empty, the country is in ruins and social tensions are on the raise everywhere.  I personally cannot image that regime change could happen in Kiev before at least one more attack on Novorussia.  The junta really has nothing left to lose and by massing a large attack force, regardless of how ill prepared this force is, and at least the theoretical such an attack could possibility draw Russia in and, thereby, save the Ukronazi junta in Kiev.
  • ...1 more annotation...
  • Nobody in Kiev is seriously thinking that they can occupy Donetsk or Lugansk or pacify the Donbass.  Everybody is pretending otherwise, but that ain’t happening.   Everybody in Kiev is fully aware of the fact that the Donbass is lost forever.  So I will repeat this again: the real purpose of an attack will not be to ‘reconquer’ Novorussia, it will be to draw Russia into the Donbass.  How? Well, in theory, if the junta can launch enough men and armor to overwhelm the Novorussian defenses and if these forces succeed in surrounding Donetsk and Lugansk, Russia will really have no other option than to intervene.  Of course, the Russians will easily defeat the Ukronazi forces, in 24 hours or less, but at that point the Nazi regime in Kiev will be saved: it will be able to declare full mobilization, blame every difficulty in Russia, crush any resistance with even more brutality than before and politically force all the US allies to provide aid to the regime in Kiev.  The regime itself, by the way, would be safe as, contrary to the hopes of many, the Russians will not push much beyond the current line of contact.  At most they will liberate Mariupol and or Slaviansk/Kramatrosk as a “penalty” for the Ukronazi attack.  The junta in Kiev will remain safe, at least from the Russians. The real danger for the junta does not come from the Russian military, but from the disillusioned and impoverished Ukrainian people with whom the regime will remain “one on one” unless the Russians intervene.  And as long as this situation will remain like this, a Ukronazi attack will possibly at any moment.  Starting right now.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Afghan Troop Deadline Extended Again: Guess Why? - WhoWhatWhy - 0 views

  • How many times over the years have we heard promises that the United States would get out of Afghanistan by such-and-such a date, only to have those promises retracted due to exigent circumstances of one kind or another? Too many to count.And now, just when we thought the longest war in American history was finally at an end, comes this headline:US Military Commanders Favor Keeping Troops In Afghanistan Beyond 2016Here’s the Associated Press lead on that story:With the Taliban gaining new ground, US military commanders are arguing for keeping at least a few thousand American troops in Afghanistan beyond 2016, a move that would mark a departure from President Barack Obama’s current policy.
  • Why the never-ending carnage?For another perspective on the importance of Afghanistan — the strategic importance — we invite you to click here and view an interesting treasure map of the region. We’ve run it in the past but it surely warrants renewed attention, given this latest proposal to commit American boots on the ground there for an indefinite future.A good look at the map, which details the wealth of natural resources buried beneath the soil of Afghanistan, raises the question: Which “interests” actually stand to benefit from a prolonged US military presence in Afghanistan? When these troops are drawn, as they inevitably will be, into deadly combat, what exactly will they be sacrificing their lives for: the defense of liberty in the name of US security or the fattening of some corporation’s bottom line?
Paul Merrell

The Latest US and World News - USATODAY.com - 0 views

  • The U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.Federal investigators used the call records to track drug cartels' distribution networks in the USA, allowing agents to detect previously unknown trafficking rings and money handlers. They also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in a wide range of other investigations.The Justice Department revealed in January that the DEA had collected data about calls to "designated foreign countries." But the history and vast scale of that operation have not been disclosed until now.
  • The now-discontinued operation, carried out by the DEA's intelligence arm, was the government's first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans' privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.More than a dozen current and former law enforcement and intelligence officials described the details of the Justice Department operation to USA TODAY. Most did so on the condition of anonymity because they were not authorized to publicly discuss the intelligence program, part of which remains classified.The DEA program did not intercept the content of Americans' calls, but the records — which numbers were dialed and when — allowed agents to map suspects' communications and link them to troves of other police and intelligence data. At first, the drug agency did so with help from military computers and intelligence analysts
  • The extent of that surveillance alarmed privacy advocates, who questioned its legality. "This was aimed squarely at Americans," said Mark Rumold, an attorney with the Electronic Frontier Foundation. "That's very significant from a constitutional perspective."Holder halted the data collection in September 2013 amid the fallout from Snowden's revelations about other surveillance programs. In its place, current and former officials said the drug agency sends telecom companies daily subpoenas for international calling records involving only phone numbers that agents suspect are linked to the drug trade or other crimes — sometimes a thousand or more numbers a day.Tuesday, Justice Department spokesman Patrick Rodenbush said the DEA "is no longer collecting bulk telephony metadata from U.S. service providers." A DEA spokesman declined to comment.
  • ...6 more annotations...
  • The system they built ultimately allowed the drug agency to stitch together huge collections of data to map trafficking and money laundering networks both overseas and within the USA. It allowed agents to link the call records its agents gathered domestically with calling data the DEA and intelligence agencies had acquired outside the USA. (In some cases, officials said the DEA paid employees of foreign telecom firms for copies of call logs and subscriber lists.) And it eventually allowed agents to cross-reference all of that against investigative reports from the DEA, FBI and Customs Service.
  • The result "produced major international investigations that allowed us to take some big people," Constantine said, though he said he could not identify particular cases.
  • In 1992, in the last months of Bush's administration, Attorney General William Barr and his chief criminal prosecutor, Robert Mueller, gave the DEA permission to collect a much larger set of phone data to feed into that intelligence operation.Instead of simply asking phone companies for records about calls made by people suspected of drug crimes, the Justice Department began ordering telephone companies to turn over lists of all phone calls from the USA to countries where the government determined drug traffickers operated, current and former officials said
  • The DEA obtained those records using administrative subpoenas that allow the agency to collect records "relevant or material to" federal drug investigations. Officials acknowledged it was an expansive interpretation of that authority but one that was not likely to be challenged because unlike search warrants, DEA subpoenas do not require a judge's approval. "We knew we were stretching the definition," a former official involved in the process said.Officials said a few telephone companies were reluctant to provide so much information, but none challenged the subpoenas in court. Those that hesitated received letters from the Justice Department urging them to comply.
  • A spokesman for AT&T declined to comment. Sprint spokeswoman Stephanie Vinge Walsh said only that "we do comply with all state and federal laws regarding law enforcement subpoenas."Agents said that when the data collection began, they sought to limit its use mainly to drug investigations and turned away requests for access from the FBI and the NSA. They allowed searches of the data in terrorism cases, including the bombing of a federal building in Oklahoma City that killed 168 people in 1995, helping to rule out theories linking the attack to foreign terrorists. They allowed even broader use after Sept. 11, 2001. The DEA's public disclosure of its program in January came in the case of a man charged with violating U.S. export restrictions by trying to send electrical equipment to Iran.At first, officials said the DEA gathered records only of calls to a handful of countries, focusing on Colombian drug cartels and their supply lines. Its reach grew quickly, and by the late 1990s, the DEA was logging "a massive number of calls," said a former intelligence official who supervised the program.
  • At its peak, the operation gathered data on calls to 116 countries, an official involved in reviewing the list said. Two other officials said they did not recall the precise number of countries, but it was more than 100. That gave the collection a considerable sweep; the U.S. government recognizes a total of 195 countries.
Gary Edwards

Daniel Pearl and the Normalization of Evil - or, Carter's an Idiot! - WSJ.com - 0 views

  • Bill Moyers was quick to lend Hamas legitimacy as a "resistance" movement, together with honorary membership in PBS's imaginary "cycle of violence." In his Jan. 9 TV show, Mr. Moyers explained to his viewers that "each [side] greases the cycle of violence, as one man's terrorism becomes another's resistance to oppression." He then stated -- without blushing -- that for readers of the Hebrew Bible "God-soaked violence became genetically coded." The "cycle of violence" platitude allows analysts to empower terror with the guise of reciprocity, and, amazingly, indict terror's victims for violence as immutable as DNA.
  •  
    But the clearest endorsement of terror as a legitimate instrument of political bargaining came from former President Jimmy Carter. In his book "Palestine: Peace Not Apartheid," Mr. Carter appeals to the sponsors of suicide bombing. "It is imperative that the general Arab community and all significant Palestinian groups make it clear that they will end the suicide bombings and other acts of terrorism when international laws and the ultimate goals of the Road-map for Peace are accepted by Israel." Acts of terror, according to Mr. Carter, are no longer taboo, but effective tools for terrorists to address perceived injustices. Mr. Carter's logic has become the dominant paradigm in rationalizing terror. When asked what Israel should do to stop Hamas's rockets aimed at innocent civilians, the Syrian first lady, Asma Al-Assad, did not hesitate for a moment in her response: "They should end the occupation." In other words, terror must earn a dividend before it is stopped.
Gary Edwards

Speculators, Politicians, and Financial Disasters : A history of Banking and Socialism - 0 views

  • As the sorry tale of the S&L crisis suggests, the road to financial hell is sometimes paved with good intentions. There was nothing malign in attempting to keep these institutions solvent and profitable; they were of long standing, and it seemed a noble exercise to preserve them. Perhaps even more noble, and with consequences that have already proved much more threatening, was the philosophy that would eventually lead the United States into its latest financial crisis—a crisis that begins, and ends, with mortgages. A mortgage used to stay on the books of the issuing bank until it was paid off, often twenty or thirty years later. This greatly limited the number of mortgages a bank could initiate. In 1938, as part of the New Deal, the federal government established the Federal National Mortgage Association, nicknamed Fannie Mae, to help provide liquidity to the mortgage market.
  • it was, ironically, the New Deal that institutionalized discrimination against blacks seeking mortgages. In 1935 the Federal Housing Administration (FHA), established in 1934 to insure home mortgages, asked the Home Owner’s Loan Corporation—another New Deal agency, this one created to help prevent foreclosures—to draw up maps of residential areas according to the risk of lending in them. Affluent suburbs were outlined in blue, less desirable areas in yellow, and the least desirable in red. The FHA used the maps to decide whether or not to insure a mortgage, which in turn caused banks to avoid the redlined neighborhoods. These tended to be in the inner city and to comprise largely black populations. As most blacks at this time were unable to buy in white neighborhoods, the effect of redlining was largely to exclude even affluent blacks from the mortgage market.
  • In 1977, responding to political pressure to abolish the practice, Congress finally passed the Community Reinvestment Act, requiring banks to offer credit throughout their marketing areas and rating them on their compliance. This effectively outlawed redlining.
  • ...4 more annotations...
  • in 1995, regulations adopted by the Clinton administration took the Community Reinvestment Act to a new level. Instead of forbidding banks to discriminate against blacks and black neighborhoods, the new regulations positively forced banks to seek out such customers and areas. Without saying so, the revised law established quotas for loans to specific neighborhoods, specific income classes, and specific races. It also encouraged community groups to monitor compliance and allowed them to receive fees for marketing loans to target groups.
  • the Clinton changes in 1995. As part of them, Fannie and Freddie were now permitted to invest up to 40 times their capital in mortgages; banks, by contrast, were limited to only ten times their capital. Put briefly, in order to increase the number of mortgages Fannie and Freddie could underwrite, the federal government allowed them to become grossly undercapitalized—that is, grossly to reduce their one source of insurance against failure. The risk of a mammoth failure was then greatly augmented by the sheer number of mortgages given out in the country.
    • Gary Edwards
       
      wow, there's that "40 to 1" lending to asset ratio that took down the big five investment banks in October of 2008!
  • Since banks knew they could offload these sub-prime mortgages to Fannie and Freddie, they had no reason to be careful about issuing them. As for the firms that bought the mortgage-based securities issued by Fannie and Freddie, they thought they could rely on the government’s implicit guarantee. AIG, the world’s largest insurance firm, was happy to insure vast quantities of these securities against default; it must have seemed like insuring against the sun rising in the West.
  • remaining at the heart of the financial beast now abroad in the world are Fannie Mae and Freddie Mac and the mortgages they bought and turned into securities. Protected by their political patrons, they were allowed to pile up colossal debt on an inadequate capital base and to escape much of the regulatory oversight and rules to which other financial institutions are subject. Had they been treated as the potential risks to financial stability they were from the beginning, the housing bubble could not have grown so large and the pain that is now accompanying its end would not have hurt so much.
  •  
    Fueled by easy credit, the real-estate market had been rising swiftly for some years. Members of Congress were determined to assure the continuation of that easy credit. Suddenly, the party came to a devastating halt. Defaults multiplied, banks began to fail. Soon the economic troubles spread beyond real estate. Depression stalked the land. The year was 1836.
Gary Edwards

Restoring a constitutional republic: My Plan for a Freedom President by Ron Paul - 0 views

  •  
    "How would a constitutionalist president go about dismantling the welfare-warfare state and restoring a constitutional republic?" This is a very important question, because without a clear road map and set of priorities, such a president runs the risk of having his pro-freedom agenda stymied by the various vested interests that benefit from big government.
Gary Edwards

Revealed - the capitalist network that runs the world - physics-math - 19 October 2011 ... - 0 views

  •  
    The secret 1% revealed at last. Using advanced "complex systems heuristics", a group of mathematicians and scientist studying the stability of complex systems has applied their techniques to study the interlocking relationships driving the global economy. They claim to have identified the inner architecture of global economic power, and hope to make it more stable. Incredible stuff! A list of the top 50 of the 147 superconnected companies cross references nicely with the question, "Who Owns the Federal Reserve Bankster Cartel?" The focus is on global "Transnational Corporations" (TNCs) and how the interlocking ownership/cross-director-relationships has affected the global economy. The study discovers a "super-entity" comprised of a core 147 companies that control over 40% of the world's wealth and productivity capacity. Most of these are global banking and financial operations. Yes, Wall Street Banksters! "In effect, less than 1 per cent of the companies were able to control 40 per cent of the entire network," says James Glattfelder, head of the Zurich research team. Most were financial institutions. The top 20 included Barclays Bank, JPMorgan Chase & Co, and The Goldman Sachs Group. Collectively this 1% control a further 60% of global revenues. excerpt: AS OWS PROTESTS against financial power sweep the world this week, science may have confirmed the protesters' worst fears. An analysis of the relationships between 43,000 transnational corporations has identified a relatively small group of companies, mainly banks, with disproportionate power over the global economy.

    The study's assumptions have attracted some criticism, but complex systems analysts contacted by New Scientist say it is a unique effort to untangle control in the global economy. Pushing the analysis further, they say, could help to identify ways of making global capitalism more stable.

    The idea that a few bankers control a large chunk of the global econo
  •  
    Important work but perhaps too immature to base decisions on with confidence. I was struck by this statement: "Glattfelder says we may need global anti-trust rules, which now exist only at national level, to limit over-connection among TNCs. Sugihara says the analysis suggests one possible solution: firms should be taxed for excess interconnectivity to discourage this risk." My relevant question is, who would be the recipients of the postulated tax? Anytime you create a revenue stream, the recipients acquire a vested interest in maintaining and expanding that revenue stream and the folks who pay the revenue acquire a vested interest in minimizing or eliminating the expense. While the payers incentives are consistent with the article's statement, the identities of the recipients and their incentives to tweak the tax to produce more revenue needs more thought and discussion with a strong focus on: [i] who makes that decision; [ii] who has the the power to decide whether that authority is abused; and [iii] who has standing to initiate actions to correct abuse. On the latter, the U.S. Constitution would seem to require that those who pay the taxes are entitled to Due Process. But at the same time, the individual consumer can also be injured by abuse. However, a hallmark trait of most trade agreements is that only government and regulated corporations are granted standing to challenge regulatory decisions, which has skewed their interpretation heavily to the corporate side. Universal standing is the cure.
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

Breakthrough hopes dented as Ukraine accuses Russia of new incursion | Reuters - 0 views

  • Late-night talks in the Belarussian capital Minsk had appeared to yield some progress towards ending a war in which more than 2,200 people have been killed, according to the U.N. -- a toll that excludes the 298 who died when a Malaysian airliner was shot down over rebel-held territory in July.Ukrainian President Petro Poroshenko said he would work on an urgent 'road map' towards a ceasefire with the rebels. Russia's Vladimir Putin said it would be for Ukrainians to work out ceasefire terms, but Moscow would "contribute to create a situation of trust".
  • The next step would be for a 'Contact Group', comprising representatives of Russia, Ukraine, the rebels and the Organisation for Security and Cooperation in Europe, to meet in Minsk, he said without giving a time frame.But Ukrainian foreign policy adviser Valery Chaly told reporters in Kiev that Poroshenko's declaration on a ceasefire road map did not mean an immediate end to the government’s military offensive against the rebels."If there are attacks from the terrorists and mercenaries, then our army has the duty to defend the people," he said.A crowd of several hundred gathered outside the presidential administration building in Kiev to demand reinforcement for Ukrainian forces in Ilovaysk, a town in Donetsk region, where government troops have been encircled by rebel units.
  • A rebel leader, Oleg Tsaryov, wrote on Facebook that he welcomed the outcome of the Minsk talks, but the separatists would not stop short of full independence for the regions of eastern Ukraine they call Novorossiya (New Russia).He said he saw "a real breakthrough" in Putin's offer to contribute to the peace process.But he added: "It must be understood that a genuine settlement of the situation is only possible with the participation of representatives of Novorossiya. We will not allow our fate to be decided behind our back..."Now we are demanding independence. We don't trust the Ukrainian leadership and don't consider ourselves part of Ukraine. The guarantee of our security is our own armed forces. We will decide our own fate."Further underlining Kiev's distrust of Moscow, Ukrainian Prime Minister Arseny Yatseniuk said his country needed "practical help" and "momentous decisions" from NATO at an alliance summit next month.
  •  
    Highlighted statements are scattered and buried deep in an article mostly about new accusations against Russia. Coup government President Poroshenko's statement that he is working toward a peace roadmap represents an abrupt departure from that government's stance since it began its invasion of separatist-held territory in eastern Ukraine, that only the unconditional surrender of the separatists could halt the coup government's attack. Lying behind that statement (from other reports) is the fact that the tide of battle has turned sharply; the coup government's mostly-conscript army forces are variously surrounded or retreating as the separatists gain the upper hand. Moreover, nearly all of the coup government attack airplanes and helicopters have been destroyed by separatist MANPAD shoulder-fired ground-to-air missiles.  On coup government Prime Minister Yatseniuk's expressed need for "'practical help' and 'momentous decisions' from NATO at an alliance summit next month," I'd love to be a fly on wall during that meeting if the coup government's military situation continues to deteriorate. The U.S. is the only NATO member that wants further confrontation in Ukraine. Notwithstanding U.S. rhetoric threatening military action against Russia, it's doubtful that any military officers holding the rank needed to attend that NATO meeting would support NATO action against Russia so close to its own backyard. Russia has nukes aplenty, so it comes down to the ability to win a conventional war against Russia in Russia and the Ukraine. Far easier said than done, as both Napoleon Bonaparte and Adolph Hitler learned the hard way. Russia remains the nation with the second post powerful military in the world and would be playing on the home court with the ferocity of the Russian Bear. The U.S. would bring the most powerful force, both augmented and semi-crippled by taking the lead among reluctant NATO nation military forces. All to protect the U.S. dollar's dwindling purchasing powe
‹ Previous 21 - 40 of 136 Next › Last »
Showing 20 items per page