Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged modified

Rss Feed Group items tagged

Paul Merrell

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 0 views

    • Paul Merrell
       
      There goes the neighborhood; the Feds are moving in. 
  • In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret.
  • According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.
  • ...8 more annotations...
  • as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.) It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.
  • The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers.
  • The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program. For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail.
  • one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex. Verizon was also part of the program
  • the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES.
  • The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”
  • But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center,
  • n the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. It’s a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops.
Paul Merrell

The Daily Dot - How a major bank and the U.S. government joined forces to spy on Anonymous - 0 views

  • New details have surfaced regarding the surveillance protocols used by Bank of America to keep tabs on social activists. Last year, Anonymous hacktivists published 14 gigabytes of private emails and spreadsheets which revealed that Bank of America was monitoring social media and other online services used by activists for basic communication. This time however, information about the bank’s recent surveillance activities were obtained legally through a public records request by a single petitioner. The newly published documents reveal a coordinated effort by Bank of America, the Washington State Patrol (WSP), and federal counterterrorism agencies, to monitor activists as they prepared for a public demonstration in Olympia, Wash. Over 230 people originally signed up to attend the “Million Mask March” event, which was organized by the Anonymous movement and took place on November 5, 2013. Although an official report by the WSP described the event as a “peaceful protest” being organized by activists who had made “no threats of violence,” those involved were still monitored by the department before the event took place. Information gathered about the potential protesters was then shared with Bank of America. Furthermore, Bank of America solicited information about activists from various federal agencies, including the Federal Bureau of Investigation.
  • According to Andrew Charles Hendricks, an activist who originally acquired the documents, the emails included the home address of a demonstration organizer. Hendricks claims he redacted the address before publishing the documents online. The relationship between Bank of America and the WSP, as well as their long-term investment in surveillance, is highlighted by an email sent on September 23, 2013. Kim Triplett-Kolerich, an intelligence analyst for Bank of America requested that WSP share any intelligence gathered on activists taking part in the Million Mask March with the bank. She began the email by identifying herself as a former officer and provided her former rank. “From time to time I will see items that I believe will be of use to my friends at WSP—especially during session,” she told the officer. “May Day I will pick your brain for intel and I will give you a lot also,” she wrote.
  • The next week, Triplett-Kolerich emailed the same WSP sergeant again about the march. “Sorry for not getting back to you sooner—hectic weeks lately with foreclosures and this MMM,” Triplett-Kolerich wrote. She then notified the sergeant that Bank of America has been in contact with “the Fusion Center and JTTF” regarding the Anonymous march. JTTF refers to the Joint Terrorism Task Force, which is a group comprised of local law enforcement agencies, the Federal Bureau of Investigation (with whom it shares a website) and the Homeland Security department. The Fusion Center is a state-level counterterrorism agency, which coordinates “national intelligence” between various local law enforcement and public safety departments. In addition, the Fusion Center provides for “the effective communication of locally generated threat-related information to the federal government.”
  • ...2 more annotations...
  • Triplett-Kolerich concluded her email by boasting that the surveillance tactics used by Bank of America to monitor activists online was superior to that of the WSP. “I will most likely find it first as social media trolling is not what WSP does best. Bank of America has a team of 20 people and that’s all they do all day and then pass it to us around the country!!!” On October 24, an email was sent by a sergeant at the WSP’s Special Operations Division to an executive aide at the Thurston County Sheriff’s Office. The sergeant notified the office that a large number of arrests may take place during the Million Mask March, which could impact the jail. Attached to the letter was a message written by an Anonymous activist, and a link to its Facebook event page where the names of those planning to attend the march could be seen.
  • Unbeknownst to the crowd, the supervisor of a local transit company had dropped off an Olympia city bus nearby at the request of the WSP. According to recently published emails, it was parked on the west side of an administration building close to the demonstration, just in case they needed to move in and haul a large group of disorderly protesters off to jail—but they didn’t. The Daily Dot reached out to Triplett-Kolerich and three Bank of America media relations contacts requesting a comment for this article, but received no response. 
  •  
    More evidence of the cozy relationship between the banksters and the "anti-terrorism" folk in the U.S. Of particular interest BofA has a 20-person unit that spends their days trolling social media for intelligence.
Paul Merrell

Amend the Federal Reserve: We Need a Central Bank that Serves Main Street | Global Rese... - 0 views

  • December 23rd marks the 100th anniversary of the Federal Reserve. Dissatisfaction with its track record has prompted calls to audit the Fed and end the Fed.  At the least, Congress needs to amend the Fed, modifying the Federal Reserve Act to give the central bank the tools necessary to carry out its mandates. The Federal Reserve is the only central bank with a dual mandate. It is charged not only with maintaining low, stable inflation but with promoting maximum sustainable employment. Yet unemployment remains stubbornly high, despite four years of radical tinkering with interest rates and quantitative easing (creating money on the Fed’s books). After pushing interest rates as low as they can go, the Fed has admitted that it has run out of tools. At an IMF conference on November 8, 2013, former Treasury Secretary Larry Summers suggested that since near-zero interest rates were not adequately promoting people to borrow and spend, it might now be necessary to set interest at below zero. This idea was lauded and expanded upon by other ivory-tower inside-the-box thinkers, including Paul Krugman. Negative interest would mean that banks would charge the depositor for holding his deposits rather than paying interest on them. Runs on the banks would no doubt follow, but the pundits have a solution for that: move to a cashless society, in which all money would be electronic. “This would make it impossible to hoard cash outside the bank,” wrote Danny Vinik in Business Insider, “allowing the Fed to cut interest rates to below zero, spurring people to spend more.”
  • Business Week quotes Douglas Holtz-Eakin, a former director of the Congressional Budget Office: “We’ve had four years of extraordinarily loose monetary policy without satisfactory results, and the only thing they come up with is we need more?” Paul Craig Roberts, former Assistant Secretary of the Treasury, calls the idea “harebrained.” He is equally skeptical of quantitative easing, the Fed’s other tool for stimulating the economy. Roberts points to Andrew Huszar’s explosive November 11th Wall Street Journal article titled “Confessions of a Quantitative Easer,” in which Huszar says that QE was always intended to serve Wall Street, not Main Street.  Huszar’s assignment at the Fed was to manage the purchase of $1.25 trillion in mortgages with dollars created on a computer screen. He says he resigned when he realized that the real purpose of the policy was to drive up the prices of the banks’ holdings of debt instruments, to provide the banks with trillions of dollars at zero cost with which to lend and speculate, and to provide the banks with “fat commissions from brokering most of the Fed’s QE transactions.”
  • Bernanke created debt-free money and bought government debt with it, returning the interest to the Treasury. The result was interest-free credit, a good deal for the government. But the problem, says Lounsbury, is that: The helicopters dropped all the money into a hole in the ground (excess reserve accounts) and very little made its way into the economy.  It was essentially a rearrangement of the balance sheets of the creditor nation with little impact on the debtor nation. . . . The fatal flaw of QE is that it delivers money to the accounts of the creditors and does nothing for the accounts of the debtors. Bad debts remain unserviced and the debt crisis continues.
  • ...2 more annotations...
  • Bernanke delivered the money to the creditors because that was all the Federal Reserve Act allowed. If the Fed is to fulfill its mandate, it clearly needs more tools; and that means amending the Act.  Harvard professor Ken Rogoff, who spoke at the November 2013 IMF conference before Larry Summers, suggested several possibilities; and one was to broaden access to the central bank, allowing anyone to have an ATM at the Fed. Rajiv Sethi, Barnard/Columbia Professor of Economics, expanded on this idea in a blog titled “The Payments System and Monetary Transmission.” He suggested making the Federal Reserve the repository for all deposit banking. This would make deposit insurance unnecessary; it would eliminate the need to impose higher capital requirements; and it would allow the Fed to implement monetary policy by targeting debtor rather than creditor balance sheets. Instead of returning its profits to the Treasury, the Fed could do a helicopter drop directly into consumer bank accounts, stimulating demand in the consumer economy. John Lounsbury expanded further on these ideas. He wrote in Econintersect that they would open a pathway for investment banking and depository banking to be separated from each other, analogous to that under Glass-Steagall. Banks would no longer be too big to fail, since they could fail without destroying the general payment system of the economy. Lounsbury said the central bank could operate as a true public bank and repository for all federal banking transactions, and it could operate in the mode of a postal savings system for the general populace.
  • The Federal Reserve Act was drafted by bankers to create a banker’s bank that would serve their interests. It is their own private club, and its legal structure keeps all non-members out.  A century after the Fed’s creation, a sober look at its history leads to the conclusion that it is a privately controlled institution whose corporate owners use it to direct our entire economy for their own ends, without democratic influence or accountability.  Substantial changes are needed to transform the Fed, and these will only come with massive public pressure. Congress has the power to amend the Fed – just as it did in 1934, 1958 and 2010. For the central bank to satisfy its mandate to promote full employment and to become an institution that serves all the people, not just the 1%, the Fed needs fundamental reform.
  •  
    In my view, the Fed is beyond salvage. It needs abolition, not a new role. The Constitution grants Congress the power to mint and coin money, not a group of rent-seeking banksters. 
Paul Merrell

NYT Retracts Russian-Photo Scoop | Consortiumnews - 0 views

  • Two days after the New York Times led its editions with a one-sided article about photos supposedly proving that Russian special forces were behind the popular uprisings in eastern Ukraine, the Times published what you might call a modified, limited retraction.
Paul Merrell

Kiev secretly received data from MH17 crash investigators - Ukrainian hacktivists - RT ... - 0 views

  • Ukrainian CyberBerkut hacktivists claim that they have penetrated the internal network of Ukraine’s Defense Ministry and found proof that Kiev is getting secret data from MH17 crash investigators, including information which implies its involvement. A document, posted on the website cyber-berkut.net, and allegedly downloaded from Ukraine’s Defense Ministry network, dates back to August 7 and appears to be signed by Colonel Igor Zorin, the chief of Ukraine’s air defense forces. It is a report which maintains that a fragment of a projectile found together with the debris of the crashed flight MH17 is in fact a damage agent of a 9M38 surface-to-air guided missile belonging to the mobile air defense complex Buk or Buk M1. Photo scans allegedly depicting the fragment in question have been also posted. The document acknowledged that a specific rectangular shape of the fragment pointed out that it could belong to a 9N314 warhead of the 9M38 anti-aircraft missile. It was suggested that the final conclusion could be made after analyzing the original fragments depicted in the photographs.
  • Buk and Buk M1 missile systems were developed by the Soviet Union and entered into service in the late 1970s and in early 1980s. Earlier this week, a source in Russia’s Defense Ministry told RIA Novosti news agency that after the fall of the Soviet Union, a number of such systems remained in Ukraine and today Kiev possesses no less than 70 Buk M1 systems. According to open sources, the Russian army operates only Buk-M1-2 and Buk-M2 missile systems – the latest modified versions developed after Ukraine became independent in 1991. The source also accused Valentin Nalivaichenko, head of the Security Service of Ukraine (SBU), of inadvertently leaking that the MH17 Boeing-777-200 crash in July was caused by an outdated missile that only Ukrainian army still operates.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Transatlantic Trade and Investment Partnership (TTIP) Negotiations Fall Apart Following... - 0 views

  • Back in January the EU Commission published their response to the consultation on TTIP and it was found that 97% of the 150,000 responses opposed the trade deal. These respondents represented the general public. The biggest petition in the EU’s history was then presented that contained the signatures of 2 million citizens (now nearly 3 million) opposed to TTIP. Both were rejected as were proposals even for a simple hearing of the European Citizens Initiative. Then in April this year, thousands of protestors took to the streets of cities all over Europe as unelected officials of the EU Commission continue to ignore the concerns of its citizens. In June, fellow MEPs from many political parties who are also opposed to TTIP joined Ukip in standing, shouting, booing and clapping to show their dissatisfaction with proceedings. MEPs were due to set out their first formal position on TTIP since negotiations started two years ago and the meeting descended into chaos (video). The meeting was then stopped by the commissioners. Meanwhile David Cameron has persistently attempted to call out those working to derail the deal. Cameron has accused critics of inventing false scare stories whilst urging business chiefs to help make the case to overcome sustained attacks from left-wing opponents and warned Britain would “rue the day if we miss this opportunity” to open up transatlantic markets.
  • Cameron, who (increasingly) seldom listens to the general public or elected members of parliament representing the electorate will no doubt use all his powers to get this deal though to redeem himself after being called incompetent by his own military generals and by the Obama administration over Syria. In sharp comparison, both Paris and Berlin want the Investor State Dispute Settlement mechanism (ISDS) of TTIP removed from the transatlantic trade treaty currently being negotiated with Washington. This is a game changer. Matthias Fekl, the French Secretary of State for Foreign Trade, told EurActiv France that he would “never allow private tribunals in the pay of multinational companies to dictate the policies of sovereign states, particularly in certain domains like health and the environment”. That was back in January. Nine months later and France has now reinforced that message and gone one big step forward. In an interview with Sud-Ouest, Matthias Fekl threatened to “call a complete halt” to the TTIP negotiations if things do not change. EurActiv France reports. America has shown no desire to change any of the major issues that have been challenged. Fekl told the French newspaper that he believes the “total lack of transparency” in the Transatlantic Trade and Investment Partnership (TTIP) negotiations poses a “democratic problem”.
  • Fekl, the Minister of State for Foreign Trade called on the United States to show “reciprocity” in the negotiations. “American members of parliament have access to a much higher number of documents than we do in Europe,” he said. The German people are now taking a stand and now it is being reported in the USA that sentiment is going against the deal – “It is entirely possible that the U.S. could seek to conclude the deal in the next few years only to find that European governments are unwilling to risk the ire of their voters”. Matthias Fekl, explained that, ever since the negotiations began in 2013, “These negotiations have been and are being conducted in a total lack of transparency,” and that France has, as of yet, received “no serious offer from the Americans.” The reasons for this stunning public rejection had probably already been accurately listed more than a year ago. Jean Arthuis, a member of the European Parliament, and formerly France’s Minister of Economy and Finance, headlined in Le Figaro, on 10 April 2014, “7 good reasons to oppose the transatlantic treaty”. There is no indication that the situation has changed since then, as regards the basic demands that President Obama is making. Arthuis said at that time, that he was opposed to;
  • ...3 more annotations...
  • Private arbitration of disputes between States and businesses. Such a procedure is strictly contrary to the idea that I have of the      sovereignty of States. … Any questioning of the European system of appellations of origin. According to the US proposal, there would be a non-binding register, and only for wines and spirits. Such a reform would kill many European local products, whose value is based on their certified origin. Signing of an agreement with a power that legalizes widespread and systematic spying on my fellow European citizens and European businesses. As long as the agreement does not protect the personal data of European and US citizens, it cannot be signed. Allowing the United States proposal of a transatlantic common financial space, who adamantly refuse a common regulation of finance, and they refuse to abolish systematic discrimination by the US financial markets against European financial services. The questioning of European health protections. We do not want our animals treated with growth hormones nor products derived from GMOs, or chemical decontamination of meat, or of genetically modified seeds or non-therapeutic antibiotics in animal feed.
  • The signing of an agreement if it does not include the end of the US monetary dumping. Since the abolition of the gold convertibility of the dollar and the transition to the system of floating exchange rates, the dollar is both American national currency and the main unit for exchange reserves in the world. The Federal Reserve then continually practices monetary dumping, by influencing the amount of dollars available to facilitate exports from the United States. As things now stand, America’s monetary weapon has the same effect as customs duties against every other nation. [And he will not sign unless it’s removed.] Allow the emerging digital services in Europe to be swept up by US giants such as Google, Amazon or Netflix. They’re giant absolute masters in tax optimization, which make Europe a “digital colony.”
  • France is now considering “all options including an outright termination of negotiations” says France’s Trade Minister.
Paul Merrell

Doctors Without Borders airstrike: US alters story for fourth time in four days | World... - 0 views

  • US special operations forces – not their Afghan allies – called in the deadly airstrike on the Doctors Without Borders hospital in Kunduz, the US commander has conceded. Shortly before General John Campbell, the commander of the US and Nato war in Afghanistan, testified to a Senate panel, the president of Doctors Without Borders – also known as Médecins sans Frontières (MSF) – said the US and Afghanistan had made an “admission of a war crime”. Shifting the US account of the Saturday morning airstrike for the fourth time in as many days, Campbell reiterated that Afghan forces had requested US air cover after being engaged in a “tenacious fight” to retake the northern city of Kunduz from the Taliban. But, modifying the account he gave at a press conference on Monday, Campbell said those Afghan forces had not directly communicated with the US pilots of an AC-130 gunship overhead. “Even though the Afghans request that support, it still has to go through a rigorous US procedure to enable fires to go on the ground. We had a special operations unit that was in close vicinity that was talking to the aircraft that delivered those fires,” Campbell told the Senate armed services committee on Tuesday morning.
Paul Merrell

The Western Alliance Is Crumbling: EU Is Abandoning U.S. on Overthrowing Assad | Global... - 0 views

  • Europe is being overrun by refugees from American bombing campaigns in Libya and Syria, which created a failed state in Libya, and which threaten to do the same in Syria. Europe is thus being forced to separate itself from endorsing the U.S. bombing campaign that focuses against the Syrian government forces of the secular Shiite Syrian President Bashar al-Assad, instead of against his fundamentalist Sunni Islamic opponents, the jihadist groups (all of which are Sunni), such as ISIS, and Al Qaeda in Syria (al-Nusra).
  • Russia announced on October 2nd that their bombing campaign against America’s allies in Syria — ISIS and Al Nusra (the latter being Al Qaeda in Syria) — will intensify and will last “three or four months.” U.S. President Barack Obama is insisting upon excluding Russia from any peace talks on Syria; the U.S. will not move forward with peace talks unless Syria’s President Bashar al-Assad first steps down. But Russia is the only serious military power against the jihadists who are trying to defeat Assad, and Russia is now committing itself also to providing Lebanon with weapons against the jihadists, who are America’s allies in Lebanon too.
  • That’s hardly the only ‘legacy’ issue for Obama — his war against Russia, via overthrowing Gaddafi, then Yanukovych, and his still trying to overthrow Assad — which is now forcing the break-up of the Western Alliance, over the resulting refugee-crisis. An even bigger such conflict within the Alliance concerns Obama’s proposed treaty with European states, the TTIP, which would give international corporations rights to sue national governments in non-appealable global private arbitration panels, the dictates from which will stand above any member-nation’s laws. Elected government officials will have no control over them. This supra-national mega-corporate effort by Obama is also part of his similar effort in his proposed TPP treaty with Asian nations, both of which are additionally aimed to isolate from international trade not just Russia, but China, so as to leave America’s large international corporations controlling virtually the entire world. As things now stand regarding these ‘trade’ deals, Obama will either need to eliminate some of his demands, or else the European Commission won’t be able to muster enough of its members to support Obama’s proposed treaty with the EU, the TTIP (Transatlantic Trade and Investment Partnership). Also, some key European nations might reject Obama’s proposed treaty on regulations regarding financial and other services: TISA (Trade In Services Agreement). All three of Obama’s proposed ‘trade’ deals, including the TPP (Trans-Pacific Partnership) between the U.S. and Asian countries, are the actual culmination of Obama’s Presidency, and they’re all about far more than just trade and economics. The main proposed deal with Europe might now be dead.
  • ...4 more annotations...
  • Thirdly, I am opposed to the signing of an agreement with a power that legalizes widespread and systematic spying on my fellow European citizens and European businesses. Edward Snowden’s revelations are instructive in this regard. As long as the agreement does not protect the personal data of European and US citizens, it cannot be signed. Fourth, the United States proposes a transatlantic common financial space, but they adamantly refuse a common regulation of finance, and they refuse to abolish systematic discrimination by the US financial markets against European financial services. They want to have their cake and eat it too: I object to the idea of a common area without common rules, and I reject commercial discrimination. Fifth, I object to the questioning of European health protections. Washington must understand once and for all that notwithstanding its insistence, we do not want our plates or animals treated with growth hormones nor products derived from GMOs, or chemical decontamination of meat, or of genetically modified seeds or non-therapeutic antibiotics in animal feed. Sixth, I object to the signing of an agreement if it does not include the end of the US monetary dumping. Since the abolition of the gold convertibility of the dollar and the transition to the system of floating exchange rates, the dollar is both American national currency and the main unit for exchange reserves in the world. The Federal Reserve then continually practices monetary dumping, by influencing the amount of dollars available to facilitate exports from the United States. China proposes to eliminate this unfair advantage by making “special drawing rights” of the IMF the new global reference currency. But as things now stand, America’s monetary weapon has the same effect as customs duties against every other nation. [And he will not sign unless it’s removed.]
  • On September 27th, France’s newspaper SouthWest featured an exclusive interview with Matthias Fekl, France’s Secretary of State for Foreign Trade, in which he said that “France is considering all options, including outright termination of negotiations” on the TTIP. He explained that, ever since the negotiations began in 2013, “These negotiations have been and are being conducted in a total lack of transparency,” and that France has, as of yet, received “no serious offer from the Americans.” The reasons for this stunning public rejection had probably already been accurately listed more than a year ago. After all, France has, throughout all of the negotiations, received “no serious offer from the Americans”; not now, and not back at the start of the negotiations in 2013. The U.S. has been steadfast. Jean Arthuis, a member of the European Parliament, and formerly France’s Minister of Economy and Finance, headlined in Le Figaro, on 10 April 2014, “7 good reasons to oppose the transatlantic treaty”. There is no indication that the situation has changed since then, as regards the basic demands that President Obama is making. Arthuis said at that time: First, I am opposed to private arbitration of disputes between States and businesses. [It would place corporate arbitrators above any nation’s laws and enable them to make unappealable decisions whenever a corporation sues a nation for alleged damages for alleged violations of its rights by that nation of the trade-treaty.] Such a procedure is strictly contrary to the idea that I have of the sovereignty of States. … Secondly, I am opposed to any questioning of the European system of appellations of origin. Tomorrow, according to the US proposal, there would be a non-binding register, and only for wines and spirits. Such a reform would kill many European local products, whose value is based on their certified origin.
  • Seventh, beyond the audiovisual sector alone, which is the current standard of government that serves as a loincloth to its cowardice on all other European interests in these negotiations, I want all the cultural exceptions prohibited. In particular, it is unacceptable to allow the emerging digital services in Europe to be swept up by US giants such as Google, Amazon or Netflix. They’re giant absolute masters in tax optimization, which make Europe a “digital colony.” President Obama’s negotiator is his close personal friend, Michael Froman, a man who is even trying to force Europe to reduce its fuel standards against global warming and whose back-room actions run exactly contrary to Obama’s public rhetoric. Froman and Obama have been buddies since they worked together as editors on Harvard Law Review. He knows what Obama’s real goals are. Also: “Froman introduced Mr. Obama to Robert E. Rubin, the former Treasury secretary,” who had brought into the Clinton Administration Timothy Geithner and Larry Summers, and had championed (along with them) the ending of the regulations on banks that the previous Democratic President, Franklin Delano Roosevelt, had put into place. (President Bill Clinton signed that legislation just as he left office, and this enabled the long process to occur with MBS securities and with financial derivatives, which culminated with the 2008 crash, and this same legislation also enabled the mega-banks to get bailed out by U.S. taxpayers for their crash — on exactly the basis that FDR had outlawed.)
  • Froman has always been a pro-mega-corporate, pro-mega-bank champion, who favors only regulations which benefit America’s super-rich, no regulations which benefit the public. Froman’s introducing the Wall Street king Robert Rubin to the then-Senator Obama was crucial to Obama’s becoming enabled to win the U.S. Presidency; Robert Rubin’s contacts among the super-rich were essential in order for that — Obama’s getting a real chance to win the Presidency — to happen. It enabled Obama to compete effectively against Hillary Clinton. Otherwise, he wouldn’t have been able to do that. His winning Robert Rubin’s support was crucial to his becoming President. The chances, that President Obama will now be able to get the support from any entity but the U.S. Congress for his proposed TTIP treaty with Europe, are reducing by the day. Europe seems to be less corrupt than is the United States, after all. The only independent economic analysis that has been done of the proposed TTIP finds that the only beneficiaries from it will be large international corporations, especially ones that are based in the United States. Workers, consumers, and everybody else, will lose from it, if it passes into law. Apparently, enough European officials care about that, so as to be able to block the deal. Or else: Obama will cede on all seven of the grounds for Europe’s saying no. At this late date, that seems extremely unlikely.
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Paul Merrell

U.S. accuses China of cyber spying on American companies | Reuters - 0 views

  • The United States on Monday charged five Chinese military officers and accused them of hacking into American nuclear, metal and solar companies to steal trade secrets, ratcheting up tensions between the two world powers over cyber espionage. China immediately denied the charges, saying in a strongly worded Foreign Ministry statement the U.S. grand jury indictment was "made up" and would damage trust between the two nations.Officials in Washington have argued for years that cyber espionage is a top national security concern. The indictment was the first criminal hacking charge that the United States has filed against specific foreign officials, and follows a steady increase in public criticism and private confrontation, including at a summit last year between U.S. President Barack Obama and Chinese President Xi Jinping.
  • Federal prosecutors said the suspects targeted companies including Alcoa Inc, Allegheny Technologies Inc, United States Steel Corp, Toshiba Corp unit Westinghouse Electric Co, the U.S. subsidiaries of SolarWorld AG, and a steel workers' union.
  • According to the indictment, Chinese state-owned companies "hired" Unit 61398 of the People's Liberation Army "to provide information technology services" including assembling a database of corporate intelligence. The Chinese companies were not named.The Shanghai-based Unit 61398 was identified last year by cybersecurity firm Mandiant as the source of a large number of espionage operations. All five defendants worked with 61398, according to the indictment.
  • ...4 more annotations...
  • U.S. officials have maintained that they do not steal secrets to give an advantage to U.S. companies, but in China, Lewis said, the line between military and business prowess is unclear.Unit 61398 has hundreds of active spies and is just one of dozens of such bodies in China, said Jen Weedon, an analyst at Mandiant, now owned by global network security company FireEye Inc. She said the group is not among the most sophisticated.
  • Washington announced the charges as new claims emerged last week about the scope of overseas spying by the United States. Documents leaked by Snowden showed the agency intercepted and modified equipment made by Cisco Systems Inc that was headed overseas.Cisco responded by asking Obama to curtail U.S. surveillance programs, underscoring the vulnerability of multinationals to a whipsaw of competing government interests.
  • Skeptics said U.S. authorities would not be able to arrest those indicted because Beijing would not hand them over. Still, the move would prevent the individuals from traveling to the United States or other countries that have an extradition agreement with the United States.
  • In an indictment filed in the Western District of Pennsylvania, prosecutors said the officers hacked into computers starting in 2006, often by infecting machines with tainted "spear phishing" emails to employees that purport to be from colleagues.Prosecutors alleged that one hacker, for example, stole cost and pricing information in 2012 from an Oregon-based solar panel production unit of SolarWorld. The company was losing market share at the time to Chinese competitors who were systematically pricing exports below production costs, according to the indictment.Another officer is accused of stealing technical and design specifications about pipes for nuclear plants from Westinghouse Electric as the company was negotiating with a Chinese company to build four power plants in China, prosecutors said.
  •  
    Yesterday I watched the DoJ press conference announcing charges. This article does not capture its spirit. AG Ben Holder faced stiff questions directed by attending reporters. One of the first questions went something like this: "Is it true that the U.S. has extradition treaty with China and these defendants will never be actually prosecuted, and if so, what's the real reason for the charges?" Others raised the hypocrisy of the U.S. move in light of what the NSA has been doing. Holder ducked the tough questions  The press conference was a farce and too many of the reporters realized it. Recall that Obama was days away from traveling to China with the announced purpose of chastising its leader for waging cyberesionage against the U.S. when the first Edward Snowden pulled the moral high ground from beneath Obama's feet. This stunt looks more like it was designed to lesson the government pain by promoting Obama's "everyone does it" meme.   Also not mentioned in this article, at the press confernence the five defendants were identified as generals in the Chinese Army. Might we see China respond by charging a few former and present NSA generals with cyber-espionage? Fun and games on the Beltway. 
Paul Merrell

Obama's Flawed Vision of the World - The Daily Beast - 0 views

  • At West Point, Obama takes the U.S. out of the Afghan frying pan only to leap back into the Mideast fire, where a crucial shift in Syria policy may be in store.
  • Obama is now moving to provide moderate rebels in Syria with overt training from U.S. special operation forces in addition to the covert aid presently fed by the CIA. That move will make sense only if the White House formulates a viable strategy for Syria. Right now, its strategy of upending President Bashar Assad makes no sense. If he’s not winning, he’s certainly not losing. And no amount of projected aid to the moderate rebels will change that unfortunate but unarguable fact.
  • Thus, Obama either will have to change his means and provide massive aid to these rebels, which he will not do, or he will have to change his goal of eliminating Assad. This may well surprise experts, but senior administration officials tell me that Obama has been modifying his objective and is now prepared to work with Assad, to some degree, along with the moderate rebels, against what the White House finally has come to see as the real and major threat—the jihadists. These senior officials further say that they expect support in this new policy from previous opponents, i.e. from Saudi Arabia and other Gulf states. Let us hope that this is true.
  •  
    By the former president of the Foreign Policy Council. Are we dizzy yet?  He says that Obama has decided to work with Syrian President Assad to root out the real threat, the jihadists. Might it not have saved tens of thousands of Syrian lives to have refused in the first place to assist the Sauds and Qatar in arming the same jihadists and sending them as an invading force to Syria? And yes, it's true; the Sauds have also done a 180-degree turn here. 
Paul Merrell

The Real Villains of the Bergdahl Tale | Consortiumnews - 0 views

  • The right-wing media is denouncing Sgt. Bowe Bergdahl as a “deserter” who wasn’t worth ransoming from the Taliban, but the real villains are the architects of the disastrous Iraq and Afghan wars who frivolously put the many Bergdahls in harm’s way, writes ex-CIA analyst Ray McGovern. By Ray McGovern For me, the Sgt. Bowe Bergdahl affair brings back angry memories of how, in 2009, President Barack Obama caved in to be-medaled and be-ribboned generals like David Petraeus and ordered a modified-limited-hangout-type “surge” of 33,000 troops into Afghanistan. Consequential cowardice at work – trading lives for political advantage – as bad as it gets. Bergdahl was quick to discern that he and his comrades were pawns of a policy doing far more harm than good in terms of helping the Afghans. Emailing from Afghanistan in late June 2009, Bergdahl pointed out the main problem in these words: “In the US army you are cut down for being honest… but if you are a conceited brown nosing shit-bag you will be allowed to do what ever you want.”
  • But how far up the line did this behavior go? Did it include Petraeus, described by CENTCOM commander Admiral William “Fox” Fallon as “an ass-kissing little chickenshit” after a meeting at which Petraeus fawned over Fallon, then his superior? (Why is it that the Fox Fallons are the ones who get sacked? Although Petraeus’s charmed government career was finally done in by a sex scandal in December 2012.) Do Fallon’s epithets toward Petraeus apply equally to commander-in-chief Obama who ordered the “surge” into Afghanistan, which – like its first still-born twin “surge” in Iraq two years earlier – predictably did little more than get a lot of folks killed and buy some time for the architects of the two misguided adventures to get some distance between their original decisions and the ultimate failures.
  •  
    Former CIA analyst Ray McGovern has some very harsh words for Barack Obama and some good advice as well. I was a little slowed-down by McGovern's use of the term "right wing" to describe television networks; dumping on Sgt. Bergdahl certainly wasn't confined to Fox News; it's happening throughout mainstream media.  Then I realized that he was using the term in the sense employed nearly everywhere but in U.S. mainstream media land; "right-wing" denotes a position that supports maximal government power and minimizes the citizenry's rights. "Left-wing" takes the opposite tack. And within those senses, McGovern is absolutely correct to brand all of mainstream media as right-wing. They're virtually all pro-oligarchists peddling American exceptionalism fascism under an imperial presidency as being good for all Americans.      
Paul Merrell

Tech giants oppose NSA reform bill for timid safeguards against spying - RT USA - 0 views

  • Ahead of Thursday’s US House vote on a bill sold as reform of a major US government spying program, top technology firms like Google have joined civil liberties and privacy groups in calling the legislation inadequate in fighting mass surveillance. The Reform Government Surveillance coalition – AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo – offered a statement on Wednesday denouncing the USA Freedom Act as a weak attempt at ending the government’s bulk storage of domestic phone metadata.
  • The USA Freedom Act would take the mass storage of phone records away from the government. Instead, telecommunications companies would be required to store the data. The bill would require the National Security Agency to get approval to search the telecoms’ cache of records from the often-compliant Foreign Intelligence Surveillance Court. Last-minute changes to the bill rankled privacy groups on Tuesday, leading many of them to decry the backdoor dealings as responsible for a “weakened,” “watered down” bill compared to what had previously passed the House Judiciary and Intelligence Committees earlier this month. On Wednesday, the tech coalition echoed these concerns, calling the amended legislation a move “in the wrong direction” of needed reform regarding mass surveillance. "The latest draft opens up an unacceptable loophole that could enable the bulk collection of Internet users' data," the coalition said. "While it makes important progress, we cannot support this bill as currently drafted and urge Congress to close this loophole to ensure meaningful reform." The loophole referred to by the coalition pertains to the USA Freedom Act’s definition for how and when government officials can search collected phone metadata records.
  • The new language – approved by House leaders and the Obama administration in recent days – modifies the prohibitions on bulk collection of domestic data to allow government officials to search for Americans’ phone records using a “a discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the Government to limit the scope of the information or tangible things sought.” This revised standard for the USA Freedom Act’s reform of surveillance is too broad and leaves privacy protections at risk, civil liberties groups said on Tuesday. In addition, the legislation’s new language also weakens the bill’s transparency provisions which outlined how much technology companies can disclose to customers about the extent of government requests of user data.
  • ...2 more annotations...
  • In addition to the tech coalition’s protest, the Computer & Communications Industry Association – whose members include Pandora, Samsung, Sprint, and others – said Wednesday it would “not support consideration or passage of the USA Freedom Act in its current form." The Obama administration publicly threw its support behind the amended USA Freedom Act, saying the bill would “provide the public greater confidence in our programs and the checks and balances in the system.” “The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the nation, while further ensuring that individuals’ privacy is appropriately protected when these authorities are employed,” the White House included.
  • Lawmakers opposed to the secretive negotiations attempted on Tuesday to counter the weakened surveillance reform bill by offering an amendment to the National Defense Authorization Act (NDAA) that is “materially identical” to the version of the USA Freedom Act that was advanced by the House Judiciary and Intelligence Committees earlier this month. Yet the amendment was denied by the House Rules Committee late Tuesday. The House is now scheduled to vote on the USA Freedom Act on Thursday under closed rules, which forbids adding amendments before the final vote.
  •  
    The Obama Administration and NSA supporters in the House of Representatives resort to a successful last-minute ambush attack to eviscerate the modest reforms proposed in the USA Freedom Act. 
Paul Merrell

How a false witness helped the CIA make a case for torture | Al Jazeera America - 0 views

  • Buried amid details of “rectal rehydration” and waterboarding that dominated the headlines over last week’s Senate Intelligence Committee findings was an alarming detail: Both the committee’s summary report and its rebuttal by the CIA admit that a source whose claims were central to the July 2004 resumption of the torture program  — and, almost certainly, to authorizing the Internet dragnet collecting massive amounts of Americans’ email metadata — fabricated claims about an election year plot. Both the torture program and President Bush's warrantless wiretap program, Stellar Wind, were partly halted from March through June of 2004. That March, Assistant Attorney General Jack Goldsmith prepared to withdraw Pentagon authorization for torture, amid growing concern following the publication of pictures of detainee abuse at Iraq's Abu Ghraib, and a May 2004 CIA inspector general report criticizing a number of aspects of the Agency's interrogation program. On June 4, 2004, CIA Director George Tenet suspended the use of torture techniques.
  • During the same period, the DOJ lawyers who pushed to stop torture were also persuading President George W. Bush to halt aspects of Stellar Wind, a program that conducted warrantless wiretapping of Americans’ communications inside the U.S., on top of the Internet metadata. After a dramatic confrontation in the hospital room of Attorney General John Ashcroft on March 10, 2004, acting Attorney General Jim Comey and Goldsmith informed Bush there was no legal basis for parts of the program. Ultimately, Bush agreed to modify aspects of it, in part by halting the collection of Internet metadata. But even as Bush officials suspended that part of the program on March 26, they quickly set about finding legal cover for its resumption. One way they did so was by pointing to imminent threats — such as a planned election-season attack — in the United States.
  • The CIA in March 2004 received reporting from a source the torture report calls "Asset Y,” who said a known Al-Qaeda associate in Pakistan, Janat Gul — whom CIA at the time believed was a key facilitator — had set up a meeting between Asset Y and Al-Qaeda's finance chief, and was helping plan attacks inside the United States timed to coincide with the November 2004 elections. According to the report, CIA officers immediately expressed doubts about the veracity of the information they’d been given by Asset Y. A senior CIA officer called the report "vague" and "worthless in terms of actionable intelligence." He noted that Al Qaeda had already issued a statement “emphasizing a lack of desire to strike before the U.S. election” and suggested that since Al-Qaeda was aware that “threat reporting causes panic in Washington” and inevitably results in leaks, planting a false claim of an election season attack would be a good way for the network to test whether Asset Y was working for its enemies. Another officer, assigned to the group hunting Osama bin Laden, also expressed doubts. In its rebuttal to the Senate report, the CIA argues the agency was right to take seriously Asset Y’s reporting , in spite of those initial doubts. The CIA wrote numerous reports about the claim “even as we worked to resolve the inconsistencies.” Reports from detainee Hassan Ghul, who was captured in January 2004, supported the possibility that a cell of Al-Qaeda members in Pakistan’s tribal areas might be planning a plot of which he was unaware. And the CIA corroborated other parts of Asset Y's reporting.
  • ...5 more annotations...
  • Still, the CIA had one further reason for doubting claims that Gul was at the center of an Al-Qaeda election-year plot. Ghu told the CIA about an attempt by Gul, in the fall of 2003, to sell anti-aircraft missiles to Al-Qaeda; the Qaeda figure in Ghul’s story didn't even want to work with Gul. And Ghul later learned Gul was probably lying about his ability to acquire the missiles.
  • Nevertheless, the CIA took seriously Asset Y’s claim that Gul was involved in an election plot and moved quickly to gain custody of him after his arrest by Pakistan in June 2004. Even before CIA rendered Gul to its custody, Tenet started lobbying to get torture techniques reapproved for his interrogation. On June 29, Tenet wrote National Security Adviser Condoleezza Rice seeking approval to once again use some of the techniques whose use he suspended less than four weeks earlier, in the hope of gathering information on the election season plot. "Given the magnitude of the danger posed by the pre-election plot and Gul's almost certain knowledge of any intelligence about that plot” Tenet wrote, relying on Asset Y's claims, “I request the fastest possible resolution of the above issues." On July 20, according to the report, top administration officials gave CIA verbal approval to get back into the torture business. Ashcroft stated that most previously approved interrogation techniques would not violate U.S. law on July 22 (though not waterboarding). And by the end of July, CIA started coaxing DOJ to approve other techniques — such as slapping someone in the stomach or hosing them down with cold water or limiting their food — which had already been used by the CIA but never officially approved by DOJ.
  • At the same time, the government was also using the ostensible election-season plot, among others, to persuade the Foreign Intelligence Surveillance Court (FISC) – the secret court that approves domestic spying on Americans – to authorize the Internet dragnet. After Bush halted the Internet dragnet on March 26, his aides began working with FISC presiding judge Colleen Kollar-Kotelly to find a way to use FISA authority -- normally been used to access records for a single phone or Internet account -- to collect Internet metadata in bulk. They provided a series of briefings, including one attended by Terrorist Threat Integration Center head John Brennan and CIA Director George Tenet, to explain the threat. In addition, they provided what – under Stellar Wind – analysts called a “scary memo,” summarizing all the threats facing the country to underscore the urgency of the program. Tenet's declaration included as an appendix to an application submitted in the days before July 14, 2004, laid out the threats CIA and others were fighting that summer.
  • Judge Kollar-Kotelly invoked Tenet's material in a redacted section of her opinion authorizing the phone dragnet, pointing to it as a key reason to permit collection of what she called “enormous” amounts of data from innocent Americans.
  • Soon after the reauthorization of the torture and the Internet dragnet, the CIA realized ASSET Y's story wasn't true. By September, an officer involved in Janat Gul's interrogation observed, “we lack credible information that ties him to pre-election threat information or direct operational planning against the United States, at home or abroad.” In October, CIA reassessed ASSET Y, and found him to be deceptive. When pressured, ASSET Y admitted had had made up the story of a meeting set up by Gul. ASSET Y blamed his CIA handler for pressuring him for intelligence, leading him to lie about the meeting. By 2005, CIA had concluded that ASSET Y was a fabricator, and Janat Gul was a “rather poorly educated village man [who is] quite lazy [who] was looking to make some easy money for little work and he was easily persuaded to move people and run errands for folks on our target list” (though the Agency wasn't always forthright about the judgment to DOJ). The torture program, which was resumed in part because of a perceived urgency of extracting information from Gul on a plot that didn't exist, continued for several more years. The Internet dragnet continued under FISC authorization, on and off, until December 2011. And several other still active NSA programs, including the phone dragnet, relied on Kollar-Kotelly's earlier authorization as precedents – the case for which had also been derived, in part, from one long discredited fabricator.
Paul Merrell

Yahoo to begin offering PGP encryption support in Yahoo Mail service | Ars Technica - 0 views

  • Yahoo Chief Information Security Officer Alex Stamos announced today at Black Hat 2014 that starting in the fall of this year, the purple-hued company will begin giving users the option of seamlessly wrapping their e-mails in PGP encryption. According to Kashmir Hill at Forbes, the encryption capability will be offered through a modified version of the same End-to-End browser plug-in that Google uses for PGP in Gmail. The announcement was tweeted by Yan Zhu, who has reportedly been hired by Yahoo to adapt End-to-End for use with Yahoo Mail. Zhu formerly worked as an engineer at the Electronic Frontier Foundation, an organization that has consistently been outspoken in its call for the widespread use of encryption throughout the Web and the Internet in general.
Paul Merrell

Israel deploys a new weapons system in Gaza - Intellihub.com - 0 views

  • Reports, including photographic evidence reveal that Israel is using an energy weapon to attack targets in Gaza. The destructive beam, thought to be a high energy laser, is emitted from a plane identified as a Boeing KC707 “Re’em,” originally configured for Electronic Warfare. Those observing the attacks cite a beam from a 4 engine jet hitting a target which immediately turns “white hot.” After these attacks, the target area is then hit with either bombs or artillery to destroy evidence of the use of an American designed and built energy weapon illegally given to Israel. BACKGROUND The weapon used is identified as part of the YAL 1 system, a COIL laser (chemical, oxygen/iodine laser), originally intended as an aircraft mounted system to shoot down ICBMs. Boeing approached the Department of Defense in 2002 and by 2004 had mounted its first system on a 747/400 previously flown by Air India. Boeing had convinced Secretary of Defense Donald Rumsfeld that this system, mounted on as many as 7 aircraft, could fly 24 hours a day around Iran and defend “the free world” against nuclear tipped ICBMs that Rumsfeld believed Iran was planning to use. Please note that it was Rumsfeld that told television audiences that Afghanistan was “peppered” with underground cities serviced by rail links that supported division sized Al Qaeda units that, after ten years, no one was able to locate.
  • Boeing tested the system in 2007. The Department of Defense claimed the system could shoot down low earth orbit satellites and that in tests conducted in 2010, destroyed multiple test missiles. There is no reliable confirmation of this other than a press release from then Secretary of Defense Robert Gates. CANCELLATION AND MYSTERIOUS DISAPPEARANCE The Center for Strategic Studies, in an interview with then Defense Secretary Gates published the following: “I don’t know anybody at the Department of Defense who thinks that this program should, or would, ever be operationally deployed. The reality is that you would need a laser something like 20 to 30 times more powerful than the chemical laser in the plane right now to be able to get any distance from the launch site to fire.” So, right now the ABL would have to orbit inside the borders of Iran in order to be able to try and use its laser to shoot down that missile in the boost phase. And if you were to operationalize this you would be looking at 10 to 20 747s, at a billion and a half dollars apiece, and $100 million a year to operate. And there’s nobody in uniform that I know who believes that this is a workable concept.”
  • After $5 billion was spent, the functioning prototype only capable of being fired directly at nearby targets, a system very capable of acquisition and destruction of ground targets with no air defense protection only, was said to have been flown to a scrap yard. The plane itself is still there, at Davis Monthan Air Force Base, with other failed dreams and nightmares. However, the weapons system disappeared, only to reappear in Israel as a “missile defense” project, an adjunct to the “Iron Dome” system. Israel’s Rafael Defense had been trying to develop laser weapons on its own to intercept rockets being fired from Gaza. It was never able to neither deploy a laser powerful enough nor develop a radar system able to be effective.
  • ...5 more annotations...
  • “Friends of Israel,” within the US defense community were convinced by Israel that the system could be finished and deployed to protect Israel against a purported “missile onslaught” from Tehran. In truth, there was no such intention. Instead, as in the film “Real Genius,” the laser system was always intended to be deployed against ground targets, for terrorism and assassinations. The “delivery system,” a Boeing airliner configured for AWAC, electronic warfare or refueling, could easily be modified to “clone” commercial air traffic and attack targets thousands of miles away or as close as Gaza, Lebanon, Syria or Iraq with total impunity.
  • McLeod and Rogers, in The Law of War, examine the history of prohibition of incendiary weapons. Israel’s use of white phosphorous, intended as a “smoke market” as a corrosive anti-personnel weapon against civilian populations in Lebanon and Gaza skirts initial language, as cited below, in the St. Petersburg Declaration of 1868, but falls well short of evading later prohibition on the use of chemical agents. “The first treaty to deal with weapons was the St Petersburg Declaration of 1868. Here states were concerned about the development of explosive or incendiary bullets for use against the wagon trains of enemy forces. It was felt that these bullets might be used against enemy personnel15 and cause unnecessary injury. The Contracting Parties agreed ‘mutually to renounce, in case of war among themselves, the employment by their military or naval troops of any projectile of a weight below 400 grammes, which is either explosive or charged with fulminating or inflammable substances’.
  • The declaration does not seem to have affected the practice of states in using tracer for range finding, even mixed with normal ammunition, nor the use of small explosive projectiles for anti-aircraft and anti-material uses. It did not prevent states from using four pound, thermite-based incendiary bombs during the Second World War. These, obviously, were more than 400 grammes in weight. Furthermore it could be argued that they were not ‘projectiles’, a term that certainly would not include illuminating flares or smoke canisters.” The use of energy weapons for assassinations and terrorism had, prior to only a few short days ago, been subject of speculative fiction only. No one had imagined that a failed American weapons system would be pirated for deployment in acts of terrorism by a rogue state. A greater question arises, if this “failed system” costing many billions has been shipped off “in the dark of night” without public knowledge or official authorization for use in a criminal manner, what other systems may have been similarly pirated? There is conclusive evidence that W54/Davy Crocket nuclear weapons made their way to Israel after 1991 after an accident at Dimona is reputed to have made that facility useless for weapons development.
  • Similarly, when the Ukraine retired its “fleet” of SS21 tactical nuclear missiles, Israel took possession of the warheads, servicing their deuterium booster gas all these years to keep them ready for deployment. Intercepted communications between the Kiev junta and Israel now indicate that Israel is ready to “repatriate” some of these nuclear weapons to the Ukraine for use against pro-Russian separatists. Ukrainian leaders have spoken of the intent to deploy and use these nuclear weapons publicly on several recent occasions. From USA Today: “KIEV, Ukraine — Ukraine may have to arm itself with nuclear weapons if the United States and other world powers refuse to enforce a security pact that obligates them to reverse the Moscow-backed takeover of Crimea, a member of the Ukraine parliament told USA TODAY. ‘We gave up nuclear weapons because of this agreement,’ said Rizanenko, a member of the Udar Party headed by Vitali Klitschko, a candidate for president. ‘Now there’s a strong sentiment in Ukraine that we made a big mistake.’”
  • With the recent bombing of a UN refugee facility in Gaza, with the use of chemical and now energy weapons, with Israel’s planned sale of nuclear warheads to Ukraine, there is little more that could be done to establish Israel, not only as a rogue state, but as a “clear and present danger” to not only regional but global security as well. As Jim W. Dean of Veterans Today recently stated, “Their fingerprints are at every crime scene.”
Paul Merrell

Mission creep in Iraq continues as US launches airstrikes in Amerli - Threat Matrix - 0 views

  • The US military and humanitarian mission in Iraq continues to suffer from what is known as "mission creep," which is defined as "a gradual shift in objectives during the course of a military campaign, often resulting in an unplanned long-term commitment." When the Obama administration ordered limited military intervention against the Islamic State beginning on Aug. 7, the objectives were twofold: to halt the Islamic State's advance on Irbil to protect US personnel based there, and provide humanitarian relief to the Yazidi minority who fled Sinjar and other towns and were trapped on Mount Sinjar. Within a week, the objectives were modified, and the US military was now tasked with serving as the air force to Kurdish and Iraqi forces "to protect critical infrastructure" and "support Iraqi security forces and Kurdish defense forces, who are working together to combat ISIL [the Islamic State]." Yesterday, the US began launching airstrikes against Islamic State fighters who are besieging the ethnic Turkmen town of Amerli. Note that Amerli is in Salahaddin province and doesn't constitute a critical threat to US personnel in Irbil, nor does it host critical infrastructure. Below is the full press release that was issued yesterday by US Central Command:
  • It has been clear from the beginning that the Obama administration does not have a strategy to deal with the Islamic State. President Obama admitted as much in a press conference last week. But what is clear is that the Obama administration is doing exactly what it said it wouldn't do: get sucked into Iraq's civil war and serve as Iraq's air force. If President Obama wants to defeat the Islamic State, a group that he described as a "cancer," he needs to quickly develop a comprehensive strategy and articulate it to the American public. Otherwise, the administration is employing tactical solutions to the strategic problem that is the Islamic State, and adjusting these tactics on the fly.
  •  
    Considering that no U.S. military intervention in the Mideast since WWII has produced anything but disaster, in my carefully studied opinion, the only sensible solution is a U.S. military hands-off-the-Mideast policy. Of course, our Israel Lobby-controlled Congress would never allow that before the Israel Lobby is widely recognized as a cancer within the U.S. body politic. 
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
Paul Merrell

The Virtue of Subtlety: A U.S. Strategy Against the Islamic State - 0 views

  • U.S. strategy is sound. It is to allow the balance of power to play out, to come in only when it absolutely must — with overwhelming force, as in Kuwait — and to avoid intervention where it cannot succeed. The tactical application of strategy is the problem. In this case the tactic is not direct intervention by the United States, save as a satisfying gesture to avenge murdered Americans. But the solution rests in doing as little as possible and forcing regional powers into the fray, then in maintaining the balance of power in this coalition. Such an American strategy is not an avoidance of responsibility. It is the use of U.S. power to force a regional solution. Sometimes the best use of American power is to go to war. Far more often, the best use of U.S. power is to withhold it. The United States cannot evade responsibility in the region. But it is enormously unimaginative to assume that carrying out that responsibility is best achieved by direct intervention. Indirect intervention is frequently more efficient and more effective.
  • The United States cannot win the game of small mosaic tiles that is emerging in Syria and Iraq. An American intervention at this microscopic level can only fail. But the principle of balance of power does not mean that balance must be maintained directly. Turkey, Iran and Saudi Arabia have far more at stake in this than the United States. So long as they believe that the United States will attempt to control the situation, it is perfectly rational for them to back off and watch, or act in the margins, or even hinder the Americans. The United States must turn this from a balance of power between Syria and Iraq to a balance of power among this trio of regional powers. They have far more at stake and, absent the United States, they have no choice but to involve themselves. They cannot stand by and watch a chaos that could spread to them. It is impossible to forecast how the game is played out. What is important is that the game begins. The Turks do not trust the Iranians, and neither is comfortable with the Saudis. They will cooperate, compete, manipulate and betray, just as the United States or any country might do in such a circumstance. The point is that there is a tactic that will fail: American re-involvement. There is a tactic that will succeed: the United States making it clear that while it might aid the pacification in some way, the responsibility is on regional powers. The inevitable outcome will be a regional competition that the United States can manage far better than the current chaos.
  • There is then the special case of the Islamic State. It is special because its emergence triggered the current crisis. It is special because the brutal murder of two prisoners on video showed a particular cruelty. And it is different because its ideology is similar to that of al Qaeda, which attacked the United States. It has excited particular American passions. To counter this, I would argue that the uprising by Iraq’s Sunni community was inevitable, with its marginalization by Nouri al-Maliki’s Shiite regime in Baghdad. That it took this particularly virulent form is because the more conservative elements of the Sunni community were unable or unwilling to challenge al-Maliki. But the fragmentation of Iraq into Shiite, Sunni and Kurdish regions was well underway before the Islamic State, and jihadism was deeply embedded in the Sunni community a long time ago. Moreover, although the Islamic State is brutal, its cruelty is not unique in the region. Syrian President Bashar al Assad and others may not have killed Americans or uploaded killings to YouTube, but their history of ghastly acts is comparable. Finally, the Islamic State — engaged in war with everyone around it — is much less dangerous to the United States than a small group with time on its hands, planning an attack. In any event, if the Islamic State did not exist, the threat to the United States from jihadist groups in Yemen or Libya or somewhere inside the United States would remain.
  • ...11 more annotations...
  • The issue is whether the United States can live with this situation or whether it must reshape it. The immediate question is whether the United States has the power to reshape it and to what extent. The American interest turns on its ability to balance local forces. If that exists, the question is whether there is any other shape that can be achieved through American power that would be superior. From my point of view, there are many different shapes that can be imagined, but few that can be achieved. The American experience in Iraq highlighted the problems with counterinsurgency or being caught in a local civil war. The idea of major intervention assumes that this time it will be different. This fits one famous definition of insanity.
  • A national strategy emerges over the decades and centuries. It becomes a set of national interests into which a great deal has been invested, upon which a great deal depends and upon which many are counting. Presidents inherit national strategies, and they can modify them to some extent. But the idea that a president has the power to craft a new national strategy both overstates his power and understates the power of realities crafted by all those who came before him. We are all trapped in circumstances into which we were born and choices that were made for us. The United States has an inherent interest in Ukraine and in Syria-Iraq. Whether we should have that interest is an interesting philosophical question for a late-night discussion, followed by a sunrise when we return to reality. These places reflexively matter to the United States. The American strategy is fixed: Allow powers in the region to compete and balance against each other. When that fails, intervene with as little force and risk as possible. For example, the conflict between Iran and Iraq canceled out two rising powers until the war ended. Then Iraq invaded Kuwait and threatened to overturn the balance of power in the region. The result was Desert Storm.
  • The American strategy is fixed: Allow powers in the region to compete and balance against each other. When that fails, intervene with as little force and risk as possible. For example, the conflict between Iran and Iraq canceled out two rising powers until the war ended. Then Iraq invaded Kuwait and threatened to overturn the balance of power in the region. The result was Desert Storm. This strategy provides a model. In the Syria-Iraq region, the initial strategy is to allow the regional powers to balance each other, while providing as little support as possible to maintain the balance of power. It is crucial to understand the balance of power in detail, and to understand what might undermine it, so that any force can be applied effectively. This is the tactical part, and it is the tactical part that can go wrong. The strategy has a logic of its own. Understanding what that strategy demands is the hard part. Some nations have lost their sovereignty by not understanding what strategy demands. France in 1940 comes to mind. For the United States, there is no threat to sovereignty, but that makes the process harder: Great powers can tend to be casual because the situation is not existential. This increases the cost of doing what is necessary. The ground where we are talking about applying this model is Syria and Iraq. Both of these central governments have lost control of the country as a whole, but each remains a force. Both countries are divided by religion, and the religions are divided internally as well. In a sense the nations have ceased to exist, and the fragments they consisted of are now smaller but more complex entities.
  • This strategy provides a model. In the Syria-Iraq region, the initial strategy is to allow the regional powers to balance each other, while providing as little support as possible to maintain the balance of power. It is crucial to understand the balance of power in detail, and to understand what might undermine it, so that any force can be applied effectively. This is the tactical part, and it is the tactical part that can go wrong. The strategy has a logic of its own. Understanding what that strategy demands is the hard part. Some nations have lost their sovereignty by not understanding what strategy demands. France in 1940 comes to mind. For the United States, there is no threat to sovereignty, but that makes the process harder: Great powers can tend to be casual because the situation is not existential. This increases the cost of doing what is necessary. The ground where we are talking about applying this model is Syria and Iraq. Both of these central governments have lost control of the country as a whole, but each remains a force. Both countries are divided by religion, and the religions are divided internally as well. In a sense the nations have ceased to exist, and the fragments they consisted of are now smaller but more complex entities.
  • There is then the special case of the Islamic State. It is special because its emergence triggered the current crisis. It is special because the brutal murder of two prisoners on video showed a particular cruelty. And it is different because its ideology is similar to that of al Qaeda, which attacked the United States. It has excited particular American passions. To counter this, I would argue that the uprising by Iraq’s Sunni community was inevitable, with its marginalization by Nouri al-Maliki’s Shiite regime in Baghdad. That it took this particularly virulent form is because the more conservative elements of the Sunni community were unable or unwilling to challenge al-Maliki. But the fragmentation of Iraq into Shiite, Sunni and Kurdish regions was well underway before the Islamic State, and jihadism was deeply embedded in the Sunni community a long time ago. Moreover, although the Islamic State is brutal, its cruelty is not unique in the region. Syrian President Bashar al Assad and others may not have killed Americans or uploaded killings to YouTube, but their history of ghastly acts is comparable. Finally, the Islamic State — engaged in war with everyone around it — is much less dangerous to the United States than a small group with time on its hands, planning an attack. In any event, if the Islamic State did not exist, the threat to the United States from jihadist groups in Yemen or Libya or somewhere inside the United States would remain.
  • The issue is whether the United States can live with this situation or whether it must reshape it. The immediate question is whether the United States has the power to reshape it and to what extent. The American interest turns on its ability to balance local forces. If that exists, the question is whether there is any other shape that can be achieved through American power that would be superior. From my point of view, there are many different shapes that can be imagined, but few that can be achieved. The American experience in Iraq highlighted the problems with counterinsurgency or being caught in a local civil war. The idea of major intervention assumes that this time it will be different. This fits one famous definition of insanity.
  • Because the Islamic State operates to some extent as a conventional military force, it is vulnerable to U.S. air power. The use of air power against conventional forces that lack anti-aircraft missiles is a useful gambit. It shows that the United States is doing something, while taking little risk, assuming that the Islamic State really does not have anti-aircraft missiles. But it accomplishes little. The Islamic State will disperse its forces, denying conventional aircraft a target. Attempting to defeat the Islamic State by distinguishing its supporters from other Sunni groups and killing them will founder at the first step. The problem of counterinsurgency is identifying the insurgent. There is no reason not to bomb the Islamic State’s forces and leaders. They certainly deserve it. But there should be no illusion that bombing them will force them to capitulate or mend their ways. They are now part of the fabric of the Sunni community, and only the Sunni community can root them out. Identifying Sunnis who are anti-Islamic State and supplying them with weapons is a much better idea. It is the balance-of-power strategy that the United States follows, but this approach doesn’t have the dramatic satisfaction of blowing up the enemy. That satisfaction is not trivial, and the United States can certainly blow something up and call it the enemy, but it does not address the strategic problem. In the first place, is it really a problem for the United States?
  • There is no reason not to bomb the Islamic State’s forces and leaders. They certainly deserve it. But there should be no illusion that bombing them will force them to capitulate or mend their ways. They are now part of the fabric of the Sunni community, and only the Sunni community can root them out. Identifying Sunnis who are anti-Islamic State and supplying them with weapons is a much better idea. It is the balance-of-power strategy that the United States follows, but this approach doesn’t have the dramatic satisfaction of blowing up the enemy. That satisfaction is not trivial, and the United States can certainly blow something up and call it the enemy, but it does not address the strategic problem. In the first place, is it really a problem for the United States? The American interest is not stability but the existence of a dynamic balance of power in which all players are effectively paralyzed so that no one who would threaten the United States emerges. The Islamic State had real successes at first, but the balance of power with the Kurds and Shia has limited its expansion, and tensions within the Sunni community diverted its attention. Certainly there is the danger of intercontinental terrorism, and U.S. intelligence should be active in identifying and destroying these threats. But the re-occupation of Iraq, or Iraq plus Syria, makes no sense. The United States does not have the force needed to occupy Iraq and Syria at the same time. The demographic imbalance between available forces and the local population makes that impossible.
  • The danger is that other Islamic State franchises might emerge in other countries. But the United States would not be able to block these threats as well as the other countries in the region. Saudi Arabia must cope with any internal threat it faces not because the United States is indifferent, but because the Saudis are much better at dealing with such threats. In the end, the same can be said for the Iranians. Most important, it can also be said for the Turks. The Turks are emerging as a regional power. Their economy has grown dramatically in the past decade, their military is the largest in the region, and they are part of the Islamic world. Their government is Islamist but in no way similar to the Islamic State, which concerns Ankara. This is partly because of Ankara’s fear that the jihadist group might spread to Turkey, but more so because its impact on Iraqi Kurdistan could affect Turkey’s long-term energy plans.
  • The United States cannot win the game of small mosaic tiles that is emerging in Syria and Iraq. An American intervention at this microscopic level can only fail. But the principle of balance of power does not mean that balance must be maintained directly. Turkey, Iran and Saudi Arabia have far more at stake in this than the United States. So long as they believe that the United States will attempt to control the situation, it is perfectly rational for them to back off and watch, or act in the margins, or even hinder the Americans. The United States must turn this from a balance of power between Syria and Iraq to a balance of power among this trio of regional powers. They have far more at stake and, absent the United States, they have no choice but to involve themselves. They cannot stand by and watch a chaos that could spread to them. It is impossible to forecast how the game is played out. What is important is that the game begins. The Turks do not trust the Iranians, and neither is comfortable with the Saudis. They will cooperate, compete, manipulate and betray, just as the United States or any country might do in such a circumstance. The point is that there is a tactic that will fail: American re-involvement. There is a tactic that will succeed: the United States making it clear that while it might aid the pacification in some way, the responsibility is on regional powers. The inevitable outcome will be a regional competition that the United States can manage far better than the current chaos.
  • U.S. strategy is sound. It is to allow the balance of power to play out, to come in only when it absolutely must — with overwhelming force, as in Kuwait — and to avoid intervention where it cannot succeed. The tactical application of strategy is the problem. In this case the tactic is not direct intervention by the United States, save as a satisfying gesture to avenge murdered Americans. But the solution rests in doing as little as possible and forcing regional powers into the fray, then in maintaining the balance of power in this coalition. Such an American strategy is not an avoidance of responsibility. It is the use of U.S. power to force a regional solution. Sometimes the best use of American power is to go to war. Far more often, the best use of U.S. power is to withhold it. The United States cannot evade responsibility in the region. But it is enormously unimaginative to assume that carrying out that responsibility is best achieved by direct intervention. Indirect intervention is frequently more efficient and more effective.
  •  
    The article is by the Chairman of Stratfor, a private intelligence company. I don't agree with its analysis because I am decidedly non-interventionist. But this article should be required reading for all who have fallen for the war fever being spread by the War Party for full-scale military invasion of Iraq and Syria. The article at least lays a sound basis for a large degree of restraint.
‹ Previous 21 - 40 of 47 Next ›
Showing 20 items per page