Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged online-docs

Rss Feed Group items tagged

Paul Merrell

Documenting use of overhead imagery on civilian US targets - 0 views

  • New Documents Trace Controversial Use of Drones and other Aerial Surveillance for Domestic National Security – from Safeguarding Major Sporting Events to Law Enforcement to Tracking Wildfires
  • “FBI spy plane zeroes in on Dearborn area” was the headline in The Detroit News on August 5, 2015. The story, which broke the news that the FBI had conducted at least seven surveillance flights recently over downtown Detroit, also raised a broader issue. It illustrated the fact that along with the controversy concerning electronic surveillance activities focused on telephone and e-mail records of United States citizens there exists a corresponding source of controversy – the use of satellites and assorted aircraft (manned and unmanned) to collect imagery and conduct aerial surveillance of civilian targets within the United States. Today, the National Security Archive posts over forty documents, many appearing online for the first time, related to the domestic use of overhead imagery and the controversy it has generated. Among those documents are:
  • Annual activity reports of the Civil Applications Committee, created in 1975 to provide a forum for interaction between the Intelligence Community and civil agencies wanting information from “national systems” (Document 2, Document 4, Document 6, Document 13, Document 16). Articles from a classified National Reconnaissance Office magazine discussing the use of NRO imagery spacecraft to aid in disaster relief (Document 9, Document 10, Document 23). Articles from the National Geospatial-Intelligence Agency’s Pathfinder magazine, which describe how the NGA uses overhead imagery to provide data to assorted agencies with responsibilities in security operations and planning for National Special Security Events (Document 12, Documents 20a, 20b, 20c, Document 26). Examples of imagery, obtained by the KH-9 spy camera, of two targets in New York – the World Trade Center and Shea Stadium (Document 29). Detailed NGA, NORTHCOM, and Air Combat Command internal regulations governing the collection, dissemination and use of domestic imagery (Document 17, Document 19, Document 34).  A description and assessments of the Customs and Border Protection service’s use of drones (Document 24, Document 30, Document 35, Document 37).
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • ...5 more annotations...
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Paul Merrell

Is the Justice Department Protecting An Anti-Iran Smear Campaign? « LobeLog - 0 views

  • A new wrinkle in an already bizarre lawsuit is shaping up to potentially embarrass the Obama administration. If allegations made in a recent court filing are true, then the US Department of Justice, with an unprecedented assertion of the state secrets privilege, might be shielding from any accountability a group actively engaged in spreading false information. The lawsuit revolves around United Against Nuclear Iran (UANI), an anti-Iran, pro-sanctions outfit that takes a hard line against Iran and lodges name-and-shame campaigns against companies it says are doing business with the country. The group is made up of former officials from the Bush and Obama administrations, as well as a host of academics, former diplomats and former intelligence officials from foreign countries, including Israel.
  • Last week, things got even weirder: in a motion filed on Wednesday, Restis’s lawyers suggested that UANI had leaked information to the Jerusalem Post that resulted in a piece accusing Restis of doing more illegal business in Iran. The Post later retracted the article, citing “new information” that indicated the purportedly illegal shipping had been “legitimate and permitted,” and scrubbed the article from its website. “Defendants appear to have provided The Jerusalem Post with false information purporting to show an American company’s legal and humanitarian cargo of soya beans to Iran aboard Plaintiffs’ vessel violated sanctions against Iran,” said a footnote in the filing from Restis’s lawyers. “Although it printed Defendants’ false allegations against Plaintiffs, The Jerusalem Post recognized the falsity of the allegations and issued a retraction and apology.”
  • If true, the alleged UANI leak of false information to the Jerusalem Post would contradict UANI’s lawyers’ assertion in an October hearing that “UANI has made no statements whatsoever about Victor Restis or his companies, about any subject, doing business with Iran or any subject since February of 2014.” The Jerusalem Post article also said that the information it revealed would be “raised… in an upcoming hearing in a US federal court.” UANI’s lawyers brought up the purported revelations the following day in the October 8 hearing. It has not been proven that UANI leaked information to the Post.
  • ...4 more annotations...
  • In a separate filing last Wednesday, lawyers from the American Civil Liberties Union, the Center for Constitutional Rights, the Electronic Frontier Foundation and other groups spelled out how unusual the Justice Department intervention was. The groups submitted a friend of the court briefing—itself an unusual move, since amicus briefs are usually filed when cases reach the appellate stage—agreeing with Restis’s team. “Never before has the government sought dismissal of a suit between private parties on state secrets grounds without providing the parties and the public any information about the government’s interest in the case,” the lawyers from the groups wrote. “It is hard to see why, unlike in every other state secrets case in history, meaningful public disclosure to the parties is not possible in this case.”
  • The October 7 Jerusalem Post article in question, headlined “Evidence obtained by JPost shows alleged ongoing violation of Iran sanctions” and written by legal correspondent Yonah Jeremy Bob, went through several iterations online before being retracted. (Bob did not respond to requests for comment.) The original version of the article purported to present evidence that Restis’s companies were continuing to violate Iran sanctions by pointing to information that a ship owned by Restis docked in Iran on September 27. (The article was amended without notice before being captured by a web archive on October 8.) Lowell, the lawyer for Restis, denied the charges to the Post at the time. “In September 2014, a major US-based food company made a legal shipment of soya beans from Argentina to Iran aboard the Helvetia One, a vessel owned by the Restis family,” Lowell told the paper. “The provision of food cargo to Iran is entirely legal and encouraged under the humanitarian carve-outs to international sanctions regimes.”
  • The original version of the article purported to present evidence that Restis’s companies were continuing to violate Iran sanctions by pointing to information that a ship owned by Restis docked in Iran on September 27. (The article was amended without notice before being captured by a web archive on October 8.) Lowell, the lawyer for Restis, denied the charges to the Post at the time. “In September 2014, a major US-based food company made a legal shipment of soya beans from Argentina to Iran aboard the Helvetia One, a vessel owned by the Restis family,” Lowell told the paper. “The provision of food cargo to Iran is entirely legal and encouraged under the humanitarian carve-outs to international sanctions regimes.”
  • On October 22, the Post came around to Lowell’s perspective, scrubbing the story and issuing a “clarification and correction” that expressed regret for publishing the story. The Post said its assertions of illegal business were “contradicted by new information provided to us and therefore no allegations of misconduct should be concluded from the above article.”
  •  
    The strange Restis case just keeps getting more strange.
Paul Merrell

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.” By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
  •  
    Government retaliation for exercise of First Amendment rights by covert destruction of reputations.  
Paul Merrell

In NSA-intercepted data, those not targeted far outnumber the foreigners who are - The ... - 0 views

  • Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.
  • In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach. The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.
  • Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks.
  • ...1 more annotation...
  • The Obama administration declines to discuss the scale of incidental collection. The NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted that it is unable to make any estimate, even in classified form, of the number of Americans swept in. It is not obvious why the NSA could not offer at least a partial count, given that its analysts routinely pick out “U.S. persons” and mask their identities, in most cases, before distributing intelligence reports. If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.
  •  
    Now that we're getting into the "incidental" search of American's emails and online docs, we're getting much closer to learning *who* is surveilled other than foreign leaders. It isn't a pretty sight. Note that the President's Privacy and Civil Liberties Oversight Board just issued a report on NSA's FISA sec. 702 program and gave it the legal green light. Their Fourth Amendment analysis was stunningly poor.   http://goo.gl/3Ufc9n 
Paul Merrell

The best way to read Glenn Greenwald's 'No Place to Hide' - 0 views

  • Journalist Glenn Greenwald just dropped a pile of new secret National Security Agency documents onto the Internet. But this isn’t just some haphazard WikiLeaks-style dump. These documents, leaked to Greenwald last year by former NSA contractor Edward Snowden, are key supplemental reading material for his new book, No Place to Hide, which went on sale Tuesday. Now, you could just go buy the book in hardcover and read it like you would any other nonfiction tome. Thanks to all the additional source material, however, if any work should be read on an e-reader or computer, this is it. Here are all the links and instructions for getting the most out of No Place to Hide.
  • Greenwald has released two versions of the accompanying NSA docs: a compressed version and an uncompressed version. The only difference between these two is the quality of the PDFs. The uncompressed version clocks in at over 91MB, while the compressed version is just under 13MB. For simple reading purposes, just go with the compressed version and save yourself some storage space. Greenwald also released additional “notes” for the book, which are just citations. Unless you’re doing some scholarly research, you can skip this download.
  • No Place to Hide is, of course, available on a wide variety of ebook formats—all of which are a few dollars cheaper than the hardcover version, I might add. Pick your e-poison: Amazon, Nook, Kobo, iBooks. Flipping back and forth Each page of the documents includes a corresponding page number for the book, to allow readers to easily flip between the book text and the supporting documents. If you use the Amazon Kindle version, you also have the option of reading Greenwald’s book directly on your computer using the Kindle for PC app or directly in your browser. Yes, that may be the worst way to read a book. In this case, however, it may be the easiest way to flip back and forth between the book text and the notes and supporting documents. Of course, you can do the same on your e-reader—though it can be a bit of a pain. Those of you who own a tablet are in luck, as they provide the best way to read both ebooks and PDF files. Simply download the book using the e-reader app of your choice, download the PDFs from Greenwald’s website, and dig in. If you own a Kindle, Nook, or other ereader, you may have to convert the PDFs into a format that works well with your device. The Internet is full of tools and how-to guides for how to do this. Here’s one:
  • ...1 more annotation...
  • Kindle users also have the option of using Amazon’s Whispernet service, which converts PDFs into a format that functions best on the company’s e-reader. That will cost you a small fee, however—$0.15 per megabyte, which means the compressed Greenwald docs will cost you a whopping $1.95.
Paul Merrell

Secret Docs Reveal Dubious Details of Targeted Killings in Afghanistan - SPIEGEL ONLINE - 0 views

  • Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.
  • The child and his father are two of the many victims of the dirty secret operations that NATO conducted for years in Afghanistan. Their fate is described in secret documents to which SPIEGEL was given access. Some of the documents concerning the International Security Assistance Force (ISAF) and the NSA and GCHQ intelligence services are from the archive of whistleblower Edward Snowden. Included is the first known complete list of the Western alliance's "targeted killings" in Afghanistan. The documents show that the deadly missions were not just viewed as a last resort to prevent attacks, but were in fact part of everyday life in the guerilla war in Afghanistan. The list, which included up to 750 people at times, proves for the first time that NATO didn't just target the Taliban leadership, but also eliminated mid- and lower-level members of the group on a large scale. Some Afghans were only on the list because, as drug dealers, they were allegedly supporting the insurgents.
  • Different rules apply in war than in fighting crime in times of peace. But for years the West tied its campaign in Afghanistan to the promise that it was fighting for different values there. A democracy that kills its enemies on the basis of nothing but suspicion squanders its claim to moral superiority, making itself complicit instead. This lesson from Afghanistan also applies to the conflicts in Syria, Iraq, Pakistan and Yemen. The material SPIEGEL was able to review is from 2009 to 2011, and falls within the term of US President Barack Obama, who was inaugurated in January 2009. For Obama, Afghanistan was the "good" war and therefore legitimate -- in contrast to the Iraq war. The president wanted to end the engagement in Iraq as quickly as possible, but in Afghanistan his aim was to win.
  • ...9 more annotations...
  • After Obama assumed office, the US government opted for a new strategy. In June 2009, then Defense Secretary Robert Gates installed Stanley McChrystal, a four-star general who had served in Iraq, as commander of US forces in Afghanistan. McChrystal promoted the aggressive pursuit of the Taliban. Obama sent 33,000 additional troops to Afghanistan, but their deployment was tied to a demand that military officials provide a binding date for the withdrawal of US forces. At the same time, the president distanced himself from the grand objectives the West had proclaimed when it first marched into Kabul. The United States would not try to make Afghanistan "a perfect place," said Obama. Its new main objective was to fight the insurgency.
  • This marked the beginning of one of the bloodiest phases of the war. Some 2,412 civilians died in Afghanistan in 2009. Two-thirds of them were killed by insurgents and 25 percent by NATO troops and Afghan security forces. The number of operations against the Taliban rose sharply, to between 10 and 15 a night. The operations were based on the lists maintained by the CIA and NATO -- Obama's lists. The White House dubbed the strategy "escalate and exit." McChrystal's successor, General David Petraeus, documented the strategy in "Field Manual 3-24" on fighting insurgencies, which remains a standard work today. Petraeus outlined three stages in fighting guerilla organizations like the Taliban. The first was a cleansing phase, in which the enemy leadership is weakened. After that, local forces were to regain control of the captured areas. The third phase was focused on reconstruction. Behind closed doors, Petraeus and his staff explained exactly what was meant by "cleansing." German politicians recall something that Michael T. Flynn, the head of ISAF intelligence in Afghanistan, once said during a briefing: "The only good Talib is a dead Talib."
  • Under Petraeus, a merciless campaign began to hunt down the so-called shadow governors and local supporters aligned with the Islamists. For the Americans, the fact that the operations often ended in killings was seen as a success. In August 2010, Petraeus proudly told diplomats in Kabul that he had noticed a shifting trend. The figures he presented as evidence made some of the ambassadors feel uneasy. At least 365 insurgent commanders, Petraeus explained, had been neutralized in the last three months, for an average of about four killings a day. The existence of documents relating to the so-called Joint Prioritized Effects List (JPEL) has only been described in vague terms until now. The missions by US special units are mentioned but not discussed in detail in the US Army Afghanistan war logs published by WikiLeaks in 2010, together with the New York Times, the Guardian and SPIEGEL. The documents that have now become accessible provide, for the first time, a systematic view of the targeted killings. They outline the criteria used to determine who was placed on the list and why.
  • According to the NSA document, in October 2008 the NATO defense ministers made the momentous decision that drug networks would now be "legitimate targets" for ISAF troops. "Narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) list for the first time," the report reads. In the opinion of American commanders like Bantz John Craddock, there was no need to prove that drug money was being funneled to the Taliban to declare farmers, couriers and dealers as legitimate targets of NATO strikes.
  • The document also reveals how vague the basis for deadly operations apparently was. In the voice recognition procedure, it was sufficient if a suspect identified himself by name once during the monitored conversation. Within the next 24 hours, this voice recognition was treated as "positive target identification" and, therefore, as legitimate grounds for an airstrike. This greatly increased the risk of civilian casualties. Probably one of the most controversial decisions by NATO in Afghanistan is the expansion of these operations to include drug dealers. According to an NSA document, the United Nations estimated that the Taliban was earning $300 million a year through the drug trade. The insurgents, the document continues, "could not be defeated without disrupting the drug trade."
  • When an operation could potentially result in civilian casualties, ISAF headquarters in Kabul had to be involved. "The rule of thumb was that when there was estimated collateral damage of up to 10 civilians, the ISAF commander in Kabul was to decide whether the risk was justifiable," says an ISAF officer who worked with the lists for years. If more potential civilian casualties were anticipated, the decision was left up to the relevant NATO headquarters office. Bodyguards, drivers and male attendants were viewed as enemy combatants, whether or not they actually were. Only women, children and the elderly were treated as civilians. Even officers who were involved in the program admit that these guidelines were cynical. If a Taliban fighter was repeatedly involved in deadly attacks, a "weighing of interests" was performed. The military officials would then calculate how many human lives could be saved by the "kill," and how many civilians would potentially be killed in an airstrike.
  • In early 2009, Craddock, NATO's Supreme Allied Commander for Europe at the time, issued an order to expand the targeted killings of Taliban officials to drug producers. This led to heated discussions within NATO. German NATO General Egon Ramms declared the order "illegal" and a violation of international law. The power struggle within NATO finally led to a modification of Craddock's directive: Targets related to the drug production at least had to be investigated as individual cases. The top-secret dossier could be highly damaging to the German government. For years, German authorities have turned over the mobile phone numbers of German extremists in Afghanistan to the United States. At the same time, the German officials claimed that homing in on mobile phone signals was far too imprecise for targeted killings. This is apparently an untenable argument. According to the 2010 document, both Eurofighters and drones had "the ability to geolocate a known GSM handset." In other words, active mobile phones could serve as tracking devices for the special units.
  • The classified documents could now have legal repercussions. The human rights organization Reprieve is weighing legal action against the British government. Reprieve believes it is especially relevant that the lists include Pakistanis who were located in Pakistan. "The British government has repeatedly stated that it is not pursuing targets in Pakistan and not doing air strikes on Pakistani territory," says Reprieve attorney Jennifer Gibson. The documents, she notes, also show that the "war on terror" was virtually conflated with the "war on drugs." "This is both new and extremely legally troubling," says Gibson.
  • A 2009 CIA study that addresses targeted killings of senior enemy officials worldwide reaches a bitter conclusion. Because of the Taliban's centralized but flexible leadership, as well as its egalitarian tribal structures, the targeted killings were only moderately successful in Afghanistan. "Morover, the Taliban has a high overall ability to replace lost leaders," the study finds.
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Leaked docs show spyware used to snoop on US computers | Ars Technica - 0 views

  • Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
  • The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists, and activist groups. The documents, leaked last Saturday, could not be readily verified, but experts told ProPublica they believed them to be genuine. "I think it's highly unlikely that it's a fake," said Morgan Marquis-Bore, a security researcher who while at The Citizen Lab at the University of Toronto had analyzed Gamma Group's software and who authored an article about the leak on Thursday. The documents confirm many details that have already been reported about Gamma, such as that its tools were used to spy on Bahraini activists. Some documents in the trove contain metadata tied to e-mail addresses of several Gamma employees. Bill Marczak, another Gamma Group expert at the Citizen Lab, said that several dates in the documents correspond to publicly known events—such as the day that a particular Bahraini activist was hacked.
  • The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones. A price list included in the trove lists a license of the software at almost $4 million. The documents reveal that Gamma uses technology from a French company called Vupen Security that sells so-called computer "exploits." Exploits include techniques called "zero days" for "popular software like Microsoft Office, Internet Explorer, Adobe Acrobat Reader, and many more." Zero days are exploits that have not yet been detected by the software maker and therefore are not blocked.
  • ...2 more annotations...
  • Many of Gamma's product brochures have previously been published by the Wall Street Journal and Wikileaks, but the latest trove shows how the products are getting more sophisticated. In one document, engineers at Gamma tested a product called FinSpy, which inserts malware onto a user's machine, and found that it could not be blocked by most antivirus software. Documents also reveal that Gamma had been working to bypass encryption tools including a mobile phone encryption app, Silent Circle, and were able to bypass the protection given by hard-drive encryption products TrueCrypt and Microsoft's Bitlocker.
  • The documents also describe a "country-wide" surveillance product called FinFly ISP which promises customers the ability to intercept Internet traffic and masquerade as ordinary websites in order to install malware on a target's computer. The most recent date-stamp found in the documents is August 2, coincidung with the first tweet by a parody Twitter account, @GammaGroupPR, which first announced the hack and may be run by the hacker or hackers responsible for the leak. On Reddit, a user called PhineasFisher claimed responsibility for the leak. "Two years ago their software was found being widely used by governments in the middle east, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents," the user wrote. The name on the @GammaGroupPR Twitter account is also "Phineas Fisher." GammaGroup, the surveillance company whose documents were released, is no stranger to the spotlight. The security firm F-Secure first reported the purchase of FinFisher software by the Egyptian State Security agency in 2011. In 2012, Bloomberg News and The Citizen Lab showed how the company's malware was used to target activists in Bahrain. In 2013, the software company Mozilla sent a cease-and-desist letter to the company after a report by The Citizen Lab showed that a spyware-infected version of the Firefox browser manufactured by Gamma was being used to spy on Malaysian activists.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

Investigations - 0 views

  • The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites, including YouTube, all without the knowledge or consent of the companies.Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter.
  • Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.”Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data, and would be able to extract some key data about specific users as well.
Paul Merrell

Snowden Docs: British Spies Used Sex and 'Dirty Tricks' - NBC News.com - 0 views

  • ritish spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications. advertisement Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
  • ritish spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.
  • In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here and here. The documents are being published with minimal redactions.
  •  
    Glenn Greenwald adds another dollop to the brew. 
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

Asia Times Online :: World Affairs - 0 views

  • By Pepe Escobar Let's start with a flashback to February 1992 - only two months after the dissolution of the Soviet Union. First draft of the US government's Defense Planning Guidance. It was later toned down, but it still formed the basis for the exceptionalist dementia incarnated by the Project for the New American Century; and also reappeared in full glory in Dr Zbig "Let's Rule Eurasia" Brzezinski's 1997 magnum opus The Grand Chessboard. It's all there, raw, rough and ready: Our first objective is to prevent the reemergence of a new rival, either on the territory of the former Soviet Union or elsewhere, that poses a threat on <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> the order of that posed by the Soviet Union. This ... requires that we endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to generate global power. These regions include Western Europe, East Asia, the territory of the former Soviet Union, and Southwest Asia.
  • By Pepe Escobar Let's start with a flashback to February 1992 - only two months after the dissolution of the Soviet Union. First draft of the US government's Defense Planning Guidance. It was later toned down, but it still formed the basis for the exceptionalist dementia incarnated by the Project for the New American Century; and also reappeared in full glory in Dr Zbig "Let's Rule Eurasia" Brzezinski's 1997 magnum opus The Grand Chessboard. It's all there, raw, rough and ready: Our first objective is to prevent the reemergence of a new rival, either on the territory of the former Soviet Union or elsewhere, that poses a threat on <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> the order of that posed by the Soviet Union. This ... requires that we endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to generate global power. These regions include Western Europe, East Asia, the territory of the former Soviet Union, and Southwest Asia.
  • The Spring collection is far from derailing other pivoting - whose latest offering is the current "anti-terrorist" campaign in eastern Ukraine by the Kiev regime changers, which follows a most curious calendar. CIA's John Brennan hits Kiev, and the regime changers launch their first war on terra. Dismal failure ensues. Vice President Joe Biden visits Kiev and the regime changers, right on cue, relaunch their war on terra. Thus the pivoting to Cold War 2.0 proceeds unabated, as in Washington working hard to build an iron curtain between Berlin and Moscow - preventing further trade integration across Eurasia - via instigation of a civil war in Ukraine. German Chancellor Angela Merkel remains on the spot: it's either Atlantic high-fidelity or her Ostpolitik - and that's exactly where Washington wants her.
  • ...3 more annotations...
  • That's all one needs to know about the Obama administration's "pivoting to Asia", as well as the pivoting to Iran ("if we're not going to war", as US Secretary of State John Kerry let it slip) and the pivoting to Cold War 2.0, as in using Ukraine as a "new Vietnam" remix next door to Russia. And that's also the crucial context for Obama's Pax Americana Spring collection currently unrolling in selected Asian catwalks (Japan, South Korea, Malaysia and Philippines).
  • How's Beijing reacting to all this hysteria? Simple: by reaping dividends. Beijing wins with the US offensive trying to alienate Moscow from Western markets by getting a better pricing deal on the supply of Eastern Siberian gas. Beijing wins from the European Union's fear of losing trade with Russia by negotiating a free-trade agreement with its largest trading partner, which happens to the be the EU. And then, the sterling example. Just compare Obama's Spring collection tour, as a pivoting appendix, to the current tour of Cuba, Venezuela, Brazil and Argentina by Chinese Foreign Minister Wang Yi. It's a business bonanza, focused on bilateral financing and, what else, trade deals. It's all in the mix: Peruvian and Chilean copper; Brazilian iron and soybeans; support for Venezuelan social programs and energy development; support for Cuba in its interest for greater Chinese involvement in Venezuela, which supplies Cuba with subsidized energy.
  • And all this against the background of a Beltway so excited that the Chinese economy is in deep trouble. It's not - it grew at 7.4% year-on-year for the first quarter of 2014. Demand for iron and copper won't significantly slow down - as the Beijing-driven urbanization drive has not even reached full speed. Same for soybeans - as millions of Chinese increasingly start eating meat on a regular basis (soybean products are a crucial feedstock). And, of course, Chinese companies will not losee their appetite for diversifying all across South America. For the large, upcoming Chinese middle class - on their way to becoming full-fledged members of the number one economic power in the world by 2018 - this Spring collection is a non-starter. He or she would rather hit Hong Kong and queue up in Canton Road to buy loads of Hermes and Prada - and then strategically celebrate with Jiro quality, non-Fukushima-radiated, sushi.
  •  
    Escobar's point that for the U.S., Ukraine is about building an iron curtain between Russia and the E.U. should not be missed. 
Paul Merrell

Land Destroyer: America's Covert Re-Invasion of Iraq - 0 views

  • mage: ISIS clearly did not materialize spontaneously within Iraq, it hasclearly redeployed from its NATO-sponsored destruction of Syria to northern Iraq, perhaps in an attempt to justify a NATO incursion and thecreation of a buffer zone straddling Syrian, Iraqi, and even possibly Iranian territory with the goal of targeting Iran directly with ISIS.   June 13, 2014 (Tony Cartalucci - LD) - Heavily armed, well funded, and organized as a professional, standing army, the forces of the Islamic State of Iraq and Syria (ISIS) swept southward into Iraq from Turkey and northeastern Syria, taking the cities of Mosul and Tikrit, and now threaten the Iraqi capital city of Baghdad itself. The United States was sure to prop up two unfounded narratives - the first being that US intelligence agencies, despite assets in Iraq and above it in the form of surveillance drones, failed to give warning of the invasion, and that ISIS is some sort of self-sustaining terror organization carving out a "state" by "robbing banks" and collecting "donations" on Twitter. The Wall Street Journal in its report, "Iraqi Drama Catches U.S. Off Guard," stated: The quickly unfolding drama prompted a White House meeting Wednesday of top policy makers and military leaders who were caught off guard by the swift collapse of Iraqi security forces, officials acknowledged.
  • mage: ISIS has convoys of brand new matching Toyota's the samevehicles seen among admittedly NATO-armed terrorists operatingeverywhere from Libya to Syria, and now Iraq. It is a synthetic, state-sponsored regional mercenary expeditionary force.
  • The question remains, if a Lebanese newspaper knew ISIS was on the move eastward, why didn't the CIA? The obvious answer is the CIA did know, and is simply feigning ignorance at the expense of their reputation to bait its enemies into suspecting the agency of  incompetency rather than complicity in the horrific terroristic swath ISIS is now carving through northern Iraq. Described extensively in the full New Eastern Outlook Journal (NEO) report, "NATO’s Terror Hordes in Iraq a Pretext for Syria Invasion," the United States, Turkey, Saudi Arabia, and Qatar, have funded and armed terrorists operating in Syria for the past 3 years to the tune of hundreds of millions of dollars - coincidentally the same amount that ISIS would require to gain primacy among militant groups fighting in Syria and to mobilize forces capable of crossing into Iraq and overwhelming Baghdad's national defenses.
  • ...4 more annotations...
  • a 3-year ongoing CIA program (here, here, and here) all along the Turkish-Syrian border to "monitor" and "arm" "moderate" militants fighting the Syrian government, the US claims it was caught "by surprise." If drones and CIA operatives operating in ISIS territory weren't enough to detect the impending invasion, perhaps the CIA should have just picked up a newspaper.Indeed, the Lebanon Daily Start in March 2014 reported that ISIS openly withdrew its forces from Latakia and Idlib provinces in western Syria, and redeployed them in Syria's east - along the Syrian-Iraqi border. The article titled, "Al-Qaeda splinter group in Syria leaves two provinces: activists," stated explicitly that: On Friday, ISIS – which alienated many rebels by seizing territory and killing rival commanders – finished withdrawing from the Idlib and Latakia provinces and moved its forces toward the eastern Raqqa province and the eastern outskirts of the northern city of Aleppo, activists said.
  • The NEO report includes links to the US Army’s West Point Countering Terrorism Center reports, “Bombers, Bank Accounts and Bleedout: al-Qa’ida’s Road In and Out of Iraq,” and “Al-Qa’ida’s Foreign Fighters in Iraq,” which detail extensively the terror network used to flood Iraq with foreign terrorists, weapons, and cash to fuel an artificial "sectarian war" during the US occupation, and then turned over to flood Syria with terrorists in the West's bid to overthrow the government in Damascus. What's ISIS Doing in Iraq? The NEO report would also post Seymour Hersh's 2007 article, "The Redirection," documenting over the course of 9 pages US, Saudi, and Israeli intentions to create and deploy sectarian extremists region-wide to confront Iran, Syria, and Hezbollah in Lebanon. Hersh would note that these "sectarian extremists" were either tied to Al Qaeda, or Al Qaeda itself. The ISIS army moving toward Baghdad is the final manifestation of this conspiracy, a standing army operating with impunity, threatening to topple the Syrian government, purge pro-Iranian forces in Iraq, and even threatening Iran itself by building a bridge from Al Qaeda's NATO safe havens in Turkey, across northern Iraq, and up to Iran's borders directly. Labeled "terrorists" by the West, grants the West plausible deniability in its creation, deployment, and across the broad spectrum of atrocities it is now carrying out.  
  • It is a defacto re-invasion of Iraq by Western interests - but this time without Western forces directly participating - rather a proxy force the West is desperately attempting to disavow any knowledge of or any connection to. However, no other explanation can account for the size and prowess of ISIS beyond state sponsorship. And since ISIS is the clear benefactor of state sponsorship, the question is, which states are sponsoring it? With Iraq, Syria, and Iran along with Lebanese-based Hezbollah locked in armed struggle with ISIS and other Al Qaeda franchises across the region, the only blocs left are NATO and the GCC (Saudi Arabia and Qatar in particular).
  • With the West declaring ISIS fully villainous in an attempt to intervene more directly in northern Iraq and eastern Syria, creating a long desired "buffer zone" within which to harbor, arm, and fund an even larger terrorist expeditionary force, Syria, Iraq, Iran, and others are offered an opportunity to preempt Western involvement and to crush the ISIS - cornering and eliminating NATO-GCC's expeditionary force while scoring geopolitical points of vanquishing Washington's latest "villain." Joint Iraq-Iranian operations in the north and south of ISIS's locations, and just along Turkey's borders could envelop and trap ISIS to then be whittled down and destroyed - just as Syria has been doing to NATO's proxy terrorist forces within its own borders.Whatever the regional outcome may be, the fact is the West has re-invaded Iraq, with a force as brutal, if not worse than the "shock and awe" doctrine of 2003. Iraq faces another difficult occupation if it cannot summon a response from within, and among its allies abroad, to counter and crush this threat with utmost expediency.
Paul Merrell

USA Freedom Act Passes House, Codifying Bulk Collection For First Time, Critics Say - T... - 0 views

  • After only one hour of floor debate, and no allowed amendments, the House of Representatives today passed legislation that opponents believe may give brand new authorization to the U.S. government to conduct domestic dragnets. The USA Freedom Act was approved in a 338-88 vote, with approximately equal numbers of Democrats and Republicans voting against. The bill’s supporters say it will disallow bulk collection of domestic telephone metadata, in which the Foreign Intelligence Surveillance Court has regularly ordered phone companies to turn over such data. The Obama administration claims such collection is authorized by Section 215 of the USA Patriot Act, which is set to expire June 1. However, the U.S. Court of Appeals for the Second Circuit recently held that Section 215 does not provide such authorization. Today’s legislation would prevent the government from issuing such orders for bulk collection and instead rely on telephone companies to store all their metadata — some of which the government could then demand using a “specific selection term” related to foreign terrorism. Bill supporters maintain this would prevent indiscriminate collection.
  • However, the legislation may not end bulk surveillance and in fact could codify the ability of the government to conduct dragnet data collection. “We’re taking something that was not permitted under regular section 215 … and now we’re creating a whole apparatus to provide for it,” Rep. Justin Amash, R-Mich., said on Tuesday night during a House Rules Committee proceeding. “The language does limit the amount of bulk collection, it doesn’t end bulk collection,” Rep. Amash said, arguing that the problematic “specific selection term” allows for “very large data collection, potentially in the hundreds of thousands of people, maybe even millions.” In a statement posted to Facebook ahead of the vote, Rep. Amash said the legislation “falls woefully short of reining in the mass collection of Americans’ data, and it takes us a step in the wrong direction by specifically authorizing such collection in violation of the Fourth Amendment to the Constitution.”
  • “While I appreciate a number of the reforms in the bill and understand the need for secure counter-espionage and terrorism investigations, I believe our nation is better served by allowing Section 215 to expire completely and replacing it with a measure that finds a better balance between national security interests and protecting the civil liberties of Americans,” Congressman Ted Lieu, D-Calif., said in a statement explaining his vote against the bill.
  • ...2 more annotations...
  • Not addressed in the bill, however, are a slew of other spying authorities in use by the NSA that either directly or inadvertently target the communications of American citizens. Lawmakers offered several amendments in the days leading up to the vote that would have tackled surveillance activities laid out in Section 702 of the Foreign Intelligence Surveillance Act and Executive Order 12333 — two authorities intended for foreign surveillance that have been used to collect Americans’ internet data, including online address books and buddy lists. The House Rules Committee, however, prohibited consideration of any amendment to the USA Freedom Act, claiming that any changes to the legislation would have weakened its chances of passage.
  • The measure now goes to the Senate where its future is uncertain. Majority Leader Mitch McConnell has declined to schedule the bill for consideration, and is instead pushing for a clean reauthorization of expiring Patriot Act provisions that includes no surveillance reforms. Senators Ron Wyden, D-Ore., and Rand Paul, R-Ky., have threated to filibuster any bill that extends the Patriot Act without also reforming the NSA.
  •  
    Surprise, surprise. U.S. "progressive" groups are waging an all-out email lobbying effort to sunset the Patriot Act. https://www.sunsetthepatriotact.com/ Same with civil liberties groups. e.g., https://action.aclu.org/secure/Section215 And a coalition of libertarian organizations. http://docs.techfreedom.org/Coalition_Letter_McConnell_215Reauth_4.27.15.pdf
Paul Merrell

Israel-Gaza conflict: The secret report that helps Israelis to hide facts - Comment - V... - 0 views

  • Israeli spokesmen have their work cut out explaining how they have killed more than 1,000 Palestinians in Gaza, most of them civilians, compared with just three civilians killed in Israel by Hamas rocket and mortar fire. But on television and radio and in newspapers, Israeli government spokesmen such as Mark Regev appear slicker and less aggressive than their predecessors, who were often visibly indifferent to how many Palestinians were killed. There is a reason for this enhancement of the PR skills of Israeli spokesmen. Going by what they say, the playbook they are using is a professional, well-researched and confidential study on how to influence the media and public opinion in America and Europe. Written by the expert Republican pollster and political strategist Dr Frank Luntz, the study was commissioned five years ago by a group called The Israel Project, with offices in the US and Israel, for use by those "who are on the front lines of fighting the media war for Israel".
  • Every one of the 112 pages in the booklet is marked "not for distribution or publication" and it is easy to see why. The Luntz report, officially entitled "The Israel project's 2009 Global Language Dictionary, was leaked almost immediately to Newsweek Online, but its true importance has seldom been appreciated. It should be required reading for everybody, especially journalists, interested in any aspect of Israeli policy because of its "dos and don'ts" for Israeli spokesmen.These are highly illuminating about the gap between what Israeli officials and politicians really believe, and what they say, the latter shaped in minute detail by polling to determine what Americans want to hear. Certainly, no journalist interviewing an Israeli spokesman should do so without reading this preview of many of the themes and phrases employed by Mr Regev and his colleagues.
  •  
    The doc can be downloaded here. http://goo.gl/HlkhmU
Paul Merrell

The Daily Dot - How a major bank and the U.S. government joined forces to spy on Anonymous - 0 views

  • New details have surfaced regarding the surveillance protocols used by Bank of America to keep tabs on social activists. Last year, Anonymous hacktivists published 14 gigabytes of private emails and spreadsheets which revealed that Bank of America was monitoring social media and other online services used by activists for basic communication. This time however, information about the bank’s recent surveillance activities were obtained legally through a public records request by a single petitioner. The newly published documents reveal a coordinated effort by Bank of America, the Washington State Patrol (WSP), and federal counterterrorism agencies, to monitor activists as they prepared for a public demonstration in Olympia, Wash. Over 230 people originally signed up to attend the “Million Mask March” event, which was organized by the Anonymous movement and took place on November 5, 2013. Although an official report by the WSP described the event as a “peaceful protest” being organized by activists who had made “no threats of violence,” those involved were still monitored by the department before the event took place. Information gathered about the potential protesters was then shared with Bank of America. Furthermore, Bank of America solicited information about activists from various federal agencies, including the Federal Bureau of Investigation.
  • According to Andrew Charles Hendricks, an activist who originally acquired the documents, the emails included the home address of a demonstration organizer. Hendricks claims he redacted the address before publishing the documents online. The relationship between Bank of America and the WSP, as well as their long-term investment in surveillance, is highlighted by an email sent on September 23, 2013. Kim Triplett-Kolerich, an intelligence analyst for Bank of America requested that WSP share any intelligence gathered on activists taking part in the Million Mask March with the bank. She began the email by identifying herself as a former officer and provided her former rank. “From time to time I will see items that I believe will be of use to my friends at WSP—especially during session,” she told the officer. “May Day I will pick your brain for intel and I will give you a lot also,” she wrote.
  • The next week, Triplett-Kolerich emailed the same WSP sergeant again about the march. “Sorry for not getting back to you sooner—hectic weeks lately with foreclosures and this MMM,” Triplett-Kolerich wrote. She then notified the sergeant that Bank of America has been in contact with “the Fusion Center and JTTF” regarding the Anonymous march. JTTF refers to the Joint Terrorism Task Force, which is a group comprised of local law enforcement agencies, the Federal Bureau of Investigation (with whom it shares a website) and the Homeland Security department. The Fusion Center is a state-level counterterrorism agency, which coordinates “national intelligence” between various local law enforcement and public safety departments. In addition, the Fusion Center provides for “the effective communication of locally generated threat-related information to the federal government.”
  • ...2 more annotations...
  • Triplett-Kolerich concluded her email by boasting that the surveillance tactics used by Bank of America to monitor activists online was superior to that of the WSP. “I will most likely find it first as social media trolling is not what WSP does best. Bank of America has a team of 20 people and that’s all they do all day and then pass it to us around the country!!!” On October 24, an email was sent by a sergeant at the WSP’s Special Operations Division to an executive aide at the Thurston County Sheriff’s Office. The sergeant notified the office that a large number of arrests may take place during the Million Mask March, which could impact the jail. Attached to the letter was a message written by an Anonymous activist, and a link to its Facebook event page where the names of those planning to attend the march could be seen.
  • Unbeknownst to the crowd, the supervisor of a local transit company had dropped off an Olympia city bus nearby at the request of the WSP. According to recently published emails, it was parked on the west side of an administration building close to the demonstration, just in case they needed to move in and haul a large group of disorderly protesters off to jail—but they didn’t. The Daily Dot reached out to Triplett-Kolerich and three Bank of America media relations contacts requesting a comment for this article, but received no response. 
  •  
    More evidence of the cozy relationship between the banksters and the "anti-terrorism" folk in the U.S. Of particular interest BofA has a 20-person unit that spends their days trolling social media for intelligence.
Paul Merrell

Britain Used Spy Team to Shape Latin American Public Opinion on Falklands - The Intercept - 0 views

  • Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands. A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.” At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.
  • The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end. Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.
  • While the full extent of JTRIG’s tactics used in the Falklands mission is unclear, the scope of JTRIG’s approved capabilities offers an idea of what may have been done. The group, first revealed last year by NBC News and The Intercept, has developed various techniques — including “false flag” operations, sexual “honey traps,” and implanting computer viruses — to collect intelligence, plant propaganda and diminish or discredit opponents. As reported in The Intercept last year, JTRIG “has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ‘amplif[y]’ sanctioned messages on YouTube,” and plant false Facebook wall posts for “entire countries.” According to a study of the group by the U.K.’s Defence Science and Technology Laboratory (DSTL), “the language of JTRIG’s operations is characterized by terms such as ‘discredit,’ promote ‘distrust,’ ‘dissuade,’ ‘deceive,’ ‘disrupt,’ ‘delay,’ ‘deny,’ ‘denigrate/degrade,’ and ‘deter.’” The unit’s activities generally break down into two symbiotic categories: online Human Intelligence, or HUMINT, and “effects operations.” Online HUMINT is the collection of information on human targets through passive tracking or overt interaction with a target through an alias. These operations may sometimes be in support of, or in conjunction with, covert MI-6 agents on the ground.
  • ...2 more annotations...
  • Effects operations are used to disseminate deception and disruption online. A full catalog of JTRIG’s capabilities as of 2012 can be seen here. Operation QUITO, the group’s operation to support the Foreign Office’s “goals relating to Argentina and the Falkland Islands” is called a “pioneering effects operation.” That operation, still in the planning stages, had undergone “a significant amount of prep work” and was “almost complete” as of 2009.
  • GCHQ’s mission regarding the Falkland Islands also appears to extend beyond just Argentina and involve regional leaders and attitudes. A November 2011 workshop on “Mission Driven Access” gathered staff to “build on pioneering work already done” and tried to develop new ideas for real world scenarios. One such scenario: “GCHQ has consistently underperformed on Brazil, with growing concerns that [South] American attitudes on the Falklands are swinging behind Argentina. A forthcoming Ministerial visit to Chile provides an opportunity to counter the trend. The Foreign Office are looking for advice.”
1 - 20 of 36 Next ›
Showing 20 items per page