Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged space-exploitation

Rss Feed Group items tagged

Paul Merrell

Who owns space? US asteroid-mining act is dangerous and potentially illegal - 0 views

  • Nope, a flag is not enough to make the moon a colony.
  • An event of cosmic proportions occurred on November 18 when the US congress passed the Space Act of 2015 into law. The legislation will give US space firms the rights to own and sell natural resources they mine from bodies in space, including asteroids. Although the act, passed with bipartisan support, still requires President Obama’s signature, it is already the most significant salvo that has been fired in the ideological battle over ownership of the cosmos. It goes against a number of treaties and international customary law which already apply to the entire universe. The new law is nothing but a classic rendition of the “he who dares wins” philosophy of the Wild West. The act will also allow the private sector to make space innovations without regulatory oversight during an eight-year period and protect spaceflight participants from financial ruin. Surely, this will see private firms begin to incorporate the mining of asteroids into their investment plans.
  • Supporters argue that the US Space Act is a bold statement that finally sets private spaceflight free from the heavy regulation of the US government. The misdiagnosis begins here. Space exploration is a universal activity and therefore requires international regulation. The act represents a full-frontal attack on settled principles of space law which are based on two basic principles: the right of states to scientific exploration of outer space and its celestial bodies and the prevention of unilateral and unbriddled commercial exploitation of outer-space resources. These principles are found in agreements including the Outer Space Treaty of 1967 and the Moon Agreement of 1979. The US House Committee on Science, Space and Technology denies there is anything in the act which violates the US’s international obligations. According to this body, the right to extract and use resources from celestial bodies “is affirmed by State practice and by the US State Department in Congressional testimony and written correspondence”. Crucially, there is no specific reference to international law in this statement. Simply relying on US legislation and policy statements to justify the plans is obviously insufficient.
  • ...5 more annotations...
  • Gbenga Oduntan is the author of Sovereignty and Jurisdiction in Airspace and Outer Space: Legal Criteria for Spatial Delimitation. London: Routledge-Cavendish 2012. https://www.routledge.com/products/9780415562126
  • Ever since NASA discovered signs of liquid water on Mars, concerns have been raised about the risk of contaminating the red planet.
  • So what’s at stake? We can assume that the list of states that have access to outer space – currently a dozen or so – will grow. These states may also shortly respond with mining programmes of their own. That means that the pristine conditions of the cradle of nature from which our own Earth was born may become irrevocably altered forever – making it harder to trace how we came into being. Similarly, if we started contaminating celestial bodies with microbes from Earth, it could ruin our chances of ever finding alien life there. Mining minerals in space could also damage the environment around the Earth and eventually lead to conflict over resources. Indeed what right has the second highest polluter of the Earth’s environment got to proceed with some of the same corporations in a bid to plunder outer space? While we’re not there yet, developments towards actual space mining may begin to occur within a decade.
  • Ultimately, the US plans must be understood in the light of existing rules of space law. Money is not a dirty word in space – the total value of the satellite telecommunications industry in 2013 was more than $195bn. Free market principles also apply to the operations of the International Space Station. So, let’s get down to the nitty-gritty.
  • Currently corporations can exploit outer space in a number of ways, including for space tourism and scientific training. Companies may also be allowed to extract certain resources, but the very first provision of the Outer Space Treaty (1967), to which the US is a signatory, is that such exploration and use shall be carried out for the benefit and in the interests of all countries. This therefore prevents the sale of space-based minerals for profit. The treaty also states that outer space shall be the “province of all mankind … and that states shall avoid harmful contamination of space". Meanwhile, the Moon Agreement (1979) has in effect forbidden states to conduct commercial mining on planets and asteroids until there is an international regime for such exploitation. While the US has refused to sign up to this, it is binding as customary international law. The idea that American companies can on the basis of domestic laws alone systematically exploit mineral resources in space, despite huge environmental risks, really amounts to the audacity of greed. The Romans had this all correctly figured out in their legal maxim: “What concerns all must be decided upon by all.”
Paul Merrell

WikiLeaks Cables Portray Saudi Arabia As A Cash Machine For Terrorists - 0 views

  • Saudi Arabia is the world’s largest source of funds for Islamist militant groups such as the Afghan Taliban and Lashkar-e-Taiba – but the Saudi government is reluctant to stem the flow of money, according to Hillary Clinton. “More needs to be done since Saudi Arabia remains a critical financial support base for al-Qaida, the Taliban, LeT and other terrorist groups,” says a secret December 2009 paper signed by the US secretary of state. Her memo urged US diplomats to redouble their efforts to stop Gulf money reaching extremists in Pakistan and Afghanistan.
  • “Donors in Saudi Arabia constitute the most significant source of funding to Sunni terrorist groups worldwide,” she said. Three other Arab countries are listed as sources of militant money: Qatar, Kuwait and the United Arab Emirates. The cables highlight an often ignored factor in the Pakistani and Afghan conflicts: that the violence is partly bankrolled by rich, conservative donors across the Arabian Sea whose governments do little to stop them. The problem is particularly acute in Saudi Arabia, where militants soliciting funds slip into the country disguised as holy pilgrims, set up front companies to launder funds and receive money from government-sanctioned charities. One cable details how the Pakistani militant outfit Lashkar-e-Taiba, which carried out the 2008 Mumbai attacks, used a Saudi-based front company to fund its activities in 2005. Meanwhile officials with the LeT’s charity wing, Jamaat-ud-Dawa, travelled to Saudi Arabia seeking donations for new schools at vastly inflated costs – then siphoned off the excess money to fund militant operations. Militants seeking donations often come during the hajj pilgrimage – “a major security loophole since pilgrims often travel with large amounts of cash and the Saudis cannot refuse them entry into Saudi Arabia”. Even a small donation can go far: LeT operates on a budget of just $5.25m (£3.25m) a year, according to American estimates.
  • Saudi officials are often painted as reluctant partners. Clinton complained of the “ongoing challenge to persuade Saudi officials to treat terrorist funds emanating from Saudi Arabia as a strategic priority”. Washington is critical of the Saudi refusal to ban three charities classified as terrorist entities in the US. “Intelligence suggests that these groups continue to send money overseas and, at times, fund extremism overseas,” she said. There has been some progress. This year US officials reported that al-Qaida’s fundraising ability had “deteriorated substantially” since a government crackdown. As a result Bin Laden’s group was “in its weakest state since 9/11” in Saudi Arabia. Any criticisms are generally offered in private. The cables show that when it comes to powerful oil-rich allies US diplomats save their concerns for closed-door talks, in stark contrast to the often pointed criticism meted out to allies inPakistan and Afghanistan. Instead, officials at the Riyadh embassy worry about protecting Saudi oilfields from al-Qaida attacks. The other major headache for the US in the Gulf region is the United Arab Emirates. The Afghan Taliban and their militant partners the Haqqani network earn “significant funds” through UAE-based businesses, according to one report. The Taliban extort money from the large Pashtun community in the UAE, which is home to 1 million Pakistanis and 150,000 Afghans. They also fundraise by kidnapping Pashtun businessmen based in Dubai or their relatives.
  • ...2 more annotations...
  • “Some Afghan businessmen in the UAE have resorted to purchasing tickets on the day of travel to limit the chance of being kidnapped themselves upon arrival in either Afghanistan or Pakistan,” the report says. Last January US intelligence sources said two senior Taliban fundraisers hadregularly travelled to the UAE, where the Taliban and Haqqani networkslaundered money through local front companies. One report singled out a Kabul-based “Haqqani facilitator”, Haji Khalil Zadran, as a key figure. But, Clinton complained, it was hard to be sure: the UAE’s weak financial regulation and porous borders left US investigators with “limited information” on the identity of Taliban and LeT facilitators. The lack of border controls was “exploited by Taliban couriers and Afghan drug lords camouflaged among traders, businessmen and migrant workers”, she said. In an effort to stem the flow of funds American and UAE officials are increasinglyco-operating to catch the “cash couriers” – smugglers who fly giant sums of money into Pakistan and Afghanistan.
  • In common with its neighbours Kuwait is described as a “source of funds and a key transit point” for al-Qaida and other militant groups. While the government has acted against attacks on its own soil, it is “less inclined to take action against Kuwait-based financiers and facilitators plotting attacks outside of Kuwait”. Kuwait has refused to ban the Revival of Islamic Heritage Society, a charity the US designated a terrorist entity in June 2008 for providing aid to al-Qaida and affiliated groups, including LeT. There is little information about militant fundraising in the fourth Gulf country singled out, Qatar, other than to say its “overall level of CT co-operation with the US is considered the worst in the region”. The funding quagmire extends to Pakistan itself, where the US cables detail sharp criticism of the government’s ambivalence towards funding of militant groups that enjoy covert military support. The cables show how before the Mumbai attacks in 2008, Pakistani and Chinese diplomats manoeuvred hard to block UN sanctions against Jamaat-ud-Dawa. But in August 2009, nine months after sanctions were finally imposed, US diplomats wrote: “We continue to see reporting indicating that JUD is still operating in multiple locations in Pakistan and that the group continues to openly raise funds”. JUD denies it is the charity wing of LeT.
  •  
    Question for Hillary: Since you have known at least since December, 2009 that these Arab nations are funding al Qaida and its offshoot organizations, if elected will you impose strong sanctions on them to halt their funding of terrorism?
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Secret US cybersecurity report: encryption vital to protect private data | US news | Th... - 0 views

  • A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.
  • In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access. Cameron, who landed in the US on Thursday night, is expected to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.
  • Cameron said the companies “need to work with us. They need also to demonstrate, which they do, that they have a social responsibility to fight the battle against terrorism. We shouldn’t allow safe spaces for terrorists to communicate. That’s a huge challenge but that’s certainly the right principle”. But the document from the US National Intelligence Council, which reports directly to the US director of national intelligence, made clear that encryption was the “best defence” for computer users to protect private data. Part of the cache given to the Guardian by Snowden was published in 2009 and gives a five-year forecast on the “global cyber threat to the US information infrastructure”. It covers communications, commercial and financial networks, and government and critical infrastructure systems. It was shared with GCHQ and made available to the agency’s staff through its intranet.
  • ...6 more annotations...
  • An unclassified table accompanying the report states that encryption is the “[b]est defense to protect data”, especially if made particularly strong through “multi-factor authentication” – similar to two-step verification used by Google and others for email – or biometrics. These measures remain all but impossible to crack, even for GCHQ and the NSA. The report warned: “Almost all current and potential adversaries – nations, criminal groups, terrorists, and individual hackers – now have the capability to exploit, and in some cases attack, unclassified access-controlled US and allied information systems.” It further noted that the “scale of detected compromises indicates organisations should assume that any controlled but unclassified networks of intelligence, operational or commercial value directly accessible from the internet are already potentially compromised by foreign adversaries”.
  • The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded. Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
  • The previous week, a day after the attack on the Charlie Hebdo office in Paris, the MI5 chief, Andrew Parker, called for new powers and warned that new technologies were making it harder to track extremists. In November, the head of GCHQ, Robert Hannigan, said US social media giants had become the “networks of choice” for terrorists. Chris Soghoian, principal senior policy analyst at the American Civil Liberties Union, said attempts by the British government to force US companies to weaken encryption faced many hurdles.
  • The Guardian, New York Times and ProPublica have previously reported the intelligence agencies’ broad efforts to undermine encryption and exploit rather than reveal vulnerabilities. This prompted Obama’s NSA review panel to warn that the agency’s conflicting missions caused problems, and so recommend that its cyber-security responsibilities be removed to prevent future issues.
  • The memo requested a renewal of the legal warrant allowing GCHQ to “modify” commercial software in violation of licensing agreements. The document cites examples of software the agency had hacked, including commonly used software to run web forums, and website administration tools. Such software are widely used by companies and individuals around the world. The document also said the agency had developed “capability against Cisco routers”, which would “allow us to re-route selected traffic across international links towards GCHQ’s passive collection systems”. GCHQ had also been working to “exploit” the anti-virus software Kaspersky, the document said. The report contained no information on the nature of the vulnerabilities found by the agency.
  • Michael Beckerman, president and CEO of the Internet Association, a lobby group that represents Facebook, Google, Reddit, Twitter, Yahoo and other tech companies, said: “Just as governments have a duty to protect to the public from threats, internet services have a duty to our users to ensure the security and privacy of their data. That’s why internet services have been increasing encryption security.”
Paul Merrell

N.S.A. Report Outlined Goals for More Power - NYTimes.com - 0 views

  • Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document.
  • In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.” Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A. to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the document concluded. Using sweeping language, the paper also outlined some of the agency’s other ambitions. They included defeating the cybersecurity practices of adversaries in order to acquire the data the agency needs from “anyone, anytime, anywhere.” The agency also said it would try to decrypt or bypass codes that keep communications secret by influencing “the global commercial encryption market through commercial relationships,” human spies and intelligence partners in other countries. It also talked of the need to “revolutionize” analysis of its vast collections of data to “radically increase operational impact.”
  • The N.S.A. document, titled “Sigint Strategy 2012-2016,” does not make clear what legal or policy changes the agency might seek. The N.S.A.’s powers are determined variously by Congress, executive orders and the nation’s secret intelligence court, and its operations are governed by layers of regulations. While asserting that the agency’s “culture of compliance” would not be compromised, N.S.A. officials argued that they needed more flexibility, according to the paper. Senior intelligence officials, responding to questions about the document, said that the N.S.A. believed that legal impediments limited its ability to conduct surveillance of terrorism suspects inside the United States. Despite an overhaul of national security law in 2008, the officials said, if a terrorism suspect who is under surveillance overseas enters the United States, the agency has to stop monitoring him until it obtains a warrant from the Foreign Intelligence Surveillance Court. “N.S.A.’s Sigint strategy is designed to guide investments in future capabilities and close gaps in current capabilities,” the agency said in a statement. “In an ever-changing technology and telecommunications environment, N.S.A. tries to get in front of issues to better fulfill the foreign-intelligence requirements of the U.S. government.”
  • ...4 more annotations...
  • Critics, including some congressional leaders, say that the role of N.S.A. surveillance in thwarting terrorist attacks — often cited by the agency to justify expanded powers — has been exaggerated. In response to the controversy about its activities after Mr. Snowden’s disclosures, agency officials claimed that the N.S.A.’s sweeping domestic surveillance programs had helped in 54 “terrorist-related activities.” But under growing scrutiny, congressional staff members and other critics say that the use of such figures by defenders of the agency has drastically overstated the value of the domestic surveillance programs in counterterrorism. Agency leaders believe that the N.S.A. has never enjoyed such a target-rich environment as it does now because of the global explosion of digital information — and they want to make certain that they can dominate “the Sigint battle space” in the future, the document said. To be “optimally effective,” the paper said, “legal, policy and process authorities must be as adaptive and dynamic as the technological and operational advances we seek to exploit.” Intent on unlocking the secrets of adversaries, the paper underscores the agency’s long-term goal of being able to collect virtually everything available in the digital world. To achieve that objective, the paper suggests that the N.S.A. plans to gain greater access, in a variety of ways, to the infrastructure of the world’s telecommunications networks.
  • Yet the paper also shows how the agency believes it can influence and shape trends in high-tech industries in other ways to suit its needs. One of the agency’s goals is to “continue to invest in the industrial base and drive the state of the art for high performance computing to maintain pre-eminent cryptanalytic capability for the nation.” The paper added that the N.S.A. must seek to “identify new access, collection and exploitation methods by leveraging global business trends in data and communications services.” And it wants to find ways to combine all of its technical tools to enhance its surveillance powers. The N.S.A. will seek to integrate its “capabilities to reach previously inaccessible targets in support of exploitation, cyberdefense and cyberoperations,” the paper stated. The agency also intends to improve its access to encrypted communications used by individuals, businesses and foreign governments, the strategy document said. The N.S.A. has already had some success in defeating encryption, The New York Times has reported, but the document makes it clear that countering “ubiquitous, strong, commercial network encryption” is a top priority. The agency plans to fight back against the rise of encryption through relationships with companies that develop encryption tools and through espionage operations. In other countries, the document said, the N.S.A. must also “counter indigenous cryptographic programs by targeting their industrial bases with all available Sigint and Humint” — human intelligence, meaning spies.
  • Above all, the strategy paper suggests the N.S.A.’s vast view of its mission: nothing less than to “dramatically increase mastery of the global network.” Other N.S.A. documents offer hints of how the agency is trying to do just that. One program, code-named Treasure Map, provides what a secret N.S.A. PowerPoint presentation describes as “a near real-time, interactive map of the global Internet.” According to the undated PowerPoint presentation, disclosed by Mr. Snowden, Treasure Map gives the N.S.A. “a 300,000 foot view of the Internet.”  Relying on Internet routing data, commercial and Sigint information, Treasure Map is a sophisticated tool, one that the PowerPoint presentation describes as a “massive Internet mapping, analysis and exploration engine.” It collects Wi-Fi network and geolocation data, and between 30 million and 50 million unique Internet provider addresses — code that can reveal the location and owner of a computer, mobile device or router — are represented each day on Treasure Map, according to the document. It boasts that the program can map “any device, anywhere, all the time.”  The documents include addresses labeled as based in the “U.S.,” and because so much Internet traffic flows through the United States, it would be difficult to map much of the world without capturing such addresses.
  • The program takes advantage of the capabilities of other secret N.S.A. programs. To support Treasure Map, for example, the document states that another program, called Packaged Goods, tracks the “traceroutes” through which data flows around the Internet. Through Packaged Goods, the N.S.A. has gained access to “13 covered servers in unwitting data centers around the globe,” according to the PowerPoint. The document identifies a list of countries where the data centers are located, including Germany, Poland, Denmark, South Africa and Taiwan as well as Russia, China and Singapore.
Paul Merrell

Spies Infiltrate a Fantasy Realm of Online Games - NYTimes.com - 0 views

  • Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
  • Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels. The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.
  • Online games might seem innocuous, a top-secret 2008 N.S.A. document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!” another 2008 N.S.A. document declared. But for all their enthusiasm — so many C.I.A., F.B.I. and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat. The documents, obtained by The Guardian and shared with The New York Times and ProPublica, do not cite any counterterrorism successes from the effort. Former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.
  • ...5 more annotations...
  • In the 2008 N.S.A. document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games. Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.
  • The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured. One American company, the maker of World of Warcraft, said that neither the N.S.A. nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.
  • “The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 N.S.A. document, referring to “signals intelligence.” The document added, “With a few exceptions, N.S.A. can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic. By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named Operation Galician, were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”
  • Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones, according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users. Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”
  • In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program. After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.
  •  
    Coming soon: disclosure of the NSA's public bathroom cams and microphones because people talk there and exchange germs that might have DNA in them that can be used to track terrorists. 
Gary Edwards

Did Money Seal Israeli-Saudi Alliance? | Consortiumnews - 0 views

  • Exclusive: The odd-couple relationship between Saudi Arabia and Israel may have been sealed with more than a mutual desire to kiss-off Iran. According to an intelligence source, there was a dowry involved, too, with the Saudis reportedly giving Israel some $16 billion, writes Robert Parry.By Robert Parry
  • For more than half a century, Saudi Arabia has tried to use its vast oil wealth to build a lobby in the United States that could rival the imposing Israel Lobby. At top dollar, the Saudis hired law firms and PR specialists – and exploited personal connections to powerful families like the Bushes – but the Saudis never could build the kind of grassroots political organization that has given Israel and its American backers such extraordinary clout.Indeed, Americans who did take Saudi money – including academic institutions and non-governmental organizations – were often pilloried as tools of the Arabs, with the Israel Lobby and its propagandists raising the political cost of accepting Saudi largesse so high that many people and institutions shied away.
  •  
    Thanks to Marbux we have this stunning summary explaining how Israel and Saudi Arabia are working together to stop Iran and the Shiite Crescent from taking over the Middle East and establishing an oil rich Shiite Caliphate. ........... "New Terrorist Gains Saudi Arabia and its Persian Gulf allies, along with Turkey, are also ramping up support in Syria for Al-Qaeda's Nusra Front and the Islamic State. Flush with jihadist reinforcements, the two terrorist organizations have seized new territory in recent weeks, including the Islamic State creating a humanitarian crisis by attacking a Palestinian refugee camp south of Damascus. All of these Saudi actions have drawn minimal criticism from mainstream U.S. media and political circles, in part, because the Saudis now have the protection of the Israel Lobby, which has kept American attention on the supposed threat from Iran, including allegedly controversial statements from Iranian leaders about their insistence that economic sanctions be lifted once the nuclear agreement is signed and/or implemented. Neocon warmongers have even been granted space in major U.S. newspapers, including the Washington Post and the New York Times, to openly advocate for the bombing of Iran despite the risk that destroying Iran's nuclear reactors could inflict both human and environmental devastation. That might serve the Saudi-Israeli interests by forcing Iran to focus exclusively on a domestic crisis but it would amount to a major war crime. [See Consortiumnews.com's "NYT Publishes Call to Bomb Iran."] The strategic benefit for Israel and Saudi Arabia would be that with Iran unable to assist the Iraqis and the Syrians in their desperate struggles against Al-Qaeda and the Islamic State, the Sunni jihadists might well be hoisting the black flag of their dystopian philosophy over Damascus, if not Baghdad. [See Consortiumnews.com's "The Secret Saudi Ties to Terrorism."] Beyond the slaughter of innocents that would follow
Paul Merrell

Emails to Hillary contradict French tale on Libya war - Al-Monitor: the Pulse of the Mi... - 0 views

  • French spies secretly organized and funded the Libyan rebels who defeated Moammar Gadhafi, according to confidential emails to Hillary Clinton that were made public on June 22.
  • The memos from Clinton adviser Sidney Blumenthal contradict the popular French narrative about its intervention in Libya, raising fresh questions about a war that toppled a dictator but left chaos and radicalism in his stead. They were allegedly written by retired CIA operative Tyler Drumheller and released by a special congressional panel investigating the 2012 attack on the US mission in Benghazi. The oft-repeated media tale in France holds that then-President Nicolas Sarkozy was outraged by Gadhafi’s crackdown on protesters in February 2011 but had no clear idea who to support. Enter a swash-buckling “intellectual,” Bernard-Henri Levy, who met with Transitional National Council leader Mustafa Abdul Jalil on March 4, immediately called Sarkozy, and had the French president invite Jalil to the Elysee Palace — and recognize the council as the country’s official government by March 10. The emails to Clinton tell a distinctly less heroic story. According to one entry from March 22, 2011, “officers” with the General Directorate for External Security — the French intelligence service — “began a series of secret meetings” with Jalil and Gen. Abdul Fatah Younis in Benghazi in late February and gave them “money and guidance” to set up the council, whose formation was announced Feb. 27. The officers, “speaking under orders from [Sarkozy] promised that as soon as the [council] was organized France would recognize [it] as the new government of Libya.”
  • “In return for their assistance,” the memo states, “the DGSE officers indicated that they expected the new government of Libya to favor French firms and national interests, particularly regarding the oil industry in Libya.” The email goes on to state that Jalil and Younis “accepted this offer” and “have maintained contact with the DGSE officers in Cairo.” The memo is titled, “How the French created the National Libyan Council, ou l’argent parle.” Another memo dated May 5 asserts that individuals close to the council stated “in strictest confidence” that as early as mid-April 2011 French humanitarian flights also included “executives from the French company TOTAL, the large construction from VINCI and the European Aeronautic Defence and Space Company N.V. (EADS).” Subsequent flights have allegedly carried representatives “from the conglomerate THALYS and other large French firms, all with close ties to [Sarkozy].” “After meeting with the [council] these French business executives leave discreetly by road, via Tobruk to Egypt,” the memo states. “These convoys are organized and protected by para-military officers [from the DGSE].” The memo adds that Levy himself came up with the idea and obtained the council’s signature on an agreement to give French firms “favorable consideration” in business matters. He is said to have used “his status as a journalist to provide cover for his activities.”
  • ...2 more annotations...
  • A later memo, from September 2011, asserts that Sarkozy urged the Libyans to reserve 35% of their oil industry for French firms — Total in particular — when he traveled to Tripoli that month. In the end, however, Italy’s Eni came out ahead with Russian and Chinese firms biding their time, even as the Libyan oil production plummeted because of the civil war. The veracity of the memos’ content is difficult if not impossible to ascertain. While Levy has long been a controversial figure in France, the council was riven by internal rivalries. Younis himself was assassinated in July 2011 — at Jalil’s urging according to an Aug. 8 memo to Clinton. And Drumheller himself has courted controversy for his role in the run-up to the 2003 Iraq war, with liberals celebrating him as a truth-teller and conservatives saying he helped concoct some of the false information he later debunked.
  • French spymasters’ role in Libya has been alluded to before, most notably in the 2012 book “The Truth About our War in Libya” by French historian Jean-Christophe Notin. That book said Henry-Levy’s role in the French decision to go to war had been overblown. “All has not been said about this war, because it has only had one narrator: Bernard-Henri Levy,” Notin told L’Express magazine. “Yes, he was one of the Libyans’ interlocutors. But his telling glosses over not only the coalition’s military exploits, but also the underground work of diplomatic and military officials on the ground, sometimes for quite some time, in Libya.” Other memos released June 22 give credence to the notion that Sarkozy was determined from the start of the uprising to get rid of Gadhafi, despite earlier efforts to court him after he abandoned his weapons program and sought closer ties with the West. A March 20 memo, for instance, states that Sarkozy “plans to have France lead the attacks on [Gadhafi] over an extended period of time” and “sees this situation as an opportunity for France to reassert itself as a military power.”
Paul Merrell

Ukrainian Parliament sets Sights on NATO: CSTO Counters | nsnbc international - 0 views

  • The Ukrainian Parliament, on Tuesday, December 23, voted for abandoning Ukraine’s neutral status and set the country on course for a NATO membership. The CSTO countered by integrating its constituent armed forces with the Russian Command and Control Center. Russian Foreign Minister Sergey Lavrov described Kiev’s decision as counterproductive while Belarus President Lukashenko asserted his country’s commitment to the collective defense within the CSTO and within the framework of the Eurasian Economic Union. 
  • Lavrov noted that the decision escalates confrontations and creates the illusion that the profound internal crisis in Ukraine can be resolved through the adoption of such laws. Russian Prime Minister Dmitry Medvedev noted on his Facebook page that Ukraine’s no-aligned status was “in essence an application to enter NATO, turning Ukraine into a potential military opponent of Russia”. Russia’s Ambassador to the OSCE, Andrei Kelin commented on Kiev’s decision, describing it as unfriendly, and as adding trouble and tension to the Russian-Ukrainian relationship.
  • It is noteworthy that former French Foreign Minister Roland Dumas, who participated in the negotiations about Germany’s reunification, repeatedly stressed that the understanding that NATO wouldn’t station weapons or troops in any of the former Warsaw Pact member States or expand eastwards was “the essence of peace”. In an interview with l’Humanité.fr in September, Dumas said: “This was the essence of peace. Everyone was in agreement… Well, the Americans do not heed. They transported weapons to the Baltic countries and Poland. Hence the controversy when Putin came to power”.
  • ...4 more annotations...
  • Moscow repeatedly warned against NATO’s eastwards expansion. Earlier this year Russian President Putin noted that one of the important reasons behind Moscow’s acceptance of the Crimean referendum and Crimea’s accession into the Russian Federation was the prospect of the deployment of NATO forces, especially naval forces to Crimea. Putin commented that Russia was more comfortable with Russia’s Western “Partners for peace” visiting a Russian naval base in Crimea than the other way around.
  • The members of the post-Soviet Collective Security Treaty Organization (CSTO) countered the push for a NATO expansion to Ukraine by incorporating their national military forces into the National Defense Control Center of Russia. The announcement about the move was made by Putin, during the opening of the CSTO session in Moscow on December 23, that was held parallel to a final meeting before the formal establishment of the Eurasian Economic Union (EEU) on January 1, 2015.
  • Belarus President Alexander Lukashenko asserted that the CSTO has been created and operates to protect the interests of all of its member states, reports the Belarus news agency BelTa. The news agency quotes Lukashenko added: “As the common economic space grows larger and more advanced within the framework of the Eurasian Economic Union, which members are now virtually identical to those of the CSTO, the importance of protecting economic interests will be pushed to the forefront. .. The existing mechanism of interaction between the special services and other services can be used for that. The services are capable of putting a stop to organized criminal groups, which are now trying to find loopholes and exploit the new economic conditions for their criminal gains.”
  • Among the primary initiatives following the CSTO’s counter-moves to NATO’s eastward expansion in Ukraine is the integration of CSTO member states’ Air Forces, a highly sophisticated electronic command and control center, and thus far, the delivery of new Russian-built, state of the art jets to Belarus.
  •  
    Russia and its neighbors who don't have NATO membership aspirations enter into a collective defense agreement, coordinated by the Russian military. 
1 - 9 of 9
Showing 20 items per page