Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged text-messages

Rss Feed Group items tagged

Paul Merrell

NSA collects millions of text messages daily in 'untargeted' global sweep | World news ... - 0 views

  • The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden. The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.
  • The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. An agency presentation from 2011 – subtitled “SMS Text Messages: A Goldmine to Exploit” – reveals the program collected an average of 194 million text messages a day in April of that year. In addition to storing the messages themselves, a further program known as “Prefer” conducted automated analysis on the untargeted communications.
  • • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”. Other travel information was obtained from itinerary texts sent by travel companies, even including cancellations and delays to travel plans.
  • ...6 more annotations...
  • • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images.
  • The Prefer program uses automated text messages such as missed call alerts or texts sent with international roaming charges to extract information, which the agency describes as “content-derived metadata”, and explains that “such gems are not in current metadata stores and would enhance current analytics”. On average, each day the NSA was able to extract:
  • Communications from US phone numbers, the documents suggest, were removed (or “minimized”) from the database – but those of other countries, including the UK, were retained. The revelation the NSA is collecting and extracting personal information from hundreds of millions of global text messages a day is likely to intensify international pressure on US president Barack Obama, who on Friday is set to give his response to the report of his NSA review panel.
  • While US attention has focused on whether the NSA’s controversial phone metadata program will be discontinued, the panel also suggested US spy agencies should pay more consideration to the privacy rights of foreigners, and reconsider spying efforts against allied heads of state and diplomats. In a statement to the Guardian, a spokeswoman for the NSA said any implication that the agency’s collection was “arbitrary and unconstrained is false”. The agency’s capabilities were directed only against “valid foreign intelligence targets” and were subject to stringent legal safeguards, she said.
  • “In contrast to [most] GCHQ equivalents, DISHFIRE contains a large volume of unselected SMS traffic,” it states (emphasis original). “This makes it particularly useful for the development of new targets, since it is possible to examine the content of messages sent months or even years before the target was known to be of interest.” It later explains in plain terms how useful this capability can be. Comparing Dishfire favourably to a GCHQ counterpart which only collects against phone numbers that have specifically been targeted, it states “Dishfire collects pretty much everything it can, so you can see SMS from a selector which is not targeted”.
  • The document also states the database allows for broad, bulk searches of keywords which could result in a high number of hits, rather than just narrow searches against particular phone numbers: “It is also possible to search against the content in bulk (e.g. for a name or home telephone number) if the target’s mobile phone number is not known.” Analysts are warned to be careful when searching content for terms relating to UK citizens or people currently residing in the UK, as these searches could be successful but would not be legal without a warrant or similar targeting authority. However, a note from GCHQ’s operational legalities team, dated May 2008, states agents can search Dishfire for “events” data relating to UK numbers – who is contacting who, and when.
Paul Merrell

Obama May Find It Impossible to Mend Frayed Ties to Netanyahu - NYTimes.com - 0 views

  • But now that Mr. Netanyahu has won after aggressively campaigning against a Palestinian state and Mr. Obama’s potential nuclear deal with Iran, the question is whether the president and prime minister can ever repair their relationship — and whether Mr. Obama will even try.On Wednesday, part of the answer seemed to be that the president would not make the effort. Continue reading the main story Related Coverage Win in Israel Sets Netanyahu on Path to Rebuild and Redefine GovernmentMARCH 18, 2015 Palestinian Leaders See Validation of Their Statehood EffortMARCH 18, 2015 Netanyahu Soundly Defeats Chief Rival in Israeli ElectionsMARCH 17, 2015 News Analysis: Deep Wounds and Lingering Questions After Israel’s Bitter RaceMARCH 17, 2015 In strikingly strong criticism, the White House called Mr. Netanyahu’s campaign rhetoric, in which he railed against Israeli Arabs because they went out to vote, an attempt to “marginalize Arab-Israeli citizens” and inconsistent with the values that bind Israel and the United States. The White House press secretary, Josh Earnest, told reporters traveling with Mr. Obama on Air Force One on Wednesday that Mr. Netanyahu’s statement was “deeply concerning and it is divisive and I can tell you that these are views the administration intends to communicate directly to the Israelis.”
  • And with Mr. Netanyahu’s last-minute turnaround against a Palestinian state alongside Israel, several administration officials said that the Obama administration may now agree to passage of a United Nations Security Council resolution embodying principles of a two-state solution that would be based on the pre-1967 lines between Israel and the West Bank and Gaza Strip and mutually agreed swaps.Most foreign policy experts say that Israel would have to cede territory to the Palestinians in exchange for holding on to major Jewish settlement blocks in the West Bank.
  • Such a Security Council resolution would be anathema to Mr. Netanyahu. Although the principles are United States policy, until now officials would never have endorsed them in the United Nations because the action would have been seen as too antagonistic to Israel.Continue reading the main story “The premise of our position internationally has been to support direct negotiations between the Israelis and the Palestinians,” a senior White House official said. “We are now in a reality where the Israeli government no longer supports direct negotiations. Therefore we clearly have to factor that into our decisions going forward.”
  • ...7 more annotations...
  • Administration officials said that although the relationship between Israel and the United States would remain strong, it would not be managed by Mr. Obama and Mr. Netanyahu. Instead it would be left to Secretary of State John Kerry, one of Mr. Netanyahu’s only remaining friends in the administration, and to Pentagon officials who handle the close military alliance with Israel. “The president is a pretty pragmatic person and if he felt it would be useful, he will certainly engage,” said a senior administration official, who asked not to be identified while discussing Mr. Obama’s opinions of Mr. Netanyahu. “But he’s not going to waste his time.”
  • Another source of administration anger is Ron Dermer, Israel’s ambassador to Washington and an American-born former Republican political operative. Some administration officials said that it would improve the atmosphere if Mr. Dermer stepped down — he helped orchestrate an invitation from Speaker John A. Boehner to have Mr. Netanyahu address Congress without first consulting the White House — but it would not change the underlying divisions over policy.
  • Despite the fractured relationship between Mr. Obama and Mr. Netanyahu, Israel, which has received more American aid since the end of World War II than any other country, will continue to get more than $3 billion annually in mostly military funding. In addition, the United States military will continue to work closely with the Israel Defense Forces to maintain Israel’s military edge against its regional adversaries.Foreign policy experts said that the United States would for the most part continue to side with Israel internationally, even as a growing number of European allies seek to pressure Israel to stop settlement expansion in the West Bank and to recognize Palestinian statehood.
  • But Daniel Levy, a former Israeli peace negotiator who is now the head of the Middle East and North Africa program at the European Council on Foreign Relations, warned that the administration’s patience was growing thin. “What the Obama administration is saying is that, ‘Yes, we’re still committed to you,’ ” Mr. Levy said. “But if you don’t give us something to work with, we can’t continue to carry the rest of the world for you.”Mr. Netanyahu’s objections to a nuclear deal with Iran, and his decision to firmly ally himself with Mr. Obama’s Republican opponents in expressing his ire over the Iran talks, may well have hardened the president’s decision to push for an agreement, one Obama adviser said Wednesday. At the very least, Mr. Netanyahu’s opposition has done nothing to steer Mr. Obama away from his preferred course of reining in Iran’s nuclear ambitions through an international agreement that would sharply limit Tehran’s ability to produce nuclear fuel for at least 10 years, in exchange for a gradual easing of economic sanctions. Mr. Kerry and Mohammad Javad Zarif, the Iranian foreign minister, are continuing talks in Lausanne, Switzerland, this week with the goal of reaching an agreement by the end of the month.
  • “We do think we’re going to get something,” one senior administration official said. He noted, pointedly, “We are backed by the P-5 plus 1” — using the diplomatic moniker for Britain, France, Russia, China and Germany, and the United States. Mr. Netanyahu, the official added, should “look carefully” at his own anti-deal coalition, which, besides congressional Republicans, consists mostly of the Sunni Arab states that all detest Israel but lately have come to fear a rising Iran more.
  • Although Mr. Netanyahu is certain to be a major critic of any Iran agreement and to push Republicans in Congress to oppose it, Aaron David Miller, a former State Department official who is now a vice president at the Woodrow Wilson International Center for Scholars, said that in the end the Israeli leader would not get his way. “You will have an Iran deal,” Mr. Miller said. ”The Israelis will not like it. But in the end, Israel will not be able to block it.”That is in part because the administration expects lawmakers will be reluctant to reject a deal for fear that they would be held responsible for what could happen after — either a nuclear-armed Iran or war with Iran.
  • After Iran, administration officials said the next major confrontation with Mr. Netanyahu would most likely be over continued Israeli settlement building in the West Bank. The Palestinians plan to file a case in the International Criminal Court in April contending that the settlements are a continuing war crime.Martin S. Indyk, Mr. Obama’s former special envoy on recent negotiations between the Israelis and the Palestinians and now the executive vice president of the Brookings Institution, said that although the United States would always be a strong supporter of Israel, Mr. Netanyahu was in dangerous terrain. “Israel does not need to be, and should not aspire to be, a nation that dwells alone,” Mr. Indyk said.
  •  
    Haven't made my way back to it yet, but Obama called Netanyahu to congratulate him on reelection, but gave him some marching orders, then the White House leaked enough to make it clear that the tail is no longer wagging the dog.  Coupled with this NY Times piece yesterday, Netanyahu undoubtedly got the message. He did a 180 degree about face today.
Paul Merrell

U.S. Airstrikes on ISIS in Tikrit Prompt Boycott by Shiite Fighters - NYTimes.com - 0 views

  • By Day 2 of the American airstrike campaign against militants holed up in Tikrit, the mission appeared beleaguered on several fronts on Thursday: Thousands of Shiite militiamen boycotted the fight, others threatened to attack any Americans they found, and Iraqi officials said nine of their fighters had been accidentally killed in an airstrike.In Washington, American military leaders insisted that things were going according to plan. They said that they were stepping into the Tikrit fight only after the Iranian- and militia-led advance on the city had stalled after three weeks, and that they welcomed working solely with Iraqi government forces.Gen. Lloyd Austin, the head of the United States Central Command, told a Senate hearing on Thursday that no Shiite militias remained in Tikrit.
  • While the withdrawal of Iranian-led Shiite militias was one of the preconditions for the Americans to join the fight against the Islamic State in Tikrit, the sudden departure of three of the major groups risked leaving the Iraqi ground forces short-handed, especially if other Shiite militiamen also abandoned the fight.
  • The three militia groups, some of which had Iranian advisers with them until recently, pulled out of the Tikrit fight to protest the American airstrikes, which began late Wednesday night, insisting that the Americans were not needed to defeat the extremists in Tikrit.Too great or abrupt a withdrawal by militia forces, analysts said, could complicate the entire Iraqi counteroffensive. Even with the militias involved, officials said the current pro-government force would not be large enough to eventually help take Mosul back from the Islamic State, also known as ISIS or ISIL.Top officials at the Pentagon appeared to think that it would not be easy to retake even Tikrit without Iranian help. “It’s going to require the kind of hammer-and-anvil approach of ground forces forcing ISIL to respond in ways that they’re targetable by air power,” one Defense Department official said. “But we’re less than 24 hours into it.”
  • ...5 more annotations...
  • Another official, asked if he was worried that the United States now owned the Tikrit operation, said, “Yes. This was a calculated risk, but it’s one that had to be taken.” Both officials spoke on grounds of anonymity because they were not authorized to speak publicly on the issue.Together, the four Shiite groups that objected to the American air role already represent more than a third of the 30,000 fighters on the government side in the offensive against the Islamic State, analysts said.
  • One of the leaders of the biggest militias in the fight, the Badr Organization, also criticized the American role and said his group, too, might pull out.Continue reading the main story “We don’t need the American-led coalition to participate in Tikrit. Tikrit is an easy battle, we can win it ourselves,” said Mueen al-Kadhumi, who is one of the Shiite militia group’s top commanders.
  • The Badr Organization fields the largest cohesive ground force in the conflict, and its withdrawal from Tikrit would be potentially catastrophic, according to Wafiq al-Hashimi, the head of the Iraqi Group for Strategic Studies. “Dr. Abadi rushed into this decision to liberate Tikrit with the Americans without taking time to work out a compromise among all these groups and the Americans, most of whom have a lot of disputes with the Americans,” Mr. Hashimi said.Another Iranian-aligned Shiite militia group reacted with defiance and threats against the Americans.
  • “We are staying in Tikrit, we are not leaving and we are going to target the American-led coalition in Tikrit and their creation, ISIS,” said Akram al-Kabi, the leader of the Nujabaa Brigade, a powerful militia that has previously sent fighters to Syria on behalf of the Bashir al-Assad government there.His remarks raised the possibility that the group would use antiaircraft fire against coalition warplanes, using Iraqi fighting positions.On Thursday night, an airstrike on the village of Alvu Ajeel, on the edge of Tikrit, killed six Shiite militiamen, as well as three federal policemen, one of them a colonel, according to a spokesman for the Iraqi military’s Salahuddin Operations Command. The strike was thought to have been carried out by the United States.
  • The other groups that announced they would boycott the Tikrit operation were Qatab Hizbullah, which like Asaib Ahl al-Haq is closely aligned and supported by Iran, and the Peace Brigade, the latest name for a militia made of up followers of the Shiite cleric Moktada al-Sadr, previously known as the Mahdi Army.Mr. Sadr, whose troops fought bitter battles against the Americans during much of the Iraq war, said his group was pulling out because, “The participation of the so-called international alliance is to protect ISIS on the one hand, and to confiscate the achievements of the Iraqis on the other hand.”
  •  
    Big "Yankee, go home" message from the Shia militias. They don't trust the U.S. for some strange reason. Not. The U.S. well earned their distrust.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

Venezuelan Opposition Mayor, Alias "The Vampire," Arrested for Role in Blue Coup Plot |... - 0 views

  • Venezuelan opposition Mayor and longtime rightwing politician, Antonio Ledezma, has been arrested by the country’s intelligence services, SEBIN, for his alleged role in plotting to stage a coup against the democratically elected government of Nicolas Maduro.  The planned coup was uncovered last week by security forces, just hours before several US backed Air Force officials had planned to partake in a bombing spree of strategic targets in the capital. They had hoped this would lead to the assassination of the country’s president and bring about regime change in the South American country.  “Antonio Ledezma who, today, by order of the Public Prosecutor’s Office, was captured and is going to be prosecuted by the Venezuelan justice system, to make him answer to all of the crimes committed against the peace and security of the country and the Constitution… We’ve had enough of conspiracies, we want to work in peace!” announced Venezuelan President, Nicolas Maduro, amidst a chorus of cheers from onlookers.
  • Last week, Ledezma, who is current Mayor of the Metropolitan Capital District of Caracas, signed a statement calling for a “National Transition Agreement” alongside opposition politicians, Maria Corina Machado and currently detained leader of the Popular Will party, Leopoldo Lopez.  The document calls on Venezuelans to unite behind a plan to remove elected President Nicolas Maduro and sets out an action programme for the would be provisional government. This includes facilitating the return of “exiled” Venezuelans, prosecuting current members of government and reaching out to international financial lending agencies such as the International Monetary Fund.  Circulated on February 11th, the statement was disclosed just a day before the attempted coup was set to unfold and was reportedly the signal to set the plan in motion.  
  • “It has no base in any juridic text, it is a putschist act of conspiracy that is unfortunately to the liking of thousands of opposition militants who have been indoctrinated to attack democracy,” Constitutional Lawyer, Jesus Silva, told Venezuelanalysis.  Ledezma’s detention comes in the wake of several other arrests, including those of a number of airforce officials implicated in the plan.   According to revelations made by the President of the National Assembly, Diosadado Cabello, on Wednesday night, Ledezma has since been named by one of the arrested officials under questioning.  The confession links Ledezma to a plan to “eliminate” opposition leader Leopoldo Lopez last year in order to create “chaos” and destabilise the government. Fellow opposition politician and National Assembly legislator, Julio Borges, is also implicated in the assassination plan, which forced an intervention by the government in early 2014. At the time, Lopez’s wife, Lilian Tintori, stated that the government had acted to protect her husband’s safety. 
  • ...3 more annotations...
  • Although details surrounding Ledezma’s exact role in the recently discovered “Blue” coup plot are still unclear, it appears that the opposition politician is implicated beyond his call for a transitional government.  Following the announcement of the coup plot last Thursday, the Maduro administration suggested that further arrests were to be made once there was sufficient evidence to prosecute the political ringleaders of the plan.  “In these intelligence investigations, we have discovered a codified message, in another language,  by an important leader of a party. On translating it, we found that it gave the details, the elements of the coup. We are about to capture the person who brought the script that they were going to read, the script they were going to read out was already written, and circulated by a person who I will name at the correct moment”, said Maduro, referencing a preplanned statement which was to be read out to the public following the aerial bombardment, announcing a “rebellion” of the armed forces against the government. 
  • It is not the first time that Ledezma has been implicated in a plan to violently overthrow the government. In 2002, he participated in an attempted coup which saw socialist president of the time, Hugo Chavez, ousted for a period of 47 hours. Last year, he was also named several times as a “principal ally” by currently detained terror plotter, Lorent Saleh. Saleh was one of the main underground activists fuelling the armed barricades known as guarimbas which last year claimed the lives of at least 43 Venezuelans. He had planned to go on a killing spree with the help of Colombian paramilitaries but was arrested before the plan could take place.  
  • Popularly known as “the vampire”, Ledezma began his political career in 1973 as a member of the “Democratic Action” Party. In 1989, he infamously became Governor of the Federal District of Caracas, when he oversaw one of the most violent periods in the history of the Caracas Metropolitan Police.  The police body, which was since disbanded in 2010 due to its human rights violations, regularly opened fire on unarmed student protests, systematically repressed street vendors, pensioners and the unemployed, as well as regularly disappeared political activists.   During this period he also oversaw the “Caracazo,” when up to 3000 people were killed and disappeared by security forces in the wake of violent protests against a government imposed austerity programme.  This particular period of Ledezma’s career earnt him the reputation of “student killer” amongst working class Venezuelans. He is founder and current leader of the rightwing party known as the “Brave People’s Alliance”. 
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Paul Merrell

Julian Assange on Twitter: "Two IC officials close to Pence stated privately this month... - 0 views

  • Julian Assange‏ @JulianAssange Mar 14 Follow Following Unfollow Blocked Unblock Pending Cancel More Share via Direct Message Copy link to Tweet Embed Tweet Mute @JulianAssange Unmute @JulianAssange Mute this conversation Unmute this conversation Block @JulianAssange Unblock @JulianAssange Report Tweet Add to other Moment Add to new Moment Two IC officials close to Pence stated privately this month that they are planning on a Pence takeover. Did not state if Pence agrees.
Paul Merrell

U.S. Embassy in Ankara Headquarter for ISIS War on Iraq - Hariri Insider | nsnbc intern... - 0 views

  • The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
  • A “trusted source” close to the Saudi – Lebanese multi-billionaire and former Lebanese P.M. Saad Hariri told on condition of anonymity, that the final green light for the war on Iraq with ISIS or ISIL brigades was given behind closed doors, at the sidelines of the Atlantic Council’s Energy Summit in Istanbul, Turkey, on November 22 – 23, 2013. The Atlantic Council is one of the most influential U.S. think tanks with regard to U.S. and NATO foreign policy and geopolitics.
  • “Had Baghdad been more cooperative about the Syrian oil fields at Deir-Ez-Zor in early 2013 and about autonomy for the North [Iraq’s northern, predominantly Kurdish region] they would possibly not have turned against al-Maliki; Or he would have been given more time”, said the Hariri insider during the almost two-hour-long conversation.
  • ...6 more annotations...
  • In March 2013, U.S. Secretary of State John Kerry demanded that Iraq “stops the arms flow to Syria”, while U.S. weapons were flowing to ISIS via Saudi Arabia into Iraq and Jordan. On Monday, April 22, 2013, 27 of the 28 E.U. foreign ministers agreed to lift the ban on the import of Syrian oil from opposition-held territories to allow the “opposition” to finance part of its campaign. “ISIS that was supposed to control [the region around] Deir Ez-Zor. [Turkish Energy Minister Taner] Yildiz and [Kurdish] Energy Minister Ashti] Hawrami were to make sure the oil could flow via the Kirkuk – Ceyhan [pipeline];… Ankara put al-Maliki under a lot of pressure about the Kurdish autonomy and oil, too much pressure, too early, if you’d ask me”, the source said. He added that the pressure backfired.
  • Previous reports confirmed that Baghdad started intercepting weapons and insurgents along the Saudi – Iraqi border, cutting off important supply lines for ISIS brigades around Deir Ez-Zor, and that Al-Maliki began complaining about a Saudi – Qatari-backed attempt to subvert the Iraqi State since late 2012. Noting my remark he replied: “That is right, but the heavy increase in attacks came in May – June 2013, after al-Maliki ordered the military to al-Anbar “. A previous article in nsnbc explains how Baghdad’s blockade caused problems in Jordan, because many of the transports of weapons, fighters and munitions had to be rerouted via Jordan. The Hariri insider added that the oil fields should have been under ISIS control by August 2013, but that the plan failed for two reasons. The UK withdrew its support for the bombing of Syria. That in turn enabled the Syrian army to dislodge both ISIS and Jabhat al-Nusrah from Deir Ez-Zor in August.
  • “The situation was a disaster because in June Hariri, Yidiz, Hawrami, Scowcroft, and everybody was ready to talk about how to share the oil between the U.S., Turkey and E.U.. The Summit in November should have dealt with a fait accompli”, the Hariri source stressed, adding that Washington put a gun to al-Maliki’s head when he was invited to the White House.
  • “Certain circles in Washington put a hell of a lot of pressure on Obama to put a gun to al-Maliki’s head”, said the Hariri source, adding that “time was running out and Obama was hesitant”. Asked what he meant with “time was running out” and if he could specify who it was that pushed Obama, he said: “Barzani was losing his grip in the North (Kurdish Iraq); the election [in September] was a setback. All plans for distributing Iraqi oil via Turkey and for sidelining Baghdad were set between Kirkuk and Ankara in early November… “Who exactly pressured Obama? I don’t know who delivered the message to Obama. I suspect Kerry had a word. It’s more important from where the message came, Kissinger, Scowcroft, Nuland and the Keagan clan, Stavridis, Petreaus, Riccardione, and the neo-con crowd at the [Atlantic] Council. … As far as I know ´someone` told Obama that he’d better pressure al-Maliki to go along with Kurdish autonomy by November or else. Who exactly ´advised` Obama is not as important as the fact that those people let him know that they would go ahead, with, or without him”.
  • Asked whether he knew details, how the final green light for the ISIS campaign was given, he said: ” Behind closed doors, in the presence of both Scowcroft, Hariri, and a couple of other people”. To my question “if he could be more specific” he replied “I could; I want to stay alive you know; Riccardione was tasked with the operation that day”. Noting that a prominent member of Saudi Arabia’s royal family, Prince Abdul Rachman al-Faisal has been named as the one being “in command” of the ISIS brigades, and if he could either confirm or deny, he nodded, adding that “the Prince” is responsible for financing the operation and for part of the command structure, but that the operations headquarter is the U.S. Embassy in Ankara Turkey. “As far as I know, nothing moves without Ambassador Riccardione”, he added.
  • The green light for the use of ISIS brigades to carve up Iraq, widen the Syria conflict into a greater Middle East war and to throw Iran off-balance was given behind closed doors at the Atlantic Council meeting in Turkey, in November 2013, told a source close to Saudi – Lebanese billionaire Saad Hariri, adding that the U.S. Embassy in Ankara is the operation’s headquarter.
  •  
    From June 2014, an important one I forgot to bookmark before. 
Paul Merrell

British Prime Minister Suggests Banning Some Online Messaging Apps - NYTimes.com - 0 views

  • Popular messaging services like Snapchat and WhatsApp are in the cross hairs in Britain. That was the message delivered on Monday by Prime Minister David Cameron, who said he would pursue banning encrypted messaging services if Britain’s intelligence services were not given access to the communications. The statement comes as many European politicians are demanding that Internet companies like Google and Facebook provide greater information about people’s online activities after several recent terrorist threats, including the attacks in Paris.
  • Mr. Cameron, who has started to campaign ahead of a national election in Britain in May, said his government, if elected, would ban encrypted online communication tools that could potentially be used by terrorists if the country’s intelligence agencies were not given increased access. The reforms are part of new legislation that would force telecom operators and Internet services providers to store more data on people’s online activities, including social network messages. “Are we going to allow a means of communications which it simply isn’t possible to read?” Mr. Cameron said at an event on Monday, in reference to services like WhatsApp, Snapchat and other encrypted online applications. “My answer to that question is: ‘No, we must not.’ ” Mr. Cameron said his first duty was to protect the country against terrorist attacks.
  • “The attacks in Paris demonstrated the scale of the threat that we face and the need to have robust powers through our intelligence and security agencies in order to keep our people safe,” he added. Any restriction on these online services, however, would not take effect until 2016, at the earliest, and it remained unclear how the British government could stop people from using these apps, which are used by hundreds of millions of people worldwide.
Paul Merrell

You Should Really Consider Installing Signal, an Encrypted Messaging App for iPhone - T... - 0 views

  • In the age of ubiquitous government surveillance, the only way citizens can protect their privacy online is through encryption. Historically, this has been extremely difficult for mere mortals; just watch the video Edward Snowden made to teach Glenn Greenwald how to encrypt his emails to see how confusing it gets. But all of this is quickly changing as high-quality, user-friendly encryption software becomes available. App maker Open Whisper Systems took an important step in this direction today with the release of a major new version of its Signal encrypted calling app for iPhones and iPads. The new version, Signal 2.0, folds in support for encrypted text messages using a protocol called TextSecure, meaning users can communicate using voice and text while remaining confident nothing can be intercepted in transit over the internet. That may not sound like a particularly big deal, given that other encrypted communication apps are available for iOS, but Signal 2.0 offers something tremendously useful: peace of mind. Unlike other text messaging products, Signal’s code is open source, meaning it can be inspected by experts, and the app also supports forward secrecy, so if an attacker steals your encryption key, they cannot go back and decrypt messages they may have collected in the past.
  • Signal is also one special place on the iPhone where users can be confident all their communications are always fully scrambled. Other apps with encryption tend to enter insecure modes at unpredictable times — unpredictable for many users, at least. Apple’s iMessage, for example, employs strong encryption, but only when communicating between two Apple devices and only when there is a proper data connection. Otherwise, iMessage falls back on insecure SMS messaging. iMessage also lacks forward secrecy and inspectable source code. Signal also offers the ability for power users to verify the identity of the people they’re talking to, confirming that the encryption isn’t under attack. With iMessage, you just have to take Apple’s word for it. Strong, reliable, predictably-applied encryption is especially important at a time when the world just found out, via a report by The Intercept, that American and British spies hacked into the world’s largest SIM card manufacturer and stole the encryption keys that are used to protect communication between handsets and cell phone towers. With these keys, spies can eavesdrop on phone calls and texts just by passively listening to the airwaves.
  • iPhone users can find Signal here. For Android users, the product is, at the moment, split into two apps: TextSecure for private texting and RedPhone for private voice calls. “We’re working towards a single unified Signal app for Android, iPhone and the desktop,” says Marlinspike. It’s important to keep in mind that no technology is 100 percent secure, and an encrypted messaging app can only be as secure as the device you install it on. Intelligence agencies and other hackers can still exploit security bugs that have not been fixed, known as zero day exploits, to take over smartphones and bypass the encryption that privacy apps employ. But apps like Signal go a long way to making mass surveillance of billions of innocent people infeasible.
Paul Merrell

​Retired General Calls on Venezuelans to Form Local Resistance Units: "Get Re... - 0 views

  • Retired Venezuelan military General, Angel Vivas, has released a string of videos on Youtube calling on Venezuelans to form “local resistance units” against the government and to prepare themselves for a war “to the death” The videos have been tweeted by both General Vivas and the anti-government group, “Operation Liberty Venezuela,” and are accompanied by the hashtag #RAV (Resistencia Anti-Castro Comunista Venezuela or Anti-Castro Communist Resistance Venezuela, in English), reportedly founded on December 15th 2014. One of the videos has over 137,000 views. “Today we are going to show you how to defend yourself, your family, your house and your community,” states Vivas from in front of a large portrait of Venezuelan liberation hero, Simon Bolivar The retired General made headlines last year when he called on violent anti-government protestors to hang barbed wire from lampposts in order to decapitate supporters of the government during the armed street blockades known as the barricades, which erupted in February 2014. At least two people died this way and another 42 citizens were killed during the unrest
  • Although he initially resisted detention, entering into an armed standoff with authorities, Vivas was eventually placed under house arrest for four months. Since his release, he has made a string of anti-government videos with ever more explicit messages. “We have no other recourse but to go out and defend ourselves, and, in this sense, I recommend that all Venezuelan citizens across the length and breadth of the Republic start preparing themselves in whatever way they can to defend their lives, their families, their houses and communities,” he states from another video, released on January 30th “Venezuelans, for those of you who have access to a firearm, it’s a good idea to prepare yourself to use it” A stony faced Vivas goes on to directly threaten the government with violent action, stating that “the pacific stage” of resistance had come to an end. “Citizens, the lapse of 15 days that patriotic Venezuelans, incorporated into the RAV, had given to Castro-Communism for it to peacefully leave the country expired last night… This period allowed us to organise the first phase… Now we are going to act,” he states to the camera
  • “Accordingly, we await the social sector, the support of all citizens, to protest massively in the streets at the correct moment”. The most recent video, entitled “You are the Leader,” is also accompanied by a series of links to step by step training handbooks on the anti-government website “Solo-Clic”. The link has also been plugged several times by Operation Liberty Venezuela. Readers who click on the links will find explanations of how to to form successful “resistance units” against the government and also “helpful” documentaries such as “How to Start a Revolution” by Gene Sharp with Spanish subtitles The handbooks themselves are split into three different presentations, including “How to Organise your Resistance Group,” “Tasks and Activities of Local Resistance Groups” and “How to Stay Safe whilst in Resistance”. They also suggest that militants familiarise themselves with Sun Tzu’s “The Art of War”.
  • ...1 more annotation...
  • According to the documents, the resistance groups shouldbe made up of local units which will eventually expand to a national structure. They should have militants who focus on spying and intelligence, “popular” journalists, medical personnel to “take care of the injured”, as well as “combat and defence members” to focus on “urban combat and barricades”. Their activities should include identifying and training recruits, including military sympathisers, as well as conducting “psychological operations “aimed at “weakening the regime” and “having an impact on citizen consciousness”
  •  
    The U.S. is upping its bet in Venezuela.
Paul Merrell

British Lawmakers Condemn 2011 Intervention in Libya - The New York Times - 0 views

  • A committee of British lawmakers issued a damning assessment on Wednesday of the 2011 intervention in Libya led by Britain and France, concluding that the military action had lacked a coherent strategy, had been based on poor intelligence and had led to a political collapse that aided the rise of the Islamic State in North Africa.
  • The report from the foreign affairs committee of the House of Commons directly blamed the former prime minister, David Cameron, saying he “was ultimately responsible for the failure to develop a coherent Libya strategy.”In echoing many criticisms from another inquiry, published this year, into Britain’s role in the Iraq war under one of Mr. Cameron’s predecessors, Tony Blair, the report suggested that lessons from that conflict had not been learned.Fearing civilian deaths, an international coalition assembled by Britain and France launched air and missile strikes in March 2011, after Col. Muammar el-Qaddafi’s forces threatened to attack the rebel-held city of Benghazi.Libya descended into chaos, and a power vacuum ensued after the Qaddafi government collapsed, allowing fighters for the Islamic State, also known as ISIS or ISIL, to gain a significant foothold in the country, and the report suggested that Britain had lost interest in the country after Colonel Qaddafi lost power. Advertisement Continue reading the main story The mission represented a significant shift from the Iraq war, with Britain and France assuming the main leadership role — Mr. Cameron had pressed for military action alongside the French president at the time, Nicolas Sarkozy — and the United States taking an active, but less visible, role.
  • In many ways, the report mirrored the assessment of President Obama, who offered a candid appraisal of the intervention in an interview published in The Atlantic this year. “It didn’t work,” Mr. Obama said, citing what he described as his misplaced faith that “the Europeans” in general would be invested in the follow-up. He also said that Mr. Cameron had soon become “distracted by other things” and that Mr. Sarkozy had been voted out of office the next year.The report by the 11-person committee, which included six lawmakers from Mr. Cameron’s Conservative Party, criticized the British strategy as flawed from its inception, concluding that it “was founded on erroneous assumptions and an incomplete understanding of the evidence.”
  • ...1 more annotation...
  • There had been, they said, no thorough assessment of the nature of the rebellion in Libya or of the real threat to civilians. Nor, they added, had there been any attempt at political engagement with the government, leaving military intervention as the sole focus. Today’s Headlines Wake up each morning to the day’s top news, analysis and opinion delivered to your inbox. Please verify you're not a robot by clicking the box. Invalid email address. Please re-enter. Sign Up Receive occasional updates and special offers for The New York Times's products and services. Thank you for subscribing to Today’s Headlines. An error has occurred. Please try again later. You are already subscribed to this email. View all New York Times newsletters. See Sample Manage Email Preferences Not you? Privacy Policy “By the summer of 2011, the limited intervention to protect civilians had drifted into an opportunist policy of regime change,” the lawmakers said.The consequence of the military action was “political and economic collapse, intermilitia and intertribal warfare, humanitarian and migrant crises, widespread human rights violations, the spread of Qaddafi regime weapons across the region and the growth of ISIL in North Africa,” the lawmakers said.
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Paul Merrell

Breaking Up is Hard to Do: Goldman Sachs Wants JPMorgan in 4 Pieces | nsnbc international - 0 views

  • JPMorgan Chase & Co (JPM) is paying out a $100 million settlement to keep details about an antitrust lawsuit filed 2 years ago out of the court system and public record.
  • JPM is one of 12 mega-banks named in the suit while they were particularly named for the price manipulation on foreign exchanges markets using digital communications and social media. Several investors including hedge funds, public pension funds, the Philadelphia city and other market investors filed a complaint accusing 12 banks of manipulating WM/Reuters rates through chat rooms, e-mail and instant messaging since Jan 2003. • JPMorgan  • Bank of America  • Goldman Sachs  • Morgan Stanley  • Citigroup  • UBS  • Credit Suisse  • HSBC • Barclays  • The Royal Bank of Scotland  • BNP  • Deutsche Bank.
  • According to court documents, “the banks’ manipulation of WM/Reuters rates impacted the value of financial transactions in the U.S., including foreign exchange trade. Further, the plaintiffs claimed that these also negatively affected the pension and savings accounts that are dependent on global foreign exchange rates.”
  • ...2 more annotations...
  • Goldman Sachs released a report citing that JPM should be broken up into 4 parts, each culminating in an increase of 25% worth over the total corporate assets. The report stated: “The biggest of the pieces would include the bank’s branch network, which could be worth over $100 billion on its own. JPMorgan’s investment bank would be nearly as large, followed by its commercial bank and an asset management company.” Richard Ramsden, analyst for Goldman Sachs and author of the report explained: “even splitting JPMorgan in two—dividing the investment bank from the traditional bank, returning the company roughly to what was allowed before the Glass Steagall Act was repealed in the early 2000s—would boost the overall value of the current bank by 16%. Our analysis indicates that even accounting for lost synergies, a JPM breakup would be accretive to shareholders in most scenarios.” Sandy Weill, former CEO of Citigroup commented: “[JPM] became the first of the nation’s modern mega-banks. Breaking up the large banks makes sense.” Ramsden asserts “the new capital requirements for big banks proposed by the Federal Reserve in early December make now a good time to consider such a split.”
  • The Federal Reserve Bank (FRB) opened the door for banks to securitize risky derivatives with the announcement to “extend the deadline for banks to sell off stakes in hedge funds and private- equity funds” until 2017. Journalist David Weidner explained: “Now, the ‘push-out’ rule is gone, so we’re in the same position again. And the Fed has delayed a potential roadblock to a taxpayer bailout. In essence, the Federal Deposit Insurance Corp. and the Fed are implicitly suggesting that losses from hedge funds and private equity won’t hold up government support.” Weidner continued: “Ultimately, let’s be honest, the delay isn’t just a delay, it’s to buy time so the bank lobby can eliminate the Volcker Rule altogether. These investments produced risky, but potentially big, returns. Why is it that the bankers are the only ones with good memories?” This was part of the official delay of the Volker Rule, which would ban risky betting with derivatives by banks, approved in 2010. Because of this announcement, Ramsden said: “A break up makes more sense for JPMorgan because, unlike some of its rivals, its individual businesses are strong enough to stand on their own. The bank is partly a victim of its own success.”
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Australia's criminlisation of dissent: anti-protest law is an ominous sign of the times... - 0 views

  • Australia’s criminlisation of dissent: anti-protest law is an ominous sign of the times Share This Tags AustraliaTasmania Brendan Gogarty (TC) : The Workplaces (Protection from Protesters) Bill – locally known as the “anti-protest” bill – was passed by Tasmanian parliament late on Tuesday night. The law was introduced as part of the government’s intention to “re-build Tasmania’s forestry industry”. That is a source of controversy and division in Tasmanian society. To achieve its aim, the government has committed itself to a wide legislative agenda. This includes: amending the uniform Defamation Act 2005 to allow large companies to sue protesters; defunding community and conservation organisations; and tearing up a “peace deal” between foresters and conservationists, which had been enacted into law before the 2014 election.
  • Recognising the potential return to hostilities, the government said it would “not try and appease” protesters, but would rather “toughen the law to deter them”. The anti-protest law is its chosen mechanism of deterrence. While such hard-line policies on political opposition are not new, the severity and breadth of the law to enforce such a policy arguably is. The shift from hard-line policy to hard-line law is worrisome in a constitutional democracy. The spread of state anti-bikie laws in Australia illustrates why this law is not just of concern for Tasmanians.
  • The new law covers all acts on, or acts inhibiting access to, a business premises (all public and private land, including forestry and mining lands) which are: … in furtherance of, or for the purposes of promoting awareness of or support for an opinion, or belief, in respect of a political, environmental, social, cultural or economic issue. Any such protest is subject to significant penalties if they interrupt “business activity”. While originally such sanctions were mandatory, the government agreed in the upper house to exchange these for discretionary penalties. However, the government agreed to this only on condition that the subsequent maximum penalties would be significantly increased. This was to “send a strong message” to protesters and the courts charged with punishing them. As a consequence, protesters who repeatedly interrupt business face fines of up to A$10,000 and four years in jail.
  • ...1 more annotation...
  • From its inception, the law has been criticised by domestic and international lawyers. Three United Nations human rights rapporteurs considered the bill to breach international law, one describing it as “shocking”. They considered the legislation, as originally envisioned, to be: … disproportionate and unnecessary [creating a] chilling effect of silencing dissenters … [who are] key to raising awareness about human rights, political, [and] social concerns … holding not just governments, but also corporations accountable. A wide range of legal professionals have voiced similar criticisms. While the removal of mandatory penalties alleviated some concerns, the larger concern about a law designed solely to punish people for protesting against controversial business activities – especially publicly supported and funded ones – remains.
  •  
    Australia has neither constitution nor Bill of Rights. It shows.
Paul Merrell

Forget Metadata ... The NSA Is Spying On EVERYTHING Washington's Blog - 0 views

  • The NSA’s spying on everyone’s metadata can tell them just about everything about us … and it violates our Constitutional right to freedom of association. But people are getting distracted from the big picture by focusing on metadata. As security expert Bruce Schneier wrote yesterday: What frustrates me about all of this — [the Privacy and Civil Liberties Oversight Board] report, the president’s speech, and so many other things — is that they focus on the bulk collection of cell phone call records. There’s so much more bulk collection going on — phone calls, e-mails, address books, buddy lists, text messages, cell phone location data, financial documents, calendars, [smartphone apps] etc. — and we really need legislation and court opinions on it all. But because cell phone call records were the first disclosure, they’re what gets the attention. Indeed, Schneier confirmed last October what we’ve been saying for years … don’t get too distracted by the details, because the government is spying on everything:
  • Honestly, I think the details matter less and less. We have to assume that the NSA has EVERYONE who uses electronic communications under CONSTANT surveillance. New details about hows and whys will continue to emerge …but the big picture will remain the same. He’s right. As just one example, there is substantial evidence from top NSA and FBI whistleblowers that the government is recording the content of our calls and emails … word-for-word. So what should we make of the government’s denials that it records content? Given that the government has been caught lying about spying again and again, I’m not sure how much weight we should give to such denials. NSA whistleblower Russ Tice notes: They’re collecting content … word-for-word. *** You can’t trust these people. They lie, and they lie a lot.
  •  
    Personally, I don't think the focus is on metadata because it was the first target exposed. I see it more as a propaganda weapon to divert attention from the other NSA targets.  In any event, this page offers a very comprehensive list of the types of data the NSA is collecting, with links to further information on each type.
Paul Merrell

FBI 'Lovers' New Texts Expose Obama Complicity: He "Wants To Know Everything We're Doin... - 0 views

  • The messages include an exchange about preparing talking points for then-FBI Director James Comey to give to President Obama, who wanted “to know everything we’re doing.”
  •  
    At the time, Strzok and Page were near the top of the command chain on both investigations into Hillary's use of a private email server and into the alleged Russian "collusion." BTW, I am reserving judgment on whether Page and Strzok actually were lovers. So far there's no lovers' language in their text messages that have been released.
Paul Merrell

Israel's Right, Cheering Donald Trump's Win, Renews Calls to Abandon 2-State Solution -... - 0 views

  • Emboldened by the Republican sweep of last week’s American elections, right-wing members of the Israeli government have called anew for the abandonment of a two-state solution to the conflict with the Palestinians.“The combination of changes in the United States, in Europe and in the region provide Israel with a unique opportunity to reset and rethink everything,” Naftali Bennett, Israel’s education minister and the leader of the pro-settlement Jewish Home party, told a gathering of the Foreign Press Association in Jerusalem on Monday.Mr. Bennett, who advocates annexing 60 percent of the occupied West Bank to Israel, exulted on the morning after Donald J. Trump’s victory: “The era of a Palestinian state is over.”That sentiment was only amplified when Jason Greenblatt, a lawyer and co-chairman of the Trump campaign’s Israel Advisory Committee, told Israel’s Army Radio that Mr. Trump did not consider West Bank settlements to be an obstacle to peace, in a stark reversal of longstanding American policy.
  • Members of Prime Minister Benjamin Netanyahu’s Likud party and other rightist politicians jumped to make hay of the change. Advertisement Continue reading the main story Yoav Kish, a Likud member of Parliament, called for the expansion of Israeli sovereignty into the West Bank; Meir Turgeman, the chairman of Jerusalem’s municipal planning committee, said he would now bring long-frozen plans for thousands of Jewish homes in the fiercely contested eastern part of the city up for approval.
  • Israel’s Supreme Court on Monday rejected a government request for a seven-month delay of the demolition of an illegal West Bank outpost built on privately owned Palestinian land. The court-ordered demolition is slated for Dec. 25, and the government had argued for the delay in part to temper a potentially violent settler response.On Sunday, a ministerial committee of rightists within the Likud party and the governing coalition approved a contentious bill to retroactively legalize illegal settlement on privately owned Palestinian land. Prompted by the effort to salvage the Amona outpost, it may be a precursor of things to come.Although the pro-settler camp was promoting the bill long before Mr. Trump’s victory, the decision was taken, unusually, over Mr. Netanyahu’s vehement objections and despite his exhortations for it to be postponed.
  • ...3 more annotations...
  • Israeli analysts point out that the Trump campaign has spread contradictory messages. While many here assume that he will have more pressing priorities than the long-running Israeli-Palestinian conflict, Mr. Trump told The Wall Street Journal on Friday that he would like to seal an Israeli-Palestinian peace agreement, calling it the “ultimate deal.”
  • Acknowledging that Mr. Trump’s positions are not entirely clear, Mr. Bennett, the leader of Jewish Home, said, “We have to say what we want first.”
  • But Mr. Gold suggested that a Trump administration was likely to roll back the demand that Israel withdraw to the 1967 lines and support borders that are more accommodating to Israel. “Trump’s policy paper spoke about Israel having defensible borders, which are clearly different from the 1967 lines,” he said.
Paul Merrell

Moussaoui Calls Saudi Princes Patrons of Al Qaeda - NYTimes.com - 0 views

  • In highly unusual testimony inside the federal supermax prison, a former operative for Al Qaeda has described prominent members of Saudi Arabia’s royal family as major donors to the terrorist network in the late 1990s and claimed that he discussed a plan to shoot down Air Force One with a Stinger missile with a staff member at the Saudi Embassy in Washington.The Qaeda member, Zacarias Moussaoui, wrote last year to Judge George B. Daniels of United States District Court for the Southern District of New York, who is presiding over a lawsuit filed against Saudi Arabia by relatives of those killed in the Sept. 11, 2001, terrorist attacks. He said he wanted to testify in the case, and after lengthy negotiations with Justice Department officials and the federal Bureau of Prisons, a team of lawyers was permitted to enter the prison and question him for two days last October.
  • He said in the prison deposition that he was directed in 1998 or 1999 by Qaeda leaders in Afghanistan to create a digital database of donors to the group. Among those he said he recalled listing in the database were Prince Turki al-Faisal, then the Saudi intelligence chief; Prince Bandar Bin Sultan, the longtime Saudi ambassador to the United States; Prince al-Waleed bin Talal, a prominent billionaire investor; and many of the country’s leading clerics.“Sheikh Osama wanted to keep a record who give money,” he said in imperfect English — “who is to be listened to or who contributed to the jihad.”Mr. Moussaoui said he acted as a courier for Bin Laden, carrying personal messages to prominent Saudi princes and clerics. And he described his training in Qaeda camps in Afghanistan.
  • He helped conduct a trial explosion of a 750-kilogram bomb as a trial run for a planned truck-bomb attack on the American Embassy in London, he said, using the same weapon used in the Qaeda attacks in 1998 on the American Embassies in Kenya and Tanzania. He also studied the possibility of staging attacks with crop-dusting aircraft.In addition, Mr. Moussaoui said, “We talk about the feasibility of shooting Air Force One.” Specifically, he said, he had met an official of the Islamic Affairs Department of the Saudi Embassy in Washington when the Saudi official visited Kandahar. “I was supposed to go to Washington and go with him” to “find a location where it may be suitable to launch a Stinger attack and then, after, be able to escape,” he said.
  • ...3 more annotations...
  • Transcripts of testimony by Zacarias Moussaoui, a former Qaeda operative, under questioning over two days in October by lawyers in a suit filed against Saudi Arabia by relatives of 9/11 victims. Exhibit 5 Exhibit 6 Exhibit 7 Exhibit 8
  • Also filed on Monday in the survivors’ lawsuit were affidavits from former Senators Bob Graham of Florida and Bob Kerrey of Nebraska and the former Navy secretary John Lehman, arguing that more investigation was needed into Saudi ties to the 9/11 plot. Mr. Graham was co-chairman of the Joint Congressional Inquiry into the attacks, and Mr. Kerrey and Mr. Lehman served on the 9/11 Commission.
  • “I am convinced that there was a direct line between at least some of the terrorists who carried out the Sept. 11 attacks and the government of Saudi Arabia,” wrote Mr. Graham, who has long demanded the release of 28 pages of the congressional report on the attacks that explore Saudi connections and remain classified.Mr. Kerrey said in the affidavit that it was “fundamentally inaccurate and misleading” to argue, as lawyers for Saudi Arabia have, that the 9/11 Commission exonerated the Saudi government.
1 - 20 of 120 Next › Last »
Showing 20 items per page