Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "vulnerabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Lt. Gen. Bogdan Hedges on Operational Testing - 0 views

  • Several weeks ago, the Project On Government Oversight announced its cautious optimism upon learning the Director of Operational Test & Evaluation (DOT&E) planned to conduct a close air support (CAS) fly-off between the proven A-10 and the yet-to-be proved F-35. The cautious aspect of that optimism has been proven to be warranted. Under questioning by Representative Martha McSally (R-AZ), a former A-10 pilot, F-35 program executive officer Lt. Gen. Christopher Bogdan (USAF) dismissed the idea of a comparative test as irrelevant. The exchange occurred during a House Armed Services subcommittee hearing on updates to the Joint Strike Fighter program. General Bogdan’s remarks echo earlier comments by Air Force Chief of Staff Gen. Mark Welsh, who described the proposed test as a “silly exercise.” Dr. Michael Gilmore, Director of Operational Test & Evaluation, said in late August, “The comparison tests on the close-air support mission will reveal how well the F-35 performs and whether there are gaps, or improvements in capability, compared to the A-10.”
  • When asked by Rep. McSally to comment about the comparative tests, Lt. Gen. Bogdan acknowledged the F-35 would not do as well as the A-10 in such a test. He smugly compared the test to a decathlete competing against a champion sprinter in a 100 meter race. “I don’t have to run that race to know who is going to win it,” he said. “What I prefer to do is test the F-35 in its close air support role as the Air Force sees the requirements for that mission for the F-35,” the General said. The test envisioned by the Air Force would be conducted in the manner it wants to conduct close air support missions in the future, not in the way decades of experience has proven it must be conducted in order to be effective on the battlefield. The Air Force wants these missions to be conducted from high altitudes using digital communications and precision munitions. In other words, it wants to accomplish the mission only through high-tech means from a distance, rather than getting low to the ground where pilots and ground controllers are able to coordinate in a way which has been used to great effect for decades.
  • In a recent documentary, an A-10 pilot talked about the sensors available to help them correlate targets on the ground to ensure a precision strike. But in nearly the same breath, he described their shortcomings as well. “That will never replace just looking right, outside of my cockpit and looking at the battlespace. What am I seeing out there, big-picture?” That level of situational awareness only develops when a pilot is able to fly low and slow over the battlefield.  That will be lost by F-35 pilots who will be restricted to much higher altitudes and speed. They will be forced there because, as Michael Gilmore said while testifying at an earlier hearing, “The (F-35) has some vulnerabilities that you would expect a high performance aircraft to have. The A-10 is going to be able to, can take, hits an F-35 couldn’t take.” The United States has already been through this process before and learned painful and expensive lessons by ignoring proven methods of designing effective weapons systems. Pierre Sprey, a veteran of many bureaucratic battles while designing effective aircraft, says the correct approach to this process is to first understand the mission the system is to perform: you’ve “got to start with what really happens in combat,” Sprey said in a recent interview.
  • ...2 more annotations...
  • Sprey, one of the principle designers of the A-10, said an effective close air support aircraft is one that can “be able to get in close enough to see [friendly troops on the ground] and what they’re opposing and what their dangers are, how they’re about to be ambushed, what tanks they’re facing, what machine gun nests they’re facing.” “You come flashing by there at 500 miles an hour, you’re hopeless and useless,” Sprey said, referring to traditional fighters designed for air-to-air combat. He and the rest of the A-10 design team began that process by interviewing many veteran pilots with experience flying CAS missions. They then matched technology with the way the aircraft would actually be used. This was a radical approach then, and now. What Lt. Gen. Bogdan admitted in his testimony was the F-35 has been engineered to incorporate favored technology. The technology is dictating how troops will be able to fight rather than battlefield experience shaping the technology incorporated in the aircraft. Rep. McSally sees dangers ahead with such an approach. “I think us envisioning that we’re never going to have close air support where guys are on the run, they’re out of ammo, they’re doing a mirror flash into your eye, they don’t have time to do stand-off CAS because of the conflict circumstances, if we think that’s never going to happen again, I think we’re lying to ourselves.”
  • The debate about the proposed tests will continue for some time. The F-35 is still years away from having the ability to go through these tests because the software needed to employ the necessary weapons will not be complete until 2017 at the earliest. In the intervening years, it is essential for Congress to continue reaffirming annually its commitment to the troops on the ground by mandating a completely intact A-10 force until another platform is proven to perform this vital mission at least as well as the Warthog.
  •  
    The A-10 has one major vulnerability; it's bought and paid for. Defense contractors don't get paid as much to manufacture spare parts for it as they are getting from the F-35 program, the most expensive weapons platform in U.S. history. But the F-35 can't do close air support, something the A-10 excels at. But Air Force generals are willing to have troops on the ground be killed to keep the F-35 boondoggle going. They've tried to retire the A-10 repeatedly, only to be blocked by members of Congress who understand the importance of the ground support mission. "By 2014, the program was "$163 billion over budget [and] seven years behind schedule."[19] Critics further contend that the program's high sunk costs and political momentum make it "too big to kill." https://en.wikipedia.org/wiki/Lockheed_Martin_F-35_Lightning_II
Gary Edwards

Doug Casey: All Banks Are Bankrupt - Casey Research - 1 views

  •  
    This interview should be must reading for every citizen of this world.  Doug Casey lays it out, explaining in the simplest of terms the problem of corrupt governments and banksters.  Put this RSS feed right next to Sir Charles' Priced In Gold" blog as essential to start your day with reading. excerpt: "Anyone with any sense should withdraw whatever cash they have in European banks, whether in euros or any other currency, immediately. Cyprus demonstrated that governments are quite willing and able to confiscate money sitting in a bank account in order to preserve the banking system. We live in Bizarro World. L: Why would it spread? Cyprus was said to be particularly vulnerable because of its strong Greek connections; Cypriot banks had bought of lot Greek debt. Would people in Luxembourg be as exposed? Doug: All banks are in effect creatures of the state at this point. They all own a lot of government bonds, which are considered the most secure form of capital. Of course, that's the opposite of the truth; all these governments are bankrupt as well. The Greek government is just more overtly bankrupt than most. Actually, we should take a minute here to discuss what a properly run banking system looks like. Historically, banks offered two types of accounts: demand deposits and time deposits. Demand deposits are what we call checking accounts today, but the original idea was that you'd pay your bank to store your money securely, and you had the right to "demand" your deposit back immediately, and to transfer funds via check. The idea of time deposits, which became savings accounts, was that the bank would pay you interest when you deposited your money with them for a specific period of time. That's why it's called a "time" deposit; you lent the bank your money for a given time, as did other depositors, and the banks would always know how much money they could lend out - at higher interest rates. Furthermore, loans made against time deposits were always short term
Emery Ledger

Elder Abuse Attorney: Abuse in Nursing Homes - 0 views

  •  
    Americans are living longer than in years past as according to the latest census, about 13% of the United States population is age 65 or older unlike in the past 1900 which is 4%. Studies show us that they are extremely vulnerable to abuse and neglect.
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Paul Merrell

Tomgram: Pratap Chatterjee, The Wild West of Surveillance | TomDispatch - 0 views

  • Selling Your Secrets The Invisible World of Software Backdoors and Bounty Hunters
  •  
    Most comprehensive overview of NSA software backdoors and vulnerability exploits I've seen so far. Lots of links to articles offering more depth. 
Paul Merrell

NSA Said to Exploit Heartbleed Bug for Intelligence for Years - Bloomberg - 0 views

  • The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said. The agency’s reported decision to keep the bug secret in pursuit of national security interests threatens to renew the rancorous debate over the role of the government’s top computer experts. The NSA, after declining to comment on the report, subsequently denied that it was aware of Heartbleed until the vulnerability was made public by a private security report earlier this month. “Reports that NSA or any other part of the government were aware of the so-called Heartbleed vulnerability before 2014 are wrong,” according to an e-mailed statement from the Office of the Director of National Intelligence.
Paul Merrell

State Dept: Clinton's personal email use 'not acceptable' | TheHill - 0 views

  • Former Secretary of State Hillary Clinton’s use of a personal email account run through a private server was "not acceptable" and happened without officials’ knowledge, a top State Department record-keeper said on Wednesday. “I think the message is loud and clear that that is not acceptable,” Joyce Barr, the State Department’s assistant secretary for the Bureau of Administration, testified before the Senate Judiciary Committee.
  • “The actions that we’ve taken in the course of recovering these emails has made it very clear what the responsibilities are with regard to record-keeping,” she added in remarks at a Senate Judiciary Committee hearing on government transparency.Clinton’s use of the private email server has enraged Republicans and government transparency advocates, who fear it allowed one of the nation’s top officials to keep her messages secret. The behavior was not revealed just a few months ago, more than a year after Clinton left the State Department, and as she began laying the groundwork for a White House run.“These kinds of things just absolutely undermine the confidence of the American people,” said Sen. Thom Tillis (R-N.C.). “It was a bad decision. I hope that we go so far as to say that, if you do this in the future, you get fired.”Worse, he said, Clinton’s email practices were likely indicative of broader misuse of records preservation within the government.
  • “What really bothers me is when people plan, in a premeditated and deliberate sort of way, to avoid the Freedom of Information Act and federal government requirements that require them to make public information available to the public,” Sen. John Cornyn (R-Texas) said on Wednesday.Barr told lawmakers she had “no information” about how Clinton used the private server and was “not aware of the practice” ahead of time.Clinton has said that she had determined that roughly half of the 60,000 emails sent through her personal account were official government business and should be turned over to the government for safekeeping. The rest of them were deleted, she said. However, that determination was made by Clinton’s team alone, Barr acknowledged, and federal officials essentially have to take her word that all relevant communications are in the government's hands. “We have been told that she has provided those to us,” she said.
  • ...1 more annotation...
  • The State Department has previously said Clinton did not send or receive classified emails through her personal email account, and the former top diplomat has also attempted to reassure the public about the security of the system. Still, many outside analysts remain unconvinced about the security of the system, which would seem to invite hackers from foreign nations and criminal groups. Barr said she did “not have information” about the security protocols, and was “perhaps” concerned about its possible vulnerability.“Well, I would hope it would concern all of us,” Cornyn responded. “I’ll just tell you it concerns me a lot.”
Gary Edwards

Signs That China Is Making A Move Against The U.S. Dollar - America Conservative 2 Conservative - 0 views

  •  
    Two articles about China taking over America appeared today on the American Conservative web site. Incredible stuff. The first deals with the dollar, and how China plans on replacing it. The second article is focused on the Chinese take over of businesss and American assets, including American land. At the heart of both articles is the problem of out of control US DEBT tha tis destroying this country. Intro: "On the global financial stage, China is playing chess while the U.S. is playing checkers, and the Chinese are now accelerating their long-term plan to dethrone the U.S. dollar.  You see, the truth is that China does not plan to allow the U.S. financial system to dominate the world indefinitely.  Right now, China is the number one exporter on the globe and China will have the largest economy on the planet at some point in the coming years.  The Chinese would like to see global currency usage reflect this shift in global economic power.  At the moment, most global trade is conducted in U.S. dollars and more than 60 percent of all global foreign exchange reserves are held in U.S. dollars.  This gives the United States an enormous built-in advantage, but thanks to decades of incredibly bad decisions this advantage is starting to erode.  And due to the recent political instability in Washington D.C., the Chinese sense vulnerability.  China has begun to publicly mock the level of U.S. debt, Chinese officials have publicly threatened to stop buying any more U.S. debt, the Chinese have started to aggressively make currency swap agreements with other major global powers, and China has been accumulating unprecedented amounts of gold.  All of these moves are setting up the moment in the future when China will completely pull the rug out from under the U.S. dollar. Today, the U.S. financial system is the core of the global financial system.  Because nearly everybody uses the U.S. dollar to buy oil and to trade with one another, this cre
Paul Merrell

Sloppy Cyber Threat Sharing Is Surveillance by Another Name | Just Security - 0 views

  • Imagine you are the target of a phishing attack: Someone sends you an email attachment containing malware. Your email service provider shares the attachment with the government, so that others can configure their computer systems to spot similar attacks. The next day, your provider gets a call. It’s the Department of Homeland Security (DHS), and they’re curious. The malware appears to be from Turkey. Why, DHS wants to know, might someone in Turkey be interested in attacking you? So, would your email company please share all your emails with the government? Knowing more about you, investigators might better understand the attack. Normally, your email provider wouldn’t be allowed to give this information over without your consent or a search warrant. But that could soon change. The Senate may soon make another attempt at passing the Cybersecurity Information Sharing Act, a bill that would waive privacy laws in the name of cybersecurity. In April, the US House of Representatives passed by strong majorities two similar “cyber threat” information sharing bills. These bills grant companies immunity for giving DHS information about network attacks, attackers, and online crimes.
  • Sharing information about security vulnerabilities is a good idea. Shared vulnerability data empowers other system operators to check and see if they, too, have been attacked, and also to guard against being similarly attacked in the future. I’ve spent most of my career fighting for researchers’ rights to share this kind of information against threats from companies that didn’t want their customers to know their products were flawed. But, these bills gut legal protections against government fishing expeditions exactly at a time when individuals and Internet companies need privacy laws to get stronger, not weaker. 
  • Worse, the bills aren’t needed. Private companies share threat data with each other, and even with the government, all the time. The threat data that security professionals use to protect networks from future attacks is a far more narrow category of information than those included in the bills being considered by Congress, and will only rarely contain private information. And none of the recent cyberattacks — not Sony, not Target, and not the devastating grab of sensitive background check interviews on government employees at the Office of Personnel Management — would have been mitigated by these bills.
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Paul Merrell

Notes from the Fight Against Surveillance and Censorship: 2014 in Review | Electronic Frontier Foundation - 0 views

  • 2014 in Review Series Net Neutrality Takes a Wild Ride 8 Stellar Surveillance Scoops Web Encryption Gets Stronger and More Widespread Big Patent Reform Wins in Court, Defeat (For Now) in Congress International Copyright Law More Time in the Spotlight for NSLs The State of Free Expression Online What We Learned About NSA Spying in 2014—And What We're Fighting to Expose in 2015 "Fair Use Is Working!" Email Encryption Grew Tremendously, but Still Needs Work Spies Vs. Spied, Worldwide The Fight in Congress to End the NSA's Mass Spying Open Access Movement Broadens, Moves Forward Stingrays Go Mainstream Three Vulnerabilities That Rocked the Online Security World Mobile Privacy and Security Takes Two Steps Forward, One Step Back It Was a Pivotal Year in TPP Activism but the Biggest Fight Is Still to Come The Government Spent a Lot of Time in Court Defending NSA Spying Last Year Let's Encrypt (the Entire Web)
  •  
    The Electronic Freedom Foundation just dropped an incredible bunch of articles on the world in the form of their "2014 Year In Review" series. These are major contributions that place an awful lot of information in context. I thought I had been keeping a close eye on the same subject matter, but I'm only part way through the articles and am learning time after time that I had missed really important news having to do with digital freedom. I can't recommend these articles enough. So far, they are all must-read.  
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

How 'Free Markets' Defame 'Democracy' | Consortiumnews - 0 views

  • Venezuela seems to be following Ukraine on the neocon hit list for “regime change” as Washington punishes Caracas for acting against a perceived coup threat. But a broader problem is how the U.S. conflates “free markets” with “democracy,” giving “democracy” a bad name, writes Robert Parry.
  • The one common thread in modern U.S. foreign policy is an insistence on “free market” solutions to the world’s problems. That is, unless you’re lucky enough to live in a First World ally of the United States or your country is too big to bully.So, if you’re in France or Canada or – for that matter – China, you can have generous health and educational services and build a modern infrastructure. But if you’re a Third World country or otherwise vulnerable – like, say, Ukraine or Venezuela – Official Washington insists that you shred your social safety net and give free reign to private investors.
  • If you’re good and accept this “free market” domination, you become, by the U.S. definition, a “democracy” – even if doing so goes against the wishes of most of your citizens. In other words, it doesn’t matter what most voters want; they must accept the “magic of the market” to be deemed a “democracy.”Thus, in today’s U.S. parlance, “democracy” has come to mean almost the opposite of what it classically meant. Rather than rule by a majority of the people, you have rule by “the market,” which usually translates into rule by local oligarchs, rich foreigners and global banks.Governments that don’t follow these rules – by instead shaping their societies to address the needs of average citizens – are deemed “not free,” thus making them targets of U.S.-funded “non-governmental organizations,” which train activists, pay journalists and coordinate business groups to organize an opposition to get rid of these “un-democratic” governments.
  • ...6 more annotations...
  • If a leader seeks to defend his or her nation’s sovereignty by such means as requiring these NGOs to register as “foreign agents,” the offending government is accused of violating “human rights” and becomes a candidate for more aggressive “regime change.”Currently, one of the big U.S. complaints against Russia is that it requires foreign-funded NGOs that seek to influence policy decisions to register as “foreign agents.” The New York Times and other Western publications have cited this 2012 law as proof that Russia has become a dictatorship, while ignoring the fact that the Russians modeled their legislation after a U.S. law known as the “Foreign Agent Registration Act.”So, it’s okay for the U.S. to label people who are paid by foreign entities to influence U.S. policies as “foreign agents” – and to imprison people who fail to register – but not for Russia to do the same. A number of these NGOs in Russia and elsewhere also are not “independent” entities but instead are financed by the U.S.-funded National Endowment for Democracy (NED) and the U.S. Agency for International Development.
  • There is even a circular element to this U.S. complaint. Leading the denunciation of Russia and other governments that restrain these U.S.-financed NGOs is Freedom House, which marks down countries on its “freedom index” when they balk at letting in this back-door U.S. influence. However, over the past three decades, Freedom House has become essentially a subsidiary of NED, a bought-and-paid-for NGO itself.
  • That takeover began in earnest in 1983 when CIA Director William Casey was focused on creating a funding mechanism to support Freedom House and other outside groups that would engage in propaganda and political action that the CIA had historically organized and financed covertly. Casey helped shape the plan for a congressionally funded entity that would serve as a conduit for this U.S. government money.But Casey recognized the need to hide the CIA’s strings. “Obviously we here [at CIA] should not get out front in the development of such an organization, nor should we appear to be a sponsor or advocate,” Casey said in one undated letter to then-White House counselor Edwin Meese III – as Casey urged creation of a “National Endowment.” [See Consortiumnews.com’s “CIA’s Hidden Hand in ‘Democracy’ Groups.”]Casey’s planning led to the 1983 creation of NED, which was put under the control of neoconservative Carl Gershman, who remains in charge to this day. Gershman’s NED now distributes more than $100 million a year, which included financing scores of activists, journalists and other groups inside Ukraine before last year’s coup and now pays for dozens of projects in Venezuela, the new emerging target for “regime change.”
  • But NED’s cash is only a part of how the U.S. government manipulates events in vulnerable countries. In Ukraine, prior to the February 2014 coup, neocon Assistant Secretary of State Victoria Nuland reminded Ukrainian business leaders that the United States had invested $5 billion in their “European aspirations.”Nuland then handpicked who would be the new leadership, telling U.S. Ambassador Geoffrey Pyatt that “Yats is the guy,” referring to “free market” politician Arseniy Yatsenyuk, who not surprisingly emerged as the new prime minister after a violent coup ousted elected President Viktor Yanukovych on Feb. 22, 2014.The coup also started a civil war that has claimed more than 6,000 lives, mostly ethnic Russians in eastern Ukraine who had supported Yanukovych and were targeted for a ruthless “anti-terrorist operation” spearheaded by neo-Nazi and other far-right militias dispatched by the U.S.-backed regime in Kiev. But Nuland blames everything on Russia’s President Vladimir Putin. [See Consortiumnews.com’s “Nuland’s Mastery of Ukraine Propaganda.”]On top of Ukraine’s horrific death toll, the country’s economy has largely collapsed, but Nuland, Yatsenyuk and other free-marketeers have devised a solution, in line with the wishes of the Washington-based International Monetary Fund: Austerity for the average Ukrainian.
  • Before the Senate Foreign Relations Committee on Tuesday, Nuland hailed “reforms” to turn Ukraine into a “free-market state,” including decisions “to reduce and cap pension benefits, increase work requirements and phase in a higher retirement age; … [and] cutting wasteful gas subsidies.”In other words, these “reforms” are designed to make the hard lives of average Ukrainians even harder – by slashing pensions, removing work protections, forcing people to work into their old age and making them pay more for heat during the winter.‘Sharing’ the Wealth In exchange for those “reforms,” the IMF approved $17.5 billion in aid that will be handled by Ukraine’s Finance Minister Natalie Jaresko, who until last December was a former U.S. diplomat responsible for a U.S. taxpayer-financed $150 million investment fund for Ukraine that was drained of money as she engaged in lucrative insider deals – deals that she has fought to keep secret. Now, Ms. Jaresko and her cronies will get a chance to be the caretakers of more than 100 times more money. [See Consortiumnews.com’s “Ukraine’s Finance Minister’s American ‘Values.’”]
  • Other prominent Americans have been circling around Ukraine’s “democratic” opportunities. For instance, Vice President Joe Biden’s son Hunter was named to the board of directors of Burisma Holdings, Ukraine’s largest private gas firm, a shadowy Cyprus-based company linked to Privat Bank.Privat Bank is controlled by the thuggish billionaire oligarch Ihor Kolomoysky, who was appointed by the Kiev regime to be governor of Dnipropetrovsk Oblast, a south-central province of Ukraine. In this tribute to “democracy,” the U.S.-backed Ukrainian authorities gave an oligarch his own province to rule. Kolomoysky also has helped finance paramilitary forces killing ethnic Russians in eastern Ukraine.Burisma has been lining up well-connected American lobbyists, too, some with ties to Secretary of State John Kerry, including Kerry’s former Senate chief of staff David Leiter, according to lobbying disclosures.As Time magazine reported, “Leiter’s involvement in the firm rounds out a power-packed team of politically-connected Americans that also includes a second new board member, Devon Archer, a Democratic bundler and former adviser to John Kerry’s 2004 presidential campaign. Both Archer and Hunter Biden have worked as business partners with Kerry’s son-in-law, Christopher Heinz, the founding partner of Rosemont Capital, a private-equity company.” [See Consortiumnews.com’s “The Whys Behind the Ukraine Crisis.”]
Paul Merrell

Is NSA Surveillance Mastermind Keith Alexander Selling US Secrets to Wall Street? | VICE United States - 0 views

  • Perhaps you already assume that there's some kind of twisted marriage between Wall Street megabanks and the US global surveillance regime. Why wouldn't there be? But not even a total cynic could have anticipated spymaster Keith Alexander cashing in this hard, this fast. As Bloomberg recently reported, the former National Security Agency chief, who resigned in March at the age of 62, quickly offered his cyber-security expertise at the eye-popping price of $1 million per month to an assortment of shady business lobbies. And now at least one member of Congress is probing this most delightfully dystopian of arrangements, raising the possibility that Alexander will be shamed out of the practice, if nothing else. “Disclosing or misusing classified information for profit is, as Mr. Alexander well knows, a felony. I question how Mr. Alexander can provide any of the services he is offering unless he discloses or misuses classified information, including extremely sensitive sources and methods,” Florida Democratic Rep. Alan Grayson wrote one of the business groups, the Security Industries and Financial Markets Association (SIFMA), which holds it down for Wall Street in Washington. “Without the classified information that he acquired in his former position, he literally would have nothing to offer to you.”
  • In an interview Monday, Grayson was even more strident in his criticism. "Frankly, what the general is doing is beginning to resemble an extortion racket," he told me. "This is a man who basically lied for a living, and he continues to do that." To be clear, what's uniquely outrageous about Alexander, who has apparently lowered his asking price to $600,000, is not that he is a former US official dangling his alleged expertise and the allure of privileged access to government officials before Wall Street. Former Secretary of State Hillary Clinton, who served under Barack Obama and is the odds-on favorite to succeed him, does this all the time, usually at a rate of about $250,000 a pop. (Indeed, one might argue that the very fact she has managed to do so while enjoying a stellar national reputation is what signaled to Alexander he might as well dive headlong through the revolving door.) But the former NSA head presumably knows things about sophisticated intelligence-gathering practices that very, very few people on Earth have been privy to—information that could be useful in the private sector, which has a tendency to collude with the military in ways that made former President and World War II General Dwight Eisenhower very sad.
  • "What could he possibly have that's worth $1 million a month other than classified information?" wonders Melanie Sloan, founder of Citizens for Responsibility and Ethics in Washington (CREW), a good government group. "That's more than former presidents make." Indeed, even former President Bill Clinton, whose corruption since leaving office is by now the stuff of legend, doesn't have the gall to ask for that much per gig. There's a sort of "fuck it!" attitude to what Alexander is doing, seemingly kicking sand in the face of everyone angry at his surveillance regime by getting paid to reflect on the experience of assembling it. More ominously, there's the prospect that Alexander, whether deliberately or otherwise, may have left behind vulnerabilities while running the NSA so as to put himself in prime position to effectively hold the banks hostage now. Certainly, there have been reports suggesting the agency was aware of some vulnerabilities it either could or did not address.   "What is especially troubling is he might actually be worth it," says former North Carolina Democratic Congressman Brad Miller, who worked extensively on financial regulation and Wall Street reform in Congress. "He's obviously not a computer geek. Some of the things that might have seemed paranoid a few years ago now seem more than plausible given what we've already learned the NSA has been doing."
  • ...1 more annotation...
  • In an email, former New York Times reporter and Goldman Sachs regulatory guru Stephen Labaton—who is currently president of communications and influence powerhouse RLM Finsbury and apparently fielding the General's media inquiries—dismissed Grayson's critique and Miller's concerns. "The letter is ludicrous," he wrote me, before adding about Miller, "The congressman’s kidding, right? Will he [Alexander] next be tied to the Kennedy assassination?" But as Marcy Wheeler points out, given that the former NSA boss has spent the last year hyping the incredible risk of catastrophic cyber-attack, as well as the alleged damage done by Edward Snowden (an assessment his successor does not seem to share), it's fair to ask if his consultancy is essentially a scam. That the victims are, for now, Wall Street bankers—some of the least sympathetic human beings around—is a sweet bit of irony. But it doesn't change the bigger picture: In this age of total surveillance and unchecked financial power, the frontiers of corruption never seem to stop expanding.
Paul Merrell

Justin Raimondo: A Covert Affair: Petraeus Caught in the Honeypot? - 0 views

  • So who would have an interest in getting rid of Petraeus? Here’s where the Cantor connection comes in. The tip by an anonymous “FBI employee” that wound up in Cantor’s office two weeks ago came through Rep. David Reichert, Republican of Washington state, who has a friend who knows the whistleblower. Cantor then spoke to the whistleblower directly, who put him in touch with FBI Director Mueller. Cantor is a great friend of Israel, and Petraeus — not so much. The General was attacked, as you’ll recall, by partisans of the Lobby, including Abe Foxman, when he delivered testimony before Congress citing Israel as a strategic liability in the Middle East. As the executor of the new Obamaite policy of sidling up to Islamists, not only in Libya but also in Syria and Egypt, Petraeus was no doubt seen by the Israelis as an enemy to be neutralized.
  • Broadwell’s affiliation with the Jebsen Center, and the Center’s connection to the neoconservative network, sets the scene: a young, attractive woman with impeccable national security credentials throws herself at Petraeus, and he takes the bait. Whether she’s been recruited by a foreign intelligence agency at this point or not is irrelevant: he’s already put himself in a vulnerable position, and there are any number of actors on the international stage more than willing to press their advantage. Will we ever know the full story? At this point, the story is so hot that it may burn the cover story — “it’s all about sex” — right off the wrapper. Because there’s more — a lot more — here than meets the eye. When Cantor pledged to Israeli Prime Minister Benjamin Netanyahu that he and his fellow Republicans “will serve as a check on the administration” in regard to the President’s policy toward Israel, he was clearly aligning himself with a foreign leader against American interests as perceived by the White House. But would he really go this far — deliberately taking down a key figure, one beloved by Republicans, in order to keep his promise to Netanyahu?
  • Update: This morning [11/12/12] the New York Times reports: “F.B.I. agents interviewed Ms. Broadwell for the first time the week of Oct. 21, and she acknowledged the affair, a government official briefed on the matter said. She also voluntarily gave the agency her computer. In a search, the agents discovered several classified documents, which raised the additional question of whether Mr. Petraeus had given them to her. She said that he had not. Agents interviewed Mr. Petraeus the following week. He also admitted to the affair but said he had not given any classified documents to her. The agents then interviewed Ms. Broadwell again on Friday, Nov. 2, the official said.”
Paul Merrell

It Can Happen Here: The Confiscation Scheme Planned for US and UK Depositors - 0 views

  • Confiscating the customer deposits in Cyprus banks, it seems, was not a one-off, desperate idea of a few Eurozone “troika” officials scrambling to salvage their balance sheets. A joint paper by the US Federal Deposit Insurance Corporation and the Bank of England dated December 10, 2012, shows that these plans have been long in the making; that they originated with the G20 Financial Stability Board in Basel, Switzerland (discussed earlier here); and that the result will be to deliver clear title to the banks of depositor funds.  
  • One might wonder why the posting of collateral by a derivative counterparty, at some percentage of full exposure, makes the creditor “secured,” while the depositor who puts up 100 cents on the dollar is “unsecured.” But moving on – Smith writes: Lehman had only two itty bitty banking subsidiaries, and to my knowledge, was not gathering retail deposits. But as readers may recall, Bank of America moved most of its derivatives from its Merrill Lynch operation [to] its depositary in late 2011. Its “depositary” is the arm of the bank that takes deposits; and at B of A, that means lots and lots of deposits. The deposits are now subject to being wiped out by a major derivatives loss. How bad could that be? Smith quotes Bloomberg:
  • The 15-page FDIC-BOE document is called “Resolving Globally Active, Systemically Important, Financial Institutions.”  It begins by explaining that the 2008 banking crisis has made it clear that some other way besides taxpayer bailouts is needed to maintain “financial stability.” Evidently anticipating that the next financial collapse will be on a grander scale than either the taxpayers or Congress is willing to underwrite, the authors state: An efficient path for returning the sound operations of the G-SIFI to the private sector would be provided by exchanging or converting a sufficient amount of the unsecured debt from the original creditors of the failed company [meaning the depositors] into equity [or stock]. In the U.S., the new equity would become capital in one or more newly formed operating entities. In the U.K., the same approach could be used, or the equity could be used to recapitalize the failing financial company itself—thus, the highest layer of surviving bailed-in creditors would become the owners of the resolved firm. In either country, the new equity holders would take on the corresponding risk of being shareholders in a financial institution.
  • ...7 more annotations...
  • No exception is indicated for “insured deposits” in the U.S., meaning those under $250,000, the deposits we thought were protected by FDIC insurance. This can hardly be an oversight, since it is the FDIC that is issuing the directive. The FDIC is an insurance company funded by premiums paid by private banks.
  • If our IOUs are converted to bank stock, they will no longer be subject to insurance protection but will be “at risk” and vulnerable to being wiped out, just as the Lehman Brothers shareholders were in 2008.  That this dire scenario could actually materialize was underscored by Yves Smith in a March 19th post titled When You Weren’t Looking, Democrat Bank Stooges Launch Bills to Permit Bailouts, Deregulate Derivatives.  She writes: In the US, depositors have actually been put in a worse position than Cyprus deposit-holders, at least if they are at the big banks that play in the derivatives casino. The regulators have turned a blind eye as banks use their depositaries to fund derivatives exposures. And as bad as that is, the depositors, unlike their Cypriot confreres, aren’t even senior creditors. Remember Lehman? When the investment bank failed, unsecured creditors (and remember, depositors are unsecured creditors) got eight cents on the dollar. One big reason was that derivatives counterparties require collateral for any exposures, meaning they are secured creditors. The 2005 bankruptcy reforms made derivatives counterparties senior to unsecured lenders.
  • Although few depositors realize it, legally the bank owns the depositor’s funds as soon as they are put in the bank. Our money becomes the bank’s, and we become unsecured creditors holding IOUs or promises to pay. (See here and here.) But until now the bank has been obligated to pay the money back on demand in the form of cash. Under the FDIC-BOE plan, our IOUs will be converted into “bank equity.”  The bank will get the money and we will get stock in the bank. With any luck we may be able to sell the stock to someone else, but when and at what price? Most people keep a deposit account so they can have ready cash to pay the bills.
  • . . . Bank of America’s holding company . . . held almost $75 trillion of derivatives at the end of June . . . . That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show. $75 trillion and $79 trillion in derivatives! These two mega-banks alone hold more in notional derivatives each than the entire global GDP (at $70 trillion).
  • Are you safe, then, if your money is in gold and silver? Apparently not – if it’s stored in a safety deposit box in the bank.  Homeland Security has reportedly told banks that it has authority to seize the contents of safety deposit boxes without a warrant when it’s a matter of “national security,” which a major bank crisis no doubt will be.
  • Another alternative was considered but rejected by President Obama in 2009: nationalize mega-banks that fail. In a February 2009 article titled “Are Uninsured Bank Depositors in Danger?“, Felix Salmon discussed a newsletter by Asia-based investment strategist Christopher Wood, in which Wood wrote: It is . . . amazing that Obama does not understand the political appeal of the nationalization option. . . . [D]espite this latest setback nationalization of the banks is coming sooner or later because the realities of the situation will demand it. The result will be shareholders wiped out and bondholders forced to take debt-for-equity swaps, if not hopefully depositors.
  • President Obama acknowledged that bank nationalization had worked in Sweden, and that the course pursued by the US Fed had not worked in Japan, which wound up instead in a “lost decade.”  But Obama opted for the Japanese approach because, according to Ed Harrison, “Americans will not tolerate nationalization.” But that was four years ago. When Americans realize that the alternative is to have their ready cash transformed into “bank stock” of questionable marketability, moving failed mega-banks into the public sector may start to have more appeal.
Paul Merrell

It Can Happen Here: The Confiscation Scheme Planned for US and UK Depositors | WEB OF DEBT BLOG - 0 views

  • Confiscating the customer deposits in Cyprus banks, it seems, was not a one-off, desperate idea of a few Eurozone “troika” officials scrambling to salvage their balance sheets. A joint paper by the US Federal Deposit Insurance Corporation and the Bank of England dated December 10, 2012, shows that these plans have been long in the making; that they originated with the G20 Financial Stability Board in Basel, Switzerland (discussed earlier here); and that the result will be to deliver clear title to the banks of depositor funds.  
  • Although few depositors realize it, legally the bank owns the depositor’s funds as soon as they are put in the bank. Our money becomes the bank’s, and we become unsecured creditors holding IOUs or promises to pay. (See here and here.) But until now the bank has been obligated to pay the money back on demand in the form of cash. Under the FDIC-BOE plan, our IOUs will be converted into “bank equity.”  The bank will get the money and we will get stock in the bank. With any luck we may be able to sell the stock to someone else, but when and at what price? Most people keep a deposit account so they can have ready cash to pay the bills.
  • No exception is indicated for “insured deposits” in the U.S., meaning those under $250,000, the deposits we thought were protected by FDIC insurance. This can hardly be an oversight, since it is the FDIC that is issuing the directive. The FDIC is an insurance company funded by premiums paid by private banks.  The directive is called a “resolution process,” defined elsewhere as a plan that “would be triggered in the event of the failure of an insurer . . . .”
  • ...7 more annotations...
  • The 15-page FDIC-BOE document is called “Resolving Globally Active, Systemically Important, Financial Institutions.”  It begins by explaining that the 2008 banking crisis has made it clear that some other way besides taxpayer bailouts is needed to maintain “financial stability.” Evidently anticipating that the next financial collapse will be on a grander scale than either the taxpayers or Congress is willing to underwrite, the authors state: An efficient path for returning the sound operations of the G-SIFI to the private sector would be provided by exchanging or converting a sufficient amount of the unsecured debt from the original creditors of the failed company [meaning the depositors] into equity [or stock]. In the U.S., the new equity would become capital in one or more newly formed operating entities. In the U.K., the same approach could be used, or the equity could be used to recapitalize the failing financial company itself—thus, the highest layer of surviving bailed-in creditors would become the owners of the resolved firm. In either country, the new equity holders would take on the corresponding risk of being shareholders in a financial institution.
  • If our IOUs are converted to bank stock, they will no longer be subject to insurance protection but will be “at risk” and vulnerable to being wiped out, just as the Lehman Brothers shareholders were in 2008.  That this dire scenario could actually materialize was underscored by Yves Smith in a March 19th post titled When You Weren’t Looking, Democrat Bank Stooges Launch Bills to Permit Bailouts, Deregulate Derivatives.  She writes: In the US, depositors have actually been put in a worse position than Cyprus deposit-holders, at least if they are at the big banks that play in the derivatives casino. The regulators have turned a blind eye as banks use their depositaries to fund derivatives exposures. And as bad as that is, the depositors, unlike their Cypriot confreres, aren’t even senior creditors. Remember Lehman? When the investment bank failed, unsecured creditors (and remember, depositors are unsecured creditors) got eight cents on the dollar. One big reason was that derivatives counterparties require collateral for any exposures, meaning they are secured creditors. The 2005 bankruptcy reforms made derivatives counterparties senior to unsecured lenders.
  • Smith writes: Lehman had only two itty bitty banking subsidiaries, and to my knowledge, was not gathering retail deposits. But as readers may recall, Bank of America moved most of its derivatives from its Merrill Lynch operation [to] its depositary in late 2011. Its “depositary” is the arm of the bank that takes deposits; and at B of A, that means lots and lots of deposits. The deposits are now subject to being wiped out by a major derivatives loss. How bad could that be? Smith quotes Bloomberg: . . . Bank of America’s holding company . . . held almost $75 trillion of derivatives at the end of June . . . . That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show.
  • $75 trillion and $79 trillion in derivatives! These two mega-banks alone hold more in notional derivatives each than the entire global GDP (at $70 trillion).
  • Smith goes on: . . . Remember the effect of the 2005 bankruptcy law revisions: derivatives counterparties are first in line, they get to grab assets first and leave everyone else to scramble for crumbs. . . . Lehman failed over a weekend after JP Morgan grabbed collateral. But it’s even worse than that. During the savings & loan crisis, the FDIC did not have enough in deposit insurance receipts to pay for the Resolution Trust Corporation wind-down vehicle. It had to get more funding from Congress. This move paves the way for another TARP-style shakedown of taxpayers, this time to save depositors. Perhaps, but Congress has already been burned and is liable to balk a second time. Section 716 of the Dodd-Frank Act specifically prohibits public support for speculative derivatives activities.
  • An FDIC confiscation of deposits to recapitalize the banks is far different from a simple tax on taxpayers to pay government expenses. The government’s debt is at least arguably the people’s debt, since the government is there to provide services for the people. But when the banks get into trouble with their derivative schemes, they are not serving depositors, who are not getting a cut of the profits. Taking depositor funds is simply theft. What should be done is to raise FDIC insurance premiums and make the banks pay to keep their depositors whole, but premiums are already high; and the FDIC, like other government regulatory agencies, is subject to regulatory capture.  Deposit insurance has failed, and so has the private banking system that has depended on it for the trust that makes banking work.
  • The Cyprus haircut on depositors was called a “wealth tax” and was written off by commentators as “deserved,” because much of the money in Cypriot accounts belongs to foreign oligarchs, tax dodgers and money launderers. But if that template is applied in the US, it will be a tax on the poor and middle class. Wealthy Americans don’t keep most of their money in bank accounts.  They keep it in the stock market, in real estate, in over-the-counter derivatives, in gold and silver, and so forth. Are you safe, then, if your money is in gold and silver? Apparently not – if it’s stored in a safety deposit box in the bank.  Homeland Security has reportedly told banks that it has authority to seize the contents of safety deposit boxes without a warrant when it’s a matter of “national security,” which a major bank crisis no doubt will be.
  •  
    Time to get your money out of the bank and into gold or silver, kept somewhere other than in a bank safety deposit box. 
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

ACLU Demands Secret Court Hand Over Crucial Rulings On Surveillance Law - 0 views

  • The American Civil Liberties Union (ACLU) has filed a motion to reveal the secret court opinions with “novel or significant interpretations” of surveillance law, in a renewed push for government transparency. The motion, filed Wednesday by the ACLU and Yale Law School’s Media Freedom and Information Access Clinic, asks the Foreign Intelligence Surveillance Act (FISA) Court, which rules on intelligence gathering activities in secret, to release 23 classified decisions it made between 9/11 and the passage of the USA Freedom Act in June 2015. As ACLU National Security Project staff attorney Patrick Toomey explains, the opinions are part of a “much larger collection of hidden rulings on all sorts of government surveillance activities that affect the privacy rights of Americans.” Among them is the court order that the government used to direct Yahoo to secretly scanits users’ emails for “a specific set of characters.” Toomey writes: These court rulings are essential for the public to understand how federal laws are being construed and implemented. They also show how constitutional protections for personal privacy and expressive activities are being enforced by the courts. In other words, access to these opinions is necessary for the public to properly oversee their government.
  • Although the USA Freedom Act requires the release of novel FISA court opinions on surveillance law, the government maintains that the rule does not apply retroactively—thereby protecting the panel from publishing many of its post-9/11 opinions, which helped create an “unprecedented buildup” of secret surveillance laws. Even after National Security Agency (NSA) whistleblower Edward Snowden revealed the scope of mass surveillance in 2013, sparking widespread outcry, dozens of rulings on spying operations remain hidden from the public eye, which stymies efforts to keep the government accountable, civil liberties advocates say. “These rulings are necessary to inform the public about the scope of the government’s surveillance powers today,” the ACLU’s motion states.
  • Toomey writes that the rulings helped influence a number of novel spying activities, including: The government’s use of malware, which it calls “Network Investigative Techniques” The government’s efforts to compel technology companies to weaken or circumvent their own encryption protocols The government’s efforts to compel technology companies to disclose their source code so that it can identify vulnerabilities The government’s use of “cybersignatures” to search through internet communications for evidence of computer intrusions The government’s use of stingray cell-phone tracking devices under the Foreign Intelligence Surveillance Act (FISA) The government’s warrantless surveillance of Americans under FISA Section 702—a controversial authority scheduled to expire in December 2017 The bulk collection of financial records by the CIA and FBI under Section 215 of the Patriot Act Without these rulings being made public, “it simply isn’t possible to understand the government’s claimed authority to conduct surveillance,” Toomey writes. As he told The Intercept on Wednesday, “The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow. These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”
‹ Previous 21 - 40 of 126 Next › Last »
Showing 20 items per page