Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "target-sharing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

Sloppy Cyber Threat Sharing Is Surveillance by Another Name | Just Security - 0 views

  • Imagine you are the target of a phishing attack: Someone sends you an email attachment containing malware. Your email service provider shares the attachment with the government, so that others can configure their computer systems to spot similar attacks. The next day, your provider gets a call. It’s the Department of Homeland Security (DHS), and they’re curious. The malware appears to be from Turkey. Why, DHS wants to know, might someone in Turkey be interested in attacking you? So, would your email company please share all your emails with the government? Knowing more about you, investigators might better understand the attack. Normally, your email provider wouldn’t be allowed to give this information over without your consent or a search warrant. But that could soon change. The Senate may soon make another attempt at passing the Cybersecurity Information Sharing Act, a bill that would waive privacy laws in the name of cybersecurity. In April, the US House of Representatives passed by strong majorities two similar “cyber threat” information sharing bills. These bills grant companies immunity for giving DHS information about network attacks, attackers, and online crimes.
  • Sharing information about security vulnerabilities is a good idea. Shared vulnerability data empowers other system operators to check and see if they, too, have been attacked, and also to guard against being similarly attacked in the future. I’ve spent most of my career fighting for researchers’ rights to share this kind of information against threats from companies that didn’t want their customers to know their products were flawed. But, these bills gut legal protections against government fishing expeditions exactly at a time when individuals and Internet companies need privacy laws to get stronger, not weaker. 
  • Worse, the bills aren’t needed. Private companies share threat data with each other, and even with the government, all the time. The threat data that security professionals use to protect networks from future attacks is a far more narrow category of information than those included in the bills being considered by Congress, and will only rarely contain private information. And none of the recent cyberattacks — not Sony, not Target, and not the devastating grab of sensitive background check interviews on government employees at the Office of Personnel Management — would have been mitigated by these bills.
12More

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com - 0 views

  • Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.
  • While the names of some political and diplomatic leaders have previously emerged as targets, the newly disclosed intelligence documents provide a much fuller portrait of the spies’ sweeping interests in more than 60 countries. Britain’s Government Communications Headquarters, working closely with the National Security Agency, monitored the communications of senior European Union officials, foreign leaders including African heads of state and sometimes their family members, directors of United Nations and other relief programs, and officials overseeing oil and finance ministries, according to the documents. In addition to Israel, some targets involved close allies like France and Germany, where tensions have already erupted over recent revelations about spying by the N.S.A.
  • Details of the surveillance are described in documents from the N.S.A. and Britain’s eavesdropping agency, known as GCHQ, dating from 2008 to 2011. The target lists appear in a set of GCHQ reports that sometimes identify which agency requested the surveillance, but more often do not. The documents were leaked by the former N.S.A. contractor Edward J. Snowden and shared by The New York Times, The Guardian and Der Spiegel. The reports are spare, technical bulletins produced as the spies, typically working out of British intelligence sites, systematically tapped one international communications link after another, focusing especially on satellite transmissions. The value of each link is gauged, in part, by the number of surveillance targets found to be using it for emails, text messages or phone calls. More than 1,000 targets, which also include people suspected of being terrorists or militants, are in the reports. It is unclear what the eavesdroppers gleaned. The documents include a few fragmentary transcripts of conversations and messages, but otherwise contain only hints that further information was available elsewhere, possibly in a larger database.
  • ...8 more annotations...
  • Ms. Hansen, the spokeswoman for the European Commission, said that it was already engaged in talks with the United States that were “needed to restore trust and confidence in the trans-Atlantic relationship.” She added that “the commission will raise these new allegations with U.S. and U.K. authorities.”
  • Also appearing on the surveillance lists is Joaquín Almunia, vice president of the European Commission, which, among other powers, has oversight of antitrust issues in Europe. The commission has broad authority over local and foreign companies, and it has punished a number of American companies, including Microsoft and Intel, with heavy fines for hampering fair competition. The reports say that spies intercepted Mr. Almunia’s communications in 2008 and 2009. Mr. Almunia, a Spaniard, assumed direct authority over the commission’s antitrust office in 2010. He has been involved in a three-year standoff with Google over how the company runs its search engine. Competitors of the online giant had complained that it was prioritizing its own search results and using content like travel reviews and ratings from other websites without permission. While pushing for a settlement with Google, Mr. Almunia has warned that the company could face large fines if it does not cooperate.
  • Some condemned the surveillance on Friday as unjustified and improper. “This is not the type of behavior that we expect from strategic partners,” Pia Ahrenkilde Hansen, a spokeswoman for the European Commission, said on the latest revelations of American and British spying in Europe. Some of the surveillance relates to issues that are being scrutinized by President Obama and a panel he appointed in Washington that on Wednesday recommended tighter limits on the N.S.A., particularly on spying of foreign leaders, especially allies.
  • “We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman. But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.
  • The surveillance reports show American and British spies’ deep appetite for information. The French companies Total, the oil and gas giant, and Thales, an electronics, logistics and transportation outfit, appear as targets, as do a French ambassador, an “Estonian Skype security team” and the German Embassy in Rwanda.
  • Multiple United Nations Missions in Geneva are listed as targets, including Unicef and the United Nations Institute for Disarmament Research. So is Médecins du Monde, a medical relief organization that goes into war-ravaged areas. Leigh Daynes, an executive director of the organization in Britain, responded to news about the surveillance by saying: “There is absolutely no reason for our operations to be secretly monitored.” More obvious intelligence targets are also listed, though in smaller numbers, including people identified as “Israeli grey arms dealer,” “Taleban ministry of refugee affairs” and “various entities in Beijing.” Some of those included are described as possible members of Al Qaeda, and as suspected extremists or jihadists.
  • While few if any American citizens appear to be named in the documents, they make clear that some of the intercepted communications either began or ended in the United States and that N.S.A. facilities carried out interceptions around the world in collaboration with their British partners. Some of the interceptions appear to have been made at the Sugar Grove, W.Va., listening post run by the N.S.A. and code-named Timberline, and some are explicitly tied to N.S.A. target lists in the reports.
  • Strengthening the likelihood that full transcripts were taken during the intercepts is the case of Mohamed Ibn Chambas, an official of the Economic Community of West African States, known as Ecowas, a regional initiative of 15 countries that promotes economic and industrial activity. Whether intentionally or through some oversight, when Mr. Chambas’s communications were intercepted in August 2009, dozens of his complete text messages were copied into one of the reports.
  •  
    No mention of any "terrorist" targets. Could it be that Snowden and Greenwald are right, that the surveillance is not about terrorism at all? Surely our nation's leaders would not lie to us about that. Right. The Politics of Fear.
4More

Activists send the Senate 6 million faxes to oppose cyber bill - CBS News - 0 views

  • Activists worried about online privacy are sending Congress a message with some old-school technology: They're sending faxes -- more than 6.2 million, they claim -- to express opposition to the Cybersecurity Information Sharing Act (CISA).Why faxes? "Congress is stuck in 1984 and doesn't understand modern technology," according to the campaign Fax Big Brother. The week-long campaign was organized by the nonpartisan Electronic Frontier Foundation, the group Access and Fight for the Future, the activist group behind the major Internet protests that helped derail a pair of anti-piracy bills in 2012. It also has the backing of a dozen groups like the ACLU, the American Library Association, National Association of Criminal Defense Lawyers and others.
  • CISA aims to facilitate information sharing regarding cyberthreats between the government and the private sector. The bill gained more attention following the massive hack in which the records of nearly 22 million people were stolen from government computers."The ability to easily and quickly share cyber attack information, along with ways to counter attacks, is a key method to stop them from happening in the first place," Sen. Dianne Feinstein, D-California, who helped introduce CISA, said in a statement after the hack. Senate leadership had planned to vote on CISA this week before leaving for its August recess. However, the bill may be sidelined for the time being as the Republican-led Senate puts precedent on a legislative effort to defund Planned Parenthood.Even as the bill was put on the backburner, the grassroots campaign to stop it gained steam. Fight for the Future started sending faxes to all 100 Senate offices on Monday, but the campaign really took off after it garnered attention on the website Reddit and on social media. The faxed messages are generated by Internet users who visit faxbigbrother.com or stopcyberspying.com -- or who simply send a message via Twitter with the hashtag #faxbigbrother. To send all those faxes, Fight for the Future set up a dedicated server and a dozen phone lines and modems they say are capable of sending tens of thousands of faxes a day.
  • Fight for the Future told CBS News that it has so many faxes queued up at this point, that it may take months for Senate offices to receive them all, though the group is working on scaling up its capability to send them faster. They're also limited by the speed at which Senate offices can receive them.
  •  
    From an Fight For the Future mailing: "Here's the deal: yesterday the Senate delayed its expected vote on CISA, the Cybersecurity Information Sharing Act that would let companies share your private information--like emails and medical records--with the government. "The delay is good news; but it's a delay, not a victory. "We just bought some precious extra time to fight CISA, but we need to use it to go big like we did with SOPA or this bill will still pass. Even if we stop it in September, they'll try again after that. "The truth is that right now, things are looking pretty grim. Democrats and Republicans have been holding closed-door meetings to work out a deal to pass CISA quickly when they return from recess. "Right before the expected Senate vote on CISA, the Obama Administration endorsed the bill, which means if Congress passes it, the White House will definitely sign it.  "We've stalled and delayed CISA and bills like it nearly half a dozen times, but this month could be our last chance to stop it for good." See also http://tumblr.fightforthefuture.org/post/125953876003/senate-fails-to-advance-cisa-before-recess-amid (;) http://www.cbsnews.com/news/activists-send-the-senate-6-million-faxes-to-oppose-cyber-bill/ (;) http://www.npr.org/2015/08/04/429386027/privacy-advocates-to-senate-cyber-security-bill (.)
4More

11,000 Icelanders Offer To House Syrian Refugees - 0 views

  • The Icelandic government is reconsidering its national refugee quota after a social media campaign resulted in over 11,000 Icelanders offering up a room in their homes to refugees. As Europe struggles to cope with unprecedented levels of those seeking shelter, residents of the sparsely populated Nordic island country resorted to direct action to pressure their leaders. Iceland was recently awarded the title of “most peaceful country” in the Global Peace Index, with Syria ranking the least peaceful. With a population of 330,000 — less than many European cities — the country’s government had previously stated it could only take in 50 people this year. Taking matters into their own hands, over 16,000 Icelanders joined a Facebook page created on Sunday to pressurize the Icelandic government into accepting more refugees. In addition to offering rooms in homes, people have pledged financial support with air fares, language teaching, clothing, food, and toys, and the page has been inundated with messages of gratitude from Syrians, some of whom are writing from refugee camps. As a result of the outpouring of support, Icelandic Prime Minister Sigmundur David Gunnlaugsson announced that a committee is being formed to re-assess the country’s current policy.
  • Undoubtedly, thousands of people across the globe are equally horrified. Inspired by Iceland’s example, social media campaigns have sprung up and united those who are dismayed by the pitiful humanitarian response to the crisis. As distressing images and stories of the hurdles and barriers faced at every turn by those seeking sanctuary saturate the European press, similar schemes have snowballed throughout Europe. In Britain, more and more people are condemning the government’s shameful response to the crisis — a response particularly ironic considering most refugees are fleeing conflicts that the U.K.’s imperialist interventions have directly contributed to. .BottomResponsiveBanner { width: 300px; height: 250px; } @media (min-width:420px) { .BottomResponsiveBanner { width: 336px; height: 280px; } } @media (min-width:1300px) { .BottomResponsiveBanner { width: 728px; height: 90px; } } Not prepared to sit back, groups like Citizens UK are pressuring U.K. leaders to step up to the plate. More than 250,000 Brits have signed a petition calling for Britain to take its fair share of Syrian refugees. Ireland’s ”Pledge a Bed” campaign was overwhelmed with thousands of offers of spare rooms within hours of its launch while hundreds of Germans have offered to share their homes on the Refugees Welcome website.
  • Swiftly following suit and not to be outdone, offers of support haven’t stopped at Europe’s shores. A U.S. group called Open Homes, Open Hearts US – for Syrian refugees launched earlier this week. With no easy answers and no end in sight, the political firestorm will continue, as will the global outrage at the humanitarian tragedy. The only thing clear is that if the West were prepared to accept more refugees, desperate families wouldn’t be forced to rely on smugglers or to climb into perilous boats and refrigeration lorries.
  •  
    Many reports in the last couple of weeks show that a wave of sympathy for war refugees is sweeping Europe in reaction to government efforts to prevent refugees from reaching Europe and forcing those already there into guarded camps. And the connection of those refugees to European foreign policy and participation in wars in the Mideast is being made. The propaganda paint of NATO nations waging "humanitarian" wars in the Mideast is definitely chipping off. 
5More

Australia's criminlisation of dissent: anti-protest law is an ominous sign of the times... - 0 views

  • Australia’s criminlisation of dissent: anti-protest law is an ominous sign of the times Share This Tags AustraliaTasmania Brendan Gogarty (TC) : The Workplaces (Protection from Protesters) Bill – locally known as the “anti-protest” bill – was passed by Tasmanian parliament late on Tuesday night. The law was introduced as part of the government’s intention to “re-build Tasmania’s forestry industry”. That is a source of controversy and division in Tasmanian society. To achieve its aim, the government has committed itself to a wide legislative agenda. This includes: amending the uniform Defamation Act 2005 to allow large companies to sue protesters; defunding community and conservation organisations; and tearing up a “peace deal” between foresters and conservationists, which had been enacted into law before the 2014 election.
  • Recognising the potential return to hostilities, the government said it would “not try and appease” protesters, but would rather “toughen the law to deter them”. The anti-protest law is its chosen mechanism of deterrence. While such hard-line policies on political opposition are not new, the severity and breadth of the law to enforce such a policy arguably is. The shift from hard-line policy to hard-line law is worrisome in a constitutional democracy. The spread of state anti-bikie laws in Australia illustrates why this law is not just of concern for Tasmanians.
  • The new law covers all acts on, or acts inhibiting access to, a business premises (all public and private land, including forestry and mining lands) which are: … in furtherance of, or for the purposes of promoting awareness of or support for an opinion, or belief, in respect of a political, environmental, social, cultural or economic issue. Any such protest is subject to significant penalties if they interrupt “business activity”. While originally such sanctions were mandatory, the government agreed in the upper house to exchange these for discretionary penalties. However, the government agreed to this only on condition that the subsequent maximum penalties would be significantly increased. This was to “send a strong message” to protesters and the courts charged with punishing them. As a consequence, protesters who repeatedly interrupt business face fines of up to A$10,000 and four years in jail.
  • ...1 more annotation...
  • From its inception, the law has been criticised by domestic and international lawyers. Three United Nations human rights rapporteurs considered the bill to breach international law, one describing it as “shocking”. They considered the legislation, as originally envisioned, to be: … disproportionate and unnecessary [creating a] chilling effect of silencing dissenters … [who are] key to raising awareness about human rights, political, [and] social concerns … holding not just governments, but also corporations accountable. A wide range of legal professionals have voiced similar criticisms. While the removal of mandatory penalties alleviated some concerns, the larger concern about a law designed solely to punish people for protesting against controversial business activities – especially publicly supported and funded ones – remains.
  •  
    Australia has neither constitution nor Bill of Rights. It shows.
3More

NARA Backs Away from CIA Email Destruction Proposal - 0 views

  • The National Archives and Records Administration told the Central Intelligence Agency last week that it was withholding approval of a CIA proposal to allow the destruction of the email records of all but 22 senior Agency officials. “NARA intends to reassess the Central Intelligence Agency (CIA) proposal for the disposition of non-senior email accounts,” wrote Paul M. Wester, Jr., Chief Records Officer at NARA in a November 20 letter to Joseph Lambert, Director of Information Management Services at CIA. “Based on comments from Members of the U.S. Senate Select Committee on Intelligence and a number of public interest groups, we are concerned about the scope of the proposed schedule and the proposed retention periods,” Mr. Wester wrote. Based on a preliminary review of the CIA proposal, NARA had initially recommended approval of the plan, Secrecy News reported last month. (“CIA Asks to Destroy Email of Non-Senior Officials,” October 1.)
  • But critical comments that were submitted to NARA — from the Federation of American Scientists, Openthegovernment.org and other public interest groups and individuals, the Department of Defense Chief Defense Counsel, and especially from Senators Feinstein and Chambliss, the leaders of the Senate Intelligence Committee, and Senators Wyden, Udall and Heinrich, Members of the Committee — turned the tide and blocked the proposal in its current form. “We will hold a public meeting on this schedule in the coming months to address the comments raise by you and others and to share how NARA is moving forward,” wrote Margaret Hawkins of NARA Records Management Services in an email message today. “This meeting will be announced in the Federal Register and will be open to all commenters and the public.” For related coverage, see: “The CIA Wants To Delete Old Email; Critics Say ‘Not So Fast'” by David Welna, NPR All Things Considered, November 20; “Top Senators Oppose CIA Move to Destroy Email” by Siobhan Gorman, Wall Street Journal, November 19; “National Archives: Ok, So Maybe Letting The CIA Destroy Emails Wasn’t A Great Idea” by Ali Watkins, Huffington Post, November 21; and “Furor Over CIA Shake-Up of Email System” by Adam Klasfeld, Courthouse News Service, November 7.
  •  
    The CIA's request for permission to destroy the emails was based on the bald assertion that all information contained in the emails of historical significance had already been incorporated in more formal reports, without any actual study of the email contents. The very notion is preposterous.
4More

Video Shared By Trump Featured US-Backed FSA Commander Destroying Virgin Mary Statue In... - 0 views

  • While Trump's Twitter activity from yesterday continues to drive media and political outrage, especially in the UK, and with the focus of the frenzied coverage being that the president retweeted a far-right U.K. leader's "anti-Muslim videos", there is actually something much more interesting concerning the context to the “Muslim Destroys A Statue Of Virgin Mary” video. That particular video shared by the president is from 2013 and shows a Free Syrian Army (FSA) commander named Omar Gharba destroying a Virgin Mary statue as the group invaded a Syrian Christian town. In a geopolitical and deeply ironic twist demonstrating the absurdity and contradictions of US foreign policy, the radical Islamist commander was actually supported by the United States at the time as part of the FSA, which the media and US government deemed "moderate".  So a sitting US president shared a video which reveals a Syrian "rebel" fighter committing war crimes who was part of one of the very groups backed by the CIA as official US policy under the Obama administration. Of course it is likely that Trump himself is not fully aware of this, yet the astounding geopolitical irony in this should not be missed, even as public outrage is reduced to merely discussing "anti-Muslim bigotry" and whether or not Trump is being "presidential".
  • nd while multiple media outlets, for example NPR, continue to claim the videos are "unverified" and "have no context" or are of "murky origins" (as the Washington Post wrongly claims), this particular video especially was widely shared and discussed among the world's top Syria analysts and Middle East scholars at the time. The video was taken in 2013 and shows the Wahhabi cleric and FSA commander smashing the Christian statue in connection with the US-backed group's prior attack on Yakubiya in Idlib province. The book, The Islamic State: Combating The Caliphate Without Borders, authored by counter-terrorism experts Yonah and Dean Alexander, gives his full name as Omar Gharba al-Khojji and like vast numbers of FSA fighters he eventually jointed ISIS (some online sources alternately list his name as Omar Raghba).
  • akubiyah was a mostly Christian village principally comprised of Armenian Orthodox and Catholic churches which after being taken over by the FSA was subsequently held by ISIS. The local Christians saw no distinction between the invading FSA and ISIS fighters as it was primarily the US-backed FSA which began massacring Christians and looting churches. Even the US government funded Voice of America news had this to say based on an interview with a Christian survivor: Christian refugees described to VOA the execution of a half dozen of their co-religionists in the northwestern village of al-Yakubiye, in Idlib province, by Sunni Muslims aligned with the Western-backed Free Syrian Army. Rahel, a 45-year-old former teacher, said, “Al Nusra didn’t come to our village; the people who came were from villages close by, and they were Free Syrian Army.”   ...Nearly a third of Syria’s Christians, an estimated 600,000, have fled the country. Before the war, Christians accounted for about 10 percent of Syria’s population of 22 million. And The Daily Beast also confirmed at the time that "nearly all Christians have fled [Yakubiyah] after half a dozen were executed with their heads chopped off and about 20 more were kidnapped" by the US sponsored FSA. Furthermore, an October 2013 report in Arabic media confirmed that, Terrorists belonging to al-Nusra front broke into homes in Yakubiyah in Syria's Idlib province, killed a Chrisitan man and destroyed a Virgin Mary statue. Upon arrival at a house that had the statue of virgin Mary, Wahhabi cleric, Omar Gharba' carried the statue of the Virgin Mary after it was taken over by militants from the "Islamic State in Iraq and the Levant" (ISIL) and broke it by throwing it on the ground. He stated that he and his fellow Wahhabis won't tolerate any form of worship except strict Wahhabism of Saudi Arabia.   "God willing, Only God will be worshipped in the land of the Levant," the terrorist who destroyed the statue said, noting that "no other idol will be worshiped after these days . We won't accept but the religion of Allah and the Sunnah of our Prophet Mohammed bin Abdullah." In 2012 and 2013 Omar Gharba's name appeared somewhat frequently in Western news reports as he was interviewed on a few occasions and presented as a "moderate" rebel, for example by BBC Arabic in 2012. The below video is one such example of Omar Gharba insisting that he and his fellow FSA militants would be tolerant and respectful of Christians and other religious minorities should they inherit power by toppling the Assad government  - though he was subsequently outed as the destroyer of the Virgin Mary statue, as the edit of the video interview makes clear.
  • ...1 more annotation...
  • nd we know the rest of the story well: the media swallowed and presented such lies of FSA rebel commanders wholesale. But in terms of exposing this false history of a "moderate" uprising and revolution in Syria, Trump's tweet could actually serve to educate the public, just not in a way the media would have us believe. To Trump's credit, he announced last summer that he shut down the CIA program of covert support to rebel factions in Syria. This came after he viewed a gruesome video which showed "moderate" fighters beheading a child which reportedly helped him make the decision.
4More

Central Bankers: By 2019 Get Ready For the End of 'Too Big to Fail' | nsnbc international - 0 views

  • Mark Carney, chairman of the Financial Stability Board (FSB) and governor of the Bank of England (BoE) has proposed new rules to put an end to the concept of “too big to fail” and taxpayer banker bailouts. Carney said: Once implemented, these agreements will play important roles in enabling globally systemic banks to be resolved (wound down) without recourse to public subsidy and without disruption to the wider financial system.”
  • The total loss-absorbing capacity (TLAC) of the past has allowed for the banks to benefit from taxpayer injections of cash to compensate for speculative betting on the stock market. Now banks “will have to fund themselves with loss-absorbing capital equal to 16-20% of their risk-weighted assets.” The 30 largest banks in the world are considered “systematically important” and affected by TLAC rules; however certain loopholes in the new rules could facilitate “different market conditions” paving the way for a specific assessment of an individual case to “even the playing field”.
  • Proposed ideas include the inception of “Goldman Sachs and HSBC [to] have a buffer of bonds or equity equivalent to at least 16 to 20 percent of their risk-weighted assets, such as loans, from January 2019.” Set in motion in 2013, the Bank of International Settlements (BIS) and the Basel Committee on Banking Supervisors (BCBS) has applied the underlying pressure on US banks to liquidate to appease global markets. The American taxpayer is picking up the tab for this turn of events. BIS is giving these banks until 2019 to comply with their new rules. Capital to prop up the banks will be needed while they liquidate assets such as bonds, mortgages, loans and stock shares.
  • ...1 more annotation...
  • The European Central Bank (ECB) is setting the stage of a complete financial collapse of fiat currencies across the globe. Joining in the scheme are other technocratic institutions such as the Federal Reserve, the Bank of Canada, the Bank of England, the Bank of Japan and the Swiss National Bank.
4More

Fresh spy leak shows Australia offered to share data on its citizens - 0 views

  • Information about ordinary Australian citizens has been offered to Australia's global spying partners, according to the latest reports of leaked intelligence from US whistleblower Edward Snowden. In revelations that will add pressure to the Abbott government, which is still reeling from the Indonesian spying leak, The Guardian is reporting that Australia's surveillance agency has indicated it would share “bulk” data with its “5-eyes” partners – an intelligence-sharing network comprising the US, Britain, Canada, New Zealand and Australia.
  • “The document shows the partners discussing whether or not to share 'medical, legal or religious information',” the report states. Advertisement <iframe id="dcAd-1-4" src="http://ad-apac.doubleclick.net/N6411/adi/onl.smh.news/federalpolitics/politicalnews;cat=federalpolitics;cat1=politicalnews;ctype=article;pos=3;sz=300x250;tile=4;ord=3.4276163E7?" width='300' height='250' scrolling="no" marginheight="0" marginwidth="0" allowtransparency="true" frameborder="0"> </iframe> The latest spying revelations are based on a secret 2008 document obtained by Mr Snowden, a former contractor who had access to high-level US government intelligence. Mr Snowden's document reveals notes of what was discussed at a “5-eyes” conference hosted by Britain's GCHQ in Cheltenham on April 22-23, 2008. According to the report, Australia's intelligence agency, then known as the Defence Signals Directorate, told its global intelligence partners it could share “bulk, unselected, unminimised metadata as long as there is no intent to target an Australian national”.
  • The partners also agreed that medical, legal or religious would not be automatically excluded from the sharing arrangement, but would instead be considered by the owning agency ‘‘on a case-by-case basis’’.  The Australian intelligence agency was reportedly willing to reveal more about its country's citizens, with fewer privacy restraints, than other countries. According to The Guardian’s report, the documents reveal that Canada imposed more rigorous privacy restrictions than Australia, agreeing to share information on the condition that information about its citizens first be redacted. Prime Minister Tony Abbott said he was confident Australian intelligence agencies were acting in accordance with the law and there were adequate safeguards in place.
  •  
    Sharing "medical, legal, or religious information." 
12More

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
7More

Fresno Police Roll Out Dystopian 'Threat Ranking' System - 0 views

  • “On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.” Though the intricate surveillance apparatus described above seems straight from a dystopic novel, it is actually the Washington Post’s recent description of the the visual data collection system employed by a local California police department. The police department in Fresno, California, has taken extreme measures to combat high rates of crime in the city. As the Post reports, Fresno’s Real Time Crime Center, buried deep in the police station’s headquarters, has developed as a response to what many police call increasing threats. The system, according to police officials, can “provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases” — a feature they say is increasingly important in the wake of events like the November terror attack in Paris and the San Bernardino shooting last month.
  • “Our officers are expected to know the unknown and see the unseen,” Fresno Chief of Police Jerry Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.” Programs similar to the Real Time Crime Center have launched in New York, Houston, and Seattle over the course of the last decade. Nationwide, the use of Stingrays, data fusion centers, and aerial drone surveillance have broadened the access local police have to private information. In another example, the FBI is continually developing a comprehensive biometric database that local police access every day. “This is something that’s been building since September 11,” says Jennifer Lynch, a senior attorney at the Electronic Frontier Foundation. Like the problem of police militarization, Lynch traces the trend back to the Pentagon: “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”
  • While many of these programs may fail to shock Americans, one new software program takes police scrutiny of private citizens to a new level. Beware, a software tool produced by tech firm Intrado, not only surveils the data of the citizens of Fresno, the first city to test it — it calculates threat levels based on what it discovers. The software scours arrest records, property records, Deep Web searches, commercial databases, and social media postings. By this method, it was able to designate a man with a firearm and gang convictions involved in a real-time domestic violence dispute as the highest of three threat levels: a bright red ranking. Fresno police say the intelligence from Beware aided them, as the man eventually surrendered and officers found he was armed with a gun. Beware scours billions of data points to develop rankings for citizens, and though few recoil at the thought of catching criminals and miscreants, the program provides particular cause for concern because of both its invasiveness and its fallibility.
  • ...3 more annotations...
  • These shortcomings have sparked concern among Fresno’s city council members, who discussed the issue at a meeting in November. At that meeting, one council member cited an incident where a girl who posted on social media about a card game called “Rage” was consequently given an elevated threat ranking — all because “rage” could be a triggering keyword for Beware. At that same meeting, libertarian-leaning Republican councilman Clinton J. Olivier asked Chief Dyer to use the technology to calculate his threat level. In real-time, Olivier was given a green, or non-threatening ranking, but his home received a yellow, or medium, threat ranking. It was likely due to the record of his home’s prior occupant. “Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier told Dyer. “That may not be fair to me.” He added later, “[Beware] has failed right here with a council member as the example.” “It’s a very unrefined, gross technique,” Fresno civil rights attorney, Rob Nabarro, has said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen,” he noted, echoing Olivier’s worries.
  • Further, though Fresno police use Beware, they are left in the dark about how it determines rankings. Intrado designates the method a “trade secret,” and as such, will not share it with the officers who use it. This element of the software’s implementation has concerned civil rights advocates like Nabarro. He believes the secrecy surrounding the technology may result in unfair, unchecked threat rankings. Nabarro cautioned that between the software’s secrecy and room for error, Beware could accidentally rank a citizen as dangerous based on, for example, posts on social media criticizing police. This potential carries with it the ability for citizens to be punished not for actual crimes, but for exercising basic constitutional rights. Further, it compromises the rights of individuals who have been previously convicted of crimes, potentially using past behavior to assume guilt in unrelated future incidents. Chief Dyer insists concerns are exaggerated and that a particular score does not guarantee a particular police response. Police maintain the tools are necessary to fight crime. Nevertheless, following the heated November meeting, Dyer suggested he would work to turn off the color-coded threat ranking due to citizens’ concerns. “It’s a balancing act,” he admitted.
  • It remains to be seen if Fresno police and residents will move forward with the technology or shut it down over privacy concerns. City officials in Oakland, California, for example, recently scaled back plans to establish a Real Time Crime Center after outraged citizens protested. At the very least, as Northern California ACLU attorney Matt Cagle said, “[W]henever these surveillance technologies are on the table, there needs to be a meaningful debate. There needs to be safeguards and oversight.”
  •  
    Claiming trade secrecy for the software's selection criteria for threat ranking actually constitutes policy policy, the trade secrecy claim would probably not survive judical review. It's at least arguably an unconstitutional delegation of a government function (ranking citizens as threats) to a private company. Police departments in Florida were sued to produce records of how a related surveillance device, the Stingray IMSI device that intercepts cell phone calls by mimicking a cell-phone tower, and only averted court-ordered disclosure of its trade secret workings by the FBI swooping in just before decision to remove all the software documentation from local police possession, custody, and control.    There is a long chain of case law holding that information that is legitimately trade secret and proprietary loses that protection if adopted by local or federal government as law. With a software program that classifies citizens as threats for governmental purposes if they meet the program's selection criteria, the software is performing a strictly governmental function that is in reality law. 
3More

Obama's 'Moderate' Syrian Deception | Consortiumnews - 0 views

  • Obama’s ‘Moderate’ Syrian Deception February 16, 2016 Exclusive: President Obama, who once called the idea of “moderate” Syrian rebels a “fantasy,” has maintained the fiction to conceal the fact that many “moderates” are fighting alongside Al Qaeda’s jihadists, an inconvenient truth that is complicating an end to Syria’s civil war, explains Gareth Porter.By Gareth PorterSecretary of State John Kerry insisted at the Munich Security Conference on Saturday that the agreement with Russia on a temporary halt in the war in Syria can only be carried out if Russia stops its airstrikes against what Kerry is now calling “legitimate opposition groups.”But what Kerry did not say is that the ceasefire agreement would not apply to operations against Al Qaeda’s Syrian franchise, the Nusra Front, which both the United States and Russia have recognized as a terrorist organization. That fact is crucial to understand why the Obama administration’s reference to “legitimate opposition groups” is a deception intended to mislead public opinion.
  • The Russian airstrikes in question are aimed at cutting off Aleppo city, which is now the primary center of Nusra’s power in Syria, from the Turkish border. To succeed in that aim, Russian, Syrian and Iranian forces are attacking rebel troops deployed in towns all along the routes from Aleppo to the border.Those rebels include units belonging to Nusra, their close ally Ahrar al-Sham, and other armed opposition groups – some of whom have gotten weapons from the CIA in the past.Kerry’s language suggests that those other “legitimate opposition groups” are not part of Nusra’s military structure but are separate from it both organizationally and physically. But in fact, there is no such separation in either of the crucial provinces of Idlib and Aleppo.Information from a wide range of sources, including some of those the United States has been explicitly supporting, makes it clear that every armed anti-Assad organization unit in those provinces is engaged in a military structure controlled by Nusra militants. All of these rebel groups fight alongside the Nusra Front and coordinate their military activities with it.
  • President Obama, who once called the idea of “moderate” Syrian rebels a “fantasy,” has maintained the fiction to conceal the fact that many “moderates” are fighting alongside Al Qaeda’s jihadists, an inconvenient truth that is complicating an end to Syria’s civil war, explains Gareth Porter.
4More

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
4More

Is NSA Surveillance Mastermind Keith Alexander Selling US Secrets to Wall Street? | VIC... - 0 views

  • Perhaps you already assume that there's some kind of twisted marriage between Wall Street megabanks and the US global surveillance regime. Why wouldn't there be? But not even a total cynic could have anticipated spymaster Keith Alexander cashing in this hard, this fast. As Bloomberg recently reported, the former National Security Agency chief, who resigned in March at the age of 62, quickly offered his cyber-security expertise at the eye-popping price of $1 million per month to an assortment of shady business lobbies. And now at least one member of Congress is probing this most delightfully dystopian of arrangements, raising the possibility that Alexander will be shamed out of the practice, if nothing else. “Disclosing or misusing classified information for profit is, as Mr. Alexander well knows, a felony. I question how Mr. Alexander can provide any of the services he is offering unless he discloses or misuses classified information, including extremely sensitive sources and methods,” Florida Democratic Rep. Alan Grayson wrote one of the business groups, the Security Industries and Financial Markets Association (SIFMA), which holds it down for Wall Street in Washington. “Without the classified information that he acquired in his former position, he literally would have nothing to offer to you.”
  • In an interview Monday, Grayson was even more strident in his criticism. "Frankly, what the general is doing is beginning to resemble an extortion racket," he told me. "This is a man who basically lied for a living, and he continues to do that." To be clear, what's uniquely outrageous about Alexander, who has apparently lowered his asking price to $600,000, is not that he is a former US official dangling his alleged expertise and the allure of privileged access to government officials before Wall Street. Former Secretary of State Hillary Clinton, who served under Barack Obama and is the odds-on favorite to succeed him, does this all the time, usually at a rate of about $250,000 a pop. (Indeed, one might argue that the very fact she has managed to do so while enjoying a stellar national reputation is what signaled to Alexander he might as well dive headlong through the revolving door.) But the former NSA head presumably knows things about sophisticated intelligence-gathering practices that very, very few people on Earth have been privy to—information that could be useful in the private sector, which has a tendency to collude with the military in ways that made former President and World War II General Dwight Eisenhower very sad.
  • "What could he possibly have that's worth $1 million a month other than classified information?" wonders Melanie Sloan, founder of Citizens for Responsibility and Ethics in Washington (CREW), a good government group. "That's more than former presidents make." Indeed, even former President Bill Clinton, whose corruption since leaving office is by now the stuff of legend, doesn't have the gall to ask for that much per gig. There's a sort of "fuck it!" attitude to what Alexander is doing, seemingly kicking sand in the face of everyone angry at his surveillance regime by getting paid to reflect on the experience of assembling it. More ominously, there's the prospect that Alexander, whether deliberately or otherwise, may have left behind vulnerabilities while running the NSA so as to put himself in prime position to effectively hold the banks hostage now. Certainly, there have been reports suggesting the agency was aware of some vulnerabilities it either could or did not address.   "What is especially troubling is he might actually be worth it," says former North Carolina Democratic Congressman Brad Miller, who worked extensively on financial regulation and Wall Street reform in Congress. "He's obviously not a computer geek. Some of the things that might have seemed paranoid a few years ago now seem more than plausible given what we've already learned the NSA has been doing."
  • ...1 more annotation...
  • In an email, former New York Times reporter and Goldman Sachs regulatory guru Stephen Labaton—who is currently president of communications and influence powerhouse RLM Finsbury and apparently fielding the General's media inquiries—dismissed Grayson's critique and Miller's concerns. "The letter is ludicrous," he wrote me, before adding about Miller, "The congressman’s kidding, right? Will he [Alexander] next be tied to the Kennedy assassination?" But as Marcy Wheeler points out, given that the former NSA boss has spent the last year hyping the incredible risk of catastrophic cyber-attack, as well as the alleged damage done by Edward Snowden (an assessment his successor does not seem to share), it's fair to ask if his consultancy is essentially a scam. That the victims are, for now, Wall Street bankers—some of the least sympathetic human beings around—is a sweet bit of irony. But it doesn't change the bigger picture: In this age of total surveillance and unchecked financial power, the frontiers of corruption never seem to stop expanding.
9More

The Spy Cables: A glimpse into the world of espionage - Al Jazeera English - 0 views

  • A digital leak to Al Jazeera of hundreds of secret intelligence documents from the world's spy agencies has offered an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage. Over the coming days, Al Jazeera's Investigative Unit is publishing The Spy Cables, in collaboration with The Guardian newspaper.
  • Spanning a period from 2006 until December 2014, they include detailed briefings and internal analyses written by operatives of South Africa's State Security Agency (SSA). They also reveal the South Africans' secret correspondence with the US intelligence agency, the CIA, Britain's MI6, Israel's Mossad, Russia's FSB and Iran's operatives, as well as dozens of other services from Asia to the Middle East and Africa.
  • Among the revelations, the Spy Cables disclose how: Israel's Mossad told its allies that Iran was not working to produce nuclear weapons just a month after Prime Minister Benjamin Netanyahu warned it was barely a year from being able to do so; The CIA made attempts to contact Hamas directly despite the US government listing the Palestinian group as a "terrorist organisation"; Britain's MI6 sought South African help in an operation to recruit a North Korean official who had previously refused their cash; and South African and Ethiopian spies struggled to "neutralise" an assassination plot targeting a leading African diplomat.
  • ...6 more annotations...
  • Mossad contradicted Netanyahu on Iran nuclear programme The Spy Cables A glimpse into the world of espionage Spy Cables South African spies wary of Iran operations Spy Cables expose 'desperate' US approach to Hamas Israeli cable reveals S Africa missile theft cover-up The Spy Cables - Al Jazeera English Yazidis battle ISIL Disaster 'made us stronger' Spy Cables Abbas and Israel ally against 2009 UN probe Cables describe British attempt to recruit N Korean spy The Rise of the Oligarchs
  • Unlike the Edward Snowden documents that focus on electronic signals intelligence, commonly referred to in intelligence circles as "SIGINT", the Spy Cables deal with human intelligence, or "HUMINT".
  • Rather than chronicling spy-movie style tales of  ruthless efficiency of intelligence agencies, they offer an unprecedented glimpse into the daily working lives of people whose jobs are kept secret from the public.
  • The Spy Cables also reveal that in many cases, intelligence agencies are over-classifying information and hiding behind an unnecessary veil of secrecy. This harms the ability of a democratic society to either consent to the activities of their intelligence agencies or provide adequate checks and balances to their powers.
  • Spy Cables expose 'desperate' US approach to Hamas Leaked documents also show Mossad lobbying South Africa against Goldstone Report, claiming Abbas shared their stance.
  • Spy Cables: South African spies wary of Iran operations Leaked documents describe Tehran working to counter sanctions by using front companies and official channels.
15More

Israel Spied on Iran Nuclear Talks With U.S. - WSJ - 0 views

  • Soon after the U.S. and other major powers entered negotiations last year to curtail Iran’s nuclear program, senior White House officials learned Israel was spying on the closed-door talks. The spying operation was part of a broader campaign by Israeli Prime Minister Benjamin Netanyahu’s government to penetrate the negotiations and then help build a case against the emerging terms of the deal, current and former U.S. officials said. In addition to eavesdropping, Israel acquired information from confidential U.S. briefings, informants and diplomatic contacts in Europe, the officials said.
  • The espionage didn’t upset the White House as much as Israel’s sharing of inside information with U.S. lawmakers and others to drain support from a high-stakes deal intended to limit Iran’s nuclear program, current and former officials said. “It is one thing for the U.S. and Israel to spy on each other. It is another thing for Israel to steal U.S. secrets and play them back to U.S. legislators to undermine U.S. diplomacy,” said a senior U.S. official briefed on the matter.
  • The U.S. and Israel, longtime allies who routinely swap information on security threats, sometimes operate behind the scenes like spy-versus-spy rivals. The White House has largely tolerated Israeli snooping on U.S. policy makers—a posture Israel takes when the tables are turned. The White House discovered the operation, in fact, when U.S. intelligence agencies spying on Israel intercepted communications among Israeli officials that carried details the U.S. believed could have come only from access to the confidential talks, officials briefed on the matter said. Israeli officials denied spying directly on U.S. negotiators and said they received their information through other means, including close surveillance of Iranian leaders receiving the latest U.S. and European offers. European officials, particularly the French, also have been more transparent with Israel about the closed-door discussions than the Americans, Israeli and U.S. officials said.
  • ...11 more annotations...
  • Mr. Netanyahu and Israeli Ambassador Ron Dermer early this year saw a rapidly closing window to increase pressure on Mr. Obama before a key deadline at the end of March, Israeli officials said. Using levers of political influence unique to Israel, Messrs. Netanyahu and Dermer calculated that a lobbying campaign in Congress before an announcement was made would improve the chances of killing or reshaping any deal. They knew the intervention would damage relations with the White House, Israeli officials said, but decided that was an acceptable cost. The campaign may not have worked as well as hoped, Israeli officials now say, because it ended up alienating many congressional Democrats whose support Israel was counting on to block a deal. Obama administration officials, departing from their usual description of the unbreakable bond between the U.S. and Israel, have voiced sharp criticism of Messrs. Netanyahu and Dermer to describe how the relationship has changed.
  • “People feel personally sold out,” a senior administration official said. “That’s where the Israelis really better be careful because a lot of these people will not only be around for this administration but possibly the next one as well.” This account of the Israeli campaign is based on interviews with more than a dozen current and former U.S. and Israeli diplomats, intelligence officials, policy makers and lawmakers. Weakened ties Distrust between Mr. Netanyahu and Mr. Obama had been growing for years but worsened when Mr. Obama launched secret talks with Iran in 2012. The president didn’t tell Mr. Netanyahu because of concerns about leaks, helping set the stage for the current standoff, according to current and former U.S. and Israeli officials. U.S. officials said Israel has long topped the list of countries that aggressively spy on the U.S., along with China, Russia and France. The U.S. expends more counterintelligence resources fending off Israeli spy operations than any other close ally, U.S. officials said.
  • A senior official in the prime minister’s office said Monday: “These allegations are utterly false. The state of Israel does not conduct espionage against the United States or Israel’s other allies. The false allegations are clearly intended to undermine the strong ties between the United States and Israel and the security and intelligence relationship we share.” Current and former Israeli officials said their intelligence agencies scaled back their targeting of U.S. officials after the jailing nearly 30 years ago of American Jonathan Pollard for passing secrets to Israel. While U.S. officials may not be direct targets, current and former officials said, Israeli intelligence agencies sweep up communications between U.S. officials and parties targeted by the Israelis, including Iran. Americans shouldn’t be surprised, said a person familiar with the Israeli practice, since U.S. intelligence agencies helped the Israelis build a system to listen in on high-level Iranian communications.
  • As secret talks with Iran progressed into 2013, U.S. intelligence agencies monitored Israel’s communications to see if the country knew of the negotiations. Mr. Obama didn’t tell Mr. Netanyahu until September 2013. Israeli officials, who said they had already learned about the talks through their own channels, told their U.S. counterparts they were upset about being excluded. “ ‘Did the administration really believe we wouldn’t find out?’ ” Israeli officials said, according to a former U.S. official.
  • The episode cemented Mr. Netanyahu’s concern that Mr. Obama was bent on clinching a deal with Iran whether or not it served Israel’s best interests, Israeli officials said. Obama administration officials said the president was committed to preventing Iran from developing nuclear weapons. Mr. Dermer started lobbying U.S. lawmakers just before the U.S. and other powers signed an interim agreement with Iran in November 2013. Mr. Netanyahu and Mr. Dermer went to Congress after seeing they had little influence on the White House. Before the interim deal was made public, Mr. Dermer gave lawmakers Israel’s analysis: The U.S. offer would dramatically undermine economic sanctions on Iran, according to congressional officials who took part. After learning about the briefings, the White House dispatched senior officials to counter Mr. Dermer. The officials told lawmakers that Israel’s analysis exaggerated the sanctions relief by as much as 10 times, meeting participants said.
  • When the next round of negotiations with Iran started in Switzerland last year, U.S. counterintelligence agents told members of the U.S. negotiating team that Israel would likely try to penetrate their communications, a senior Obama administration official said. The U.S. routinely shares information with its European counterparts and others to coordinate negotiating positions. While U.S. intelligence officials believe secured U.S. communications are relatively safe from the Israelis, they say European communications are vulnerable. Mr. Netanyahu and his top advisers received confidential updates on the Geneva talks from Undersecretary of State for Political Affairs Wendy Sherman and other U.S. officials, who knew at the time that Israeli intelligence was working to fill in any gaps. The White House eventually curtailed the briefings, U.S. officials said, withholding sensitive information for fear of leaks. Current and former Israeli officials said their intelligence agencies can get much of the information they seek by targeting Iranians and others in the region who are communicating with countries in the talks. In November, the Israelis learned the contents of a proposed deal offered by the U.S. but ultimately rejected by Iran, U.S. and Israeli officials said. Israeli officials told their U.S. counterparts the terms offered insufficient protections.
  • U.S. officials urged the Israelis to give the negotiations a chance. But Mr. Netanyahu’s top advisers concluded the emerging deal was unacceptable. The White House was making too many concessions, Israeli officials said, while the Iranians were holding firm. Obama administration officials reject that view, saying Israel was making impossible demands that Iran would never accept. “The president has made clear time and again that no deal is better than a bad deal,” a senior administration official said. In January, Mr. Netanyahu told the White House his government intended to oppose the Iran deal but didn’t explain how, U.S. and Israeli officials said. On Jan. 21, House Speaker John Boehner (R., Ohio) announced Mr. Netanyahu would address a joint meeting of Congress. That same day, Mr. Dermer and other Israeli officials visited Capitol Hill to brief lawmakers and aides, seeking a bipartisan coalition large enough to block or amend any deal. Most Republicans were already prepared to challenge the White House on the negotiations, so Mr. Dermer focused on Democrats. “This deal is bad,” he said in one briefing, according to participants.
  • A spokesman for the Israeli embassy in Washington, Aaron Sagui, said Mr. Dermer didn’t launch a special campaign on Jan 21. Mr. Dermer, the spokesperson said, has “consistently briefed both Republican and Democrats, senators and congressmen, on Israel’s concerns regarding the Iran negotiations for over a year.” Mr. Dermer and other Israeli officials over the following weeks gave lawmakers and their aides information the White House was trying to keep secret, including how the emerging deal could allow Iran to operate around 6,500 centrifuges, devices used to process nuclear material, said congressional officials who attended the briefings. The Israeli officials told lawmakers that Iran would also be permitted to deploy advanced IR-4 centrifuges that could process fuel on a larger scale, meeting participants and administration officials said. Israeli officials said such fuel, which under the emerging deal would be intended for energy plants, could be used to one day build nuclear bombs. The information in the briefings, Israeli officials said, was widely known among the countries participating in the negotiations. When asked in February during one briefing where Israel got its inside information, the Israeli officials said their sources included the French and British governments, as well as their own intelligence, according to people there.
  • “Ambassador Dermer never shared confidential intelligence information with members of Congress,” Mr. Sagui said. “His briefings did not include specific details from the negotiations, including the length of the agreement or the number of centrifuges Iran would be able to keep.” Current and former U.S. officials confirmed that the number and type of centrifuges cited in the briefings were part of the discussions. But they said the briefings were misleading because Israeli officials didn’t disclose concessions asked of Iran. Those included giving up stockpiles of nuclear material, as well as modifying the advanced centrifuges to slow output, these officials said. The administration didn’t brief lawmakers on the centrifuge numbers and other details at the time because the information was classified and the details were still in flux, current and former U.S. officials said. Unexpected reaction The congressional briefings and Mr. Netanyahu’s decision to address a joint meeting of Congress on the emerging deal sparked a backlash among many Democratic lawmakers, congressional aides said.
  • On Feb. 3, Mr. Dermer huddled with Sen. Joe Manchin, a West Virginia Democrat, who said he told Mr. Dermer it was a breach of protocol for Mr. Netanyahu to accept an invitation from Mr. Boehner without going through the White House. Mr. Manchin said he told Mr. Dermer he would attend the prime minister’s speech to Congress, but he was noncommittal about supporting any move by Congress to block a deal. Mr. Dermer spent the following day doing damage control with Sen. Kirsten Gillibrand, a New York Democrat, congressional aides said. Two days later, Mr. Dermer met with Sen. Dianne Feinstein of California, the top Democrat on the SenateIntelligence Committee, at her Washington, D.C., home. He pressed for her support because he knew that she, too, was angry about Mr. Netanyahu’s planned appearance. Ms. Feinstein said afterward she would oppose legislation allowing Congress to vote down an agreement.
  • Congressional aides and Israeli officials now say Israel’s coalition in Congress is short the votes needed to pass legislation that could overcome a presidential veto, although that could change. In response, Israeli officials said, Mr. Netanyahu was pursuing other ways to pressure the White House. This week, Mr. Netanyahu sent a delegation to France, which has been more closely aligned with Israel on the nuclear talks and which could throw obstacles in Mr. Obama’s way before a deal is signed. The Obama administration, meanwhile, is stepping up its outreach to Paris to blunt the Israeli push. “If you’re wondering whether something serious has shifted here, the answer is yes,” a senior U.S. official said. “These things leave scars.”
  •  
    Obama is moving preemptively to blunt Israel's influence in Congress on the Iran negotiation.
5More

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
8More

Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views

  • The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
  • The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
  • Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
  • ...4 more annotations...
  • The N.S.A.’s protections for attorney-client conversations are narrowly crafted, said Stephen Gillers, an expert on legal ethics at New York University’s School of Law. The agency is barred from sharing with prosecutors intercepted attorney-client communications involving someone under indictment in the United States, according to previously disclosed N.S.A. rules. But the agency may still use or share the information for intelligence purposes. Andrew M. Perlman, a Suffolk University law professor who specializes in legal ethics and technology issues, said the growth of surveillance was troubling for lawyers. He helped create the bar association’s ethics code revisions that require lawyers to try to avoid being overheard by eavesdroppers. “You run out of options very quickly to communicate with someone overseas,” he said. “Given the difficulty of finding anything that is 100 percent secure, lawyers are in a difficult spot to ensure that all of the information remains in confidence.” 
  • Still, the N.S.A. can intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials. The N.S.A. is then required to follow so-called minimization rules to protect their privacy, such as deleting the identity of Americans or information that is not deemed necessary to understand or assess the foreign intelligence, before sharing it with other agencies. An N.S.A. spokeswoman said the agency’s Office of the General Counsel was consulted when issues of potential attorney-client privilege arose and could recommend steps to protect such information. “Such steps could include requesting that collection or reporting by a foreign partner be limited, that intelligence reports be written so as to limit the inclusion of privileged material and to exclude U.S. identities, and that dissemination of such reports be limited and subject to appropriate warnings or restrictions on their use,” said Vanee M. Vines, the spokeswoman.
  • In justifying the agency’s sweeping powers, the Obama administration often emphasizes the N.S.A.’s role in fighting terrorism and cyberattacks, but disclosures in recent months from the documents leaked by Mr. Snowden show the agency routinely spies on trade negotiations, communications of economic officials in other countries and even foreign corporations.
  • Other documents obtained from Mr. Snowden reveal that the N.S.A. shares reports from its surveillance widely among civilian agencies. A 2004 N.S.A. document, for example, describes how the agency’s intelligence gathering was critical to the Agriculture Department in international trade negotiations. “The U.S.D.A. is involved in trade operations to protect and secure a large segment of the U.S. economy,” that document states. Top agency officials “often rely on SIGINT” — short for the signals intelligence that the N.S.A. eavesdropping collects — “to support their negotiations.”
  •  
    Outrageous.
6More

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
9More

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
‹ Previous 21 - 40 of 251 Next › Last »
Showing 20 items per page