Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "theft" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Just Security - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

The New Snowden? NSA Contractor Arrested Over Alleged Theft Of Classified Data - 0 views

  • A contractor working for the National Security Agency (NSA) was arrested by the FBI following his alleged theft of “state secrets.” More specifically, the contractor, Harold Thomas Martin, is charged with stealing highly classified source codes developed to covertly hack the networks of foreign governments, according to several senior law enforcement and intelligence officials. The Justice Department has said that these stolen materials were “critical to national security.” Martin was employed by Booz Allen Hamilton, the company responsible for most of the NSA’s most sensitive cyber-operations. Edward Snowden, the most well-known NSA whistleblower, also worked for Booz Allen Hamilton until he fled to Hong Kong in 2013 where he revealed a trove of documents exposing the massive scope of the NSA dragnet surveillance. That surveillance system was shown to have targeted untold numbers of innocent Americans. According to the New York Times, the theft “raises the embarrassing prospect” that an NSA insider managed to steal highly damaging secret information from the NSA for the second time in three years, not to mention the “Shadow Broker” hack this past August, which made classified NSA hacking tools available to the public.
  • Snowden himself took to Twitter to comment on the arrest. In a tweet, he said the news of Martin’s arrest “is huge” and asked, “Did the FBI secretly arrest the person behind the reports [that the] NSA sat on huge flaws in US products?” It is currently unknown if Martin was connected to those reports as well.
  • It also remains to be seen what Martin’s motivations were in removing classified data from the NSA. Though many suspect that he planned to follow in Snowden’s footsteps, the government will more likely argue that he had planned to commit espionage by selling state secrets to “adversaries.” According to the New York Times article on the arrest, Russia, China, Iran, and North Korea are named as examples of the “adversaries” who would have been targeted by the NSA codes that Martin is accused of stealing. However, Snowden revealed widespread US spying on foreign governments including several US allies such as France and Germany. This suggests that the stolen “source codes” were likely utilized on a much broader scale.
Gary Edwards

Cavuto: What's Happening in Cyprus Is Just Like Obamacare's 3.8% Home Sales Tax (Video) | The Gateway Pundit - 0 views

  •  
    Funny but the National Association of Realtors has yet to speak out about this devastating tax on Home Sales.  The theft of citizen wealth and savings in Cyprus is clearly a Bankster / Socialist Government bailout play.  Is ObamaCare the same?   ........    FOX News host Neil Cavuto compared the governmental theft in Cyprus to Barack Obama's tax on home sales to fund Obamacare. "Cavuto says Obama already pulled off a similar stunt in America. "While no one is taxing our bank holdings, thanks to Obamacare, they are going after our other assets. Remember that 3.8% Medicare surtax on investment sales larger than a couple hundred grand. Surprised? Next time you try to sell your house, trust me, you'll be hitting the roof. A tax on your home… your tangible assets. Is there really a difference? No.""
Gary Edwards

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMATION ON $43 TRILLION LAWSUIT >> Four Winds 10 - Truth Winds - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
Paul Merrell

Secrets about suspected Israeli theft of U.S. weapons-grade nuclear material declassified - IRmep -- WASHINGTON, March 27, 2014 /PRNewswire-USNewswire/ -- - 0 views

  • On March 18, 2014 ISCAP, the highest declassification authority in the U.S., released 84 pages (PDF) of formerly secret information about investigations into the illegal diversion of weapons-grade nuclear material from a Pennsylvania plant into the clandestine Israeli nuclear weapons program.  Files now available to the public from IRmep's ISCAP process include: 4/2/1968 Letter from the Director of the CIA alerting the Attorney General (PDF) about a huge loss of material from Pennsylvania's Nuclear Materials and Equipment Corporation (NUMEC). "It is critical for us to establish whether or not the Israelis now have the capability for fabricating nuclear weapons which might be employed in the Near East." 03/09/1972 FBI memorandum (PDF) "On the basis of the foregoing it must be assumed for the purpose of U.S. national security that diversion of special nuclear materials to Israel by Dr. [Zalman] Shapiro and his [NUMEC] associates is a distinct possibility." 07/28/1977 Notes of a briefing from CIA's Associate Deputy Director for Operations Theodore Shackley to the Carter administration National Security Council  (PDF) "I also asked Shackley to get us a rundown on the political aspects—e.g. when were the President and Congressional officials briefed on the Israeli weapons program, on the NUMEC connection, and what were their reactions.  In December, Carter was briefed on the NUMEC problem as President-elect by Bush in Georgia...I do not think the President has plausible deniability.  The CIA case is persuasive..."
  • 08/02/1977 Memo to Carter from Zbigniew Brzezinski "So far as we know however, (and we have made serious effort to discover it) there is nothing to indicate active CIA participation in the alleged theft...There is a tremendous amount of interest in this issue in Congress...We face tough sledding in the next few weeks in trying to keep attention focused on ERDA's technical [overall U.S. nuclear material loss] arguments..on the FBI investigations, and away from the CIA's information." All released CIA evidence and former Tel Aviv Station Chief John Hadden suggest the severely undercapitalized NUMEC was "an Israeli [smuggling] operation from the beginning." Multiple health-related lawsuits have been filed targeting companies that later assumed NUMEC ownership. The U.S. Army Corps of Engineers currently estimates its toxic cleanup of NUMEC will cost $500 million.  No damage claims have yet been filed against the Israeli government. IRmep is a Washington-DC based nonprofit researching U.S. Middle East policy formulation.
Paul Merrell

Obama to propose legislation to protect firms that share cyberthreat data - The Washington Post - 0 views

  • President Obama plans to announce legislation Tuesday that would shield companies from lawsuits for sharing computer threat data with the government in an effort to prevent cyber­attacks. On the heels of a destructive attack at Sony Pictures Entertainment and major breaches at JPMorgan Chase and retail chains, Obama is intent on capitalizing on the heightened sense of urgency to improve the security of the nation’s networks, officials said. “He’s been doing everything he can within his executive authority to move the ball on this,” said a senior administration official who spoke on the condition of anonymity to discuss legislation that has not yet been released. “We’ve got to get something in place that allows both industry and government to work more closely together.”
  • The legislation is part of a broader package, to be sent to Capitol Hill on Tuesday, that includes measures to help protect consumers and students against ­cyberattacks and to give law enforcement greater authority to combat cybercrime. The provision’s goal is to “enshrine in law liability protection for the private sector for them to share specific information — cyberthreat indicators — with the government,” the official said. Some analysts questioned the need for such legislation, saying there are adequate measures in place to enable sharing between companies and the government and among companies.
  • “We think the current information-sharing regime is adequate,” said Mark Jaycox, legislative analyst at the Electronic Frontier Foundation, a privacy group. “More companies need to use it, but the idea of broad legal immunity isn’t needed right now.” The administration official disagreed. The lack of such immunity is what prevents many companies from greater sharing of data with the government, the official said. “We have heard that time and time again,” the official said. The proposal, which builds on a 2011 administration bill, grants liability protection to companies that provide indicators of cyberattacks and threats to the Department of Homeland Security.
  • ...5 more annotations...
  • But in a provision likely to raise concerns from privacy advocates, the administration wants to require DHS to share that information “in as near real time as possible” with other government agencies that have a cybersecurity mission, the official said. Those include the National Security Agency, the Pentagon’s ­Cyber Command, the FBI and the Secret Service. “DHS needs to take an active lead role in ensuring that unnecessary personal information is not shared with intelligence authorities,” Jaycox said. The debates over government surveillance prompted by disclosures from former NSA contractor Edward Snowden have shown that “the agencies already have a tremendous amount of unnecessary information,” he said.
  • The administration official stressed that the legislation will require companies to remove unnecessary personal information before furnishing it to the government in order to qualify for liability protection. It also will impose limits on the use of the data for cybersecurity crimes and instances in which there is a threat of death or bodily harm, such as kidnapping, the official said. And it will require DHS and the attorney general to develop guidelines for the federal government’s use and retention of the data. It will not authorize a company to take offensive cyber-measures to defend itself, such as “hacking back” into a server or computer outside its own network to track a breach. The bill also will provide liability protection to companies that share data with private-sector-developed organizations set up specifically for that purpose. Called information sharing and analysis organizations, these groups often are set up by particular industries, such as banking, to facilitate the exchange of data and best practices.
  • Efforts to pass information-sharing legislation have stalled in the past five years, blocked primarily by privacy concerns. The package also contains provisions that would allow prosecution for the sale of botnets or access to armies of compromised computers that can be used to spread malware, would criminalize the overseas sale of stolen U.S. credit card and bank account numbers, would expand federal law enforcement authority to deter the sale of spyware used to stalk people or commit identity theft, and would give courts the authority to shut down botnets being used for criminal activity, such as denial-of-service attacks.
  • It would reaffirm that federal racketeering law applies to cybercrimes and amends the Computer Fraud and Abuse Act by ensuring that “insignificant conduct” does not fall within the scope of the statute. A third element of the package is legislation Obama proposed Monday to help protect consumers and students against cyberattacks. The theft of personal financial information “is a direct threat to the economic security of American families, and we’ve got to stop it,” Obama said. The plan, unveiled in a speech at the Federal Trade Commission, would require companies to notify customers within 30 days after the theft of personal information is discovered. Right now, data breaches are handled under a patchwork of state laws that the president said are confusing and costly to enforce. Obama’s plan would streamline those into one clear federal standard and bolster requirements for companies to notify customers. Obama is proposing closing loopholes to make it easier to track down cybercriminals overseas who steal and sell identities. “The more we do to protect consumer information and privacy, the harder it is for hackers to damage our businesses and hurt our economy,” he said.
  • In October, Obama signed an order to protect consumers from identity theft by strengthening security features in credit cards and the terminals that process them. Marc Rotenberg, executive director of the Electronic Privacy Information Center, said there is concern that a federal standard would “preempt stronger state laws” about how and when companies have to notify consumers. The Student Digital Privacy Act would ensure that data entered would be used only for educational purposes. It would prohibit companies from selling student data to third-party companies for purposes other than education. Obama also plans to introduce a Consumer Privacy Bill of Rights. And the White House will host a summit on cybersecurity and consumer protection on Feb. 13 at Stanford University.
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired.com - 0 views

  • In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network. According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters. At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment. What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.
  • In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.” Because of his position, it was something Binney should have been alerted to, but wasn’t. “In addition to being the technical director,” he said, “I was the chair of the TAP, it’s the Technical Advisory Panel, the foreign relations council. We’re supposed to know what all these foreign countries, technically what they’re doing…. They didn’t do this that way, it was under the table.” After discovering the secret transfer of the technology, Binney argued that the agency simply pass it to them officially, and in that way get something in return, such as access to communications terminals. “So we gave it to them for switches,” he said. “For access.”
  • But Binney now suspects that Israeli intelligence in turn passed the technology on to Israeli companies who operate in countries around the world, including the U.S. In return, the companies could act as extensions of Israeli intelligence and pass critical military, economic and diplomatic information back to them. “And then five years later, four or five years later, you see a Narus device,” he said. “I think there’s a connection there, we don’t know for sure.” Narus was formed in Israel in November 1997 by six Israelis with much of its money coming from Walden Israel, an Israeli venture capital company. Its founder and former chairman, Ori Cohen, once told Israel’s Fortune Magazine that his partners have done technology work for Israeli intelligence. And among the five founders was Stanislav Khirman, a husky, bearded Russian who had previously worked for Elta Systems, Inc. A division of Israel Aerospace Industries, Ltd., Elta specializes in developing advanced eavesdropping systems for Israeli defense and intelligence organizations. At Narus, Khirman became the chief technology officer.
  • ...4 more annotations...
  • A few years ago, Narus boasted that it is “known for its ability to capture and collect data from the largest networks around the world.” The company says its equipment is capable of “providing unparalleled monitoring and intercept capabilities to service providers and government organizations around the world” and that “Anything that comes through [an Internet protocol network], we can record. We can reconstruct all of their e-mails, along with attachments, see what Web pages they clicked on, we can reconstruct their [Voice over Internet Protocol] calls.” Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”
  • In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”
  • According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.
  • Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties. When asked about these contractors, the NSA declined to “verify the allegations made.”
  •  
    So, allegedly a Zionist working in NSA passed NSA's telecommunications data mining software to Israel, was identified, but was never prosecuted. And the Verint CEO is now a fugitive from justice on charges of "fraud, theft, lying, money laundering, and other crimes." What's not to like in having this company processing all of our telephone metadata?
Gary Edwards

Barack Obama Voter Fraud 2012: Barack Obama Voter Fraud 2012 - 0 views

  •  
    Wow.  Great collection of links detailing the incredible theft of the 2012 elections by the Obammunists.   There are a couple things we can do. web site provider suggests that all Tea Party, Libertarian and Conservative groups contact the Secretary of State in each of the involved battleground States and request a recount and verification of actual voters casting ballots. Another suggestion is to send official organization letters to Republican Secretaries of State asking them NOT TO Certify the election until all questions about voter fraud are vetted and abated. This is awful stuff, and may signal the end of our blessed Republic unless good citizens act immediately.
Gary Edwards

HBL - The Harry Binswanger List - 0 views

  •  
    WOW!  Renown Ayn Rand expert, Harry Binswanger, discusses the 2012 election big media accusation that Romney is "short on specifics".  (Not that Obama ever provided anything close to a specific explanation, but there it is.)  In his discussion, Harry describes exactly how to present "principles" that then can be easily connected to "specifics".   Incredible read. excerpt: "Here's a sample of what an ideal candidate would say, first in terms of principles: "The only proper function of government is to protect individual rights, and the only way rights can be violated is by the initiation of physical force. Under my administration, we will return to the original American system in which the government uses its physical force only in retaliation against those who initiate its use in violation of individual rights. The fundamental right is the right to life, and its corollaries include the right to private property, without which no other rights are possible." He could then go on to name policy goals that represent mid-level abstractions: "Entitlement programs are the initiation of force; they seize the property of some to provide unearned benefits to others. This is immoral; it is a legalized equivalent of theft. Thus, I will drastically cut entitlement spending-whether "discretionary" or not. Another area of initiated government force is regulation. Regulation by its nature is preventive law, interfering with the lives of the innocent in order to (supposedly) prevent the guilty from acting. This is force initiated against the innocent, so I will drastically cut the number and scope of regulations over the same 4 years." Now the real fun comes when, having established this context, he gets to specifics: "My first budget will cut funds for all departments, except Defense, to 15% below what they received the previous year. This is an across-the-board cut, not something to become the subject of infighting among departments. Then in my next budget I will cut 15%
Gary Edwards

Major Banksters, Governmental Officials and Their Comrade Capitalists Targets of Spire Law Group, LLP's Racketeering and Money Laundering Lawsuit Seeking Return of $43 Trillion to the United States Treasury - MarketWatch - 0 views

  •  
    "NEW YORK, Oct. 25, 2012 /PRNewswire via COMTEX/ -- Spire Law Group, LLP's national home owners' lawsuit, pending in the venue where the "Banksters" control their $43 trillion racketeering scheme (New York) - known as the largest money laundering and racketeering lawsuit in United States History and identifying $43 trillion ($43,000,000,000,000.00) of laundered money by the "Banksters" and their U.S. racketeering partners and joint venturers - now pinpoints the identities of the key racketeering partners of the "Banksters" located in the highest offices of government and acting for their own self-interests. In connection with the federal lawsuit now impending in the United States District Court in Brooklyn, New York (Case No. 12-cv-04269-JBW-RML) - involving, among other things, a request that the District Court enjoin all mortgage foreclosures by the Banksters nationwide, unless and until the entire $43 trillion is repaid to a court-appointed receiver - Plaintiffs now establish the location of the $43 trillion ($43,000,000,000,000.00) of laundered money in a racketeering enterprise participated in by the following individuals (without limitation): Attorney General Holder acting in his individual capacity, Assistant Attorney General Tony West, the brother in law of Defendant California Attorney General Kamala Harris (both acting in their individual capacities), Jon Corzine (former New Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster), Timothy Geitner, Treasury Secretary (acting in his individual capacity), Vikram Pandit (recently resigned and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a Senior White House Advisor), Anita Dunn (a former "communications director" for the Obama Administration), Robert Bauer (husband of Anita Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as well as the "Banksters" themselves, and their affiliates and conduits. The lawsuit alleges serial violations of the United States Patri
  •  
    This is the first time anyone has tried to go after the Bankster class of midievil (mediæval) elites to recover theft of funds. Charges include racketeering, fraud and international money laundering. The mass tort action is now in the Brooklyn Federal Courts. Dead bodies are starting to show up as the Banksters move to shut down press coverage. Amazing stuff.
Gary Edwards

Stealing the Election - Rampant Voter Fraud Across the Country - 0 views

  •  
    Quick summary of the rampant voter fraud being committed throughout the nation by Democrat Party members. Battalions of Democrat Imposters swept out across the land in both 2008 and 2010, blanketing voting locations, using the names of Dead voters listed on the voting rolls, and being issued ballots without having to provide any proof of identity. Voter fraud tactics include falsifying petitions, false identities, dead identity theft, illegal non citizen voting, and ballot fraud. The DOJ has joined the effort bringing charges of racism against those States and Counties where voters are required to prove their identity with photo ID. Sickening.
Gary Edwards

Why Isn't Wall Street in Jail? | Rolling Stone - Matt Taibi - 2 views

  •  
    Must read stuff.  Very lengthy Bankster expose, this time involving Bankster connections to Obama, the political establishment, and the corruption of the DOJ, SEC and other regulatory agencies.  Very lengthy.  Includes stories about the misfortunes of those few honest individuals who tried to do the right thing in a sea of thieves, liars and crooks. excerpt: Nobody goes to jail. This is the mantra of the financial-crisis era, one that saw virtually every major bank and financial company on Wall Street embroiled in obscene criminal scandals that impoverished millions and collectively destroyed hundreds of billions, in fact, trillions of dollars of the world's wealth - and nobody went to jail. Nobody, that is, except Bernie Madoff, a flamboyant and pathological celebrity con artist, whose victims happened to be other rich and famous people. This article appears in the March 3, 2011 issue of Rolling Stone. The issue is available now on newsstands and will appear in the online archive February 18. The rest of them, all of them, got off. Not a single executive who ran the companies that cooked up and cashed in on the phony financial boom - an industrywide scam that involved the mass sale of mismarked, fraudulent mortgage-backed securities - has ever been convicted. Their names by now are familiar to even the most casual Middle American news consumer: companies like AIG, Goldman Sachs, Lehman Brothers, JP Morgan Chase, Bank of America and Morgan Stanley. Most of these firms were directly involved in elaborate fraud and theft. Lehman Brothers hid billions in loans from its investors. Bank of America lied about billions in bonuses. Goldman Sachs failed to tell clients how it put together the born-to-lose toxic mortgage deals it was selling. What's more, many of these companies had corporate chieftains whose actions cost investors billions - from AIG derivatives chief Joe Cassano, who assured investors they would not lose even "one dollar" just months before hi
Gary Edwards

Judge Blocks Citigroup Settlement With S.E.C. - NYTimes.com - 0 views

  •  
    The greatest theft in the history of mankind, and a posse of one Judge and a few State Attorney Generals is all we have on the hunt.  Pathetic.  But thank God for Judge Jed S. Rakoff of United States District Court in Manhattan!   The Federal Government is so corrupt and politicized that regulatory agencies are bagmen for the worst kind of crony capitalism ever seen.  I would rather shut down these corrupt and crony laden regulatory agencies and replace them with legislation requiring full transparency and reporting to the PUBLIC.  A process that would enable lawyers and Courts to sift through the mess, and let contract law, legal settlements, class actions and lawsuit penalties be the instruments of regulatory oversight.  Judge Rakoff should be the next Supreme Court nominee.
Gary Edwards

Peter Beinart: How Ron Paul Will Change the GOP in 2012 - The Daily Beast - 2 views

  •  
    Not a big Peter Beinhart fan, but this article explains a large part of the Ron Paul phenom. After a life time as a big C Goldwater-Reagan Constitutional Conservative, this summer i made a full transition to big C Constitutional Libertarian. The tipping point for me was the GAO audit of the Federal Reserve, where they discovered $16.1 Trillion of taxpayer dollars missing from the Federal Reserve Bankster Cartel management books. It went to a who's who of international Bankster Cartel members. None of the taxpayer funded "financial collapse of 2008" bailout dollars went to the purposes chartered by their legislation. That includees the TARP $850 Billion, the Obama Stimulous $1 Trillion, and the mega FRBC $16.1 Trillion. No bad debts were purchased and retired. No rotting mortgage securities were swept up and restructured. No shovel ready jobs either. And no one in government or banksterism having caused the financial collapse went to jail. Instead, the perps feasted on the bailout dollars. The debt remains on the books of international Banksters, collecting interest, thirsting for foreclosure. The Bankster Cartel members are flush with cash, but not lending. By law (The Federal Reserve Act of December 23rd, 1913), FRBC members must keep a significant amount of their assets on "reserve" at the Federal Reserve, at 6% interest. In exchange for managing this process and the exploding money supply, the taxpayers of the USA are obligated by law to pay the FRBC 1% per year of (assets under management" (the money supply). Take note: the FRBC takes the 1% per year payment for their services in the form of GOLD!! They will not take payment in the form of paper notes labeled legal tender "Federal Reserve Notes". They only take GOLD. My transition to Constitutional Libertarian begins with a strct reading of the Constitution (the How), the Declaration of Independence, (the Why), and belief in the Rule of Law, not man. The concept of achievi
Paul Merrell

Tomgram: Pepe Escobar, The Tao of Containing China | TomDispatch - 0 views

  • Sun Tzu, the ancient author of The Art of War, must be throwing a rice wine party in his heavenly tomb in the wake of the shirtsleeves California love-in between President Obama and President Xi Jinping. "Know your enemy" was, it seems, the theme of the meeting. Beijing was very much aware of -- and had furiously protested -- Washington’s deep plunge into China’s computer networks over the past 15 years via a secretive NSA unit, the Office of Tailored Access Operations (with the apt acronym TAO). Yet Xi merrily allowed Obama to pontificate on hacking and cyber-theft as if China were alone on such a stage. Enter -- with perfect timing -- Edward Snowden, the spy who came in from Hawaii and who has been holed up in Hong Kong since May 20th. And cut to the wickedly straight-faced, no-commentary-needed take on Obama’s hacker army by Xinhua, the Chinese Communist Party’s official press service. With America’s dark-side-of-the-moon surveillance programs like Prism suddenly in the global spotlight, the Chinese, long blistered by Washington’s charges about hacking American corporate and military websites, were polite enough. They didn’t even bother to mention that Prism was just another node in the Pentagon’s Joint Vision 2020 dream of “full spectrum dominance.” By revealing the existence of Prism (and other related surveillance programs), Snowden handed Beijing a roast duck banquet of a motive for sticking with cyber-surveillance. Especially after Snowden, a few days later, doubled down by unveiling what Xi, of course, already knew -- that the National Security Agency had for years been relentlessly hacking both Hong Kong and mainland Chinese computer networks.
  • But the ultimate shark fin’s soup on China’s recent banquet card was an editorial in the Communist Party-controlled Global Times.  “Snowden,” it acknowledged, “is a ‘card’ that China never expected,” adding that “China is neither adept at nor used to playing it.” Its recommendation: use the recent leaks “as evidence to negotiate with the U.S.” It also offered a warning that “public opinion will turn against China’s central government and the Hong Kong SAR [Special Administrative Region] government if they choose to send [Snowden] back.” With a set of cyber-campaigns -- from cyber-enabled economic theft and espionage to the possibility of future state-sanctioned cyber-attacks -- evolving in the shadows, it’s hard to spin the sunny “new type of great power relationship” President Xi suggested for the U.S. and China at the recent summit. It’s the (State) Economy, Stupid The unfolding Snowden cyber-saga effectively drowned out the Obama administration’s interest in learning more about Xi’s immensely ambitious plans for reconfiguring the Chinese economy -- and how to capture a piece of that future economic pie for American business. Essential to those plans is an astonishing investment of $6.4 trillion by China’s leadership in a drive to “urbanize” the economy yet further by 2020.
  •  
    Lengthy political analysis by the sterling Pepe Escobar on China/U.S. relations and Chinese President Xi Jinping's goals for the future of China during his period of national leadership. He leads with the impact of the NSA scandal, but goes on to paint a far more detailed picture of China's role in international policy, economic progress, and economic plans being executed. This is a must-read for China-watchers. As always, Pepe provides a lively read.
Paul Merrell

You're More Likely to Die from Brain-Eating Parasites, Alcoholism, Obesity, Medical Errors, Risky Sexual Behavior or Just About Anything OTHER THAN Terrorism | Washington's Blog - 0 views

  • We noted in 2011: – You are 17,600 times more likely to die from heart disease than from a terrorist attack – You are 12,571 times more likely to die from cancer than from a terrorist attack — You are 11,000 times more likely to die in an airplane accident than from a terrorist plot involving an airplane — You are 1048 times more likely to die from a car accident than from a terrorist attack –You are 404 times more likely to die in a fall than from a terrorist attack — You are 87 times more likely to drown than die in a terrorist attack – You are 13 times more likely to die in a railway accident than from a terrorist attack –You are 12 times more likely to die from accidental suffocation in bed than from a terrorist attack –You are 9 times more likely to choke to death on your own vomit than die in a terrorist attack –You are 8 times more likely to be killed by a police officer than by a terrorist –You are 8 times more likely to die from accidental electrocution than from a terrorist attack – You are 6 times more likely to die from hot weather than from a terrorist attack Let’s look at some details from the most recent official statistics.
  • The U.S.  Department of State reports that only 17 U.S. citizens were killed worldwide as a result of terrorism in 2011. That figure includes deaths in Afghanistan, Iraq and all other theaters of war. In contrast, the American agency which tracks health-related issues – the U.S. Centers for Disease Control – rounds up the most prevalent causes of death in the United States:
  • (Keep in mind when reading this entire piece that we are consistently and substantially understating the risk of other causes of death as compared to terrorism, because we are comparing deaths from various causes within the United States against deaths from terrorism worldwide.)
  •  
    Reminds of a quote: "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. This is not a way of life at all in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron." - Dwight D. Eisenhower, From a speech before the American Society of Newspaper Editors (16 April 1953)
Paul Merrell

Israel withholds funds, weighs lawsuits against Palestinians | Reuters - 0 views

  • (Reuters) - Israel will withhold critical tax revenue and seek ways to bring war crimes prosecutions against Palestinian leaders in retaliation for Palestinian moves to join the International Criminal Court (ICC), Israeli officials said on Saturday. On Friday, the Palestinians delivered documents to U.N. headquarters in New York on joining the Rome Statute of the ICC in The Hague and other global treaties with the aim of prosecuting Israelis for what they consider war crimes committed on their territory.
  • This is highway robbery. Not only is this illegal, they are adding money theft to land theft. The revenues belong to the Palestinian people, they go to pay salaries and support our economy. Israel has no business deciding to steal our funds," senior Palestinian negotiator Hanan Ashrawi told Reuters.Under interim peace deals from the 1990s, Israel collects at least $100 million a month in duties on behalf of the Palestinian Authority.
  • The ICC was set up to try war crimes and crimes against humanity such as genocide. Israel and the United States object to unilateral approaches by the Palestinians to world bodies, saying they undermine prospects for negotiating a peaceful settlement of the decades-old Middle East conflict.
  • ...2 more annotations...
  • In addition to the revenue freeze, an Israeli official said Israel was "weighing the possibilities for large-scale prosecution in the United States and elsewhere" of Palestinian President Mahmoud Abbas and other senior Palestinian officials.Israel would probably press these cases via non-governmental groups and pro-Israel legal organizations capable of filing lawsuits abroad, a second Israeli official said.Israel sees the heads of the Palestinian Authority in the occupied West Bank as collaborators with the Islamist militant group Hamas, which dominates Gaza, because of a unity deal they forged in April, the officials said.Netanyahu had previously warned that unilateral moves by the Palestinian Authority at the United Nations would expose its leaders to prosecution over support for Hamas, viewed by Israel and much of the West as a terrorist organization.
  • Abbas opted to join the ICC after losing a motion last week in the U.N. Security Council to set a 2017 deadline for a Palestinian state to be established in land occupied by Israel.The United States, Israel's main ally, supports an eventual independent Palestinian state, but has argued against unilateral moves like Friday's, saying they could damage the peace process.Washington sends about $400 million in economic support to the Palestinians every year. Under U.S. law, that aid would be cut off if the Palestinians used membership of the ICC to press claims against Israel.
Paul Merrell

Federal Bureau of Investigation - Cincinnati [...] (via noodls) / Former Columbus Police Officer Sentenced for Embezzling from Defense Department Surplus Program - 0 views

  • COLUMBUS, OH-Former Columbus Police Officer Steven Edward Dean, 49, of Columbus, was sentenced in U.S. District Court to 30 months in prison for misappropriating and selling heavy equipment and other property the Columbus Division of Police received through a Department of Defense surplus program. Carter M. Stewart, U.S. Attorney for the Southern District of Ohio; Kevin Cornelius, Special Agent in Charge, Federal Bureau of Investigation (FBI); Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS); and Columbus Police Chief Kim Jacobs announced the sentence handed down today by U.S. District Judge Michael H. Watson. According to court documents, an investigation by the Columbus Division of Police, the FBI and DCIS concluded that between October 1, 2005 and June 1, 2012, Dean diverted property with a fair market value of $251,570.94 the police department had received from the Defense Reutilization Marketing Office (DRMO) program. The embezzled items included $133,554.59 of heavy equipment, construction equipment, and vehicles; restaurant equipment; $94,163.25 of materials sold for scrap; and $16,353.15 worth of items, including diesel generators, sold to private persons. This conclusion was based on records obtained from the U.S. Department of Defense DRMO program, the state of Ohio offices involved with the DRMO program, scrapyard receipts, Craigslist online point-of-sale website records, restaurant supply records of sold equipment, and by viewing the items of property themselves.
  • Federal Bureau of Investigation - Cincinnati Field Office 08/13/2014 | Press release Former Columbus Police Officer Sentenced for Embezzling from Defense Department Surplus Program
  • "This is a major theft and embezzlement case involving a uniformed police officer stealing from his own department and involving property which should have otherwise been used to assist law enforcement, and all the equipment and vehicles were originally purchased with taxpayer dollars," Assistant U.S. Attorneys Doug Squires and Deborah Solove told the court prior to sentencing. "Today's sentencing demonstrates the Defense Criminal Investigative Service's ongoing commitment to combating fraud and corruption that impacts the Department of Defense's vital programs and operations," said Brian Reihms, Special Agent in Charge, Defense Criminal Investigative Service (DCIS), "DCIS, with our partner agencies, will continue to work tirelessly to investigate fraud involving the DoD's DRMO Law Enforcement Support Office which transfers excess property to law enforcement organizations across the United States." Dean pleaded guilty in February to one count of embezzlement from a program receiving federal funds and one count of theft of public property. Under terms of the plea agreement, Dean will forfeit $251,570.94 less the value of the recovered equipment. Dean was also sentenced to three years of supervised released following inprisonment. U.S. Attorney Stewart commended the investigation by DCIS, the FBI, and CPD, as well as Assistant U.S. Attorneys Doug Squires and Deborah Solove, who prosecuted the case.
  •  
    Thanks for keeping us safe, Officer Dean. Related: http://www.dispositionservices.dla.mil/leso/Pages/default.aspx (DoD section1033 law enforcement donation program) and http://www.law.cornell.edu/uscode/text/10/2576a ("Notwithstanding any other provision of law and subject to subsection (b), the Secretary of Defense may transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is- (A) suitable for use by the agencies in law enforcement activities, including counter-drug and counter-terrorism activities; and (B) excess to the needs of the Department of Defense.") 
1 - 20 of 61 Next › Last »
Showing 20 items per page