Aletho News

ΑΛΗΘΩΣ

NSA Unit Intercepts Computer Shipments for Secret Access Modifications

By Noel Brinkerhoff | AllGov | January 1, 2014

Sophisticated as it is with myriad forms of electronic spying at its disposal, the National Security Agency (NSA) sometimes resorts to old-fashioned, hands-on methods of breaking into someone’s computer system.

In rare instances when the agency can’t hack its way into a network, the NSA employs a special group of “plumbers” to gain access.

These specialists intercept computer shipments ordered by a targeted person and reroute the boxes to secret workshops. There, the packages are opened, and either software or hardware are implanted into the equipment to allow the NSA full access to the system once it’s operational by the target. The packages are then carefully resealed and sent on their way to the unsuspecting customers.

This type of old-school procedure, referred to by NSA as “interdiction,” is considered by the agency to be one of its “most productive operations,” a method that gives the NSA access to computer networks “around the world.”

These interceptions are just one of the many sneaky tasks performed by the NSA’s Office of Tailored Access Operations (TAO), which is also skilled at electronic snooping.

According to NSA documents obtained by the German newspaper Der Spiegel, TAO handles jobs involving counterterrorism, cyber attacks and traditional espionage.

Matthew Aid, a historian who specializes in NSA history, told Spiegel that TAO is “akin to the wunderkind of the US intelligence community,” adding that within the NSA, the unit is known for “getting the ungettable.”

TAO’s work has extended around the globe, reaching more than 250 targets in nearly 90 countries. It has been projected that about 85,000 computers worldwide were infiltrated by NSA specialists as of the end of 2013. Most of the “implants” were accomplished via the Internet by TAO teams.

“Indeed, TAO specialists have directly accessed the protected networks of democratically elected leaders of countries,” Spiegel wrote. “They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry’s BES email servers, which until then were believed to be securely encrypted.”

The unit’s successes have given the NSA reason to expand its size and locations since first establishing TAO in 1997.

TAO offices now operate out of Wahiawa, Hawaii; Fort Gordon, Georgia; Buckley Air Force Base near Denver, Colorado; Lackland Air Force Base in San Antonio, Texas; and Fort Meade, Maryland (NSA headquarters).

The San Antonio unit alone is expected to grow from 60 to 270 specialists by 2015.

To Learn More:

Inside TAO: Documents Reveal Top NSA Hacking Unit (Der Spiegel)

Shopping for Spy Gear: Catalog Advertises NSA Toolbox (by Jacob Appelbaum, Judith Horchert and Christian Stöcker, Der Spiegel)

Computer Security Firm Accepted $10 Million Payoff to Give NSA Backdoor Access (by Noel Brinkerhoff, AllGov)

January 1, 2014 Posted by | Corruption, Full Spectrum Dominance | , , , , | Leave a comment

NSA’s Personal Propagandist For CBS Officially Takes Counterterrorism Job Everyone Knew He Was Getting

By Mike Masnick | Techdirt | December 30, 2013

When 60 Minutes did its hack PR job for the NSA a few weeks ago, lots of people called out the fact that the reporter who handled the segment, John Miller, wasn’t just a former intelligence official working for the Office of the Director of National Intelligence (which oversees the NSA), but that he was widely rumored to have worked out a deal for a new job for the NYPD, heading up “counterterrorism.” Even though there were multiple reports at the time, including one that claimed it was a “99.44% done deal,” when asked about it, Miller lied. He told a reporter, “you know as much about this as I do.”

That was clearly Miller lying — something that Miller has had an issue with in the past — as the “rumor” is now confirmed and Miller has accepted his job doing “counterterrorism” for the NYPD. And while some might say that doing counterterrorism for a city police force is different than working for national intelligence, that’s only because you’re not familiar with the NYPD, which has set up something of a shadow NSA/CIA to do all sorts of activities not normally associated with a police force.

And, of course, since the press was clearly familiar with Miller’s expected role, it raises serious questions about why 60 Minutes allowed the puff piece to move forward with a seriously conflicted “journalist.” While Miller has lashed out at critics, rather than respond to a single point raised, the brand that comes out worst in all this is clearly CBS and 60 Minutes — which basically let an intelligence official do an entire propaganda piece on the NSA. 60 Minutes used to be about hard hitting journalism. Now, apparently, they think it’s “journalism” to shill for the surveillance state.

December 30, 2013 Posted by | Corruption, Deception, Full Spectrum Dominance, Mainstream Media, Warmongering | , , , , , , | Leave a comment

Israeli forces shoot photographer in Bilin demonstrations

palestinian-journalists-media-press-israeli-soldier

Ma’an – 29/12/2013

RAMALLAH – A photographer was injured and dozens suffered from excessive tear gas inhalation as Israeli forces dispersed a demonstration in Bilin near Ramallah.

Israeli forces fired rubber-coated steel bullets, tear gas and stun grenades at demonstrators as they neared their lands close to the wall.

Photographer Mohammad Yassin, 20, was hit with a rubber coated steel bullet during the protests.

The demonstration was held in celebration of Christmas and the release of Samer Issawi, and in protest of Israeli settlement activity and the separation wall.

Participants, some of whom wore Santa Claus costumes, raised Palestinian flags and chanted songs for unity and resistance.

Since 2005, Bilin villagers have protested on a weekly basis against the Israeli separation wall that runs through their village on land confiscated from local farmers.

Previous protests by Bilin activists have forced the Israeli authorities to re-route the wall, but large chunks of the village lands remain inaccessible to residents because of the route.

December 29, 2013 Posted by | Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Solidarity and Activism | , , | Leave a comment

NSA collects data from undersea cables

342624_The SEA-ME-WE 4 cable
South East Asia–Middle East–Western Europe 4 (SEA-ME-WE 4) optical fiber submarine communications cable
Press TV – December 29, 2013

The US National Security Agency (NSA) has collected sensitive data on key undersea optical fiber telecommunications cables between Europe, North Africa and Asia.

Citing classified documents labeled “top secret” and “not for foreigners”, German news magazine Der Spiegel reported on Sunday that the NSA spied on the so-called “South East Asia-Middle East-West Europe 4” also known as “Sea-Me-We 4” undersea cable system.

The German magazine said NSA specialists had hacked an internal website belonging to the operator consortium to mine documents about technical infrastructure including circuit mapping and network management information. “More operations are planned in the future to collect more information about this and other cable systems.” Spiegel quoted the NSA documents, dating from February, as saying.

According to the website of the project “the South East Asia-Middle East-West Europe 4 project is a next generation submarine cable system linking South East Asia to Europe via the Indian Sub-Continent and Middle East. The project aims to take these regions to the forefront of global communication by significantly increasing the bandwidth and global connectivity of users along its route between Singapore and France.”

Spiegel reports that “Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.”

In March 2004, a consortium of 16 international telecommunications companies signed construction and maintenance agreements for the new optical fiber submarine cable system linking South East Asia to Europe via the Indian Sub-Continent and Middle East with Terminal Stations in Singapore, Malaysia, Thailand, Bangladesh, India, Sri Lanka, Pakistan, United Arab Emirates, Saudi Arabia, Egypt, Italy, Tunisia, Algeria and France. The contract is being awarded jointly to Alcatel Submarine Networks, France and Fujitsu Ltd., Japan and the estimated project cost is of the order of $500 million.

The submarine cable system is approximately 20,000km long. It consists of the main backbone across the Eastern and Western worlds plus the extension links in various countries. The project seeks to support telephone, internet, multimedia and various broadband data applications.

It seems the method was employed by the NSA’s elite hacking unit (TAO) via incorporating routers and servers from non-NSA networks into its covert network by infecting these networks with “implants” that then allow the government hackers to control the computers remotely.

The document leaked by Der Spiegel proudly says that, on Feb. 13, 2013, TAO “successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4).” With the help of a “website masquerade operation,” the agency managed to “gain access to the consortium’s management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network.”

The US government claims that its spying operations that are taking place both at home and abroad are vital for fighting terrorism.

A federal judge ruled Friday that the NSA’s bulk collection of millions of Americans’ telephone and Internet records is legal. US District Judge William Pauley also concluded that the operation is an important part of America’s effort to combat the threat of terrorism.

NSA spies on millions of telephone and Internet records that are routed through American networks on daily basis. According to some estimates, NSA spies on 380 million cellphones in the US.

Prior to Pauley’s ruling, another US District Court Judge, Richard Leon, had described the massive NSA spying program “Almost Orwellian”.

“I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen,” Judge Leon wrote.

December 29, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance | , , , , | Leave a comment

Is Anything Left of the US Constitution or Privacy Rights?

 photo jdgpauley_zpsbd54d86d.jpg

Vying for a Supreme Court appointment? US District Judge William H. Pauley III ruled that the NSA’s massive spying program is legal.

By Franklin Lamb | Fig Trees and Vineyards | December 28, 2013

The answer to this question is being pondered across America in light of two seemingly contradictory federal court decisions handed down this month from two separate courts, one in Washington, the other in New York.

Since the Bush Administration’s “war of terrorism” was launched, civil liberties advocates have voiced growing alarms about the erosion of Constitutional guarantees. Yet with the disclosures by whistle blower Edward Snowden, concerns about what protections Americans have remaining—protections from governmental intrusions into their privacy as well as home or office invasions by police forces—have rapidly gained new impetus. Because of Snowden’s leaks, legal challenges have been brought against the National Security Agency; without the leaks, no challenge could have been mounted.

Now all of a sudden two US Federal District Courts, with identical powers under the US Constitution, have reached seemingly opposite conclusions on the same legal issue, i.e. the right of the NSA to conduct “metadata” searches and store the information of scores of millions of unknowing Americans. This means, given that appeals have been filed in both cases, that the issue is likely going to be decided by the US Supreme Court.

Civil libertarians were encouraged earlier this month when Federal Judge Richard Leon of the United States District Court for the District of Columbia ruled on December 16 that the NSA’s bulk collection of cell phone data of Americans (everyone you called, when you called them, and where you were when you called them) violates the Fourth Amendment to the Constitution. Calling the data gathering “Orwellian,” Judge Leon reasoned that we now use our smartphones for a wide variety of personal activities in which we have the expectation of privacy, that probably we have more expectation of privacy from cell phones now than we did, say, from a pay phone in the 1980s. And he also noted, crucially, that cell phones today make it possible to determine the caller’s GPS location. “It’s one thing to say that people expect phone companies to occasionally provide information to law enforcement; it is quite another to suggest that our citizens expect all phone companies to operate what is effectively a joint intelligence-gathering operation with the Government,” Leon wrote.

 photo jdgleon_zpsfadd67bc.jpg

US District Judge Richard Leon

The judge then focused on whether the massive NSA surveillance violates the Fourth Amendment, which guarantees, “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

He writes:

“The threshold issue that I must address, then, is whether plaintiffs have a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephony metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains all of that metadata for five years, and then queries, analyzes and investigates that data without prior judicial approval of the investigative targets. If they do – and a Fourth Amendment search has thus occurred– then the next step of the analysis will be to determine whether such a search is ‘reasonable.’”

Judge Leon found that the NSA, when demanding citizens’ telephone metadata, is conducting a search, and that it is most likely an unreasonable search under the Fourth Amendment, given there is no specific suspicion of wrongdoing by any individual whose records are demanded.

In his ruling he granted the request for an injunction against the collection of the plaintiffs’ phone data, ordering the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion what he termed as the “significant national security interests at stake in this case and the novelty of the constitutional issues.”

But no sooner had Judge Leon’s decision been published, bringing hope to civil libertarians, than US District Judge William H. Pauley III in New York issued what looks almost like a diametrically antithetical ruling, making for the latest in a contentious debate that has also seen a presidential commission weighing in on certain aspects of NSA spying as well. On December 27, Pauley ruled that the NSA’s collection of vast oceans of data on private phone calls is legal—meaning that in a period of just 11 days the two judges, along with the presidential panel, had reached “the opposite of consensus on every significant question before them, including the intelligence value of the program, the privacy interests at stake and how the Constitution figures in the analysis,” as the New York Times reported it.

The case in New York was brought by the American Civil Liberties Union, which said it would appeal.

Judges Leon and Pauley have starkly differing understandings on how valuable the NSA program is. Echoing arguments made recently by former FBI director Robert S. Mueller III and other senior government officials, Pauley, whose courtroom is not far from where the World Trade Center towers stood, said he believed the program might have caught the 9/11 hijackers had it been in place at the time. “While robust discussions are underway across the nation, in Congress and at the White House, the question for this court is whether the government’s bulk telephony metadata program is lawful,” Pauley wrote. “This court finds it is.”

The finding stands in stark contrast to Leon’s ruling in Washington:

“The government does not cite a single instance in which analysis of the N.S.A.’s bulk metadata collection actually stopped an imminent attack, or otherwise aided the government in achieving any objective that was time-sensitive in nature,” Judge Leon wrote.

What these conflicting decisions leave us in is a profound quandary with respect to the issues raised by Edward Snowden. In a Christmas address that was carried by British Channel 4 and widely aired on the Internet, the former NSA contractor expressed the legitimate concern of all people who value individual liberty and privacy. A child born today, he said, might “never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought.” He added that people are essentially walking around with a tracking device in their pockets, noting that this disappearance of privacy is important because privacy “is what allows us to determine who we are and who we want to be.”

December 29, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , | Leave a comment

Citizen K in the USA

By William Manson | Dissident Voice | December 27, 2013 

In his novel The Trial, Franz Kafka conjured up the nightmarish, surreal yet strangely familiar world of an ordinary person trapped in a web of bewildering governmental repressions. Inexplicably, the eponymous protagonist “Joseph K” suddenly finds himself under relentless investigation—and is then abruptly arrested. Throughout his ordeal, the charges will remain undisclosed. (“Is it political?” gasps Jeanne Moreau, in Orson Welles’ film version; or, as Orwell’s Winston Smith would say, “is it a thought-crime?”) “Free” from incarceration while he awaits trial, Joseph travels through a labyrinth of impersonal offices, baffling court procedures, and inscrutable explanations–only to find himself, once again, back at the beginning of his quest for answers.

The sadistic travesty of justice perpetrated at Guantanamo immediately comes to mind. But what about conditions here in the “Homeland”? Trapped in endless litigation–or in the clutches of creditors or foreclosers—how many millions of U.S. citizens also feel like Joseph K? At one time or another, highly complicated legal quandaries and arcane bureaucratic tangles plague most of us. Lately, however, we’ve been inclined to worry more about our Internet communications: are they being surreptitiously intercepted and stored permanently (PRISM)? In order to be periodically retrieved, scrutinized and “analyzed”? If so, why?

The NSA Director, appearing on TV’s Sixty Minutes, hastened to reassure all (mere) citizens that–despite its mega-billion-dollar budget and ongoing expansion (the giant Utah data-storage complex)–the NSA is currently only actively focusing on less than “60 U.S. persons.” Was Gen. Keith Alexander telling “the whole truth” (to use a quaint phrase)? Or was he giving us, as did James Clapper (DNI) in his unsworn congressional testimony, the “least untruthful” answers he felt obliged to offer?

Therefore, our average Joseph K today is just a tiny bit worried that most (if not all) of his communications are being permanently stored, and subject at any future time to sophisticated “analysis”—under whatever rationale meddlesome technocrats may come up with. If not by the neighborly “analysts” at the NSA, then what about the other dozen-or-so “intelligence” agencies? What mischief are they up to? Joseph, who finds everyday life complicated enough, also finds himself wondering about all those marketing “research” firms, think-tank contractors, credit bureaus, and so on. How are they “mining” and storing his personal data? He doesn’t know.

But enough of that—Joseph K has enough troubles without succumbing to an obsessive paranoia! He’s even tempted to get rid of the Internet all together: his “service” stinks and he’s always hated computers. But wait! Our Joseph K has just been told—by some faceless bureaucrat—that he must quickly go the website “Healthcare.gov” and register to shop for (mandatory) private health insurance. Again, Joseph finds himself perplexed: frankly, he loathes hospitals and drug companies—and has managed quite well without them. Moreover—or so Joseph insists–if he finds himself suffering from terminal cancer, he may choose to die—rather than subject himself to dubious, degrading (and still-expensive) “procedures.” (And Joseph K is also aware that preventable medical errors are, by some estimates, the “third leading cause of death” in the U.S. today.) Joseph, you see, is one of those old-fashioned curmudgeons, the type that once embraced a radical-populism and hated Big Business and Big Government with equal fervor. He even thinks (can you believe it?) that the entire insurance industry is some kind of racket—and wants no part of it!

And admittedly, our Joseph K is not very “computer-literate” and finds it more than a little exasperating to try to comprehend all the provisions of a jerry-built “Affordable” Care Act. Couldn’t the government, he asks, have mailed (simplified) application forms to each and every citizen (counted in the 2010 U.S. Census)? He’s always found legalistic small-print, provisos and disclaimers more than a little confusing (and annoying). Given such typically over-complicated ordeals, Joseph understandably has become a fanatic for simplification. Why can’t “the government,” he again recently demanded, simply establish “Medicare for All”? After all, he pointed out, “we” spend trillions for “defense”—and from whom, exactly? He doesn’t know (but was under the impression that the U.S.-Soviet nuclear arms race ended some time ago).

Well, to make a long story short: our friend Joseph, feeling trapped between corrupt insurance giants and coercive big government, was so demoralized that he decided to leave all this behind. So much so, it turns out, that he urgently asked his creator Kafka to return him back to the world of fiction–wherein he will at least continue his Sisyphean struggle against coercion with some measure of defiance and tragic dignity.

~

William Manson is the author of The Psychodynamics of Culture (Greenwood Press).

December 28, 2013 Posted by | Civil Liberties, Economics, Full Spectrum Dominance, Progressive Hypocrite, Timeless or most popular | , , , | Leave a comment

Obama regime tries to stop courts from ruling on constitutionality of warrantless spying

By Noel Brinkerhoff | AllGov | December 24, 2013

Even after months of stories exposing the breadth and depth of National Security Agency (NSA) spying on Americans’ communications, the Obama administration insists federal courts should stop hearing cases challenging the agency’s warrantless surveillance on grounds that they might expose the existence of this spying.

Last week, federal lawyers asked a judge, Jeffrey S. White, in Northern California to dismiss cases that could lead to a ruling on the constitutionality of warrantless surveillance programs authorized during the George W. Bush administration.

The Obama administration contends the cases are just too dangerous to continue if they wind up jeopardizing state secrets.

“Disclosure of this still-classified information regarding the scope and operational details of N.S.A. intelligence activities implicated by plaintiffs’ allegations could be expected to cause extremely grave damage to the national security of the United States,” James Clapper Jr., director of national intelligence, wrote in one of the filings. In June, Clapper was exposed for having lied to Congress about the existence of programs that spied on Americans.

Cindy Cohn, legal director for the Electronic Frontier Foundation, which is representing the plaintiffs in the cases, told The New York Times that the government’s assertion was “very troubling.”

She added that despite the revelations by NSA whistleblower Edward Snowden, the administration was essentially saying, “We can’t say whether the American people have been spied on by their government.”

The lawsuits in question were brought by Carolyn Jewel and Virginia Shubert, who claim the NSA’s spying violated their constitutional rights.

Jewel is suing on behalf of all AT&T customers, and Shubert is suing on behalf of all Americans.

The NSA has refused to confirm or deny that either plaintiff’s communications were targeted.

“The American people know they’re being surveilled,” Cohn told The Washington Post. “The government is trying to reset the clock in order to avoid an open judicial determination about whether that surveillance is legal.”

To Learn More:

White House Tries to Prevent Judge From Ruling on Surveillance Efforts (by Charlie Savage and David Sanger, New York Times)

U.S. Government Moves To Block Further Litigation In NSA Surveillance Cases (by Marc Ferranti, IDG News Service)

U.S. Reasserts Need To Keep Domestic Surveillance Secret (by Ellen Nakashima, Washington Post)

Jewel v. NSA (Electronic Frontier Foundation)

NSA Phone Data Collection Made No Difference to National Security (by Noel Brinkerhoff and Danny Biederman, AllGov)

Obama Asks U.S. Supreme Court for Stamp of Approval on Warrantless Cell Phone Searches (by Noel Brinkerhoff, AllGov)

Should National Intelligence Director Clapper be Charged with a Felony for Lying in Sworn Senate Testimony? (by Noel Brinkerhoff, AllGov)

December 26, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Progressive Hypocrite | , | Leave a comment

Canada’s intelligence service asked foreign agencies to spy on Canadians

RT | December 22, 2013

Canada’s intelligence agency deliberately kept the country’s Federal Court “in the dark” to bypass the law in order to outsource its spying on Canadian citizens abroad to foreign security agencies, a federal judge said.

Federal Court Judge, Richard Mosley, has slammed the Canadian Security Intelligence Service (CSIS) for knowingly misleading him on numerous occasions.

Since 2009, Mosley has issued a large number of warrants to the CSIS, authorizing interception of electronic communications of unidentified Canadians abroad, who were investigated as threats to domestic security.

The spy agency assured the judge that the surveillance was to be carried out from inside Canada and controlled by and the Communication Security Establishment of Canada (CSEC), the country’s foreign signals intelligence service.

But, after the warrants were obtained, Canada’s foreign partners from the Five Eyes intelligence-gathering alliance (US, UK, Australia and New Zealand) were asked to perform the interceptions.

Canada’s Federal Court wasn’t notified of the foreign involvement and never approved it, Mosley wrote in a redacted version of a classified court decision which was made public on Friday.

“It is clear that the exercise of the court’s warrant issuing has been used as protective cover for activities that it has not authorized,” the document stressed. “The failure to disclose that information was the result of a deliberate decision to keep the court in the dark about the scope and extent of the foreign collection efforts that would flow from the court’s issuance of a warrant.”

Under Canada’s current legislation, the Federal Court has no authority to issue warrants that involve surveillance of Canadians by foreign intelligence agencies, he added.

The actions of CSIS and CSEC put the Canadian citizens abroad at risk as they “may be detained or otherwise harmed as a result of the use of the intercepted communications by the foreign agencies,” Mosley wrote.

“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards,” the document said. “It appears to me that they are using the warrants as authorization to assume those risks.”

Mosley demanded explanations from the security agencies after an annual report by CSEC commissioner, Robert Decary, this August.

The judge became suspicious after Decary suggested that CSIS should provide the Federal Court with “certain additional evidence about the nature and extent” of the help, it received from his agency.

The results of the Federal Court’s inquiry into the matter were made public on Friday.

By misleading him, the CSIS and CSEC have been in “breach of the duty of candor,” which resulted in misstatements on the public record about the scope of the authority granted to the service,” Mosley wrote.

Mosley, who used to be a former assistant deputy minister in the Justice Department, was intimately involved in the creation of the 2001 Anti-terrorism Act, which the CSIS and CSEC violated.

December 22, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

GCHQ, NSA Spied On Known Terrorist Haven… UNICEF

By Mike Masnick | Techdirt | December 20, 2013

The latest revelations from the Snowden documents, according to reports in both the NY Times and the Guardian is that the UK’s GCHQ, operating out of a site heavily funded by the NSA, targeted a variety of humanitarian and charitable groups, including the United Nations Children’s Fund, better known as UNICEF. Another target was Médecins du Monde, a well known medical relief group that delivers medicines and medical help to war-torn areas.

The reports also detail spying on various government officials, though, as I’ve said in the past, that kind of stuff isn’t particularly bothersome — as spying on leaders of other countries is typical and expected espionage activity, though it can certainly create some diplomatic awkwardness. Perhaps more interesting is that there’s much more evidence here of economic espionage activity. Among those “targeted” were Joaquin Almunia, the EU commission “competition” boss, who has been investigating anti-trust claims against American companies like Google and Microsoft. The NSA has insisted (and repeated in response to questions from reporters writing the two stories above) that it doesn’t engage in economic espionage — though GCHQ apparently doesn’t have any such restriction, suggesting that the NSA can just hand that kind of activity off to its UK friends, who it funds, and then reap the benefits.

Furthermore, the NSA seems to indicate in its response that while it may not engage in economic espionage in the form of spying on issues and handing that info directly to US companies, it does seem to open up the possibility of engaging in economic espionage to inform US policy makers — meaning it likely gets filtered back to those companies anyway:

“We do not use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of — or give intelligence we collect to — U.S. companies to enhance their international competitiveness or increase their bottom line,” said Vanee Vines, an N.S.A. spokeswoman.

But she added that some economic spying was justified by national security needs. “The intelligence community’s efforts to understand economic systems and policies, and monitor anomalous economic activities, are critical to providing policy makers with the information they need to make informed decisions that are in the best interest of our national security,” Ms. Vines said.

There is some validity in the idea that if there’s going to be some sort of earth-shattering revelation that could have a wider impact on the whole economy, that there’s some value in having intelligence services aware of what’s going on — but it’s a pretty slippery slope from there to simply intercepting direct information that might be helpful for a particular company, and providing them an advantage.

But, going beyond that, targeting groups like UNICEF seems like going way too far. It’s hard to see any legitimate justification for this, unless someone’s going to argue that terrorist groups were somehow co-opting UNICEF, which seems like a huge stretch. To argue that there’s any national security reason to spy on UNICEF seems laughable. It really seems like the NSA and GCHQ were targeting organizations like that because they can.

December 20, 2013 Posted by | Corruption, Deception, Full Spectrum Dominance | , , , , , | Leave a comment

Brazil ditches Boeing jets, grants $4.5 bln contract to Saab

‘NSA ruined it!’

RT | December 18, 2013

Brazil has rejected a contract for Boeing’s F/A-18 fighter jets in favor of the Swedish Saab’s JAS 39 Gripens. The unexpected move to reject the US bid comes amid the global scandal over the NSA’s involvement in economic espionage activities.

The announcement for the purchase of 36 fighters was made Wednesday by Brazilian Defense Minister Celso Amorim and Air Force Commander Junti Saito. The jets will cost US$4.5 billion, well below the estimated market value of around US$7 billion.

Saito said the development of the fighters will occur in conjunction with Embraer and other unspecified companies.

The 12 Mirage aircraft currently in use by the Brazilian Air Force (FAB) will be retired at the end of this year. They were acquired by Brazil in 2005. As it waits for the new fighters, the FAB will use the F5 style, which will stay viable up to 2025.

During a visit in Brasilia last week, French President Francois Hollande was accompanied by an entourage that included the president of Dassault Group, stirring speculation that the French jet manufacturer had the edge over Saab and Boeing.

Competition over which company would win the right to supply Brazil with the fighter jets began in the late 1990s during Fernando Henrique Cardoso’s administration, continued during Luiz Inácio Lula da Silva’s time in office and into current President Rousseff’s term. A FAB report in 2010 indicated a preference in Saab, though then-President Lula leaned toward the cheaper Dassault jet, Rafale.

Boeing was considered to have the inside track to win the contract earlier this year, yet revelations of intrusive surveillance of global officials’ communications, including those of Brazilian President Dilma Rousseff, by the US government’s National Security Agency led to distrust of the American company.

“The NSA problem ruined it for the Americans,” a Brazilian government source told Reuters.

The Chicago-based Boeing’s bid was rejected because of Saab’s better performance and cost of its aircraft as well as “willingness to transfer technology,” defense minister Celso Amorim said, as cited by Bloomberg.

‘Economic espionage’ fallout

Brazil is currently probing reports released by former NSA contractor Edward Snowden that the spy agency monitored the personal communications of President Rousseff and hacked into government ministries to gather information. Among the institutions targeted by NSA espionage were state oil giant Petrobras and the Ministry of Mines and Energy, contradicting claims by Washington that it did not engage in “economic espionage.”

Rousseff lambasted US spying on her country during the UN General Assembly in September, calling it a “breach of international law.” She further warned that the NSA surveillance, revealed since June, threatened freedom of speech and democracy.

“Meddling in such a manner in the lives and affairs of other countries is a breach of international law and as such it is an affront to the principles that should otherwise govern relations among countries, especially among friendly nations,” Rousseff said.

Just before her address at the UN summit, Rousseff canceled a state visit to Washington, scheduled to take place in October, because of indignation over spying revelations. Rousseff has stated she wants an apology from US President Barack Obama.

Snowden has promised to aid Brazil in a probe into the NSA’s spying program in the country.

“A lot of Brazilian senators have asked me to collaborate with their investigations into suspected crimes against Brazilian citizens,” said Snowden, in an open letter published by Brazilian paper Folha de S.Paulo. Snowden hinted in the letter that he may ask Brazil for asylum.

“The American government will continue to limit my ability to speak out until a country grants me permanent political asylum,” wrote Snowden.

The whistleblower is currently under temporary asylum in Russia. Brazil plans to host a global summit on internet governance in April 2014.

Brazil resident Glenn Greenwald, the former Guardian journalist renowned for publishing Snowden’s leaks, criticized on Wednesday European Union governments’ muted response to the revelations about the NSA’s mass surveillance apparatus. He also contradicted Washington’s claim that no economic espionage is involved amid NSA spying.

“What a lot of this spying is about has nothing to do with terrorism and national security. That is the pretext. It is about diplomatic manipulation and economic advantage.”

December 18, 2013 Posted by | Corruption, Economics, Full Spectrum Dominance | , , , , , | Leave a comment

US-Israeli Security Company Selling Mobile Phone Surveillance Products To Agencies Around The World

By Tim Cushing | Techdirt | December 17, 2013

Privacy International, which has done a very thorough job digging into the backgrounds of the many private companies involved in the surveillance “industry” around the world, has just released a promotional document from the American-Israeli Verint, a security company that provides NSA-level cell phone surveillance power to entities around the world.

[A] scaled down version of this system is also being sold by private surveillance contractors to the highest bidder. The company behind it? Israeli-American company Verint. Their Skylock technology claims to have the ability to “Remotely locate GSM and UMTS targets located anywhere in the world at cell level precision”.

The brochure Privacy Int’l obtained doesn’t go into detail as to how it achieves this, but what is shown is both impressive and disturbing.

From a brochure collected this year we have discovered one of the newest additions to Verint’s product line: mobile phone tracking on an international scale. Previously, mobile phone tracking required presence in the particular areas of interest, focusing on the tracking of phones through monitoring Base Stations (Cell Towers) and local networks to pinpoint location. In the past, if a law enforcement agency wanted location data they requested information from the relevant telecommunication firm operating in that specific territory. By way of an example, this would result in the UK not being able to obtain a French mobile phone’s location without help from the French. Now it would appear that Verint have bypassed the territoriality requirement.With this latest news, we know that location tracking has become borderless in the same way as communications surveillance. The ability to do this has likely come from a focus on international phone systems rather than domestic or regional networks which would never reach the worldwide nature of location tracking Verint is advertising.

Some details on Verint’s SKYLOCK offering are available online (under the name ENGAGE). While the brochure seems to indicate this is solely a military product (the brochure cover only lists “Military, Special Forces, Navy, Search and Rescue, Border Control” and the photos contained show only military personnel), the inside notes make it clear these products are available to “law enforcement” as well.

As Privacy Int’l points out, Verint’s offering operates “independently of local service providers,” meaning pretty much every legal obstacle is demolished. What no one knows is going on won’t hurt them. One product is targeted at satellite communications, but even considering that limited scope, it’s still very powerful.

Here’s what ENGAGE/SKYLOCK can do:

– Intercept voice calls and text messages
– Decrypt A5/1 and A5/2 encryptions with an embedded decipher
– Operate undetected leaving no electromagnetic signature
– Selectively downgrade UMTS traffic to GSM

Other ENGAGE products target wireless communications. Verint’s intercept-in-a-box can do all of the following.

Actively and passively intercept WiFi communications based on: 802.11 a/b/g/n, 2.4Ghz, and 5GHz
– Active interception of mobile handsets, even when not intentionally connected to a WiFi network
– Intercept target communication at a distance with zero packet loss
– Choose from multiple active interception methods to overcome encryption of private communication
– Identify access points and intercept MAC addresses in the area

Verint also gives its purchasers the power to target phones using 3G networks, remotely activate cell phone mics, and block cellular communication.

The capabilities that were presumed to only be in the hands of national intelligence agencies now can be had by nearly anyone who can come up with the money. Powerful cell phone surveillance products are a growth market. Anything that can increase data and communication harvesting while simultaneously eliminating a majority of legal restrictions and oversight practically sells itself.

We may feel this sort of power is OK in the “right hands,” but we don’t get to decide which hands this ends up in. We may believe the NSA should be able to do this sort of thing (overseas, preferably), but that local law enforcement agencies should be forced to jump through warrant and subpoena hoops before tracking locations and intercepting communications. But ultimately it doesn’t matter what we prefer. That call is made by Verint and it’s in the business of selling surveillance products, not protecting the privacy of the world’s citizens.

December 17, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance | , , , , | Leave a comment

ACLU calls for Massachusetts moratorium on controversial license plate readers

ACLU – 12/14/2013

BOSTON — The ACLU of Massachusetts calls for a moratorium on the use of controversial and unregulated license plate scanner technology in all Massachusetts police departments, following a Boston Globe exposé of problems in the Boston Police Department’s program.

The story, published in today’s Globe, shows that contrary to officials’ claims about why departments need the technology, police routinely do not respond to live ‘hits’ alerting them to the location of stolen cars. This suggests that the program is, as the ACLU feared, largely oriented towards compiling vast databases enabling the warrantless tracking of millions of innocent motorists.

In response to these alarming findings, the Boston Police Department announced it would suspend the program, at least until proper oversight and procedures are put into place.

“The Globe’s investigation into the Boston Police Department’s license plate reader program, based largely on a series of public records requests initiated nearly a year ago, confirms that police departments need outside oversight and guidance in order to responsibly use this powerful technology. We applaud the Boston police decision to suspend the program,” said Kade Crockford, director of the Technology for Liberty project at the ACLU of Massachusetts. “In light of these disturbing revelations, no police department in the state should continue to use this technology until the legislature passes the License Plate Privacy Act. We need uniform statewide rules for departments’ use of plate readers.”

Currently the Massachusetts State Police and more than 50 cities and towns deploy license plate scanners, which snap photographs of each license plate they encounter, noting the time, date and location, and run the plate numbers against “hot lists” to identify stolen cars, outstanding warrants and other violations. Today, no license plate reader program in the state is subject to outside regulation.

“The License Plate Privacy Act will establish accountability and public transparency requirements to ensure that the kinds of abuses the Globe uncovered at the Boston Police Department are not happening in other cities and towns,” said Crockford. “Technologies that target ordinary Americans going about their everyday lives create tremendous opportunity for abuse, without keeping us safe. We must ensure that the law keeps pace with these new technologies.”

The License Plate Privacy Act allows departments to use license plate readers to identify cars associated with criminal suspects or crimes, while preventing the government from amassing databases containing the historical travel records of millions of innocent people.

“The Globe’s investigation makes crystal clear that departments cannot police their own use of this complex and powerful tool,” said Crockford. “The legislature must step in to provide some basic rules, as well as checks and balances to make sure license plate readers aren’t used for warrantless tracking of innocent drivers. The Joint Transportation Committee should recommend swift approval of the License Plate Privacy Act, the legislature should pass it, and the Governor should sign it into law.”

Advanced surveillance tools can work to promote public safety while simultaneously respecting the privacy and liberty interests that help our Commonwealth thrive, but in order for that to happen the law needs to catch up with the technology. The License Plate Privacy Act strikes the right balance. Police departments statewide should follow Boston’s lead and immediately halt their use of the technology until the legislature acts.

For more on the License Plate Privacy Act, go to:
https://aclum.org/privacy_agenda#LPA

To take action on this issue, go to:
https://ssl.capwiz.com/aclu/ma/issues/alert/?alertid=63008551&type=ML

For more information about automatic license plate readers, go to:
https://www.aclu.org/alpr

December 14, 2013 Posted by | Civil Liberties, Corruption, Deception, Full Spectrum Dominance | , , , , , , | Leave a comment