Category Archives: Deep Politics

Chart of the day: Asian arms in the game of Zones


From Reuters, the respective arms of the nations engaged in the high stakes, ever-intensifying competition for resources and influence. Click on the image to enlarge:

BLOG Asian arms

InSecurityWatch: Nukes, hacks, cops, zones


Today’s compendium of security woes open with two stories about America’s nuclear arsenal and the folks charged with its oversight.

First up, via the Associated Press, merely the latest instance of a phenomenon all too common these days, given that earlier this year similar cheats were exposed amongst Air Force officers overseeing nuclear missiles:

Navy kicks out 34 for nuke cheating

At least 34 sailors are being kicked out of the Navy for their roles in a cheating ring that operated undetected for at least seven years at a nuclear power training site, and 10 others are under criminal investigation, the admiral in charge of the Navy’s nuclear reactors program told The Associated Press.

The number of accused and the duration of cheating are greater than was known when the Navy announced in February that it had discovered cheating on qualification exams by an estimated 20 to 30 sailors seeking to be certified as instructors at the nuclear training unit at Charleston, South Carolina. Students there are trained in nuclear reactor operations to prepare for service on any of the Navy’s 83 nuclear-powered submarines and aircraft carriers.

Neither the instructors nor the students are involved in handling nuclear weapons.

After further investigation the Navy determined that 78 enlisted sailors were implicated. Although the cheating is believed to have been confined to a single unit at Charleston and apparently was not known to commanding officers, the misconduct had been happening since at least 2007, according to Adm. John M. Richardson, director of naval reactors. The exact start of the cheating was not pinpointed.

From the Associated Press again, nuclear spooks:

Former lab worker sentenced in nuke secrets plot

A former Los Alamos National Laboratory contractor has been sentenced to a year and a day in prison for conspiring with her physicist husband to sell nuclear secrets.

The Justice Department on Wednesday announced the sentencing of 71-year-old Marjorie Roxby Mascheroni, who pleaded guilty to charges accusing the couple of plotting to communicate classified nuclear weapons data to an undercover agent who they thought was a Venezuelan government official.

Her husband, 79-year-old Pedro Leonardo Mascheroni, has also pleaded guilty in the case and is in federal custody pending his sentencing. He was a scientist at the lab from 1979 to 1988. She did technical writing and editing from 1981 to 2010. Prosecutors say both held security clearances that allowed them access to certain classified information and restricted data.

Defense One covers up:

Yet Again, CIA is Concealing Information Americans Should See

Once again, the CIA is concealing information that Americans have a right to know, and once again President Obama should ensure its release.

The Senate Select Committee on Intelligence is set to release a landmark report on the CIA’s post-9/11 torture program. But Obama allowed the CIA to oversee redactions, and it predictably went to town with the black marker. According to committee Chair Dianne Feinstein, D-Calif., the redactions “eliminate or obscure key facts that support the report’s findings and conclusions.”

From The Intercept, seriously surreal:

U.S. Military Bans The Intercept

The U.S. military is banning and blocking employees from visiting The Intercept in an apparent effort to censor news reports that contain leaked government secrets.

According to multiple military sources, a notice has been circulated to units within the Army, Navy, Air Force, and Marine Corps warning staff that they are prohibited from reading stories published by The Intercept on the grounds that they may contain classified information. The ban appears to apply to all employees—including those with top-secret security clearance—and is aimed at preventing classified information from being viewed on unclassified computer networks, even if it is freely available on the internet. Similar military-wide bans have been directed against news outlets in the past after leaks of classified information.

A directive issued to military staff at one location last week, obtained by The Intercept, threatens that any employees caught viewing classified material in the public domain will face “long term security issues.” It suggests that the call to prohibit employees from viewing the website was made by senior officials over concerns about a “potential new leaker” of secret documents.

From the Guardian, does that include begonias?:

US police given billions from Homeland Security for ‘tactical’ equipment

  • With little oversight, federal agency awarded billions to local police for spending on drones, drugs, vehicles and ‘animals and plants’, among eligible purchases

Billions of federal dollars have been spent since September 11 on purchasing modern and often military-grade equipment for state and local police. But there is little that limits the use of that hardware to counter-terrorism purposes, and oversight of the spending is difficult, according to federal sources and documents reviewed by the Guardian.

In the wake of the Ferguson protests, much attention has gone to the Department of Defense’s program to supply surplus military equipment to police. But that program is eclipsed in size and scope by grant money from the Department of Homeland Security (DHS), which enables purchases of similar “tactical” equipment.

Under existing federal requirements, police departments and state law enforcement agencies do not need to spend much of that money on preventing terrorism or preparing for disaster relief.

The Wire covers a benching:

ACLU: Officer Who Threatened to ‘F*cking Kill’ Ferguson Protesters Taken Off Duty

A Ferguson Police officer who threatened to kill protesters has been taken off duty after a complaint from the Missouri ACLU, the organization announced Wednesday.

The organization tweeted, “SUCCESS! In response to our letter, officer who threatened to kill #Ferguson protesters has been removed from duty,” soon after posting a copy of a letter addressed to the Missouri State Highway Patrol. The ACLU’s Vanita Gupta tweeted “Highway patrol called. They identified the cop. He will no longer be in ferguson.”

In a letter sent Wednesday, the ACLU called on the Missouri Highway Patrol to “identify and remove” an officer featured in the video below. In the video, the officer points a gun protesters and says he’ll “fucking kill” one man. When asked what his name is, he replies “Go fuck yourself.” While Ferguson protests have had “tense moments,” the ACLU argues that the officer’s behavior was “from start to finish wholly unacceptable.”

From the Christian Science Monitor, another containment effort:

After Foley murder, an effort to stamp out jihadi Twitter accounts

The jihad group IS videotaped its murder of American journalist James Foley as a propaganda exercise, fueling a debate over when and how often such groups should be censored on social media sites.

The gruesome murder of American journalist James Foley yesterday was an opportunity for the self-styled Islamic State (IS) to put on a propaganda show. The jihadi group uploaded video of the killing to YouTube and Vimeo and its social media team bombarded Twitter – including targeting journalists and others who closely follow the war in Syria and Iraq – with the links.

Within minutes YouTube deleted the original post and Twitter was not far behind, announcing it would suspend accounts spreading the distressing video. But by that time the clip had multiplied. Users posted slightly different versions to evade detection – YouTube has an algorithm that prevents re-uploads. By Tuesday evening, dozens of copies of the footage could be found with just a simple web search.

As social media sites fought to shut them down, the online followers of IS reveled in the butchery of a hostage and called for more, part of the point of the exercise for the group. Social media has become an important fund-raising and recruitment tool for them. While to most people the murder was nihilistic and repugnant, for would-be internet mujahideen it was a moment of celebration.

PandoDaily catches a contradiction:

Twitter suspends users that share graphic James Foley images — Unless you’re a New York tabloid

Twitter CEO Dick Costolo announced a new policy, tweeting, “We have been and are actively suspending accounts as we discover them related to this graphic imagery.” But far from setting this controversy to rest, Costolo’s announcement has only sparked a greater debate over a social network’s responsibility when it comes to policing graphic imagery posted by users.

For example, Costolo’s tweet seems clear enough — post images of Foley’s beheading and you will be suspended. And yet accounts belonging to the New York Post and the New York Daily News, which both tweeted out today’s front pages depicting what by any standards is “graphic imagery” of Foley, are still chugging along.

A Twitter spokesperson told Business Insider that these accounts would not be suspended, arguing that, depending on a user’s media settings, at least one of the tweets included a warning in place of the photo. But not all users saw that warning, and in any case, letting these accounts off the hook because (presumably — Twitter would not comment on this) they belong to major media organizations, directly contradicts Costolo’s tweet, which didn’t leave much room for interpretation. Making matters even worse, Twitter even suggested the Post’s tweet to one user who didn’t even follow the New York tabloid.

From the Toronto Globe and Mail, numbers to the north:

Spy agency intercepted, kept communications of 66 Canadians

Canada’s electronic security agency intercepted and retained the communications of 66 citizens during its spying on foreigners last year in actions that were taken without a judicial warrant or a court order.

That level of detail on the activities of Communications Security Establishment Canada (CSEC), disclosed in a report issued on Wednesday by its watchdog commissioner, had never before released by the Canadian government.

Nor has such information been divulged by other allied intelligence agencies, observers say.

“All of the activities of CSEC reviewed in 2013-2014 complied with the law,” Commissioner Jean-Pierre Plouffe wrote in his annual report.

Via SecurityWeek, Se habla español:

‘Machete’ Cyber Espionage Attacks Target Spanish-Speaking Countries

  • Researchers have identified a cyber-espionage campaign focused on Spanish-speaking countries.

Researchers at Kaspersky Lab have dubbed the attack ‘Machete.’ It is believed the attack campaign started in 2010 and was renewed in 2012 with an improved infrastructure.

“Some time ago, a Kaspersky Lab customer in Latin America contacted us to say he had visited China and suspected his machine was infected with an unknown, undetected malware,” Kaspersky Lab’s Global Research and Analysis Team explained in a blog post. “While assisting the customer, we found a very interesting file in the system that is completely unrelated to China and contained no Chinese coding traces. At first look, it pretends to be a Java related application but after a quick analysis, it was obvious this was something more than just a simple Java file. It was a targeted attack we are calling “Machete”.”

The malware at the center of attacks is capable of a number of actions, including logging keystrokes, capturing audio and screenshots, taking photos from the victim’s webcam and capturing geo-location data. The malware can also copy files to a USB device if inserted, and can also copy files to a remote server. In addition, it can hijack the clipboard and capture information from the target machine.

From TheLocal.se, is should come as no surprise:

Top ministers count cost of ‘less secure world’

Foreign and Finance Ministers Carl Bildt and Anders Borg held a press conference on Wednesday to discuss how Sweden was being affected by a “less secure” world, and how it would foot the bill for a growing influx of refugees.

“Things are changing and we’re heading towards a much less secure world,” Bildt told reporters at Stockholm’s government offices on Wednesday.

“We have a lot more of Sweden in the world today, and a lot more of the world in Sweden.”

From Wired threat level, does it make you feel more secure?:

Researchers Easily Slipped Weapons Past TSA’s X-Ray Body Scanners

Two years ago, a blogger named Jonathan Corbett published a YouTube video that seemed to show a facepalm-worthy vulnerability in the TSA’s Rapiscan full-body X-ray scanners: Because metal detected by the scanners appeared black in the images they created, he claimed that any passenger could hide a weapon on the side of his or her body to render it invisible against the scans’ black background. The TSA dismissed Corbett’s findings, and even called reporters to caution them not to cover his video.

Now a team of security researchers from the University of California at San Diego, the University of Michigan, and Johns Hopkins plans to reveal their own results from months of testing that same model of scanner. And not only did they find that Corbett’s weapon-hiding tactic worked; they also found that they could pull off a disturbing list of other possible tricks, such as using teflon tape to conceal weapons against someone’s spine, installing malware on the scanner’s console that spoofed scans, or simply molding plastic explosives around a person’s body to make it nearly indistinguishable from flesh in the machine’s images.

From the London Telegraph, ditto:

Innocent couple branded shoplifters in CCTV release

  • Police in Devon apologise for airing a ‘caught on camera’ CCTV photograph which told the public to report any sightings of a couple who had done nothing wrong

An innocent young couple found themselves wrongly accused of shoplifting after bungling police issued a CCTV ‘wanted’ photograph of the pair to the public.

CCTV shots of Charlotte and James Cozens shopping in their local Boots with their three-year-old son were sent to the media as part of a “caught on camera” appeal.

They were accompanied by a description of the pair and details of how they stashed stolen goods in their toddler’s pushchair.

After the jumps, the latest from the Asian Games of Zones, including Afghan anxieties, escalating Pakistani tensions, Thai coup consolidation, trouble in Thibet, trash talk in Pyongyang, lecturing Tokyo, and Japanese eyes in the sky. . . Continue reading

InSecurityWatch: Cops, hacks, spooks, busts, zones


Lots going on in the realms of spies, lies, media, and that constantly shifting and increasingly inflammatory Asian Game of Zones.

buzzfeed covers an intelligence failure:

White House “Did Not Know” National Guard Was Being Deployed In Ferguson

Missouri Gov. Jay Nixon called the National Guard to Ferguson late Sunday without letting the White House know first.

“Folks didn’t know,” an administration official told BuzzFeed Monday. “The White House did not know they were sending it in.”

Nixon gave “no heads-up,” the official said.

From The Wire, and we hope that headline’s not literal:

Pentagon Fires Back At Critics of ‘Police Militarization’ Program

The Pentagon on Tuesday mounted a vigorous defense of the surplus military equipment transfer program that has drawn criticism following the police crackdown in Ferguson, Missouri.

The Defense Department’s chief spokesman, John Kirby, told reporters during a briefing that the 1033 program was not “some program run amok,” despite images of heavily armored officers in Ferguson that have fed concerns about the “militarization” of local law enforcement.

Congress created the program in 1990 to allow police departments to apply for free transfers of excess military equipment as local authorities sought to beef up security to combat drug gangs. Transfers have increased as the Pentagon wound down the wars in Iraq and Afghanistan.

Vocativ militarizes the neighborhood schools:

Back to School: Make Sure You Pack Your AR-15, Honey

  • If Compton schools were hoping to dispel stereotypes about their area, allowing school police to pack assault weapons is not the way

School’s back in session next week, and the campus police in Compton are packing more heat than ever. That’s not a reference to the hot drought California has faced in 2014—we’re talking guns. Specifically: controversial AR-15 semi-automatic rifles, approved for use on school campuses to prevent future gun rampages.

“This is our objective—save lives, bottom line,” Compton Unified Police Chief William Wu told the city’s school board. The board has been told that select campus police officers will be allowed buy the rifles and keep them in their cars, in case of a mass shooting incident or terrorist attack.

On to the spooky front with Deutsche Welle:

Binney: ‘The NSA’s main motives: power and money’

  • Whistleblower William Binney recently made headlines when he told the German parliament that the NSA, his former employer, had become “totalitarian.” DW spoke to him about NSA overrreach and the agency’s power.

DW: In your testimony, you described the NSA as “totalitarian,” and many commentators say that Germany’s Stasi history has made the country more sensitive to NSA revelations. But others have suggested this comparison is too easy. After all, the Stasi also targeted intellectuals and general writers opposed to the East German regime.

Binney: Sure, they haven’t gone that far yet, but they tried to shut down newspaper reporters like Jim Risen [who is fighting legal action by the Department of Justice to testify against an alleged source - the eds.]. Look at the NDAA Section 1021, that gave President Obama the ability to define someone as a terrorist threat and have the military incarcerate them indefinitely without due process. That’s the same as the special order 48 issued in 1933 by the Nazis, [the so-called Reichstag Fire Decree]. Read that – it says exactly the same thing.

These were totalitarian processes that were instituted. And it’s not just us – it’s happening around the world. Totalitarianism comes in the form first of knowledge of people and what they’re doing, and then it starts to transition into using that power against people. That’s what’s happening – in terms of newspaper reporters, in terms of crimes. That’s a direct violation of our constitution.

TechWeekEurope covers a digital Baedecker:

GCHQ Is Mapping Open TCP Ports Across Whole Countries

  • The reconnaissance operation codenamed ‘Hacienda’ supplies the agency with some of the information needed to compromise systems

German journalists and academics have criticised Britain’s intelligence service GCHQ for scanning servers round the world, and maintaining a database of open ports which could be used in attacks.

British intelligence agency GCHQ has been cataloguing open TCP ports across entire countries as part of a secret programme codenamed ‘Hacienda’, reports German publication Heise Online.

The database resulting from the scans is used in other GCHQ surveillance projects and shared with the rest of the Five Eyes – the US, Canada, Australia and New Zealand – using the secure MAILORDER transport protocol.

An open port can enable the attackers to identify services that are running on a server with the view to compromise it. According to Heise, Hacienda targeted 32 countries since 2009, and has completely mapped ports of at least 27.

From  Nextgox, and significant:

Exclusive: Nuke Regulator Hacked by Suspected Foreign Powers

Nuclear Regulatory Commission computers within the past three years were successfully hacked by foreigners twice and also by an unidentifiable individual, according to an internal investigation.

One incident involved emails sent to about 215 NRC employees in “a logon-credential harvesting attempt,” according to an inspector general report Nextgov obtained through an open-records request.

The phishing emails baited personnel by asking them to verify their user accounts by clicking a link and logging in. The link really took victims to “a cloud-based Google spreadsheet.”

From the Guardian, domestic espionage:

25 Turkish police officers arrested amid Erdogan wiretapping scandal

  • Swoop in cities including Istanbul and Izmir during investigation linked to government corruption claims

Twenty-five police officers have been arrested by Turkish authorities in the latest nationwide swoop to detain suspects alleged to have illegally wiretapped key government figures, including the prime minister, Recep Tayyip Erdogan, reports said.

Police carried out raids in 12 cities, including Istanbul and Izmir, as part of an investigation into allegations of espionage and illegal wiretapping, the private Dog(an news agency reported.

The swoop on Tuesday was the third such roundup since July in a probe that has resulted in dozens of arrests and raised tensions as Erdog(an prepares for his inauguration as president on 28 August.

From intelNews, evoking suspicions of Mossad?:

‘Sensitive files’ stolen as Saudi motorcade is ambushed in Paris

A 12-vehicle entourage transporting a Saudi royal to a Paris airport was ambushed on Monday in cinematic fashion by heavily armed men, who stole a suitcase full of cash and diplomatic files described as “sensitive”.

French police are trying to determine whether the ambush, which occurred on Monday evening just north of downtown Paris, was aimed at the money or the documents, which French newspaper Le Parisien described as “sensitive”. According to French police, the Saudi motorcade was heading from the renowned Four Seasons George V hotel on the Champs Elysées to Le Bourget airport, 15 miles north of Paris, which handles private jets. But as the convoy drove through Porte de la Chapelle, two BMWs without license tags suddenly made their way to the top of the motorcade and forced it to stop.

Within seconds, eight heavily armed men brandishing handguns and AK-47s stormed out of the two cars and hijacked a Mercedes minivan that was part of the motorcade. Several of them boarded the vehicle and drove away, taking with them its three occupants, a driver, a bodyguard and another official. Later on, the three hostages were abandoned by the side of the road. The minivan, as well as one of the two BMWs used by the armed assailants, were later found burnt out in the village of Saint-Mesmes, northeast of the French capital. But the thieves took with them a suitcase containing €250,000 ($330,000) in cash, as well as what the French press said were “important diplomatic documents”.

Deutsche Welle covers spooky journalistic blowback:

BND head to discuss Spiegel report with top Turkey spy

The German and Turkish intelligence heads will meet to discuss reports that Berlin routinely spied on its NATO partner. On Monday, Turkey’s Foreign Ministry summoned the German ambassador in Ankara, Eberhard Pohl.

Turkey’s state-run news agency Anadolu reported that the chiefs of the two countries’ spy agencies had agreed to meet after Turkey’s Ahmet Davutoglu spoke by phone with Frank-Walter Steinmeier, his German counterpart, whose office confirmed that the two foreign ministers engaged in a “long talk.”

A spokeswoman for Germany’s foreign intelligence agency, the BND, would neither confirm nor deny the meeting to news agencies on Tuesday.

Turkish officials have demanded an explanation after news magazine Der Spiegel reported that Germany had repeatedly eavesdropped on officials from the country. Anakara called the spying “unacceptable.”

From MIT Technology Review, a red light alert:

Researchers Hack Into Michigan’s Traffic Lights

  • Security flaws in a system of networked stoplights point to looming problems with an increasingly connected infrastructure.

With permission from a local road agency, researchers in Michigan hacked into nearly 100 wirelessly networked traffic lights, highlighting security issues that they say are likely to pervade networked traffic infrastructure around the country. More than 40 states currently use such systems to keep traffic flowing as efficiently as possible, helping to reduce emissions and delays.

The team, led by University of Michigan computer scientist J. Alex Halderman, found three major weaknesses in the traffic light system: unencrypted wireless connections, the use of default usernames and passwords that could be found online, and a debugging port that is easy to attack.

“The vulnerabilities we discover in the infrastructure are not a fault of any one device or design choice, but rather show a systemic lack of security consciousness,” the researchers report in a paper they’re presenting this week at a computer security conference. They did not disclose exactly where in Michigan they did the research.

Network World takes wing:

Senator questions airlines’ data privacy practices

A senior U.S. senator is asking airlines about their data privacy practices, saying he’s concerned about what information the companies are collecting and sharing with third parties.

Some consumer advocates have raised concerns that airline privacy policies “can contain substantial caveats and that it is difficult for consumers to learn what information airlines and others in the travel sector are collecting, keeping, and sharing about them,” Senator John “Jay” Rockefeller, a West Virginia Democrat, wrote in a letter to 10 U.S. airlines Monday.

The airlines receiving the letters included United Airlines, Delta Air Lines, American Airlines and Southwest Airlines. Airlines contacted about Rockefeller’s letter didn’t immediately respond to requests for comments.

From the Los Angeles Times, security for conspicuous consumers:

New Corvette will record every move a valet driver makes

  • Attention valet drivers: Don’t get frisky with the 2015 Chevrolet Corvette — big brother is watching.

General Motors is offering next year’s model of the famous sport coupe with a data recorder that captures video, audio and driving data from the vehicle when switched into a special “Valet Mode.”

Valet Mode is displayed on the touchscreen panel of the 2015 Corvette. Data and video can be viewed instantly by the owner on the screen when the car is parked, or it can be downloaded to a computer. (GM / Associated Press)

The Vette’s owner can come back from dinner and check out if the valet was testing the sports car’s 3.8 second zero to 60 mph time. The car will have recorded data such as speed, engine RPM, which gears have been used and the highest level of g-force incurred on that joy ride to the parking garage.

EUobserver covers critique:

EU justice chief criticises Google on ‘right to be forgotten’

The EU’s justice commissioner has accused internet giant Google of leading a campaign to shoot down data protection reforms.

Speaking in Lyon, France on Monday (18 August), the commissioner, Martine Reicherts, said: “Google and other affected companies who complain loudly” about a recent EU court verdict on personal data are “detractors … attempting to throw a new spanner in the works”.

The Luxembourg-based EU court in May ruled that Google must remove links to any content that is “inadequate, irrelevant or no longer relevant” or face a fine.

From Deutsche Welle, with a suggestion that they try American police departments:

Uncertain outlook for German arms industry

  • German tanks, submarines and weapons are in high demand. They’re exported to Israel despite the war in Gaza, and Kurdish fighters would also welcome a shipment. Yet the defense industry is worried about its future.

When trade unions look to politicians for help, they’re generally hoping for backing in the fight against managers planning job cuts. But when workers’ representatives from the German arms industry met at the Ministry for Economic Affairs on Tuesday, it was for a very different cause.

In this case, it’s the minister of economic affairs himself, Sigmar Gabriel, who is putting their jobs at risk by approving fewer and fewer German arms shipments to worldwide customers. In a letter sent to Gabriel in July, the unionists said that the minister’s decisions were threatening the very existence of a number of corporations in the security and defense industry.

Ernst-August Kiel, an employee representative with ThyssenKrupp Marine Systems, said after the meeting with Gabriel that they’d debated some “dicey deals,” involving thinner order books and fewer follow-up orders.

And from Sky News, semantics rebooting on the ground:

Exclusive: US Recruits Iraq Security ‘Advisers’

  • The US Army looks to beef up its ‘Office of Security Assistance’, despite Barack Obama ruling out sending troops back to Iraq.

Barack Obama may have ruled out sending “boots on the ground” back to Iraq but in the face of a growing threat from the Islamic State (IS), the Pentagon appears to have hit upon a way to get them back in by the back door.

The US Army’s Contracting Command has issued a tender notice for companies capable of deploying security assistance mentors and advisers in Iraq.

These individuals would be required for a 12-month contract, potentially extendable to a total of 36 months.

After the jump, that latest from the Asian Games of Zones — including Indo-Pakistani tensions rising, Pakistani protests, an Aussie/Malaysian rift abated and terrorism foiled in Malaysia, a high-level Taiwanese security sacking, Chinese border and terror strategems, Japanese armaments move, Shinzo Abe’s militarism redux, Japanese Korean fears, semantic riffs, and a Nazi pasta invasion. . . Continue reading

Quote of the day: The real looters in Ferguson


From Guardian columnist Steven W Thrasher:

The symptoms of structural racism stain America everywhere, but its execution is particularly perverse in places like Ferguson. It’s not just that black drivers are stopped more often for alleged crimes than white drivers, despite the Missouri attorney general’s report that white people break the law more often. It’s not that Ferguson’s police force is 94% white in a town that’s two-thirds black. It’s not even, as Jeff Smith wrote in Monday’s New York Times, that black people – many unemployed – “do more to fund local government than relatively affluent whites” by way of those stops and the subsequent fines.

The real perversion of justice by way of modern American racism is that black people in Ferguson – like black people in the greater St Louis metropolitan area and nationally – are marginalized economically and physically from day one. That is the real looting of Ferguson.

We are consistently twice as likely to be unemployed – and in and near St Louis, “47 percent of the metro area’s African-American men between ages 16 and 24 are unemployed”. Our men are more likely to be convicted and our women are more likely to be evicted. We are more likely to be victims of predatory loans. Our children are twice as likely to have asthma (even before you teargas them). Our babies are twice as likely to die before the age of one – and their mothers are three or four times more likely to die as a result of bearing them.

In America, as Ta-Nehisi Coates wrote in the Atlantic,“White flight was a triumph of social engineering, orchestrated by the shared racist presumptions of America’s public and private sectors.” But that engineering was perfected in St Louis, which Al Jazeera reported “has spent enormous sums of public money to spatially reinforce human segregation patterns”.

Read the rest.

America’s militarized police: Finally in the open


And it’s true both nationally, and in esnl’s own back yard.

First up, a pair of editorial cartoons from California papers, with the first from David Horsey, graphic commentator for the Los Angeles Times:

BLOG Horsey

And then there’s this, from Jack Ohman of the Sacramento Bee:

BLOG Ohman

Next, from RT America’s Breaking the Set, the Bay Area’s own Abby Martin weighs in on a program designed to turn beat cops into paramilitary troopers:

US Police Train with Foreign Militaries to Crackdown on Dissent

Program notes:

Abby Martin remarks on the growing militarization of America’s local police forces in the midst of the unrest in Ferguson, MO, highlighting a program known as Urban Shield, where US police forces train and learn military tactics together.

Here on the shores of San Francisco Bay, the region’s own Urban Shield copfest is scheduled for five days starting 4 September.

Here’s how the operation’s website describes the program:

Urban Shield has grown into a comprehensive, full-scale regional preparedness exercise assessing the overall Bay Area UASI Region’s response capabilities related to multi-discipline planning, policies, procedures, organization, equipment and training. Urban Shield continues to test regional integrated systems for prevention, protection, response and recovery in our high-threat, high-density urban area. The exercise evaluates our existing level of preparedness and capabilities, identifying not only what we do well, but areas in need of improvement. The previous years’ After Action Reports are referenced and used to assist in prioritizing upcoming expenditures possible for the region so we may become more prepared for any type of critical event or incident in our area.

And there’s even a video produced by Dolphin Graphics and the Alameda County Sheriff’s Office [and featuring an assistant sheriff with an Orwellian name] designed to entice would-be participants into signing up:

Urban Shield, “First Responder Training” Short Documentary

Program notes:

Urban Shield Alameda County is a full-scale exercise, designed to assess and validate the speed, effectiveness and efficiency of response capabilities, as well as test the adequacy of regional policies, plans, procedures and protocols. The Urban Shield exercise incorporates regional critical infrastructure, emergency operation centers, regional communication systems, equipment and assets, new technologies, as well as personnel representing all aspects of emergency response teams including intelligence, law enforcement, Explosive Ordinance Disposal Units, Fire, EMS, etc.

And guess what Bay Area city won top SWAT team honors in last year’s competition?

We have the picture:

BLOG Berkeley SSWAT

On a more permanent basis, militarization of Bay Area police has been enhanced by another program from the Department of Homeland Security, the Bay Area UASI, a ten-county regional government managed by the Alameda County Sheriff’s Office.

From the program’s website:

The Bay Area UASI is a regional program that provides financial assistance to improve the Bay Area’s capacity to prevent, protect against, respond to, and recover from terrorist incidents or related catastrophic events. Projects facilitated by the program enhance regional capability through regional collaboration and efficient allocation of funds available.

>snip<

The UASI program is the only federal homeland security grant program that requires regional governance, strategic planning and investing involving all disciplines (law enforcement, fire service, public health and medical, public works, critical infrastructure owners and operators, and emergency management) in order to acquire the necessary plans, organization, equipment, training and exercises. In 2006, DHS combined the three previously independent jurisdictions of San Francisco, Oakland, and San Jose into the current Bay Area UASI. The Bay Area UASI is located in northern California and is comprised of twelve counties and three core cities. The twelve counties are inclusive of over 100 incorporated cities and a combined total population exceeding 7.5 million people.

BLOG Urban shielding

On a final note, and as we’ve reported previously, as part of Urban Shield, UC Berkeley’s own campus police held a training session with Israeli border police before applying their newly won skills in cracking heads whilst dispersing student Occupy protesters. And the Minister, er, Secretary of Homeland Security back in those days is now president of the entire University of California system.

InSecurityWatch: Cops, Assange, Taps, Zones


Straight to it, first with the unsurprising from Defense One:

Congress Is Not Canceling the Pentagon-to-Police Weapons Program Anytime Soon

Rep. John Conyers, the House Judiciary Committee’s top Democrat, and two of his Democratic colleagues are asking committee Chairman Bob Goodlatte to convene hearings on the militarization of police forces. And Democratic Rep. Hank Johnson of Georgia said Thursday he will introduce a bill that would limit the kinds of military equipment local police forces can acquire.

Libertarian-leaning Republicans are joining the chorus as well. Republican Sen. Rand Paul penned a piece for Time protesting the “cartoonish imbalance between the equipment some police departments possess and the constituents they serve,” and Republican Rep. Justin Amash of Michigan spoke out against police militarization via Twitter as well.

The response from congressional Republican leadership, however, has been measured or nonexistent, suggesting the issue is unlikely to make the agenda when Congress returns from recess in September. And even if it does, the program that connects police forces to military equipment has well-placed defenders in Congress.

TPM Livewire covers a First Amendment crackdown:

Three More Journalists Detained In Ferguson

Relations between police in Ferguson, Mo. and members of the media covering protests against law enforcement there broke down again Sunday night.

Echoing the arrests of the Huffington Post’s Ryan Reilly and the Washington Post’s Wesley Lowery earlier this week, three reporters said they were briefly handcuffed and detained by police. Other reporters said officers threatened them with mace, while one radio reporter caught an officer’s threat to shoot him on tape.

Three journalists — Neil Munshi of the Financial Times, Robert Klemko of Sports Illustrated and Rob Crilly of the Telegraph — tweeted that they were briefly detained and handcuffed by Missouri highway police Capt. Ron Johnson. Munshi emphasized that the three of them were held by police but were not arrested.

From the Guardian, the harsh reality of Hope™ and Change™:

James Risen calls Obama ‘greatest enemy of press freedom in a generation’

  • Journalist refuses to reveal source of story about CIA operation
  • President’s support for press freedom called ‘hypocritical’

The New York Times reporter James Risen, who faces jail over his refusal to reveal a source and testify against a former CIA agent accused of leaking secrets, has called President Barack Obama “the greatest enemy of press freedom in a generation”.

Speaking to his colleague Maureen Dowd, Risen accused the president of aggressively pursuing journalists, including himself, who report sensitive stories that reflect poorly on the US government.

Risen faces jail over his reporting of a botched intelligence operation that ended up spilling nuclear secrets to Iran. The Justice Department has long been seeking to force him to testify and name the confidential source of the account, which is contained in his 2006 book State of War.

From Techdirt, more of that good ol’ Hope™ and Change™:

Government’s Response To Snowden? Strip 100,000 Potential Whistleblowers Of Their Security Clearances

  • from the surface-issues-neutralized.-underlying-causes-unaddressed. dept

Snowden just re-upped for three years in picturesque Russia, a land best known for not being a US military prison. Not exactly ideal, but under the circumstances, not entirely terrible. The government knows where Snowden is (more or less) and many officials have a pretty good idea what they’d like to do to him if he returns, but the NSA is still largely operating on speculation when it comes to what documents Snowden took.

But they do have someone looking into this. The government has tried to assess the damage posed by Snowden’s leaks, but so far all it has come up with is vague proclamations that the released have caused grave and exceptional damage to US security and an even vaguer CIA report claiming that a bunch of documents Snowden theoretically has in his possession might severely harm the US if a) they are released and b) they exist.

The Associated Press complains of buggery:

Turkey calls German ambassador over spying claims

Turkey’s Foreign Ministry says the German ambassador has been summoned for talks over reports that Germany’s foreign intelligence agency had eavesdropped on conversations between officials in the U.S. and Turkey, both NATO allies.

German magazine Der Spiegel reported Saturday that the agency, known by its German acronym BND, had listened to calls made by U.S. Secretary of State John Kerry and his predecessor Hillary Clinton. It also cited a confidential 2009 BND document listing Turkey as a target for German intelligence gathering.

A Foreign Ministry official said Monday the ambassador was summoned to “discuss” the report.

Peter J. Espina of China’s state-published Global Times offered his take on a certain irony of German “unintentional” eavesdropping on calls by John Kerr and Hillary Clinton:

BLOG Spooky

More from Der Spiegel:

Targeting Turkey: How Germany Spies on Its Friends

For years, the BND has intercepted satellite telephone conversations from its listening station in Bad Aibling in Bavaria in order to obtain knowledge of the Islamist terrorist scene. But intelligence sources now say that US office holders have also fallen into the BND’s crosshairs while making satellite telephone calls from airplanes. Sources described it as a kind of unintentional “by-catch”.

That’s how Clinton got caught in the BND’s net in 2012. The former secretary of state had telephoned with former United Nations Secretary General Kofi Annan. At the time, he was serving as the joint UN-Arab League special envoy for the Syrian crisis. Annan had just left the latest negotiations in Syria and wanted to provide Clinton with an update.

Following protocol, staff at BND headquarters prepared a several-page-long transcript of the conversation and passed it along to senior agency officials. They in turn ordered that the transcript be destroyed. Sources say that the document was not forwarded to Merkel’s Chancellery.

But the person tasked with destroying the transcript was Markus R., an employee in the agency’s Areas of Operations/Foreign Relations department, who also turns out to be the same man recently accused of serving as an agent for the Americans.

And still more from Deutsche Welle:

German surveillance upsets Turkish trust

Germany’s surveillance of Turkey has damaged the trust between the two nations, Turkish experts say. An apology would be appropriate, they argue – but they don’t really expect one.

It took two days before the Turkish government reacted to the news that Germany’s Bundesnachrichtendienst (BND), the country’s foreign intelligence agency, had allegedly been spying on Turkey for years.

On Monday, the Foreign Ministry in Ankara summoned Germany’s ambassador Eberhard Pohl, making it clear that the surveillance is unacceptable and must stop.

Foreign Minister Davutoglu called Germany’s behaviour “inexcusable.” There were principles of interaction that must always be considered, he said, adding the German government owed Turkey an explanation. Davutoglu, favored to take over the post of premier after new President Recep Tayyip Erdogan takes office, said he would discuss the issue with German Foreign Minister Frank-Walter Steinmeier on the phone.

From Techdirt, why are we not surprised?:

From The Unsealed ‘Jewel v. NSA’ Transcript: The DOJ Has Nothing But Contempt For American Citizens

  • from the and-[local]-god-help-you-if-you’re-a-foreign-citizen dept

With some of the proceedings unsealed in the EFF’s long-running Jewel vs. NSA lawsuit, more details can finally be exposed. Not that what’s already been exposed hasn’t been damning enough. Over the past several months, the DOJ has run interference for the NSA, traveling from courtroom to courtroom, destroying and saving (or at least pretending to…) collected data amongst a flurry of contradictory orders.

Not that it ultimately mattered. The NSA just kept destroying relevant evidence, claiming the system was too complex to do anything with but allow to run its course. Evidence would be destroyed at the 5-year limit, no matter what preservation orders were issued. The NSA, of course, has a vested interest in destroying evidence that its 215 and 702 programs collect the data and communications of Americans. Thanks to Snowden’s leaks, it can no longer pretend it doesn’t. But despite this, the DOJ still claims Section 702 targets only foreigners and American suspects located outside of the US.

The mock concern about compliance with court orders was a hustle. The DOJ wants as much evidence that might be useful to plaintiffs gone as swiftly as possible. Thanks to the unsealing of Jewel court documents, the EFF can now relate that the DOJ’s efforts went much further than simply letting aged-off collections expire. It also actively tried to change the historical record of the Jewel case, as Mike covered here recently.

Al Jazeera English announces a move:

Julian Assange ‘to leave’ Ecuador embassy

  • WikiLeaks founder says he will leave Ecuador’s embassy in London “soon”, but gives no further details.

WikiLeaks founder Julian Assange has said he plans to leave Ecuador’s embassy in London “soon”, having spent the last two years avoiding extradition to Sweden over allegations of sexual assault.

Assange told reporters during a news conference on Monday that he would be “leaving the embassy soon” but not for reasons “reported by the Murdoch press”, without elaborating further.

“I am leaving the embassy soon… but perhaps not for the reasons that Murdoch press and Sky news are saying at the moment,” he said.

And a video report from RT:

‘Important changes coming’ – Assange’s friend

Program note:

After spending more than two years trapped in a tiny embassy room, Wikileaks founder Julian Assange has made a sudden announcement that he will leave the embassy ‘soon’. For more perspective on what Assange had to say, and why he said it RT talks to someone who knows him personally – Gavin Macfadyen, Director of the Centre for Investigative Journalism.

A video of Assange’s full statement is here.

But the London Telegraph promptly threw a bucket of cold water:

Home Office shoots down Julian Assange’s claim about extradition law change

  • Julian Assange, the WikiLeaks founder, says he plans to leave the Ecuador embassy in London after spending two years there

Mr Assange and his legal advisers appeared to have made an embarrassing error by misunderstanding a basic aspect of the new legislation.

The Home Office quickly undermined his key claim by confirming the changes would not apply in the case of Mr Assange, who has been a wanted man in Sweden since 2010, because they are not retrospective.

Mr Assange, 43, is alleged to have raped a woman known as SW, then aged 26, and committed other sexual offences against AA, a 31-year-old woman.

From the Register, the Rupester crows:

Rupert Murdoch says Google is worse than the NSA

  • Mr Burns vs. The Chocolate Factory, round three!

Media tycoon Rupert Murdoch has taken to Twitter and labelled Google worse than the NSA.

Here’s The Dirty Digger’s missive:

Rupert Murdoch     @rupertmurdoch

NSA privacy invasion bad, but nothing compared to Google.
10:15 AM – 17 Aug 2014

Murdoch and Google have history, with the former accusing the latter of stealing his newspapers’ content (yet never putting in place a robots.txt file that would prevent search engines crawling it). Uncle Rupert has also criticised Google as enabling the theft of films by indexing torrent sites.

Reuters covers a hack:

Community Health says data stolen in cyber attack from China

Community Health Systems Inc (CYH.N), one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other personal data belonging to 4.5 million patients.

Security experts said the hacking group, known as “APT 18,” may have links to the Chinese government.

“APT 18″ typically targets companies in the aerospace and defense, construction and engineering, technology, financial services and healthcare industry, said Charles Carmakal, managing director with FireEye Inc’s (FEYE.O) Mandiant forensics unit, which led the investigation of the attack on Community Health in April and June.

From TechWeekEurope, cyberwarfare:

Syrian Malware Is On The Rise, Warns Kaspersky

  • As the civil war in Syria enters its fourth year, cyber warfare shows no sign of abating

The number of cyber attacks against Internet users in Syria is growing, with organised groups relying on increasingly sophisticated strains of malware to target media agencies, activists and dissidents, warns Russian security vendor Kaspersky Labs.

According to a report by Kaspersky’s Global Research & Analysis Team (GReAT), groups from both sides of the civil war are using advanced social engineering techniques, modifying legitimate apps and obfuscating their code in order to infect target machines with Remote Access Tools (RATs) such as the ‘Dark Comet’.

The company says people should be extra careful when they access online material that relates to the conflict.

From PetaPixel, delinquency of a [data] miner:

Tumblr Will Soon Scan Your Photos for Clues About What Brands You Use

Tumblr users post approximately 130 million photos every day. And starting this week, they will begin to sort through every single one of them for various brands and items, with the help of Ditto Labs.

The Yahoo-owned social media platform and Ditto are officially signing a deal this week that will help Tumblr take advantage of the unfathomable amount of images shared on its services every day. Specifically, the technology Ditto owns will allow Tumblr to analyze photos posted by users and draw out brand-related data.

This means, if someone shares an image with a pair of Beats headphones, Nike shoe, Starbucks drink or Canon camera, Ditto’s technology will be able to pinpoint the products, more effectively defining demographics for advertisers. However, accorfing to T.R. Newcomb, head of business development at Tumblr, “right now, we’re not planning to do anything ad-related.”

After the jump, a Chinese media crackdown and the latest on the Asian Game of Zones, including border crossings, peace feelers, a Japanese military woe and internal doubts, more allegations of Japanese ethnic intolerance, and more ghosts from World War II troubled the Asian present. . . Continue reading

InSecurityWatch: Cops amok, hacks, spies, zones


We begin today’s look at the world of the dark side with America’s sudden realization that America’s police forces look a lot like those of a police state.

First up, the San Francisco Chronicle looks at the impact on Bay Area cops:

How local police forces got outfitted for warfare

The paramilitary hardware that police in Missouri deployed against demonstrators angered by an officer’s killing of an unarmed black teenager has become commonplace in police departments in the Bay Area and around the country, thanks to billions of dollars in homeland security money and surplus military equipment that the federal government has showered on communities.

Big-city police departments have long had riot gear, shields and even lightly armored vehicles to deal with unrest. What has changed in recent years is the volume of military equipment finding its way to smaller, suburban police agencies like the ones that confronted protesters last week in Ferguson, Mo.

The federal programs that delivered heavy weaponry and armored vehicles to police there are the same ones that allowed the Alameda County Sheriff’s Office to obtain a decommissioned Coast Guard cutter. They enabled Concord police to acquire an armored personnel carrier that the U.S. military once used in Kuwait.

Police in South San Francisco, Vallejo, San Jose, Napa and Antioch now have specially reinforced armored personnel carriers like those that carried U.S. troops in battle areas in Afghanistan and Iraq, courtesy of a Pentagon program that distributes surplus war equipment to cities around the country.

From the Daily Dot, we hope it’s more than wishful thinking:

Social media may have turned the tide of police militarization

In many respects, last Wednesday night may turn out to be the single most important event in the history of American law enforcement in a generation.

For most of the week, the images flooding out of Ferguson, Mo., and onto social media resembled nothing so much as a military occupation. Officers from the St. Louis County Sheriff’s Department patrolled the streets in full body armor while toting machine guns, as millions of Americans started to suddenly wonder why law enforcement officials were outfitted as if they were going into a war zone.

When all you have is riot gear, even peaceful protests start to look like riots. By giving police officers the tools to use overwhelming force and military-style tactics at every opportunity, it creates a situation that may be safer for individual police officers, but is significantly more dangerous for society as a whole.

From Bloomberg of all places, confronting a real source of national insecurity:

Ferguson Unrest Shows Poverty Grows Fastest in Suburbs

A week of violence and protests in a town outside St. Louis is highlighting how poverty is growing most quickly on the outskirts of America’s cities, as suburbs have become home to a majority of the nation’s poor.

In Ferguson, Missouri, a community of 21,000 where the poverty rate doubled since 2000, the dynamic has bred animosity over racial segregation and economic inequality. Protests over the police killing of an unarmed black teenager on Aug. 9 have drawn international attention to the St. Louis suburb’s growing underclass.

Such challenges aren’t unique to Ferguson, according to a Brookings Institution report July 31 that found the poor population growing twice as fast in U.S. suburbs as in city centers. From Miami to Denver, resurgent downtowns have blossomed even as their recession-weary outskirts struggle with soaring poverty in what amounts to a paradigm shift.

On to the world of secrecy-cloaked acts of dubious legality with the Guardian:

UK ambassador ‘lobbied senators to hide Diego Garcia role in rendition’

  • Rights groups claim that top-level talks were part of bid to redact link to Diego Garcia from report

Logs released under the Freedom of Information Act have reinforced claims that the UK lobbied to keep its role in the CIA’s torture and interrogation programme out of what is expected to be a damning Senate report.

They show that the UK ambassador to the US met members of the Senate select committee on intelligence 11 times between 2012 and 2014 – as they were investigating the CIA’s rendition programme. This included two meetings with the committee’s chair, Diane Feinstein, which took place as crucial decisions were being made regarding how much of its report into the programme should be made public.

The revelation has prompted fresh concern that the government lobbied for key parts of the report referring to Diego Garcia, a British territory in the Indian Ocean leased to the US as a military base, to be redacted. Human rights groups believe that the territory played a key role in facilitating the CIA’s extraordinary rendition programme – the movement of high-value terrorist suspects to “black sites” around the world without legal oversight.

The Register looks at hacking made easy:

Who needs hackers? ‘Password1′ opens a third of all biz doors

  • GPU-powered pen test yields more bad news about defences and passwords

Hundreds of thousands of hashed corporate passwords have been cracked within minutes by penetration testers using graphics processing units.

The 626,718 passwords were harvested during penetration tests over the last two years conducted across corporate America by Trustwave infosec geeks.

The firm’s threat intelligence manager Karl Sigler said in a post that half of the plundered passwords were cracked within “the first few minutes”.

While Computerworld rings an alarm:

Microsoft urges customers to uninstall ‘Blue Screen of Death’ update

  • One of last week’s security updates has bricked an unknown number of PCs running Windows 7

Computerworld – Microsoft on Friday quietly recommended that customers uninstall one of last week’s security updates after users reported that it crippled their computers with the infamous “Blue Screen of Death” (BSOD).

The update, identified as MS14-045 in Microsoft’s numbering, was one of nine released on “Patch Tuesday,” Aug. 12, was designed to fix three separate flaws, including one related to a font vulnerability and another in the Windows kernel, the heart of the operating system.

Within hours of its release, however, users reported that MS14-045 had generated a Stop 0x50 error on some systems, mostly on Windows 7 PCs running the 64-bit version of the OS.

Off the Asia, first with South China Morning Post:

More than 20,000 rally in Islamabad, calling for Sharif to resign as PM

  • Cleric Qadri and cricket star turned politician Khan lead rallies in capital

More than 20,000 anti-government protesters flooded the centre of Pakistan’s capital yesterday, vowing to stay in the streets until Prime Minister Nawaz Sharif resigns.

The numbers were far below what protest organisers expected, but the power of protesters to paralyse the central business district has presented the biggest challenge yet to the 15-month-old civilian government.

The unrest has raised questions about Pakistan’s stability, at a time when the nation of 180 million is waging an offensive against Pakistani Taliban militants and when the influence of anti-Western and sectarian groups is growing.

More from the Express Tribune in Karachi:

Govt to form separate committees to negotiate with Imran, Qadri

Interior Minister Chaudhry Nisar Ali Khan has said that the government is willing to listen to each and every constitutional demand of the Pakistan Tehreek-e-Insaf (PTI) and the Pakistan Awami Tehreek (PAT), Express News reported.

“As a goodwill gesture, we have decided to constitute two separate committees to negotiate with PTI and PAT,” said Nisar while addressing a press conference late Sunday night. “We are ready to hear all their constitutional demands,” he added.

Earlier in the day, PAT chief Tahirul Qadri and PTI chief Imran Khan reiterated their demand for the resignation of Prime Minister Nawaz Sharif in separate addresses to their supporters, with the latter announcing the launch of a civil disobedience movement.

Reuters covers another form of protest:

Pakistan opposition leader calls for tax boycott in anti-government protest

Leading opposition politician Imran Khan urged Pakistanis on Sunday not to pay taxes or utility bills as a protest against the government and vowed to force the country’s “corrupt” prime minister to step down this week.

“After two days … your time is up,” Khan shouted to thousands of supporters at a rally in central Islamabad.

Police estimated on Sunday that around 55,000 people have occupied two streets in the center of the Pakistani capital as part of separate protests led by Khan and cleric Tahir ul-Qadri.

From the Diplomat, walking a fine line of the subcontinent:

India-China Border Engagement

As India races to catch up on infrastructure, its military is increasingly engaged with the PLA.

For the Indian military, this is a time of some fairly fundamental changes.

After decades of pursuing Pakistan-centric war planning, the Indian Army and the Indian Air Force are recalibrating their sights towards the hitherto neglected northern frontiers with China, giving a hard push to improving its war-fighting capabilities against its more powerful neighbor and at the same time, increasing on-the-ground interaction with the People’s Liberation Army (PLA).

This two-track policy, outcome of the experience of the past five years, is aimed at preventing any unnecessary flare ups along the Line of Actual Control (LAC), as the contested border between the two countries is known.

While the Times of India invokes dubious imagery:

I’m Hitler for thieves misusing funds, Telangana CM says

A crucial meeting between two warring chief ministers of Andhra Pradesh and Telangana failed to bring about a change of heart as both chose to remain on the warpath over several issues, including the Governor’s special powers in Hyderabad and the controversial household survey, on Sunday.

Governor ESL Narasimhan had brought K Chandrasekhar Rao of Telangana and N Chandrababu Naidu of AP to the negotiation table, for the first time since the bifurcation of the state. But the two chief ministers stuck to their guns, with KCR threatening to be a “Hitler” for those who allegedly misuse government’s schemes and funds, ahead of the controversial household survey.

“There is nothing wrong in being a Hitler for the people’s cause. I would like to be a Hitler for those who want to misuse the government schemes and funds. Yes, I am a Hitler for thieves,” he said after the meeting.

And Deutsche Welle covers another protest, this tiem one against another protest:

Tens of thousands stage Hong Kong pro-government rally

A protest march with tens of thousands of participants has taken place in Hong Kong. The rally was organized in response to a planned pro-democracy disobedience campaign in the former British colony.

Tens of thousands of people protested in Hong Kong on Sunday against plans by pro-democracy activists to shut down the semi-autonomous Chinese city’s financial district with a mass sit-in unless China allows electoral reforms.

The Alliance for Peace and Democracy, which organized Sunday’s rally in sweltering heat, claims that most people in the city of seven million do not support the pro-democracy campaign run by the Occupy Central group.

The Alliance says it has so far collected almost 1.5 million signatures – including that of leader Leung Chun-ying – from people opposed to the Occupy campaign on the grounds that it would tarnish Hong Kong’s reputation and harm business.

From Reuters, another spooky saga:

Chinese national charged with hacking U.S. defense contractors

A Chinese businessman has been indicted in California on charges he hacked the computer systems of Boeing Co and other U.S. defense contractors and stole confidential plans for military aircraft, federal prosecutors said on Friday.

According to the indictment in federal court in Los Angeles, Su Bin traveled to the United States at least 10 times between 2008 and 2014 and worked with two unidentified co-conspirators based in China to steal the data.

Prosecutors said the trio stole plans relating to the C-17 military transport plane and F-22 and F-35 fighter jets, and attempted to sell them to Chinese companies.

The Japan Times orders:

U.S. military told troops not to visit Yasukuni Shrine

  • Trip to war-related shrine canceled before Obama visit in April

U.S. military leaders in Japan advised against a planned visit by some of their troops to war-linked Yasukuni Shrine in early April, before President Barack Obama’s visit to Tokyo, apparently out of consideration to South Korea and China, an American military source said Saturday.

U.S. Forces Japan headquarters warned against the visit to the controversial shrine by more than 20 troops, leading to the trip’s cancellation, according to the source.

The Shinto shrine honors past Japanese leaders convicted as Class-A war criminals, along with millions of war dead. Beijing and Seoul consider it a symbol of Japan’s past militarism and wartime aggression and bristle when Japanese politicians make state visits viewed as glorifying the war.

From SINA English, another play:

Japan freezes assets of N Korean shipping firm for smuggling arms

Japan has frozen the assets of the operator of a North Korean ship seized for smuggling arms, the Foreign Ministry said, just as Tokyo is engaged in talks with Pyongyang to return Japanese citizens kidnapped by North Korean agents decades ago.

The sanction against Ocean Maritime Management, which operated the ship detained near the Panama Canal a year ago carrying Soviet-era arms, follows similar steps by the United States and U.N. blacklisting of the North Korean firm in July.

It is not immediately clear how much assets, if any, Ocean Maritime Management holds in Japan, the Finance Ministry said Saturday.

The Diplomat poses a scary question:

Nuclear Weapons for South Korea

Under threat of a possible fourth North Korean nuclear test, should South Korea develop its own nuclear weapon?

Nuclear tensions are again ratcheting up on the Korean Peninsula, with Pyongyang threatening a fourth nuclear weapons test in what one U.S. analyst described as its new “allergic reaction” to routine military exercises by South Korea and United States scheduled to start on August 18.

A fourth nuclear test could further influence the debate in Seoul and Washington over whether South Korea should consider the “nuclear option.” Such a decision – if South Korea were to seriously consider it – could upturn the 60-year South Korean-U.S. alliance, global nonproliferation efforts, not to mention dozens of international obligations that tie one of Asia’s wealthiest nations to the global economy.

Even talk of “going nuclear” has some in South Korea’s political class worrying out loud that the debate has already moved from the political fringe to occupy center stage.

From Want China Times, bulking up:

China considers buying four Russian Amur-Class AIP submarines

China reportedly signed two military sale frameworks with Moscow, of which Russia will jointly build four Amur-Class AIP submarines with China and sell them to the country while China will buy 24 Su-35 fighters from Russia, reports Sina’s military news portal.

It is the first major military procurement China has made with Russia in 10 years, said the report. China needs submarines to counter threats from India’s fleet and build a fleet to resist America’s influence, said the Voice of Russia, the Russian government’s international radio broadcasting service. A manager for a Russian national defense export company said Moscow and Beijing have been negotiating over submarine technologies. China has not revealed how many submarines it wants to buy and has not scheduled to sign a supply contract.

It is natural for India and China to show interest in Russia’s Amur-Class submarines, said a retired Russian Navy general named Sivkov. The submarine is superior to the export version of China’s 877 submarine and China would want the Amur-Class vessel since India has them. The Russian submarine can also effectively fight against American submarines and destroy Los Angeles and Virginia-class nuclear-powered submarines from long distances.

Jiji Press bolsters the borders:

Japan to Strengthen Analysis of Information on Foreigners

Japan’s Justice Ministry will set up an intelligence center at the Immigration Bureau to strengthen the ability to analyze information on foreigners in preparation for the 2020 Tokyo Olympic and Paralympic Games, informed sources said Sunday.

The ministry will seek about 220 million yen in related expenditures as part of its fiscal 2015 budget request, the sources said.

By 2020, the government aims to boost the annual number of visitors to Japan to 20 million, about double the 10.36 million in 2013.

From the Japan Times, learning from the University of California:

Japan plans fund to develop military technology with universities

  • Ministry plans fund to aid schools engaged in military research

The Defense Ministry plans to set up a fund to develop military technology by aiding research projects at universities and other civilian institutions, government sources have revealed.

In a move aimed at keeping down development costs and bolstering civilian-military cooperation, the ministry plans to seek roughly ¥2 billion for the fund in its budget request for fiscal 2015 beginning next April, raising it to ¥6 billion in three years, the sources said Saturday.

The fund, which will be modeled after the U.S. Defense Advanced Research Projects Agency, is part of Prime Minister Shinzo Abe’s drive to expand the nation’s military capabilities. It will finance promising projects in such fields as surveillance radar technology and aviation materials.

The Japan Times again, with another sort of education:

Japan to hold seminar to pitch defense equipment exports to ASEAN

The government plans to hold a seminar in late September attended by officials from ASEAN countries to make a pitch for exports of Japanese-made defense equipment to those Asian nations, government sources said Sunday.

It will be the first gathering of Japan and the Association of Southeast Asian Nations to hold full-fledged discussions concerning such exports since Prime Minister Shinzo Abe’s Cabinet decided in April to ease restrictions on arms exports.

During the seminar in Tokyo, the government plans to discuss how Japanese equipment and technology could help enhance the defense capabilities of ASEAN nations, as it seeks business opportunities to export Japanese defense equipment.

And for our final item, JapanToday covers box office militancy:

Film on 1597 victory over Japan breaks Korean box office records

A film depicting a famous 16th century naval victory against Japanese invaders has set records at the South Korean box office, drawing the largest audience and becoming the first local movie to take more than $100 million.

“Myeongryang” (“Roaring Currents”) attracted 13.62 million viewers as of Saturday after 18 days of screening, distributor CJ Entertainment.

The previous frontrunner, Hollywood blockbuster “Avatar”, drew 13.61 million Korean cinema goers over a span of four months.

InSecurityWatch: Buggery, hacks, spies, zones


Though it’s a Saturday here in ol’ Berzerkeley, the news from the dark side continues to flow unabated.

We open with the disingenuous, via the McClatchy Foreign Staff:

Germans say they accidentally tapped Clinton, Kerry calls

The German Foreign Intelligence Agency has admitted tapping “at least one” phone call each by current Secretary of State John Kerry and then-Secretary of State Hillary Clinton while they were aboard United States government jets, according to German media reports.

The reports claim Kerry’s intercepted communication was a satellite phone call from the Middle East in 2013. Clinton’s communication was also a satellite call, in 2012, and was reportedly to then United Nations Secretary General Kofi Annan. Both calls were reported to have been intercepted accidentally while German intelligence was targeting terror suspects in the Middle East and northern Africa.

The intelligence agency (the Bundesnachrichtendienst or BND) told German media that terror groups often use the same frequencies that the secretaries phone calls were made over, so the calls were picked up. The calls were among what the German newspaper Suddeutsche Zeitung said intelligence sources described as several cases of U.S. official phone calls being picked up accidentally during anti-terror communications monitoring.

From the Guardian, more buggery deprecated:

Tony Abbott says phone hack did not compromise talks with Julie Bishop

  • The prime minister responds to a report the foreign minister’s phone was hacked saying sensitive discussions were secure

Following reports the foreign minister’s phone was hacked, the prime minister, Tony Abbott, has said sensitive discussions were conducted over secure phone lines and were not monitored.

The Herald Sun reported that Julie Bishop’s mobile phone was compromised while she was overseas. The newspaper said Australian intelligence officials seized the phone when she returned from a trip negotiating access to the MH17 crash site in the Ukraine.

Australian intelligence agencies know which country those responsible for compromising the phone were from, the report said. The phone was not used to discuss sensitive communications and was replaced.

And Network World goes for the vulnerable:

British spy agency scanned for vulnerable systems in 32 countries, German paper reveals

British intelligence agency GCHQ used port scanning as part of the “Hacienda” program to find vulnerable systems it and other agencies could compromise across at least 27 countries, German news site Heise Online has revealed.

The use of so-called port scanning has long been a trusty tool used by hackers to find systems they can potentially access. In top-secret documents published by Heise on Friday, it is revealed that in 2009, GCHQ started using the technology against entire nations.

One of the documents states that full scans of network ports of 27 countries and partial scans of another five countries had been carried out. Targets included ports using protocols such as SSH (Secure Shell) and SNMP (Simple Network Management Protocol), which are used for remote access and network administration.

The results were then shared with other spy agencies in the U.S., Canada, the U.K., Australia and New Zealand. “Mailorder” is described in the documents as a secure way for them to exchange collected data.

From the McClatchy Washington Bureau, they’d tell us, but then they’d have to kill us:

(REDACTED) memo released on killing (REDACTED) American overseas

The government on Friday made public a heavily redacted memo that was used to legally justify the killing of an American overseas.

Acting under pressure from a lawsuit filed by the ACLU and the New York Times, the Justice Department turned over the long-sought Feb. 19, 2010 Office of Legal Counsel memo relating to the killing of Anwar al-Aulaqi.

Characterized as “egregiously over-redacted” by ACLU Deputy Legal Director Jameel Jaffer, the seven page memo is signed by then-Acting Assistant Attorney General David J. Barron. Barron is now a judge on the 1st Circuit Court of Appeals.

The only words that survive the redacting knife on pages 2 and 3 are “top secret.” Snippets that survive include the ominous sounding word play “killings in self-defense are not assassination.” More elaborately, the memo declares that “the use of lethal force would not violate the Fourth Amendment” if certain conditions prevail, including a “capture operation ts infeasible and the targeted person is part of a dangerous enemy force and poses a continued and imminent threat to U.S. persons or interests.”

Ars Technica covers the action:

Five American Muslims sue FBI, attorney general over travel watch list

  • Plaintiffs decry “invisible web of consequences that are imposed indefinitely.”

A group of five Muslims (four of whom are United States citizens) have sued top American government officials, alleging that their constitutional rights have been violated for having been put on a federal watch list.

The plaintiffs’ lawsuit, which was filed on Thursday in federal court in Detroit, accuses numerous leaders—including the attorney general, the directors of the FBI and the Department of Homeland Security, and others—of violating their constitutional rights to due process and the right to be free from religious discrimination.

In the complaint, each person outlines a similar story: being detained at the border, often having digital devices seized, and being subject to prolonged physical searches. One was told that he was on the no-fly list and was later offered a chance to work on behalf of federal law enforcement in exchange for removal. He seems to have declined.

Next up, with all the talk about militarized police in the U.S., just how well has Uncle Sam armed them. A Los Angeles Times graphic has the numbers:

BLOG Cop arms

From International Business Times, context for Missouri misery:

Mike Brown Shooting: What It’s Like To Grow Up Black In A Town Where 94% Of Cops Are White

When Gregory Carr was growing up in the suburbs of St. Louis, his father gave him and his four brothers advice about dealing with the police.

“He’d say ‘let me tell you something, when you’re black and you get stopped by the man you just say, yes sir, no sir, and cooperate. Because that man will crack your head.’”

A generation later, Carr, 49, who teaches speech and theater at Harris-Stowe State University in St. Louis, said that he tells his own son the same thing.

“I’m very concerned, he’s only six years younger than Mike Brown,” he said, referring to the shooting of Brown, 18, who was unarmed when he was killed by police Saturday in this St. Louis suburb, an incident that sparked six days of protests, a violent police backlash, sympathetic protests across the country and a national discussion about race and segregation in America.

From the Independent, hooded bigotry gone bananas:

Michael Brown shooting: Ku Klux Klan raises ‘reward’ for officer who shot unarmed teen in Ferguson, Missouri

The Missouri chapter of a faction of the Ku Klux Klan is allegedly raising money as a reward for the white police officer who fatally shot Michael Brown, an unarmed black teenager, in Ferguson a week ago.

On its website, the South Carolina-based New Empire Knights of the Ku Klux Klan (KKK) has published a series of racist posts describing Brown as “a black punk” and “not a good kid”, the Southern Poverty Law Center’s Hate Watch (SCPLCHW) blog has reported.

The group has also advertised a fundraiser asking for donations of $10 (£6) and above, with all proceeds going to “the cop who did his job against the negro criminal”.

And from Boing Boing, a note about a podcast for the modern journalist:

Essential gadgets while reporting on civil unrest

In this episode, we talk to journalist Quinn Norton, who writes about digital rights, hacker culture, copyright, and the strangeness of the world and the complexity of the people who inhabit it for Medium and other outlets. She has covered the Occupy Wall Street movement and civil unrest around the world for Wired and other publications.

News Corp Australia covers aquatic hack attacks:

Sharks eat the internet but Google fights back

A NEW food craze is sweeping the underwater world with sharks taking a fancy to Google’s undersea data cables.

Vision has emerged showing sharks munching away on the cables, mistaking them for dinner.

Google has been forced to take action, reinforcing parts of the trans-Pacific fibre-optic cables and wrapping them in material to keep the sharks at bay.

From TheLocal.dk, information control in the name of IP. [And if you do want to see a picture, Wikipedia has ‘e here]:

Denmark’s icon… that we can’t show you

  • The Little Mermaid is perhaps the most photographed attraction in the entire country, but Danish media outlets are extremely hesitant to publish a photo of the sculpture.

Earlier this week, The Local reported that Seoul’s mayor wants a miniature version of Copenhagen’s famous Little Mermaid statue for his own city.

Rather than illustrate the photo with a beautiful picture of the sculpture – thousands of which can be found all over the internet – we chose a photo in which the famous landmark was surrounded by tourists and thus not the main focus of the image.

There was a reason for that. The family of sculptor Edvard Eriksen is known for being very aggressive about the sculpture’s copyright and numerous Danish media outlets have received a large bill in the mail for using a photo of the Little Mermaid – even though it is arguably the most recognisable image in all of Denmark.

The newspapers Politiken, Berlingske and the now-closed Nyhedsavisen have all been fined for using an image of the Little Mermaid. Berlingske had to pay 10,000 kroner ($1,800) for using a photo of the statue in connection with a 2005 story on Denmark’s tourism industry.

From Ars Technica, check your grocery bills:

Grocery shoppers nationwide probably had credit card data stolen

  • Coast-to-coast: Albertsons, Acme Markets, Jewel-Osco and more were hit

Two major supermarket chains announced that their customers’ credit card information may have been stolen during a network intrusion.

SuperValu, the Minnesota parent company of Cub Foods, Farm Fresh, Hornbacher’s, Shop ‘n Save, and Shoppers Food and Pharmacy, announced that 180 stores in North Carolina, Maryland, Virginia, Illinois, Missouri, North Dakota, and Minnesota were affected.

“The Company has not determined that any such cardholder data was in fact stolen by the intruder, and it has no evidence of any misuse of any such data, but is making this announcement out of an abundance of caution,” SuperValu said in a statement Friday.

Consortiumnews.com covers a sin of MSM omission:

The Hushed-Up Hitler Factor in Ukraine

Behind the Ukraine crisis is a revision of World War II history that seeks to honor eastern European collaborators with Hitler and the Holocaust by repackaging these rightists as anti-Soviet heroes, a reality shielded from the U.S. public, as Dovid Katz explains.

Would America support any type of Hitlerism in the course of the State Department’s effort to turn the anti-Russian political classes of Eastern Europe into paragons of PR perfection that may not be criticized, howsoever mildly?

It was frankly disconcerting to see Sen. John McCain, R-Arizona, embracing the leader of Ukraine’s far right, anti-Semitic, pro-fascist Svoboda party last December. It was disturbing to learn of the neo-Nazi elements that provided the “muscle” for the actual Maidan takeover last February (BBC’s Newsnight was among the few major Western outlets to dare cover that openly).

Most disturbing of all has been the mainstream Western media’s almost Soviet-grade wall somehow erected against critical mention of the far-right component of Ukraine’s 2014 history, rendering any such thought as worthy of ridicule on New York Times opinion pages last spring.

And the Associated Press covers an offer:

EU Offers to Take Charge of Gaza Border, Says Status Quo ‘Is Not an Option’

The European Union offered Friday to take charge of Gaza’s border crossings and work to prevent illegal arms flows, insisting on a durable truce and saying a return to the status quo for the region “is not an option.”

As EU foreign ministers held an urgent meeting in Brussels about global conflicts, Hamas negotiators met with the Islamic militant group’s leadership in Qatar to discuss a proposal for a long-term truce with Israel. An official said the group was inclined to accept the Egyptian-mediated offer.

The Gaza blockade remains the main stumbling block. It has greatly limited the movement of Palestinians in and out of the territory of 1.8 million people, restricted the flow of goods into Gaza and blocked virtually all exports.

After the jump, the last from Asia, where the Game of Zones continue to boil. There’s turmoil in Pakistan, Indian assertiveness, bellicose rhetoric, avowals and disavowals, dubious ploys, and data protectionism — plus a flatulent tale from up north and an apology that’s not nearly enough. . . Continue reading

InSecurityWatch: Taps, hacks, zones, bluster


Today’s headlines from the world of spies, deep politics, hackery, state violence, and the ongoing Asian Games of Zones is agenda’s so full we opted to switch the order of our compendia today, and we’ll get straight to it, first with a pair of stories about prominent conversations overheard.

We open with this from International Business Times:

Germany Recorded Hillary Clinton When She Was Secretary Of State, German Media Says

Germany’s Federal Intelligence Service (BND) recorded a conversation of Hillary Clinton while she was secretary of state, three German media outlets reported on Friday. Clinton was recorded while flying in a U.S. government aircraft. Reports did not specify the exact date of the recording.

Germany’s largest daily newspaper and two public broadcasting services broke the story on the alleged incident and cited anonymous government sources that said the recording was by accident. One source said the recordings should have been destroyed immediately and it was “idiocy” that they weren’t. The report also mentions the BND recorded other “American politicians and other friendly countries,” but did not specify which politicians or what countries.

The disclosure came after last year’s revelation by Edward Snowden that the U.S. ran an espionage operation on Germany, one of America’s closest allies. German Chancellor Angela Merkel, who was bugged and recorded by the U.S., was highly critical of the surveillance, saying there must not be “spying among friends.” More recently, German officials revealed in July that the U.S had been working with a spy in Germany for more than two years.

And the other eavesdropping saga, via News Corp Australia:

Foreign Minister Julie Bishop’s phone was hacked at the height of the MH17 crisis

FOREIGN Affairs Minister Julie Bishop’s mobile phone was compromised while she was overseas leading tense negotiations to win access to the MH17 crash site in Ukraine.

Australian intelligence officials seized Ms Bishop’s phone on her return from a two-week trip to the United States, Ukraine and Holland, having secured a deal to get Australian police into the crash area.

Russian-backed rebels shot down the Malaysia Airlines flight with a surface-to-air missile on July 17, killing 298 passengers and crew, including 38 Australians.

It is thought that our intelligence agencies know which country those responsible for compromising Ms Bishop’s phone were operating from.

American accessory convicted, via Al Jazeera:

Court: Poland culpable for CIA secret prisons

  • The European Court of Human Rights has ordered Poland to pay reparations to two Saudis being held in Guantanamo Bay

On July 24, seven judges on the European Court of Human Rights (ECHR) ruled against Poland in a landmark case, making it the first European Union country to be held accountable for its involvement in the United States’ systematic, extrajudicial detention of suspects, known as the “extraordinary rendition” programme. Established by the George W Bush administration in the aftermath of September 11 attacks, the programme was run by the CIA, and designed to detain suspects deemed to be of “high value”.

In the unanimous ruling, the judges stated that “Poland had cooperated in the preparation and execution of the CIA rendition, secret detention, and interrogation operations on its territory” and that it had failed in its duty under the European Convention on Human Rights to “ensure that individuals within its jurisdiction were not subjected to torture or inhuman or degrading treatment or punishment.”

The ECHR ordered Poland to pay $175,000 to Saudi-born Palestinian Abu Zubaydah and $135,000 to Saudi national Abd al-Rahim al-Nashiri. Both applicants are currently being held in US custody in Guantanamo Bay, isolated from the outside world.

From the Daily Californian, an alarm sounds in Berkeley:

UC to evacuate affiliates in Pakistan after bombing this week

The university is initiating evacuation of UC affiliates in Pakistan after a bombing in the city of Quetta on Tuesday.

Two UC Berkeley faculty members are currently in Pakistan on UC-related business, according to campus risk manager Andy Goldblatt. No students or staff have been reported to be in the country, although an email was sent Wednesday to campus deans, directors and chairs asking for help identifying other UC faculty, staff and students in Pakistan.

Campus professor Ron Gronsky, special faculty assistant to the chancellor for international relations, said in the email that not all UC affiliates take the recommendation that they register their international travel with the university.

The Los Angeles Times plays the overture for the next act:

Nouri Maliki’s departure sets stage for deeper U.S. role in Iraq

The resignation of Iraqi Prime Minister Nouri Maliki after a bitter final power struggle sets the stage for increasing U.S. arms shipments and military advisors, deepening America’s role in a conflict President Obama had sought to avoid.

White House officials, who had urged Maliki to step down, praised him for agreeing Thursday to back Haider Abadi, a less divisive successor who they hope can unite Iraq’s political and religious factions against the Islamic State militants who control or threaten much of the country.

“Iraqis took another major step forward in uniting their country,” national security advisor Susan Rice said in a statement. “These are encouraging developments that we hope can set Iraq on a new path.”

And from the Associated Press, hints of Perry-less times ahead for the Lone Star State:

Texas’ Perry indicted for coercion for veto threat

A grand jury indicted Texas Gov. Rick Perry on Friday for abusing the powers of his office by carrying out a threat to veto funding for state prosecutors investigating public corruption — making the possible 2016 presidential hopeful his state’s first indicted governor in nearly a century.

A special prosecutor spent months calling witnesses and presenting evidence that Perry broke the law when he promised publicly to nix $7.5 million over two years for the public integrity unit, which is run by Travis County District Rosemary Lehmberg’s office. Several top aides to the Republican governor appeared before grand jurors in Austin, including his deputy chief of staff, legislative director and general counsel. Perry himself wasn’t called to testify.

He was indicted by an Austin grand jury on felony counts of abuse of official capacity and coercion of a public servant. Maximum punishment on the first charge is five to 99 years in prison. The second is two to 10 years.

The Reporters Committee for Freedom of the Press challenges First Amendment insecurity:

Media coalition protests police treatment of reporters during Ferguson events

The Reporters Committee for Freedom of the Press led a coalition of 48 national media organizations that sent a protest letter [PDF] objecting to the treatment of reporters during the recent events in Ferguson, Mo., that followed the police shooting of Michael Brown.

The letter was sent to the heads of the city and county police, as well as the state highway patrol.

“Officers on the ground must understand that gathering news and recording police activities are not crimes,” the letter states. “The actions in Ferguson demonstrate a lack of training among local law enforcement in the protections required by the First Amendment as well as the absence of respect for the role of newsgatherers. We implore police leadership to rectify this failing to ensure that these incidents do not occur again.”

From the Washington Post, another source of insecurity:

Ex-cop who burned body again gets 17 years

For a second time, a former New Orleans police officer has been sentenced to more than 17 years in prison for burning the body of a man shot to death by another New Orleans police officer in the chaotic days following Hurricane Katrina.

Gregory McRae, 53, already is imprisoned for burning Henry Glover’s body. However, an appeals court had ordered a recalculation of his original 17-year sentence after one of his original convictions was thrown out.

In giving the same 17-year, 3-month sentence, U.S. District Judge Lance Africk said Friday that McRae was guilty of covering up an unlawful killing by fellow Officer David Warren. Africk’s assertion comes despite a jury’s earlier acquittal of Warren.

The Center for Investigative Reporting covers another insecurity on the borders:

Ousted chief accuses border agency of shooting cover-ups, corruption

More than two dozen people have died in violent clashes with U.S. Customs and Border Protection since 2010. Despite public outrage over some of the killings, no agent or officer has faced criminal charges – or public reprimand – to date.

Yet at least a quarter of the 28 deaths were “highly suspect,” said James F. Tomsheck, the agency’s recently removed head of internal affairs. In a sweeping and unauthorized interview with The Center for Investigative Reporting, he said the deaths raised serious questions about whether the use of lethal force was appropriate.

Instead, Tomsheck said, Border Patrol officials have consistently tried to change or distort facts to make fatal shootings by agents appear to be “a good shoot” and cover up any wrongdoing.

The Oakland Tribune covers questionable consistency:

Judge orders investigation into Oakland’s police arbitration losses

A federal judge with sweeping power over Oakland’s police department ordered an investigation Thursday into why the city consistently loses arbitration cases with officers who are appealing discipline.

U.S. District Judge Thelton Henderson wrote that an arbitrator’s recent decision overturning the termination of an officer videotaped tossing a tear gas grenade into a crowd of Occupy Oakland protesters struck at the heart of a reform drive that he has overseen for more than a decade.

“Just like any failure to impose appropriate discipline by the (police) chief or city administrator, any reversal of appropriate discipline at arbitration undermines the very objectives of the (reform program),” Henderson wrote.

From the London Daily Mail, yet another way to bug you:

Are apps secretly listening to your calls? Security experts discover gyroscopes can identify voices from VIBRATIONS

  • Computer scientists from Stanford University and Israeli defence research group Rafael have turned a phone gyroscope into a crude microphone
  • Smartphones contain the sensors which are used for games and orientation
  • They found gyroscopes can pick up frequency of soundwaves around them
  • Vibrations are then decoded by software, making it possible for experts to eavesdrop on phone conversations – with 65 per cent accuracy
  • No permission is needed from third parties to access gyroscopes

Many people are careful to protect their pin numbers, and are vigilant about giving smartphone apps access to their microphone in case they could be listened in on.

But now there’s a new snooping threat, and it comes from a smartphone’s gyroscope.

From the Guardian, security questions:

Australian intelligence watchdog wants clarification on national security plan

  • Inspector General of Intelligence and Security also wants increased budget for effective oversight of expanded surveillance

Australia’s intelligence watchdog has called on the Abbott government to clarify various elements of its national security reforms – and also increase its budget so that it is in a position to carry out effective oversight in an environment where the surveillance footprint is being significantly expanded.

In a public hearing in parliament on Friday, the Inspector General of Intelligence and Security (IGIS) said the Australian Security Intelligence Organisation (Asio) should be required to report more extensively on the use of new powers proposed in the Coalition’s national security reforms.

IGIS said the government should consider adding a requirement to the first tranche of its security legislation requiring Asio to report on instances where it used force in operations, where it accessed third party property, or where it disrupted computers.

From the Guardian, those with info want others to have less info:

CIA security luminary: ‘Right to be forgotten is not enough’

  • Leading security expert Dan Geer says the EU ruling does not go far enough in protecting users’ privacy

The EU’s so-called “right to be forgotten” laws have not gone far enough to protect citizens’ privacy, according to Dan Geer, one of the world’s best-known security experts.

Geer, currently chief information security officer at the CIA’s venture capital arm, told delegates at the Black Hat security conference in Las Vegas that he was confused by the Guardian’s coverage of the issue. The so called “right to be forgotten” issue stemmed from a European court of justice ruling, forcing Google to remove a link relating to a 1998 newspaper article from its search results after a complaint from the person named in the article.

Geer described it as “notably ironic” that the Guardian had championed Edward Snowden’s revelations about intrusion by government agencies into civilians’ privacy, while also claiming in one editorial (though he did not specify which) that nobody has a right to be forgotten.

From the Washington Post, why are not surprised?:

U.S. firm helped the spyware industry build a potent digital weapon for sale overseas

CloudShield Technologies, a California defense contractor, dispatched a senior engineer to Munich in the early fall of 2009. His instructions were unusually opaque.

As he boarded the flight, the engineer told confidants later, he knew only that he should visit a German national who awaited him with an off-the-books assignment. There would be no written contract, and on no account was the engineer to send reports back to CloudShield headquarters.

His contact, Martin J. Muench, turned out to be a former developer of computer security tools who had long since turned to the darkest side of their profession. Gamma Group, the British conglomerate for which Muench was a managing director, built and sold systems to break into computers, seize control clandestinely, and then copy files, listen to Skype calls, record every keystroke and switch on Web cameras and microphones at will.

According to accounts the engineer gave later and contemporary records obtained by The Washington Post, he soon fell into a shadowy world of lucrative spyware tools for sale to foreign security services, some of them with records of human rights abuse.

More of the same from The Verge:

Hacking Team is spreading government malware through YouTube and Microsoft Live

You don’t have to click on a sketchy link to end up downloading malware. A new report from Citizen Lab’s Morgan Marquis-Boire shows how companies can spread targeted malware by intercepting web traffic en route, sending malicious traffic from an otherwise friendly link. A company called Hacking Team has been using the tactics on traffic from YouTube and Microsoft’s login.live.com servers, seeding innocent videos with surveillance software designed to track the target’s activities online.

The attacks are more targeted than traditional malware, usually targeting a single person at a time, and relying on access to government internet infrastructure to intercept the traffic. Hacking Team typically works with governments like Morocco and the United Arab Emirates, but Marquis-Boire says similar capabilities have been used by intelligence agencies in the US, Britain, Russia, China and Israel. Snowden documents released in The Washington Post have identified NSA malware injection attacks that infected more than 80,000 different devices.

Since the attacks are injected into everyday web traffic, defending against them is difficult, but many companies have already adopted HTTPS encryption as a possible defense. HTTPS would encrypt the connection between the user and the server, preventing injection attacks. At the moment, only a small fraction of web traffic is encrypted, but Google is offering incentives to sites that switch over, including a small boost in search rankings. It’s unclear whether login.live or YouTube will switch to default HTTPS, but Marquis-Boire says both Microsoft and Google “have taken steps to close the vulnerability by encrypting all targeted traffic.”

intelNews lays blame:

Malware targeting ex-Soviet states has Russian hallmarks

A malicious software that has infiltrated the computer systems of dozens of embassies belonging to former Eastern Bloc nations “has all the hallmarks of a nation-state” cyberespionage operation, according to researchers.

Security firm Symantec said last week that the malware appears to be specifically targeting embassies of former communist nations located in China, Jordan, as well as in locations across Western Europe.

In a report published on its website, Symantec said “only a nation state” was likely to have the funds and technical resources to create a malware of such complexity. Additionally, the malware seems to be designed “to go after explicit government networks that are not easy to find”, according to Symantec senior security researcher Vikram Thakur.

Big Brother still seduces, via Nextgov:

The Snowden Effect

Revelations last year that the National Security Agency is collecting Americans’ telephone metadata soured some people’s opinions about the U.S. intelligence community, but they apparently haven’t affected the views of many computer security professionals.

Anecdotal evidence suggests that leaks by Edward Snowden, the former systems administrator and contractor with the National Security Agency, have not hindered efforts to recruit or retain cyber staff at the three-letter agencies. Instead, the disclosures actually might have helped intelligence agencies attract computer aficionados by spotlighting the agencies’ bleeding edge technology.

“We have had no indication that cyber pros have any reticence about working for the government,” says Mark Aiello, president of Massachusetts-based Cyber 360 Solutions, a staffing firm. “It is probably the opposite, and mostly for the opportunity to work with some advanced tools or techniques. The Big Brother aspect is appealing if you are the watcher, not the watched.”

From Motherboard, young accomplices:

DARPA Uses Preteen Gamers to Beta Test Tomorrow’s Military Software

Sieg Hall doesn’t look like much from the outside. Located at the University of Washington, the building was constructed in the 1960s, when it was  a focal point for Vietnam-era antiwar protests. Before renovations were carried out it had become so dilapidated that students had a tradition of taking home chunks of rock off its façade. If I didn’t know better, Sieg is just another nondescript computer science building, not a front line in military research and development.

But it’s here, tucked away on the third floor, that you’ll find precisely that: the Center for Game Science, a research lab that makes educational video games for children, and that received the bulk of its funding from the  Defense Advanced Research Projects Agency, the wing of the US Department of Defense that supports research into experimental military technology.

Why is DARPA the original primary funder of the CGS? According to written and recorded statements from current and former DARPA program managers, as well as other government documents, the DARPA-funded educational video games developed at the CGS have a purpose beyond the pretense of teaching elementary school children STEM skills.

Instead, the games developed at CGS have had the primary purpose of using grade-school children as test subjects to develop and improve “adaptive learning” training technology for the military.

From MercoPress, invoking the T-word in a curious context:

Cristina Fernandez will use anti-terrorism law against US company that closed its Argentine plant

Argentina’s government will use an anti-terrorism law for the first time to seek criminal charges against a U.S.-based international printing firm which closed its Argentine plant without warning, president Cristina Fernández said on Thursday. She linked the company to some of the hedge funds in litigation with Argentina over defaulted bonds.

Several hundred workers were left jobless when RR Donnelly abruptly filed for bankruptcy and shut down its printing presses on the outskirts of the Argentine capital, Buenos Aires.

“We are facing a real case of fraudulent behavior and an attempt to intimidate the population,” said Cristina Fernandez in a speech at Government House.

“We will apply the anti-terrorist law. We filled a motion under charges of altering the economic and financial order and terrorizing of people,” the head of state expressed after blaming Donnelly with tax fraud and evasion.

On to other attempts to suppress information, first from the Latin American Herald Tribune:

Sexism of Authorities Aggravates Violence Against Women Journalists in Mexico

The sexism of Mexican authorities generates impunity and has led to a 300 percent increase in violence against women journalists in just a decade, according to a report presented by an NGO.

In the last few years 86 cases of violence against women journalists were reported, of which 54 percent occurred in 2013, the study by the Communication and Information for Women organization (CIMAC) revealed.

It added that Mexico City reported 35 percent of the total number of cases, thus making the capital “the most dangerous place for women in this profession.”

GlobalPost sends up a rocket:

Hamas says it has deported foreign journalists for reporting on missile launches

  • The group that runs Gaza says foreign media coverage of this latest conflict with Israel was skewed against the Palestinians.

Did Hamas, the Islamist group that rules Gaza, intimidate, harass or even deport journalists trying their damnedest to cover a dangerous war with Israel?

If you take Hamas’ word for it, the answer appears to be yes.

In an interview with the Lebanese-based Al Mayadeen TV, Hamas spokeswoman Isra Almodallal said that foreign journalists have been deported from Gaza for filming Hamas rocket launches.

Why? According to Almodallal, they “were fixated on the notion of peace and on the Israeli narrative. So when they were conducting interviews or when they went on location to report they would focus on filming the places from where the missiles were launched. Thus, they were collaborating with the occupation.”

From the Associated Press, many questions remain:

Liberian police seal newspaper office

Dozens of riot police have sealed the offices of a newspaper critical of the Liberian government and officers attempted to detain its publisher. Police spokesman Sam Collins says the paper’s criticisms could “plunge the country into confusion” when the government is struggling to contain an Ebola outbreak.

Philibert Brown’s National Chronicle has often accused President Ellen Johnson Sirleaf’s government of corruption and on Wednesday it called for the government to step down.

Brown has been ordered to report for questioning Friday.

Sirleaf’s government has come under stiff criticism for its record on press freedoms. Sirleaf has signed the Declaration of Table Mountain, which calls for the Africa-wide repeal of defamation and “insult” laws, but multiple libel convictions have been handed down since she came to power in 2006.

From International Business Times, more media under fire:

China’s Anti-Corruption Crackdown Increasingly Targets CCTV, Flagship Network

In the latest sign that China Central Television, the country’s state-run television giant, is in political trouble,  the government announced Friday that one of the network’s top officials is under detention.

China arrested Huang Haitao, deputy director of CCTV 8, a channel devoted to scripted dramas, according to 163.com, a popular news portal. His arrest is in connection with a wide-ranging government audit of CCTV, which claims an audience of more than 1 billion viewers.

Huang is only the latest prominent CCTV personality to run afoul of Chinese authorities since the December 2013 arrest of Li Dongsheng, a former vice president of the network. In late May, authorities arrested Guo Zhenxi, the head of CCTV’s financial news network, while high-profile anchor Rui Chenggang, whose “Economic News” program has an estimated 10 million viewers, was detained on July 11.

After the jump, more tensions in the Asian Games of Zones, including Pakistani protests and violence, a resounding chorus of moans from the ghosts of history, claims and counterclaims, U.S. marines of a Japanese island, and as story that really is too good to be true. . . Continue reading

InSecurityWatch: Cops, spooks, zones, drones


Today we open our coverage with the ongoing tragedy in Missouri, with a particular focus on the transformation of America’s cops from officers on the beat into an occupying paramilitary.

First up, a major development from Canada’s National Post:

Security of Ferguson will be taken over by Highway Patrol after local and county police lose community trust

Captain Ron Johnson of Highway Patrol, will be leading the security efforts in Ferguson, Missouri, going forward after several nights of racially charged provocation has left residents feeling little trust in local and county police forces.

The St. Louis suburb has been the scene of violent protests since a police officer fatally shot an unarmed black teenager on Saturday.

Gov. Jay Nixon said the change is intended to make sure “that we allow peaceful and appropriate protests, that we use force only when necessary, that we step back a little bit and let some of the energy be felt in this region appropriately.”

Johnson, who is black, said he grew up in the community and “it means a lot to me personally that we break this cycle of violence.”

And on to our primary focus, first from Businessweek:

A Federal Effort to Reuse Military Gear Turned Cops Into Commandos

The heavily militarized police force in a St. Louis suburb is hardly an anomaly. Local police departments across the country deploy not just military-style equipment but actual castoffs from the U.S. military.

Federal grant programs fund the police acquisition of military weapons and vehicles, and a U.S. law has sent more than $4 billion of surplus Pentagon gear to law enforcement over the past 17 years. Now protests following the fatal police shooting of unarmed teenager Michael Brown in Ferguson, Mo.—and the heavily armed response by local police—seem likely to spark a national debate on the militarization of law enforcement. Do local cops from from Maine to New Mexico need military rifles and armored personnel carriers to do their jobs?

“I know that many Americans have been deeply disturbed by images we’ve seen in the heartland of our country,” President Barack Obama said Thursday, urging calm amid the investigation of the Aug. 9 shooting. Police have said Brown fought with a police officer and tried to grab his service weapon, while witness have said the 18-year-old did not struggle with police and was surrendering when he was shot.

But Businessweek is somewhat disingenuous, as witness this from Pacific Standard:

Lockdown Nation

How military-style policing became America’s new normal.

In the fascinating and sometimes terrifying Rise of the Warrior Cop: The Militarization of America’s Police Forces, journalist Radley Balko traces the changes in American policing from colonial times to the present. His focus, though, is law enforcement’s increased reliance on military hardware and strategy in the last 45 years, especially in the form of SWAT (special weapons and tactics) teams.

As recently as 1969, the Los Angeles Police Department had one of the only SWAT teams in the country. Its first raid targeted a group of Black Panthers. Four police officers and four Panthers were shot and wounded. After hours of gunfire, the raid’s leader, Daryl Gates, called the mayor, who received permission from the Department of Defense to use a grenade launcher. “My words seemed unreal,” Gates would later remember. “Anytime you even talk about using military equipment in a civil action, it’s very serious business. You’re bridging an enormous gap.” The Panthers were charged with conspiracy to murder police officers, but acquitted on self-defense grounds. “Practically, logistically, and tactically,” Balko writes, “the raid was an utter disaster. But in terms of public relations, it was an enormous success.”

Paramilitary policing quickly spread across the country. Today there are more than 1,000 U.S. police forces with SWAT or SWAT-type units. In 1980, nationwide, they carried out an average of eight paramilitary raids a day; now there are well over 100. Balko attempts to explain why this happened, and why it matters.

Nextgov has some details:

The Pentagon Gave the Ferguson Police Department Military-Grade Weapons

According to Michelle McCaskill, media relations chief at the Defense Logistics Agency, the Ferguson Police Department is part of a federal program called 1033, in which the Department of Defense distributes hundreds of millions of dollars of surplus military equipment to civilian police forces across the U.S.

That surplus military equipment doesn’t just mean small items like pistols or automatic rifles; towns like Ferguson could become owners of heavy armored vehicles, including the MRAPs used in Afghanistan and Iraq. “In 2013 alone, $449,309,003.71 worth of property was transferred to law enforcement,” the agency’s website states.

All in all, it’s meant armored vehicles rolling down streets in Ferguson and police officers armed with short-barreled 5.56-mm rifles that can accurately hit a target out to 500 meters hovering near the citizens they’re meant to protect.

Glenn Greenwald offers a specific focus at The Intercept:

The Militarization of U.S. Police: Finally Dragged Into the Light by the Horrors of Ferguson

The intensive militarization of America’s police forces is a serious menace about which a small number of people have been loudly warning for years, with little attention or traction. In a 2007 paper on “the blurring distinctions between the police and military institutions and between war and law enforcement,” the criminal justice professor Peter Kraska defined “police militarization” as “the process whereby civilian police increasingly draw from, and pattern themselves around, the tenets of militarism and the military model.”

The harrowing events of the last week in Ferguson, Missouri – the fatal police shooting of an unarmed African-American teenager, Mike Brown, and the blatantly excessive and thuggish response to ensuing community protests from a police force that resembles an occupying army – have shocked the U.S. media class and millions of Americans. But none of this is aberrational.

It is the destructive by-product of several decades of deliberate militarization of American policing, a trend that received a sustained (and ongoing) steroid injection in the form of a still-flowing, post-9/11 federal funding bonanza, all justified in the name of “homeland security.” This has resulted in a domestic police force that looks, thinks, and acts more like an invading and occupying military than a community-based force to protect the public.

And one hopeful response, via BuzzFeed:

Democratic Congressman Will Introduce Police Demilitarization Bill

  • Rep. Hank Johnson pivots off Ferguson to introduce the “Stop Militarizing Law Enforcement Act”

Amid growing criticism of the military-style equipment and tactics deployed by police in Ferguson, Missouri, a Democrat from Georgia plans to introduce the “Stop Militarizing Law Enforcement Act” in Congress next month.

Rep. Hank Johnson asked his all his colleagues Thursday to join him in supporting the bill, which he said in a letter “will end the free transfers of certain aggressive military equipment to local law enforcement and ensure that all equipment can be accounted for.”

Images of assault rifle-carrying camouflaged police riding through Ferguson on military vehicles similar to the IED-resistant equipment used by American armed forces in combat have proven to be a jolt of energy for a long-simmering debate about police militarization.

While the Independent makes a telling point:

America is one nation, still divided: Protests over the shooting of a black teenager could have erupted in any number of US cities

While Ferguson is the latest flashpoint in America’s struggle to overcome a legacy of racial tension going back to slavery, it could just as easily have been somewhere else; Los Angeles, where 24-year-old Ezell Ford, also black, was shot and killed by a police officer on Monday, or perhaps New York, where the death of Eric Garner while in custody, after an officer held him in an illegal chokehold last month, is still fuelling anger.

The grievances still felt by many African-Americans are rooted in the life experiences of many of them, particularly young men, which are also reflected in the sometimes shocking statistics. Statistics just from Ferguson are startling but by no means unique to the town, which, on the edge of downtown St Louis, became majority black after whites fled decades ago to escape rising violence and sinking schools.

Until last weekend, few beyond Ferguson will have known that only three of its 53 police officers are black, even if the community is overwhelmingly more black than white. Or that 483 blacks were arrested in town last year but only 36 whites. Or that blacks, who make up less than two thirds of the driving-age population, account for 86 per cent of all traffic stops by police.

From International Business Times, an intersection of two threads:

Anonymous Twitter Suspended Amid St. Louis Police Hack; Other Anon Accounts Decry Naming Officer

The St. Louis County Police confirmed to multiple outlets Thursday that the department has been hit by a cyberattack, with the agency’s website and emails down since Wednesday. Word of the hack came at the same time Twitter suspended the account of the Anonymous hacker collective, who’ve been feuding with the police online over details withheld in the Mike Brown shooting.

The confirmation also comes after the Ferguson, Missouri, police reported their system was infiltrated, with Anonymous claiming responsibility for briefly rendering the department’s phones and computers useless.

More from The Wire:

Anonymous Stops Releasing Information on Alleged Officer Who Shot Michael Brown

The online activist group Anonymous has threatened to reveal the identity and other personal information of the police officer they say is responsible for the shooting of Michael Brown in Ferguson, Missouri. However, they have called that effort (for now) after denials from St. Louis area police that they had the right person, and after Twitter suspended one of their accounts. No other media outlets have been able to verify whether their information is correct or not. Read below for the latest updates…

The latest:

1:21 p.m.: After switching to a secondary account (@TheAnonMessage), the group that named the alleged shooter says they won’t be releasing any more information for the time being.

The McClatchy Washington Bureau takes us to another scene of conflict and a triumphant declaration:

U.S. declares Yazidi intervention a success, says rescue mission unneeded

The United States military has concluded that there are too few Yazidi refugees still trapped in the mountains of northern Iraq to warrant mounting a potentially risky rescue, the Pentagon said late Wednesday.

Military advisers who earlier in the day visited the Sinjar mountains, where as many as 30,000 people were thought to still be trapped, said that they found “far fewer” Yazidis than expected and that those who were there were in better condition than anticipated. Food and water dropped in recent days have reached those who remain, the Pentagon statement said.

The Pentagon said the visit proved that the actions the United States had taken in recent days had succeeded in preventing the Islamic State from capturing and executing the Yazidis, members of a religious sect that Sunni extremists view as heretics. It said the assessment team encountered no hostile forces during its visit and “did not engage in combat operations.”

While the Guardian foreshadows:

British SAS sent to Iraq on ‘intelligence’ mission before airlift of Yazidi refugees

  • Deployment to Mt Sinjar ahead of US-led rescue of civilians follows plan for RAF to deliver arms to Kurds fighting jihadists

British SAS soldiers have been deployed to northern Iraq to “gather intelligence” ahead of any potential rescue operation, led by the US, to airlift thousands of Yazidi refugees from Mount Sinjar.

In the most dramatic sign of Britain’s growing involvement in the Iraqi crisis, the SAS soldiers have moved to the region near Mount Sinjar where US special forces are coordinating the rescue effort.

Last night, a small team from the US landed on Mount Sinjar to assess the situation, and said that an evacuation mission was less likely as “there are far fewer Yazidis on Mount Sinjar than previously feared”, according to Pentagon press secretary Rear Admiral John Kirby.

Deutsche Welle covers a related development:

Morocco breaks up recruitment cell for ‘Islamic State’

  • Moroccan police have dismantled a jihadist network suspected of recruiting volunteers to fight with the radical “Islamic State” group in Iraq and Syria. The operation was carried out with help from authorities in Spain.

The Moroccan Interior Ministry said on Thursday that it had broken up a network that was used to recruit and send volunteers to fight with the “Islamic State” (IS) in Iraq and Syria.

“The operation, based on detailed investigations carried out in close collaboration with Spain, stems from a proactive security approach aimed at battling terrorist threats,” a ministry statement said.

According to Moroccan police, the group was operating in the Moroccan cities of Fez and Tetouan, as well as the town of Fnideq, close to the Spanish exclave of Ceuta.

On to rampant Orwellianism, first with the New York Times:

Reagan-Era Order on Surveillance Violates Rights, Says Departing Aide

After President Obama delivered a speech in January endorsing changes to surveillance policies, including an end to the National Security Agency’s bulk collection of Americans’ domestic calling records, John Napier Tye was disillusioned.

A State Department official, Mr. Tye worked on Internet freedom issues and had top-secret clearance. He knew the Obama administration had also considered a proposal to impose what an internal White House document, obtained by The New York Times, portrayed as “significant changes” to rules for handling Americans’ data the N.S.A. collects from fiber-optic networks abroad. But Mr. Obama said nothing about that in his speech.

So in April, as Mr. Tye was leaving the State Department, he filed a whistle-blower complaint arguing that the N.S.A.’s practices abroad violated Americans’ Fourth Amendment rights. He also met with staff members for the House and Senate intelligence committees. Last month, he went public with those concerns, which have attracted growing attention.

While Techdirt notes another development:

Newly Released Documents Show NSA Abused Its Discontinued Internet Metadata Program Just Like It Abused Everything Else

  • from the so,-more-of-the-same,-then? dept

James Clapper’s office (ODNI) has released a large batch of declassified documents, most of which deal with the NSA’s discontinued Section 402 program. What this program did was re-read pen register/trap and trace (PR/TT) statutes to cover internet metadata, including sender/receiver information contained in email and instant messages. (Not to be confused with the Section 702 program, which is still active and harvests internet communications.)

Notably, this marks only the second time that the ODNI has acknowledged the document release has been compelled by a FOIA lawsuit.

Following a declassification review by the Executive Branch, the Department of Justice released on August 6, 2014, in redacted form, 38 documents relating to the now-discontinued NSA program to collect bulk electronic communications metadata pursuant to Section 402 of the FISA (“PRTT provision”). These documents are also responsive to a Freedom of Information Act request by the Electronic Privacy Information Center.

As EPIC’s site notes (and the ODNI’s doesn’t), the program was authorized in 2004, but no legal justification was provided to Congressional oversight until a half-decade later

And Nextgov adds a touch of the Kafkaesque:

Watchdog: The FBI Spied on the Wrong People Because of Typos

The FBI unintentionally spied on the communications data of some Americans who were not targets of investigations because of typographical errors, according to a government watchdog.

The Justice Department’s inspector general concluded in a report Thursday that the FBI has improved its overall handling of national security letters, which permit the agency to collect telephone and Internet data of suspects believed to be tied to a national security investigation.

But the inspector general identified a number of areas that “require additional effort and attention,” such as a tendency to collect data on the wrong person because of routine mistakes.

From The Hill, another bizarre revelation:

IRS wrongly allowed contractors access to sensitive data

IRS contractors without background checks had access to sensitive information, potentially putting confidential taxpayer data at risk, according to a federal audit.

The Treasury inspector general for tax administration found more than a dozen cases in which the IRS awarded contracts that required access to taxpayer information without background investigations or before those checks were completed.

Under IRS policy, background checks are mandatory for contractors who work with that kind of data.

More from Nextgov:

IRS Gave Sensitive Data to Convict Sentenced to 21 Years

At the IRS, contractors hired for courier, printing, document recovery, and sign language and interpreter services who accessed sensitive information had not undergone investigations, which is a policy violation.

A Treasury Inspector General for Tax Administration report released today details several situations where employees had ample opportunity to steal data.

In one, a courier who daily delivered IRS documents and mail to post offices and other locations had previously served 21 years in prison for arson, retaliation and attempted escape.

The Intercept takes action:

Five Muslim-Americans Sue Feds Over Watchlisting

Relying in part on recent Intercept reporting on the vast breadth of the government’s watchlisting system, several Muslim Americans filed a complaint in a Michigan federal court today, arguing that they have been wrongly ensnared in an unaccountable system without any opportunity to defend themselves.

Citing “recent media accounts,” including secret government documents published exclusively by The Intercept, the complaint claims that the plaintiffs—five men on the terror watchlist—have been falsely stigmatized and punished without trial by a system motivated by “bigotry and misguided, counterproductive zeal.”

“This lawsuit is an expression of anger grounded in law,” the 28-page complaint begins. “Our federal government is imposing an injustice of historic proportions upon the Americans who have filed this action, as well as thousands of others.”

From the London Telegraph, a fascinating tale:

Google removes Telegraph stories about explosives arrests

  • Google has removed links to two Telegraph articles, each more than a decade old, describing arrests for possession of explosives after receiving requests under the EU’s ‘right to be forgotten’

Google has removed links to two Telegraph articles from certain search results describing arrests for possession of explosives after receiving requests under the EU’s ‘right to be forgotten’.

The first story is a news article from June 2001 reporting that three men had appeared in court after being arrested when explosives were found in a Dublin apartment.

The three men had been seen looking at something in a car, then refused to stop when police later attempted to pull them over. Inside the car were balaclavas and plastic boxes with switches attached to them, which “could be used as incendiary devices”.

Follow-up searches of a number of homes found explosives and similar equipment to that found in the car.

The second story is a collection of brief articles, one of which refers to the case above.

On to the hacking front, first with the National Post:

Several rallies planned to support alleged hacker Matt DeHart before his Canadian refugee hearing

The bizarre case of a former U.S. airman seeking asylum in Canada — claiming he was tortured by U.S. authorities probing his links to the shadowy Anonymous hacker collective — is sparking protest rallies and an international day of action.

Matt DeHart, 30, is in prison in Ontario awaiting an Aug. 20 refugee hearing in Toronto during which he will argue his claim for refugee protection.

“It is a very serious case that could set a lot of dangerous precedents for activists, hacktivists whistleblowers and journalists,” said Stacie Te Korako, director of #FreeMattDeHart, a support group based in New Orleans.

SecurityWeek covers another front:

Ukrainian Hackers Claim Attack on Polish Websites

Ukrainian hackers hostile to the government claimed Thursday to have launched a cyber attack against the websites of Poland’s presidency and the Warsaw Stock Exchange.

The hacker group Cyber Berkut said it blocked the sites, both down on Thursday afternoon, in response to what it said were Poland’s actions as “sponsors of fascism in Ukraine”.

“Our western neighbour on orders from Washington renders political, diplomatic and military assistance to nationalists and oligarchs who destabilise and wreck Ukraine,” the group alleged on its website.

SecurityWeek again, charting a hack attack whack:

Lockheed: Attackers Went Quiet After APT1 Report Exposed Chinese Hackers

Threat actors targeting Lockheed Martin immediately halted their cyberattacks against the defense contractor following the release of Mandiant’s APT1 report, Lockheed executives said Wednesday.

In February 2013, Mandiant released its bold, unprecedented report that made direct allegations and exposed a multi-year, massive cyber state-sponsored espionage campaign from a unit of China’s People’s Liberation Army (PLA).

The threat actor group, dubbed APT1 by FireEye-owned Mandiant, is alleged to be one of the most persistent of China’s cyber threat actors, which the security firm claims has “systematically stolen hundreds of terabytes of data” from at least 141 organizations.

China Daily tracks another web crackdown that could make a reader Yelp!:

Micro-blogger in court charged with spreading rumors

A popular Chinese micro-blogger went on trial on Thursday for allegedly spreading rumors to attract followers and helping others delete posts for profit.

Yang Xiuyu, founder of Erma Co and with the online identity Lier Chaisi, was accused of illegal business operations after receiving 531,200 yuan ($86,312) for helping people remove Internet posts and publish rumors, according to Beijing Chaoyang District People’s Court.

Yang, 41, from Northeast China’s Jilin province, was charged with running the illegal operation between May 2012 and September 2013, the court said.

From the Independent, bids to cop a deal:

Chief Constable bombarded with offers for private contracts

One of Britain’s most senior police officers has repeatedly rebuffed attempts by former service colleagues to use their contacts to push for contracts on behalf of their new private sector employers.

Lynne Owens, the Chief Constable of Surrey Police, said that she had been “bombarded” with requests for meetings from people who used to work in policing to tap into the £2.3bn market in private police services.

Industry watchers say the approaches signal a new drive by security companies for deals with police forces after the political furore died down over the failure of the world’s biggest security company G4S to supply enough security staff for the 2012 Olympics. Under pressure from 20 per cent budget cuts, some police forces have done deals with outside companies for technology, human resources and detention services.

On the drone front, there’s this from Aviation Week & Space Technology:

France, U.K. Move Toward Joint UCAV

  • UCAV feasiblity study renews French-British aerospace industry cooperation

New low-observable technologies, a highly reliable turbofan engine and multifunction radar are among the technologies that could be destined for an Anglo-French unmanned combat air vehicle (UCAV) in the 2030s.

A two-year feasibility study, signed by defense ministers from the two countries at the Farnborough air show last month, could mark the return to an era of close cooperation between the British and French aerospace industries not seen since the development of the Concorde in the 1960s.

Now more details have emerged of some of the ambitious capabilities and technologies being envisaged for the Future Combat Air System (FCAS), which both nations hope will give them a leading edge in air power and defense exports in the coming decades.

After the jump, it’s off to Asia with an allegation of a seditious Like and a non-illegal ISIS fan club, tensions in Pakistan, and the latest in the Game of Zones, including Korean missiles and a papal plea, Chinese arms developments, another “comfort women” demand, Japanese protests, Russo-Japanese tensions, the real Men in Black, and much, much more. . . Continue reading

Quote of the day: Snowden’s decisive moment


From “The Most Wanted Man in the World,” a superb Wired report on Edward Snowden by James Bamford, the writer who ongoing documentation of the National Security Agency gave American’s their first in-depth look at the nation’s spookiest outfit:

On March 13, 2013, sitting at his desk in the “tunnel” surrounded by computer screens, Snowden read a news story that convinced him that the time had come to act. It was an account of director of national intelligence James Clapper telling a Senate committee that the NSA does “not wittingly” collect information on millions of Americans. “I think I was reading it in the paper the next day, talking to coworkers, saying, can you believe this shit?”

Snowden and his colleagues had discussed the routine deception around the breadth of the NSA’s spying many times, so it wasn’t surprising to him when they had little reaction to Clapper’s testimony. “It was more of just acceptance,” he says, calling it “the banality of evil”—a reference to Hannah Arendt’s study of bureaucrats in Nazi Germany.

“It’s like the boiling frog,” Snowden tells me. “You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it. But if you do that, it creates a slippery slope that just increases over time, and by the time you’ve been in 15 years, 20 years, 25 years, you’ve seen it all and it doesn’t shock you. And so you see it as normal. And that’s the problem, that’s what the Clapper event was all about. He saw deceiving the American people as what he does, as his job, as something completely ordinary. And he was right that he wouldn’t be punished for it, because he was revealed as having lied under oath and he didn’t even get a slap on the wrist for it. It says a lot about the system and a lot about our leaders.” Snowden decided it was time to hop out of the water before he too was boiled alive.

Accompanying the article are two videos, posted online.

First, a scenesetter, featured Bamford and Platon, the very talented photographer whose mostly black-and-white images accompany the story.

From Wired:

The Most Wanted Man in the World: Behind the Scenes with Edward Snowden

Program note:

It took almost a year to arrange to interview and photograph Edward Snowden in Moscow, where he has sought asylum. Author James Bamford and photographer Platon reflect back on their encounters with the elusive whistleblower.

And the second video, consisting of Snowden’s voice and Platon’s images:

The Most Wanted Man in the World: Edward Snowden in His Own Words

Program note:

Dispatched to Moscow, famed portrait photographer Platon captured a never-before-seen side of Edward Snowden for WIRED. In this riveting montage, the elusive whistleblower explains the thinking behind his decision to reveal the extent of domestic surveillance being conducted by US intelligence services.

InSecurityWatch: Bombs, bluster, spooks, Asiana


With Iraq inflame and political and military posturing ramping up in Asia, American spookery in the spotlight, hacks, drones, and all the rest, there’s lots of ground to cover.

First up, via CBC News, the Iraqi meltdown continues:

Iraq conflict: Political crisis deepens as PM deploys militia

  • Canada increases humanitarian aid amid U.S. airstrikes and reports of civilians buried alive

Shia militia forces loyal to Iraq’s Prime Minister Nuri al-Maliki stepped up patrols around Baghdad on Sunday night after he delivered a tough televised speech indicating he would not cave in to pressure to drop a bid for a third term.

Political deadlock has prevented Iraqi politicians from uniting against Islamic State militants whose advance in the north has rattled the Baghdad government and its Western allies.

A senior U.S. official for Iraq said on Sunday he fully supported Iraqi President Fouad Masoum after al-Maliki, who the United States has blamed for stoking Iraq’s security crisis, accused Masoum of violating the constitution.

U.S. jet fighters and drones conducted four more airstrikes on ISIS militants in Iraq over the weekend, taking out armoured carriers and a truck that were firing on civilians, as Iraq’s human rights minister said ISIS militants killed at least 500 members of the Yazidi ethnic minority.

The Observer delivers a warning:

Obama warns of long campaign as Iraq strikes continue against Isis

  • US president admits there is no quick fix as minorities flee Islamist onslaught and British planes join relief effort

Barack Obama has committed the US to long-term involvement in Iraq, warning that the rapidly evolving crisis in the north would not be solved quickly.

US aircraft have targeted armoured vehicles and militant positions in a second day of strikes against Islamic State forces. A mix of US fighters and drones attacked and destroyed armoured personnel carriers after Yazidi civilians near Sinjar came under attack from the vehicles, US central command said.

US forces “successfully [conducted] four air strikes to defend Yazidi civilians being indiscriminately attacked” near Sinjar, said a statement from the United States Central Command (Centcom), which covers the Middle East.

The Independent covers an inciting incident:

Iraq crisis: Islamic militants ‘buried alive Yazidi women and children in attack that killed 500′

Militants in north-western Iraq have buried women and children alive during their offensive against the Yazidi ethnic minority, according to Iraq’s minister for human rights.

The bodies were reportedly found in a mass grave in the wake of Isis’s push towards the Sinjar mountain range, where tens of thousands of Kurdish-speaking refugees have been trapped to the point of starvation.

Mohammed Shia al-Sudani said his government had evidence that 500 Yazidi civilians had been killed so far, and that some of the victims had been buried alive. A further 300 Yazidi women have been kidnapped as slaves, he added.

From the McClatchy Foreign Staff, more context:

In backing Kurds, Obama ‘confident’ in protecting refugees

Obama was elected largely on the promise that he would extricate the United States from its two long and costly wars in Iraq and Afghanistan, a promise he then took to a further extreme by refusing to get militarily involved to any significant degree in the Syrian civil war despite tremendous outside pressure.

But the rapid advance by Islamic State militants in northern Iraq against Kurdish positions in the wake of June’s collapse of the Iraqi Army and most of central and northern Iraq to the radicals suddenly changed the equation.

West of the Islamic State-controlled city of Mosul, the takeover of Sinjar, a city heavily populated by the ancient Persian Yazidi sect considered heretics by the Islamic State, sent tens of thousands of civilians fleeing last week into a barren mountain range, where harsh heat and a lack of food and water have pushed the situation into a humanitarian catastrophe shadowed by the threat of an even larger massacre by the Islamic State.

At the same time, another offensive by the Islamic State against forces protecting the Kurdish capital of Irbil captured not only Iraq’s largest dam and hydro electric plant, but also took over four of Iraq’s largest Christian villages. That drove a wave of refugees into a Kurdish region already hosting tens of thousands of refugees from the June collapse of the Arab sections of Iraq. And as Islamic State forces closed to within 25 miles of Irbil, the United States said it was forced to act with both air strikes to protect the capital and a humanitarian airlift to help alleviate the Yazidi suffering.

While The Hill amps up, rhetorically:

McCain: Iraq airstrikes ‘clearly ineffective’

Sen. John McCain (R-Ariz.) on Sunday blasted President Obama’s strategy for limited airstrikes in Iraq, calling it “very, very ineffective.”

“Launching three strikes around a place where horrible humanitarian crisis is taking place, meanwhile [the Islamic State in Iraq and Syria (ISIS)] continues to make gains everywhere, yes is clearly very, very ineffective, to say the least,” McCain said on CNN’s “State of the Union.”

ISIS is making gains in Syria, Lebanon, Jordan and Turkey, McCain said.

McCain said the president’s decision to approve targeted airstrikes and drop humanitarian aid to refugees under siege in northern Iraq was “far from sufficient to meet the growing threat that ISIS poses.”

And the Jakarta Globe covers metastasis:

Police Arrest Suspected Terrorist Involved With ISIS in Bekasi

The National Police on Saturday arrested a member of hard-line Islamic group Jamaah Ansharut Tauhid, or JAT, for his alleged involvement in funding a paramilitary training camp in Aceh, which is suspected to be a training ground for Al Qaeda-linked extremists, in 2010.

“We have taken action against Afif Abdul Majid … in Jatiasih, Bekasi [West Java] at 10:45 p.m. on Saturday,” National Police spokesperson Insp. Gen. Ronny F. Sompie said on Sunday.

Ronny said that the arrest was a cooperation between the Jakarta Police and anti-terrorism agency Detachment 88 (Densus 88).

And from The Wire, bringing it home:

Republican Leaders Warn Obama ISIL is Coming to U.S.

Republican leaders took to the Sunday talk show circuit to criticize what they see as a weak response by the Obama administration to the crisis in Iraq, making the case that the emboldened militant group ISIL is also a threat to the United States.

On “Fox News Sunday,” Sen. Lindsey Graham (R-S.C.) accused Obama of having no game plan for handling ISIL and simply attempting to avoid “a bad news story.”

“So Mr. President, you have never once spoken directly to the American people about the threat we face from being attacked from Syria, now Iraq,” said Graham. “What is your strategy to stop these people from attacking the homeland? They have expressed a desire to do so.”

On to the latest from the world of spooks, first with The Hill:

Left to Obama: Check spy agencies

  • Activists on the left are demanding President Obama flex his muscle over the country’s spy agencies.

The CIA’s admission that a handful of officials spied on Senate staffers is proof that the White House has lost control of the intelligence agencies, critics say. They are also discomforted by the continued support Obama has offered for agency Director John Brennan.

“This is not an isolated incident,” said Becky Bond, political director with the progressive group Credo.

“The fact that these intelligence officials are able to keep their job when major breaches or major assaults on the Constitution are made public — let alone all the things that are happening that we don’t know about — it sets a very dangerous precedent,” she added.

New Scientist covers consequences of loose reins:

US is wasting money on too many spy satellites

THE US government is wasting billions of dollars on spy satellites. According to a report released by Congress last week, the US National Reconnaissance Office, which maintains the nation’s eyes in the sky, is buying new satellites at a faster rate than necessary.

The NRO says that regular purchases are the only way to maintain the nation’s satellite-building expertise. The Congress report questions this assumption, arguing that any saving in efficiency through increased expertise is outstripped by the cost of launching extra satellites.

We already know the NRO has excess satellites, thanks to its surprise donation in 2012. The spy agency gave NASA parts for two Hubble-quality telescopes that it had lying around. NASA is still deciding how to use the scopes, but to avoid any suspicion of spying will not point them at Earth.

And from the Washington Post, spooky chutzpah:

The CIA isn’t reporting any data to federal transparency site

Among the revelations in a new Government Accountability Office report on the completeness, or lack thereof, of the federal transparency site USASpending.gov is that the CIA not only doesn’t disclose contracting data on its classified programs, which isn’t so surprising. But the agency also doesn’t share data with the site on its unclassified programs, despite the fact that, as GAO notes, “[the White House Office of Management and Budget] does not have guidance that clearly exempts agencies from doing that.”

The CIA argues that because its unclassified programs are in support of its classified work, reporting on the former inexorably leads to insights about the latter. As the GAO reports in its assessment of the transparency site’s 2012 data, a CIA “official added that the agency also does not report unclassified contract information because of the risk that an individual could use it, along with other publicly available information to develop a picture of Central Intelligence Agency requirements.”

That’s exactly right, says CIA spokesperson Preston Golson. The policy wasn’t merely in effect in 2012, the time scale of the report, he confirms — it’s in effect now, too. Of course, the CIA’s budget, as well as the budget of the intelligence community writ large, has been the subject of debate, with the Obama administration opting to release a top-line number on total intelligence spending, only. What we know about the CIA budget comes in the form of leaked documents first reported by The Washington Post. In 2013, the CIA’s budget, we’re now aware as a result, was a requested $14.7 billion.

From The Hill, don’t hold your breath:

Feinstein squares off with Obama

Sen. Dianne Feinstein is squaring off with President Obama again, this time over a long-awaited Senate report on the Central Intelligence Agency’s harsh interrogation practices.

Feinstein, the senior senator from California and chairwoman of the Senate Intelligence Committee, has repeatedly battled the administration on a string of different issues.

An institutionalist who has repeatedly sought to defend congressional power, Feinstein takes her oversight role seriously. And while she is from a left-leaning state, the five-term senator frequently pushes Obama from a centrist point of view.

VICE News covers another report, other secrets:

Campaign Mounts to Declassify 9/11 Report’s References to Alleged Saudi Involvement

Nearly 13 years after the 9/11 terrorist attacks, the extent of Saudi involvement in the deaths of almost 3,000 people remains unclear — but according to members of Congress and the families of victims, information about this has been suppressed ever since the publication of a 2002 congressional investigation into the plot.

Prior to the release of the final report of the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, the Bush administration classified a 28-page section in the name of national security.

Though speculations, accusations, and denials have swirled around these pages over the past decade, the call for their declassification has steadily grown since December 2013, when House Representatives Walter Jones (R-NC) and Stephen Lynch (D-MA) introduced Resolution 428, a two-page document urging President Obama to release them to the public. Nine other representatives from both parties have co-sponsored the resolution.

And from News Corporation Australia, hints of spooky things to come:

Satellite photos reveal new hangars being built at Area 51, the United States top-secret testing facility

  • WHAT’S going on in Area 51? The mysterious US government air base in the middle of nowhere is undergoing an expansion. But nobody knows why.

Dreamland. Watertown. The Ranch. Whatever its name, the facility has entered common culture as Area 51 through a string of novels, movies, and far-fetched alien conspiracy theories.

Which may be why many people eagerly watch for every clue as to what may be going on in the dried-up lake bed.

Now, new satellite photos reveal ongoing construction work.

From RFI, hacker or spook?:

Franco-Israeli hacker poses as police officer to harass journalist

French hacker Grégory Chelli, who lives in the Israeli city of Ashdod, is under investigation for allegedly harassing a French journalist with the news website Rue89 and his family.

Known by the pseudonym of Ulcan or Violvocal, Chelli, 32, has been accused of making threatening calls to journalist Benoît le Corr and his parents since he published a profile of the hacker on July 29.

Reporters Without Borders (RSF) is urging the French justice system to pursue legal action against Chelli on the grounds that his actions “have combined violence, perversity and foolishness in an attempt to intimidate Le Corre and silence Rue89.”

However, the investigation launched in France could be difficult as there is no extradition agreement between Tel Aviv and Paris.

BBC News delivers a call:

John McAfee in surprise rant over Google and privacy

Notorious computer security pioneer John McAfee has used a surprise appearance at a hacking conference to warn of threats against “freedom” thanks to privacy issues with technology.

Speaking at Def Con in Las Vegas, Mr McAfee called on hackers to “make a stand” against companies that seek highly personal information.

He blamed laziness for the spread of apps and websites that glean information from users.

And from The Register, another kind of digital threat?:

Twitter can trigger psychosis in users

  • 140 characters or less leaves too much to symbolism, study finds

Twitter can trigger psychosis in predisposed users, according to a team of doctors from the Universitätsmedizin hospital in Berlin.

A study Twitter Psychosis A Rare Variation or a Distinct Syndrome? concluded that Twitter may have “a high potential to induce psychosis in predisposed users” based on the case of a 31 year-old woman who developed the condition from spending too much time reading and writing in 140 characters or less.

The unnamed woman named “Mrs C” imagined non-existent connections between tweets sent from random users that she during the time of her psychosis considered to be hidden messages from a celebrity.

Meanwhile, the British camel’s nose sniffs deeper into the tent, via the Guardian:

Police want right to see medical records without consent

  • Greater Manchester chief constable says move is needed to help police deal with people struggling to look after themselves

Police want new and expanded rights to access medical records and other confidential data without an individual’s consent, a senior police chief has told the Guardian.

Sir Peter Fahy, the Greater Manchester chief constable, said the extra access to sensitive data was needed to help police cope with growing numbers of vulnerable people.

Fahy said police frequently dealt with people struggling to look after themselves, including elderly people, people with dementia or Alzheimer’s, those with drug or alcohol problems, those with mental health issues and problem families. Perhaps most controversially, he said medical professionals should share information about women suffering from domestic abuse, even against the victim’s wishes.

TheLocal.de objects:

German coalition bickers over arms exports

German Economy Minister Sigmar Gabriel has met opposition from conservatives in the coalition government with plans to tighten rules on arms exports, amid tit-for-tat sanctions between the West and Russia.

“If you’re not very careful, (selling arms abroad) can very quickly become a deal with death,” Gabriel, who is also vice chancellor, warned recently on public television.

Normally, the position of deputy chancellor is largely a symbolic one. But Gabriel, a Social Democrat, is taking advantage of the absence on holiday of conservative Chancellor Angela Merkel to lobby publicly for a topic close to his heart.

And from Want China Times, a perfect transition to the jump:

Sanctions prompt Russia to turn to China for precision components

Russia is looking to acquire electronic precision components worth several billion dollars from China in light of economic sanctions from Europe and the United States, reports Global Times, a tabloid under the auspices of the Communist Party mouthpiece People’s Daily.

Citing Russian media reports, Global Times said Russian manufacturers will struggle to meet demand for electronic components required for the country’s aerospace and military fields over the next two years due to ongoing sanctions over the Ukraine crisis.

As a result, Russia is turning to China to fill the gap, with one source from the Russian Federal Space Agency telling media outlets that they are currently working with the China Aerospace Science & Industry Corporation, the main contractor for the Chinese space program. The Chinese company’s research and development center has already offered several dozen proposals on how their products can replace those previously acquired from the US, the source said, adding that they are currently in the process of translating the technical data, testing product sensitivity, temperatures and vibrations to assess component compatibility.

After the jump, all the latest on the Asian Game of Zones, with China, Japan, the Koreas, and others, all jockeying for position and power a global economic might shifts Eastward. We’ve got hack attack, political approaches [both those spurned and those embraced], military arsenal enlargement, plus a uniquely fitting punishment that’s so wrong but so gol-derned right. . . Continue reading

InSecurityWatch: Bombs, blather, zones, spooks


Lots of ground to cover, and we’ll start with the biggest story, the latest violent blowback for American violence, the little war we waged on a false pretext to satisfy deeper geopolitical motivations.

First, we turn to the Los Angeles Times for the latest in imperial hubris:

Obama sets ambitious goals for Iraq intervention

President Obama said Saturday that U.S. forces will seek to deny a safe haven to “barbaric terrorists” in Iraq and will help create a humanitarian corridor to rescue thousands of religious refugees trapped on a mountaintop, broadening his goals for the latest U.S. intervention in Iraq.

Speaking on the White House South Lawn, the president also suggested that the airstrikes by U.S. Navy fighter jets and Predator drones against Islamist militants that began Friday near the major city of Irbil won’t be a short-term operation.

The U.S. is prepared, he said, to continue bombing the fighters of Islamic State, an Al Qaeda breakaway group, as long as thousands of Americans living and working in Irbil are threatened. “We’re going to maintain vigilance and ensure that our people our safe,” the president said, before departing for Martha’s Vineyard on a family vacation.

More from Deutsche Welle:

Obama declines to put timeframe on Iraq operation

  • US President Barack Obama has declined to say how long the current American military operations in Iraq will likely continue. He also said the crisis could only be resolved after a unified Iraqi government is in place

Speaking to reporters on the South Lawn of the White House on Saturday, President Barack Obama said airstrikes, which US forces began carrying out on Friday, had “successfully destroyed arms and equipment “ used by a group of militants who call themselves the “Islamic State” (IS). Obama said that the US had “stepped up” military assistance to Kurdish forces fighting the Sunni extremists near the northern Iraq city of Irbil.

The US president said an operation to provide humanitarian aid through airdrops to members of Iraq’s Yazidi religious minority trapped on Sinjar mountain would continue. The Yazidis were left without food or water after taking refuge on the mountain to escape IS militants advancing into the city of Sinjar one week ago.

Obama also said he had secured the support in that humanitarian operation of British Prime Minister David Cameron and French President Francois Hollande.

And the predictably belligerent response from the London Daily Mail:

‘A message from ISIS to the US’: Islamist militants tweet gruesome images of dead American soldiers and vow to blow up embassies as terrorist convoy is wiped out in SECOND round of airstrikes

WARNING: GRAPHIC CONTENT: Militants who support the terror group ISIS tweeted threats to America on Friday after Barack Obama began airstrikes in Iraq

  • Some warn of car bombs at embassies while others taunt US military personnel with death threats
  • A handful of biting retorts have mocked the ham-fisted attempt to use social media as a tool of war
  • Tweets coincided with first U.S. airstrikes authorized by Obama to protect American staff and relief efforts
  • Food and water supplies have been airdropped to 50,000 refugees trapped on mountain
  • ISIS have been accused of taking hundreds of women hostage

Supporters of the ISIS terror group tweeted thousands of messages on Friday bearing the hashtag #AmessagefromISIStoUS featuring gruesome photos and threats to U.S. soldiers and citizens after American airstrikes took out terrorist targets in Iraq for the first time.

Some tweeted photos depict dead U.S. Army soldiers, U.S. marines hung from bridges in Fallujah, decapitated men, human heads on spikes, and the twin towers in flames on September 11, 2001.

‘This is a message for every American citizen,’ read one message sent with the hashtag. ‘You are the target of every Muslim in the world wherever you are.’

From the McClatchy Washington Bureau, a question:

New Iraq mission’s tough question: What does U.S. do if Islamic State survives?

“The words ‘limited’ and ‘deterrence’ don’t belong in the same sentence. There has to be the threat of a disproportionate size,” said Christopher Harmer, a senior naval analyst for the Washington-based Institute for the Study for War. “ISIS is not going to respond to limited strikes. They understand the West is reluctant to get involved.”

Senior military officials, speaking on condition of anonymity because they weren’t authorized to speak to a reporter, conceded as much, with one explaining: “There is probably some gray area” in the latest U.S. effort in Iraq.

Part of the concern is based on the most recent “limited” mission the Obama administration undertook on behalf of a besieged group: Libya. In 2011, as residents of Benghazi, Libya, faced an imminent attack from forces loyal to the country’s leader, Moammar Gadhafi, the U.S. announced it would intervene as part of a NATO mission to protect civilians from harm. The effort was billed as humanitarian, but it ended up toppling Gadhafi and leading to his death and empowering Islamist militias that now control much of the country. Libya is convulsed in a civil war between those Islamists and secular forces, the U.S. ambassador and three other Americans were killed in an attack in Benghazi in 2012, and last month the United States evacuated its embassy in Tripoli, the country’s capital.

And from the McClatchy Washington Bureau again, another question:

When is it genocide? U.S. interests help decide

Obama’s use of the word genocide _ which was echoed on Thursday by Secretary of State John Kerry _ is extremely unusual, said Jonas Claes, a conflict analyst for the United States Institute of Peace.

Claes couldn’t recall any other time during Obama’s presidency when he had used the term to describe current events.

Usually presidents dance around the word because it implies a legal responsibility to act, Claes said.

Meanwhile, the tragic legacy of using vaccination programs as covers for spooky operations continues to unfold, reports the Express Tribune in Karachi, Pakistan:

Unavailability of security cover forces polio drive in Quetta to be postponed

Despite the first reported case of polio in over a year in Balochistan surfacing last month, the government has been forced to postpone its immunisation drive in parts of the crisis hit province since it cannot provide security.

A three day anti-polio drive scheduled for Quetta and Pishin from August 11 to August 13 has been postponed.

With the security focus on Independence’s day celebrations, the government apparently can’t spare enough forces to safely oversee the immunization drive.

From the London Daily Mail, fuel poised for a toss into the flames:

The Spark that ignites quite a fire:’ Imminent release of CIA ‘torture’ report could put Americans and embassies in harm’s way, warn intelligence officials

  • National Intelligence Council pressures White House against the release of information on CIA interrogation techniques
  • Officials say the report could inflame anti-US passions in the Middle East
  • Sen. Dianne Feinstein remains locked in battle with the Obama administration over redactions that ‘obscure key facts’ in the report
  • The report shows CIA techniques were ‘far more brutal than previously understood’

American citizens and embassies could be at risk of attacks if the US Senate releases a lengthy intelligence report on CIA interrogation techniques.

The warning comes from the National Intelligence Council, which is pressuring the White House to keep the report under wraps to avoid inflaming anti-US passions abroad, lest more violence breaks out throughout the Middle East, reported Yahoo News.

‘It doesn’t take a rocket scientist to figure out if you release a report like this at a time when terrorism is surging all over the Mideast you are handing the other side a recruitment tool,’ ex-CIA Director John McLaughlin told the news outlet. ‘It’s blindingly obvious.’

On to the desperation of the outfit once dubbed No Such Agency, via Reuters:

NSA, struggling to recruit top talent, turns to Silicon Valley

The U.S. National Security Agency is turning to Silicon Valley for topflight talent, but first it has to rebuild trust.

Anne Neuberger, special assistant to NSA Director Michael Rogers, said this week she feared the agency would no longer be able to recruit top technologists, since former contractor Edward Snowden blew the lid off the extent of its spying activities.

At a seminar organized by the non-profit LongNow Foundation in San Francisco, she extended a plea to an audience replete with tech workers to consider a career in government, or at least apply for a fellowship.

And some NSA blowback from TheLocal.de:

Berlin seeks names of secret service agents

Berlin has asked all foreign diplomatic missions to provide names of secret service agents working in Germany, according to a media report on Friday, amid a rift with Washington over allegations of US spying.

Contacted by AFP, the German foreign ministry did not refute the report, originally published in Der Spiegel, which said that a note has been sent to embassies asking them for “lists of names of all active agents”.

The move came about a month after Germany ordered the Berlin CIA station chief to leave the country in an unprecedented show of anger after uncovering two cases of suspected US spying, hot on the heels of mass surveillance by the National Security Agency (NSA).

The Spiegel report said the circular to embassies was sparked by Berlin’s frustration over Washington’s repeated denials that its agents were operating in Germany.

For a change, some increased security from El País:

Ministry to cut bodyguard protection to minimum levels as ETA threat recedes

  • Protection will gradually be withdrawn from more than 1,500 public figures, saving millions of euros

The Spanish Interior Ministry says that it is to begin withdrawing armed protection for senior members of the former Socialist Party administration, along with that given to other public figures and journalists. The announcement reflects confidence that Basque terrorist organization ETA no longer represents a threat, and will see some 200 police bodyguards and around 30 vehicles return to normal duties.

When Popular Party Prime Minister Mariano Rajoy took office in late 2011, more than 1,600 officials were under police protection. In most other European countries, that figure is usually around 30, and applies only to senior members of government and other institutional posts.

In March 2012, the secretary of state for security said that “given the ostensible reduction in the threat from ETA,” it would be cutting back on the number of bodyguards, a process that has gradually been underway since.

The Latin American Herald Tribune covers security sought:

Busy Mexican Highway Blocked by Protesters

The expressway linking the Mexican capital with the Pacific resort city of Acapulco was re-opened early Friday after being blocked for more than 10 hours by peasants demanding that authorities do more to fight crime, the Guerrero state government said.

Members of the Union of Towns and Organizations of Guerrero blocked the expressway outside Chilpancingo, the state capital, at some 200 kilometers (120 miles) south of Mexico City.

Authorities agreed to install a round-table to review the peasants’ demands, as a result of which the blockade was removed after about 10 hours, the Guerrero Public Safety Office said.

And from the Mainichi, digital stalking:

Stalkers use GPS devices to track down victims

In recent years, there have been multiple instances of stalkers using global positioning system (GPS) devices to track down victims and police are urging people who feel they are being stalked to quickly contact authorities.

According to Akiko Kobayakawa, head of the anti-stalking NPO Humanity, even when victims take all the steps available for them to flee, such as putting restrictions on the viewing of their resident’s card, there have been many instances recently where stalkers have located them. “There has been an increase in cases where GPS trackers are used,” says Kobayakawa.

Many GPS devices can be found for sale in Tokyo’s Akihabara district. Their original purpose is to, for example, keep track of the locations of people like children or the elderly. A store employee introduced one such product, saying, “The battery lasts four days. As long as this device is above ground, you will know where it is.”

From TechWeekEurope, and will the outcome be real or ornamental?:

Yahoo And Google To Work Together On Encrypted Email

  • Yahoo promises to implement end-to-end PGP encryption by 2015

Yahoo is planning to introduce end-to-end encryption and advanced privacy features into its email service by 2015, helping customers avoid both cyber criminals and government surveillance. The company will collaborate with Google, which detailed its efforts in June after contributing its encryption implementation to the open source community.

According to the Wall Street Journal, Yahoo’s email encryption will rely on the Pretty Good Privacy (PGP) standard developed by Phil Zimmerman, currently the president of secure communications provider Silent Circle. This means even Yahoo itself won’t be able to access the contents of the messages.

The sudden popularity of encrypted messaging services is seen as a response to the mass surveillance practices employed by government agencies such as US National Security Agency (NSA) and UK’s GCHQ, revealed by Edward Snowden last year.

On a related note, this from Ars Technica:

Father of PGP encryption: Telcos need to get out of bed with governments

  • Zimmermann’s Silent Circle working with Dutch telco to deliver encrypted calls

Phil Zimmermann, the creator of Pretty Good Privacy public-key encryption, has some experience when it comes to the politics of crypto. During the “crypto wars” of the 1990s, Zimmermann fought to convince the US government to stop classifying PGP as a “munition” and shut down the Clipper Chip program—an effort to create a government-mandated encryption processor that would have given the NSA a back door into all encrypted electronic communication. Now Zimmermann and the company he co-founded are working to convince telecommunications companies—mostly overseas—that it’s time to end their nearly century-long cozy relationship with governments.

Zimmermann compared telephone companies’ thinking with the long-held belief that tomatoes were toxic until it was demonstrated they weren’t. “For a long time, for a hundred years, phone companies around the world have created a culture around themselves that is very cooperative with governments in invading people’s privacy. And these phone companies tend to think that there’s no other way—that they can’t break from this culture, that the tomatoes are poisonous,” he said.

The Verge covers corporate resistance:

Google, Microsoft, others backing Facebook in fight over user privacy in New York

  • Tech companies and civil liberties unions are trying to fend off warrants

Facebook’s getting some company in its fight with the New York district attorney’s office over the protection of user data from government investigations, something that has quickly become a battle over constitutional rights. Today, a number of major tech companies including Dropbox, Foursquare, Google, Kickstarter, LinkedIn, Meetup, Microsoft, Pinterest, Twitter, Tumblr, and Yelp, along with the New York Civil Liberties Union and the ACLU, filed amicus briefs in support of Facebook.

In a trio of filings today, the groups collectively argue that bulk warrants like the one that required Facebook to hand over user data for 381 users over to the NYDA are problematic, especially when attached to so-called “gag orders” that keep companies from alerting users that they are under investigation.

“Unless Facebook is able to assert its subscribers’ constitutional rights — and any of its own rights — the legality of the government’s actions with respect to those subscribers will escape review altogether. And had the government chosen to indict no one, no one would have been the wiser,” reads the opener of a filing from Google, Pinterest, Microsoft, Twitter, and Yelp.

From Channel NewsAsia Singapore, a major unLike:

Malaysia to study whether Facebook should be blocked

The Malaysian government will study whether it is necessary to block Facebook following a case of abuse involving the social website, said Communication and Multimedia Minister Datuk Seri Ahmad Shabery Cheek.

He said his ministry was conducting studies to gather public views on the matter. “If the people are of the opinion that Facebook should be closed, we are prepared to look into the matter but it is a radical approach,” he told reporters after closing the Cheras Wanita Umno Delegates Meeting on Saturday (Aug 9).

Also present were Cheras Umno head Datuk Seri Syed Ali Alhabshee and Cheras Wanita Umno chief Datuk Hajah Zurainah Musa.

From TheLocal.ch, old school spookery? Journalism? Curiosity?:

Swiss man arrested in Tunisia for ‘spying’

A Swiss man is under arrest in Tunisia for suspected spying activities in Kasserine, a city in the North African country.

Tunisian police arrested the tourist on Thursday afternoon, according to media reports from Tunisia picked up by media in Switzerland.

He was apprehended after being caught attempting to take pictures of the house of Tunisia’s interior minister, Lotfi Ben Jeddou, and military posts in Lasserine, local radio station FM Express reported.

In the man’s camera police discovered hundreds of images of police stations, government buildings and other structures with strategic objectives, the radio station said.

From Ars Technica, less than reassuring:

Hacking is simple, says author claiming role in breach of spyware firm

  • DIY guide provides instructions for carrying out similar muckraking exploits

An anonymous author who claims to be the hacker who penetrated controversial UK-based Gamma Group International and aired 40 gigabytes of its dirty laundry has published a how-to guide for other hacktivists.

“I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma,” wrote the author, who rightly cautions that the unauthorized access of other people’s networks is illegal. “I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started.”

The do-it-yourself guide explains how hackers can map entryways into a target’s network, scan for vulnerable services and exploit any that are found. It also lists some of the most common methods hackers use to keep their IP addresses and other digital fingerprints off their attacks. Among other things, the how-to suggests installing Whonix inside a hidden encrypted volume created by TrueCrypt and carrying out all operations from there. It also counsels against using Tor and instead using hacked servers. Again, this is illegal.

From the Associated Press, maple leaf imperialism sure to inflate an Arctic Game of Zones, one abetted by icecaps shrinking because of dependence on the same resources being sought in the Far North:

Canada sends icebreakers to Arctic to gather data

Canada is sending two icebreakers to the High Arctic to gather scientific data in support of its plan to bid for control of the sea floor under and beyond the North Pole.

The coast guard vessels have set out on a six-week journey that will take them to the eastern side of the Lomonosov Ridge.

The undersea ridge starts near Ellesmere Island and runs northward over the pole. Some say the ridge could give Canada a claim on a vast section of Arctic sea floor.

From the Associated Press, allegations with a certain resonance in those Ivy Bells of yesteryear:

Russia: Apparent US sub driven from Barents Sea

Russian state news agencies say the country’s navy claims to have driven away a submarine believed to be American that entered Russia’s northern waters.

The reports Saturday cited an unnamed representative of the navy’s general staff as saying the incident occurred Thursday in the Barents Sea. The Barents Sea lies off northwest Russia and the Russian navy’s Northern Fleet is based on its shores.

The reports said the fleet sent several vessels and an anti-submarine Il-38 aircraft to drive the submarine away.

After the jump, the Asian Game of Zones intensifies with hacks, web crackdowns, rhetorical and military hardware escalations, espionage arrests, deep political plays, and a sudden German love of the good old-fashioned sound of a typewriter key hitting platen-encircling paper. . . Continue reading

Quote of the day: Obama’s choice of enemies


From Glenn Greenwald, writing at The Intercept:

For those who ask “what should be done?,” has the hideous aftermath of the NATO intervention in Libya – hailed as a grand success for “humanitarian interventions” – not taught the crucial lessons that (a) bombing for ostensibly “humanitarian” ends virtually never fulfills the claimed goals but rather almost always makes the situation worse; (b) the U.S. military is not designed, and is not deployed, for “humanitarian” purposes?; and (c) the U.S. military is not always capable of “doing something” positive about every humanitarian crisis even if that were really the goal of U.S. officials?

The suffering in Iraq is real, as is the brutality of ISIS, and the desire to fix it is understandable. There may be some ideal world in which a superpower is both able and eager to bomb for humanitarian purposes. But that is not this world. Just note how completely the welfare of Libya was ignored by most intervention advocates the minute the fun, glorious, exciting part – “We came, we saw, he died,” chuckled Hillary Clinton – was over.

It is simply mystifying how anyone can look at U.S. actions in the Middle East and still believe that the goal of its military deployments is humanitarianism. The U.S. government does not oppose tyranny and violent oppression in the Middle East. To the contrary, it is and long has been American policy to do everything possible to subjugate the populations of that region with brutal force – as conclusively demonstrated by stalwart U.S. support for the region’s worst oppressors. Or, as Hillary Clinton so memorably put it in 2009: “I really consider President and Mrs. Mubarak to be friends of my family.”

How can anyone believe that a government whose overt, explicit policy is “regime continuity” for Saudi Arabia, and who continues to lend all sorts of support to the military dictators of Egypt, is simultaneously driven by humanitarian missions in the region?

Which reminds us, naturally, of a song — specifically, “Kill for Peace” by the Fugs, that merry band of 60s misfits who brought devious delights to counterculture types [including, we must note, a young esnl] by their subversive lyrics and style.

In this clip from the 1971 film W.R.: Mysteries of the Organism, Fugs cofounder Tuli Kupferberg cavorts around Wall Street and environs, alarming banksters and brokers as the Fugs classic plays out:

Via vlogger The Redemption Songs:

The Fugs: Kill for Peace

In waging cover war on Syria and overt war on Iraq. we have sown dragon’s teeth and reaped the whirlwind, leaving the United States to either fight an endless series of brushfire wars or [dare we hope] seek some way out of the mess that doesn’t involve endless slaughter and misery for those who we professed to help.

And whuile we;re at it, via vlogger Dn310 , another appropriate Fugs classic:

The Fugs: CIA Man

Program notes:

The Fugs is a rock/protopunk group formed in the 1960’s. This song is featured on their debut album “The Fugs First Album”. Most recently the song can be heard during the end credits on the movie “Burn after Reading” by the Coen brothers.

UPDATE: Just found another clip, an excerpt from a 14 July 1968 appearance on Swedish television featuring surreal autobiographies of the band members and a performance of “I Couldn’t Get High”:

From vlogger Johan Cederblad:

The Fugs: I Couldn’t Get High

InSecurityWatch: Bombs, hacks, drones, more


We’ve got a major collection today, including some items revealing how vulnerable our phones, cars, planes, and more are increasingly vulnerable to government, corporate, and other hackers, the latest developments in Asia’s Game of Zones, and a whole lot more. . .

We open with the newest phase of America’s endless wars — call it Iraq.3.0 — via the New York Times:

U.S. Warplanes Strike Militants in Iraq

The United States on Friday afternoon launched a second round of airstrikes on Sunni militants in northern Iraq, sending four Navy fighter jets to strike eight targets around Erbil, according to Pentagon officials.

The attacks came hours after an initial wave of strikes by military aircraft and armed drones, escalating the American involvement in Iraq a day after President Obama announced that the United States military was returning to a direct combat role in the country it left in 2011.

Military officials said they believed that the second round of attacks resulted in a number of casualties among the militants with the Islamic State in Iraq and Syria. The Navy fighters launched from the aircraft carrier George H. W. Bush, which has been deployed in the Arabian Sea.

Earlier Friday, two F-18 fighters dropped 500-pound laser-guided bombs on a mobile artillery target that had just begun shelling Erbil, Pentagon officials said. A senior military official said on Friday that the artillery unit hit in the earlier bombing was being towed by a truck toward Erbil.

The Associated Press has some context:

Iraq official: Militants hold 100s of Yazidi women

Hundreds of women from the Yazidi religious minority have been taken captive by Sunni militants with “vicious plans,” an Iraqi official said Friday, further underscoring the dire plight of Iraq’s minorities at the hands of the Islamic State group.

Kamil Amin, the spokesman for Iraq’s Human Rights Ministry, said hundreds of Yazidi women below the age of 35 are being held in schools in Iraq’s second largest city, Mosul. He said the ministry learned of the captives from their families.

“We think that the terrorists by now consider them slaves and they have vicious plans for them,” Amin told The Associated Press. “We think that these women are going to be used in demeaning ways by those terrorists to satisfy their animalistic urges in a way that contradicts all the human and Islamic values.”

While the London Daily Mail rattles sabers:

TWO retired four-star generals blast Obama for failing to use ‘decisive’ force in Iraq with ‘pinprick’ attacks for ‘political posturing’

  • Retired Gen. Barry McCaffrey laid into Obama on Friday, saying bombing runs against ISIS positions are political posturing
  • ‘These are political gestures using military power,’ he said, lamenting the president’s lack of commitment to a full-blown military campaign
  • Obama ran for president on a platform of getting US military out of Iraq but began bombing runs Friday morning in the country’s northern region
  • White House Press Secretary Josh Earnest assured reporters on Friday that a ground-troop incursion is out of the question
  • GOP critics are hammering the White House for not being more aggressive
  • House Speaker John Boehner said the White House has an ‘ongoing absence of a strategy for countering the grave threat ISIS poses’
  • Obama underestimated ISIS in January, telling The New Yorker that ‘If a jayvee team puts on Lakers uniforms that doesn’t make them Kobe Bryant’

CNBC raises an ironic question:

Will US airstrikes target US-supplied weapons?

As American pilots fly new airstrikes over northern Iraq Friday, they’ll see some very familiar weaponry in the hands of Islamic State forces: Humvees, MRAP transports, American-made heavy machine guns and American artillery.

Islamic State (which also goes by ISIS or ISIL) forces captured the haul of American weapons as the U.S.-supplied Iraqi Army retreated in the face of the extremist onslaught, leaving expensive American equipment littered on the battlefield.

All that raises the prospect that, at some point during these airstrikes, American taxpayer-financed fighter jets will fire on and destroy American taxpayer-financed weapons on the ground.

And the McClatchy Washington Bureau adds a dash of bitters:

Why can’t Islamic State be stopped? Analysts say it’s better armed, better organized

Observers on the ground and analysts in Washington believe that the latest push was possible because the peshmerga forces are stretched trying to defend a frontier with the Islamic State that is nearly 900 miles long. The Islamic State is also better equipped, with U.S.-supplied weapons that its forces have looted from every Iraqi military based it has seized. It also has recently captured major Syrian arsenals.

On Twitter, the Islamic State often posts photos of its bounty from military bases, which include rocket-propelled-grenade launchers, artillery and weapons that are far more sophisticated than those in the peshmerga arsenal.

The Islamic State also has the advantage of momentum. According to the Long Wars Journal, citing a tweet by the Islamic State, its forces have taken control of 17 communities in the area around Mosul. Its push stretches all the way to Diyala province in northeast Iraq, which borders Iran. On Thursday, the Islamic State claimed to control the Mosul Dam, the largest water supply source in Iraq _ a claim U.S. and Iraqi sources confirmed.

And perhaps most importantly, the Islamic State has very simply put together a smarter offensive plan. Its push toward Irbil is believed by many not to be a move to take that city but to force the peshmerga to defend its capital, allowing the Islamic State to harden its grip on places nearby it’s more interesting in holding.

And for our final item on the subject, no comment needed, via The Verge:

The Pentagon used a tweet to tell the world about airstrikes in Iraq

  • Tweets are the new briefings

From United Press International, gettin’ real [somewhat late]:

New York Times will now use the word ‘torture’

President Barack Obama made waves last Friday when he admitted the United States tortured terror suspects in order to get information.

The New York Times will now use the word “torture” in stories regarding interrogations in which the paper is sure pain was inflicted to get information.

The Times has faced criticism for its hesitation to use the word when speaking about the controversial interrogation techniques used by the United States and specifically the Central Intelligence Agency when trying to get information from terror suspects. They had previously used Bush administration-coined euphemisms such as “enhanced interrogation techniques.”

In an editorial published Thursday, executive editor Dean Baquet said The Times will no longer use these euphemisms and instead call it what it is.

From Aviation Week, Skynet fears continue unabated [thank heavens]:

‘Certifiable Trust’ Required To Take Autonomous Systems Past ‘Unmanned’

  • Deployment of autonomous capabilities across aerospace faces major hurdle

Aviation has been built around humans since before the origins of powered flight, but unmanned technology is opening new design spaces in unexpected ways. Now shaped by the strengths and weaknesses of pilots and controllers, how aircraft are flown and air traffic managed could change dramatically in coming decades as autonomy becomes understood, accepted and, eventually, trusted.

“Aviation has been very successful with a -humancentric paradigm, the idea that it is humans that save the day,” says Danette Allen, chief technologist for autonomy at NASA Langley Research Center. Even with the Northrop Grumman RQ-4 Global Hawk—arguably the most automated of today’s unmanned aircraft—“the human is still on or in the loop for situational awareness, just in case they have to jump in and solve problems,” she says.

But autonomy means machines making decisions, not humans, and behaving in ways that are not painstakingly pre-planned and pre-programmed. It requires safe and trusted systems than can perceive their environment for situational awareness and assessment, make decisions on uncertain and inaccurate information, act appropriately, learn from experience and adapt their behavior. “In Washington, autonomy has become the ‘A’ word. It has become a negative,” says Rose Mooney, executive of the Mid-Atlantic Aviation Partnership, one of six civil-UAS test sites established by the FAA.

“Certifiable trust”? Does that mean you have to be certifiable to trust ‘em?

For our next drone story, we turn to the Associated Press:

Central NY airport new site for drone safety tests

Federal regulators have approved drone research flights at a central New York airport, one of six sites nationally chosen to assess the safety of the aerial robots in already busy skies.

The other mission at Griffiss International Airport in Rome will be to study how drones can help farmers stay on top of pests, weeds and the conditions of their crops.

The NUAIR Alliance, a consortium of private industry, academic institutions and the military, says flights could begin in a couple of weeks after the Federal Aviation Administration approval Thursday. Future operations will include Massachusetts. The other test sites are in Alaska, North Dakota, Nevada, Texas and Virginia.

And for our final dronal delight, there’s this from Ars Technica:

San Jose Police Department says FAA can’t regulate its drone use

  • FAA disagrees, says law enforcement definitely needs permission to use a drone.

Newly published documents show that the San Jose Police Department (SJPD), which publicly acknowledged Tuesday that it should have “done a better job of communicating” its drone acquisition, does not believe that it even needs federal authorization in order to fly a drone. The Federal Aviation Administration thinks otherwise.

Late last month, a set of documents showed that the SJPD acquired a Hexacopter called the Century Neo 660, along with a GoPro video camera and live video transmitter. The nearly $7,000 January 2014 purchase was funded through a grant from the Bay Area Urban Areas Security Initiative, a regional arm of the Department of Homeland Security. San Jose, which proclaims itself the “capital of Silicon Valley,” is the third-largest city in California and the tenth-largest in the United States.

The documents, which were sent to MuckRock as part of a public records request and were published on Wednesday for the first time, make a number of statements suggesting that the SJPD has a deep misunderstanding of current drone policy.

Next up, more dirty dealing at Scotland Yard from the Independent:

Secret internal police report points to ‘highly corrupt’ cells in the Met

Three former Scotland Yard detectives were part of “highly corrupt cells within the Metropolitan Police Service” but have never been brought to justice, according to a secret internal report seen by The Independent.

The police officers, who left the Met to open a private investigation agency, were suspected of seizing tens of thousands of ecstasy tablets from criminals and selling the drugs themselves, according to a file produced by the force’s anti-corruption command.

The 2000 report said the officers also had links to London’s criminal underworld and were capable of tracking down and threatening witnesses involved in sensitive trials.

On to the world of hackery, starting with the latest biggie, first from ProPublica:

Leaked Docs Show Spyware Used to Snoop on U.S. Computers

  • Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United States.

Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United States, the U.K., Germany, Russia, Iran and Bahrain, according to a leaked trove of documents analyzed by ProPublica.

It’s not clear whether the surveillance was conducted by governments or private entities. Customer email addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer and the Qatari government.

The leaked files — which were posted online by hackers — are the latest in a series of revelations about how state actors including repressive regimes have used Gamma’s software to spy on dissidents, journalists and activist groups.

And The Intercept covers one country amongst the targets:

Leaked Files: German Spy Company Helped Bahrain Hack Arab Spring Protesters

A notorious surveillance technology company that helps governments around the world spy on their citizens sold software to Bahrain during that country’s brutal response to the Arab Spring movement, according to leaked internal documents posted this week on the internet.

The documents show that FinFisher, a German surveillance company, helped Bahrain install spyware on 77 computers, including those belonging to human rights lawyers and a now-jailed opposition leader, between 2010 and 2012—a period that includes Bahrain’s crackdown on pro-democracy protesters. FinFisher’s software gives remote spies total access to compromised computers. Some of the computers that were spied on appear to have been located in the United States and United Kingdom, according to a report from Bahrain Watch.

Earlier this week, an anonymous hacker released 40 gigabytes of what appears to be internal data from FinFisher on Twitter and Reddit, including messages between people who appear to be Bahraini government officials and FinFisher customer service representatives.

In those messages, Bahraini software administrators complained to FinFisher that they were “losing targets daily” due to faults in its software. In one message employing the language of a frustrated consumer, a spy appeared to complain that he or she had to keep re-infecting a targeted computer, risking detection: “[W]e cant stay bugging and infecting the target every time since it is very sensitive. and we don’t want the target to reach to know that someone is infecting his PC or spying on him” one message reads.

For our next hackery item, RT America covers a major conference and some revelations aired during sessions:

Black Hat hackers conference exposing flaws in everyday electronics

Program notes:

The “Internet of Things” is a hot topic at this year’s Black Hat cybesrsecurity conference in Las Vegas. With more household, security and even medical devices being connected to the internet, the threats posed by hackers and nefarious governments are growing. Web connected insulin pumps, home thermostats and other technologies are easily hacked and have had numerous security flaws exposed, potentially putting lives at risk, warn experts. Erin Ade, host of RT’s Boom Bust, is at the conference and has more.

Al Jazeera America has another overview:

Hackers sound alarm about Internet of Things

  • By reframing cybersecurity as a public safety issue, white-hat hackers may be making inroads in Washington

A hacker with a smartphone can unlock your front door. Your refrigerator becomes infected with a virus that launches cyber attacks against activists in Bahrain. Criminals and intelligence agencies grab data from your home thermostat to plan robberies or track your movements.

According to computer-security researchers, this is the troubling future of the Internet of Things, the term for an all-connected world where appliances like thermostats, health-tracking wristbands, smart cars and medical devices communicate with people and each other through the Internet. Many of these products are already on the market, and over the next decade, they are expected to become dramatically more commonplace.

For consumers, the Internet of Things will allow high-tech convenience that not long ago seemed like science fiction — a car’s GPS automatically turning on the air conditioner in your house as you drive home from work, for example. But security experts see a dystopian nightmare that is quickly becoming reality. A study released last week by Hewlett Packard concluded that 70 percent of Internet of Things devices contain serious vulnerabilities. Experts say it’s the latest evidence that our dependence on Internet-connected technology is outpacing our ability to secure it.

Defense One covers one session’s fruits:

Hacker Shows How to Break Into Military Communications

Soldiers on the front lines use satellite communications systems, called SATCOMS to call in back up, lead their comrades away from hot spots and coordinate attacks, among other things. Airplanes use SATCOMS to rely on data between the ground and the plane, and ships use them to avoid collisions at sea and call for help during storms or attacks. A well-known hacker says he’s found some major flaws in the communication equipment that ground troops use to coordinate movements. The equipment is also common on a variety of commercial ships and aircraft rely on to give pilots vital information. In other words, you can hack planes.

Speaking at the Black Hat cyber security conference, analyst Ruben Santamarta of IOActive presented a much-anticipated paper showing that communications devices from Harris, Hughes, Cobham, Thuraya, JRC, and Iridium are all highly vulnerable to attack. The security flaws are numerous but the most important one — the one that’s the most consistent across the systems— is back doors, special points that engineers design into the systems to allow fast access. Another common security flaw is hardcoded credentials, which allows multiple users access to a system via a single login identity.

Santamarta claims that a satellite communication system that’s common in military aviation, the Cobham Aviator 700D, could be hacked in a way that could affect devices that interact with critical systems possibly resulting in “catastrophic failure.”

MIT Technology Review covers another:

Black Hat: Google Glass Can Steal Your Passcodes

  • Footage of people unlocking their phones can be used to steal mobile passcodes even if the typing can’t be seen.

Criticism of Google Glass has often focused on the way its camera makes surreptitious video recording too easy. Now researchers have shown that footage captured by the face-mounted camera could also pose a security threat.

Software developed by the researchers can automatically recover the passcodes of people recorded on video as they type in their credentials, even when the screen itself is not visible to the camera. The attack works by watching the movement of the fingers to work out what keys they are touching. It also works on footage from camcorders, webcams, and smartphones, but Glass offers perhaps the subtlest way to stage it.

The work suggests that “shoulder surfing”—stealing passwords or other data by watching someone at a computer—could become more of a threat as digital cameras and powerful image processing software become more common.

Ars Technica covers a third:

Security expert calls home routers a clear and present danger

  • In Black Hat Q&A, In-Q-Tel CISO says home routers are “critical infrastructure.”

During his keynote and a press conference that followed here at the Black Hat information security conference, In-Q-Tel Chief Information Security Officer Dan Geer expressed concern about the growing threat of botnets powered by home and small office routers. The inexpensive Wi-Fi routers commonly used for home Internet access—which are rarely patched by their owners—are an easy target for hackers, Geer said, and could be used to construct a botnet that “could probably take down the Internet.” Asked by Ars if he considered home routers to be the equivalent of critical infrastructure as a security priority, he answered in the affirmative.

Geer spoke about the threat posed by home routers in advance of “SOHOpelessly Broken,” a router hacking contest scheduled for the DEF CON security conference later this week sponsored by the Electronic Frontier Foundation. “Because they are so cheap, you can get a low-end router for less than 20 bucks that hasn’t been updated in a while,” Geer explained.

Attackers could identify vulnerabilities in particular models and then scan the Internet for targets based on the routers’ signatures. “They can then build botnets on the exterior of the network—the routing that it does is only on side facing ISPs,” he said. “If I can build a botnet on the outside of the routers, I could probably take down the Internet.”

MIT Technology Review covers a fourth:

Black Hat: Car Security Is Likely to Worsen, Researchers Say

  • In-car applications and wireless connectivity are a boon to hackers who take aim at cars.

The electronic systems in cars increasingly control safety-critical functionality.

As more cars come with wireless connectivity and in-car apps, more of them will be vulnerable to potentially dangerous hacking, two well-known researchers warned at the Black Hat security conference in Las Vegas on Wednesday.

In a study of nearly 20 different vehicles, Charlie Miller, a security engineer with Twitter, and Chris Valasek, director of vehicle security research with security services firm ioActive, concluded that most control systems were not designed with security in mind and could be compromised remotely. The pair created cybersecurity ratings for the vehicles, which will be published in a paper later this week.

And from Wired threat level, that darned cat:

How to Use Your Cat to Hack Your Neighbor’s Wi-Fi

Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected.

Unbeknownst to Coco, he’d been fitted with a collar created by Nancy’s granddaughter’s husband, security researcher Gene Bransfield. And Bransfield had built into that collar a Spark Core chip loaded with his custom-coded firmware, a Wi-Fi card, a tiny GPS module and a battery—everything necessary to map all the networks in the neighborhood that would be vulnerable to any intruder or Wi-Fi mooch with, at most, some simple crypto-cracking tools.

Reuters covers another blow to online anonymity:

Russia demands Internet users show ID to access public Wifi

Russia further tightened its control of the Internet on Friday, requiring people using public Wifi hotspots provide identification, a policy that prompted anger from bloggers and confusion among telecom operators on how it would work.

The decree, signed by Prime Minister Dmitry Medvedev on July 31 but published online on Friday, also requires companies to declare who is using their web networks. The legislation caught many in the industry by surprise and companies said it was not clear how it would be enforced.

A flurry of new laws regulating Russia’s once freewheeling Internet has been condemned by President Vladimir Putin’s critics as a crackdown on dissent, after the websites of two of his prominent foes were blocked this year.

The Guardian covers the Down Under version of a familiar story:

Warrantless metadata access is already taking place at higher rate than ever

  • A multitude of agencies currently have access to metadata and in 2012-13 used those powers on 330,640 occasions

Given the current debate about metadata retention in Australia it’s worth pointing out that various organisations can access your metadata already, without a warrant – and it’s occurring at a higher rate than ever before.

In mid 2013 we wrote about how agencies from the police to the RSPCA to the Victorian Taxi Directorate are able to access “existing information or documents” from telecommunications companies without a warrant. The information can include details of phone calls (but not the contents of the call) and internet access details such as subscribers’ personal information, and dates and times of internet usage.

The most recent figures, released in December 2013, show warrantless access to metadata occurred on 330,640 occasions in the 2012-13 financial year. The agency requesting the data is required to fill out a request form, however there is no judicial oversight or requirement that law enforcers prove suspicion of a crime being committed.

And from the McClatchy Washington Bureau, idiotic obstructionism:

Judge dings FBI for response to inmate’s FOIA requests

A federal judge has slapped the FBI, or maybe just laughed at it, for making “transparently implausible” arguments while resisting a prison inmate’s Freedom of Information Act requests.

The feds, U.S. District Judge James E. Boasberg wrote, in what sounds like a state of near-incredulity, argued that the “FOIA request need not be disclosed because they reside on two CDs and a thumb drive.”

That’s right. The FBI seemed to say that information was exempt from disclosure because of the medium it was stored on.

After the jump, the latest developments in the Game of Zones, including spooky arrests, an Orwellian anecdote, an X-rated protest, and a whole lot more. . . Continue reading

And now for a word from our sponsor. . .


From the Other 98‘s Koch-Blocked campaign:

Koch Bros: It’s the Evil Thing

Program note:

See this kick-ass video. Then join the campaign to push Koch money out and bring democracy back in.

InSecurityWatch: Bombers, hacks, spooks, zones


Today’s InSecurityWatch opens with another crack at the ol’ Pottery Barn Rule.

First the prextext, via the Christian Science Monitor:

Islamic State persecution of Yazidi minority amounts to genocide, UN says

Tens of thousands of Yazidis have taken refuge on a mountain in Sinjar province after Islamic State fighters overran their town and other areas, pushing out Kurdish paramilitary forces.

Sunni Arab militants in northern Iraq are hunting down and killing large numbers of minority Yazidis, acts which amount to genocide, according to a senior United Nations official.

On Sunday, fighters from the self-declared Islamic State overran the city of Sinjar, part of a widening offensive that on Thursday saw IS take control of other Christian and Yzedi towns on the Nineveh plains. According to UN officials and Yazidi elders, the militants have killed hundreds of Yazidis, a secretive faith with pre-Islamic roots. Others have been taken as slaves. Tens of thousands have taken refuge on Sinjar Mountain, their traditional refuge over centuries of persecution, and are appealing for emergency aid.

Unlike Christians, who have been told they must either pay a religious tax or convert to Islam to avoid death, the Yazidis are considered by Sunni militants to be infidels who deserve extermination.

And the response, via the Los Angeles Times:

U.S. will use airstrikes to avert genocide in Iraq, Obama says

President Obama, saying that he was acting to avert a threatened genocide, announced that he had authorized airstrikes against Sunni militants who have advanced quickly across northern Iraq, driving tens of thousands of people out of their towns and villages.

In addition to the threat of airstrikes, Obama said U.S. cargo planes had dropped supplies to the refugees in the area of Mt. Sinjar, who he said faced the risk of imminent starvation.

“Today, America is coming to help,” Obama said. But he repeated his vow that no American combat troops would be sent back to Iraq.

And another country invaded, another lingering blowback, via the McClatchy Washington Bureau:

‘Green-on-blue’ killings in Afghanistan raise tough questions about U.S. strategy

In the hours after a suspected coalition-trained Afghan soldier opened fire at Afghanistan’s national defense university, killing an American two-star general and injuring more than a dozen others, a question that has plagued U.S. efforts arose again in quiet murmurs at coalition bases and camps across that country:

How are we supposed to train people who often want to kill us?

Attacks by Afghan forces on their coalition partners _ the Long Wars Journal has counted 87 since 2008 _ reached a peak in 2012. That’s when the U.S. military imposed security and education measures intended to protect coalition troops from the very people they are supposed to help. Until Tuesday’s attack, those measures were thought to have been successful; it had been six months since a uniformed Afghan had attacked American soldiers.

And from the newly issued World Drug Report [PDF] of the United Nations Office of Drug and Crime, another Afghan invasion result. Click on the chart to embiggen:

BLOG Smack

And some good news for America’s leaker-in-exile via Al Jazeera English:

Snowden gets three-year residence in Russia

  • NSA whistleblower granted asylum allowing him to move about freely and travel abroad.

Edward Snowden, the former US intelligence contractor turned whistleblower, has been granted a three-year residence permit to remain in Russia.

Snowden’s lawyer, Anatoly Kucherena, told reporters on Thursday that Snowden had been granted asylum allowing him to move about freely and travel abroad.

“The request was accepted and accordingly Edward Snowden was given a three-year residence permit,” Kucherena said.

Techdirt raises an interesting question:

As DOJ Hunts For ‘Second Leaker,’ Will It Also Explore Who Leaked The Intercept’s Story To The AP?

  • from the questions-to-ponder dept

Earlier this week, Tim Cushing wrote about The Intercept’s latest scoop, concerning the makeup of the US government’s federal terrorist watchlist, and the fact that a large chunk of it isn’t affiliated with any terrorist groups. While most of the article focused on that point, he made two other notes in passing — the first was that it was obvious that this release was from a second leaker, not Snowden, and the second was about how the government “leaked” the story in a “friendlier” manner to the AP in order to beat The Intercept. We thought both of these asides were interesting, but they’ve both turned into big stories on their own.

CNN later confirmed that US government officials are now searching for the second leaker (though “second” may not be accurate either…), more or less confirming what many people had been suspecting. Meanwhile, the “scoop spoiling” by the federal government actually resulted in a semi-apology from the National Counterterrorism Center (NCTC) who gave the scoop to the AP. The NCTC claimed it had been working with the AP on a story for a while, and after seeing what The Intercept was doing, felt it needed to give them the heads up, though it also says it could have handled the situation better. Of course, this also makes it more likely that The Intercept won’t bother giving the government much time (if any) to respond on future stories. Why risk the chance of having the government spoil the scoop again?

From the Dept. Of We Say So, via Defense One:

The CIA Can’t Hack Senate Computers Because They Own Them, Experts Say

CIA personnel probably didn’t commit a hacking crime by rummaging through congressional computers used to research the agency’s torture activities, former federal attorneys and scholars say.

Some lawmakers are calling for a criminal probe into new findings by a CIA inspector general that the agency improperly searched Senate intelligence committee files about its detention and interrogation program. Committee staff has been compiling a report condemning the program.

Under an agreement, only CIA information technology employees were allowed to access the system, says committee Chairwoman Sen. Dianne Feinstein, D-Calif. The CIA violated that agreement by removing about 920 agency items and searching through the committee’s own internal work, she maintains.

SecurityWeek covers turnabout:

Attackers Used Multiple Zero-Days to Hit Spy Agencies in Cyber-Espionage Campaign

Kaspersky Lab said that it has discovered how victims of an ongoing massive cyber espionage campaign were infected, shedding light on questions previously left unanswered in earlier research.

The campaign, called Epic Turla, targeted intelligence agencies, government institutions, embassies, military groups, education institutions, and research and pharmaceutical companies in more than 45 countries, the security firm said on Thursday.

Turla, also known as Snake or Uroburos, is considered by researchers to be one of the most sophisticated ongoing cyber-espionage campaigns. Earlier research by G-Data published in February of this year on Turla/Snake didn’t address how victims were getting infected in the first place, or the role Epic Turla/Tavdig played in the infection path.

From Wired threat level, let’s make a deal:

CIA Insider: U.S. Should Buy All Security Exploits, Then Disclose Them

To increase the security of the internet and computers, the government should corner the market on zero-day vulnerabilities and exploits, offering top-dollar to force out all other buyers. At least, that’s what Dan Geer thinks, and his opinion matters. Geer is chief information security officer at the CIA’s venture capital arm In-Q-Tel, which invests in technologies that help the intelligence community.

Geer, an icon in the world of computer security, delivered his controversial stance during a keynote at the Black Hat security conference in Las Vegas today. His talk, entitled “Cybersecurity as Realpolitik” was provocative throughout, including advocating that software companies make their unsupported products open source to keep them secure. He even quoted the Code of Hammurabi (circa 1700 B.C.) while suggesting that product liability be applied to source code. “If a builder builds a house for someone, and does not construct it properly, and the house which he built falls in and kills its owner, then the builder shall be put to death,” he said. While the death penalty may be a little severe for software makers who fail to adequately secure their products, criminal and civil liability isn’t, he suggests.

But the highlight of Geer’s talk was definitely his suggestion that the U.S. government own the zero-day market. Zero-day vulnerabilities are security holes in software that are yet unknown to software makers or to antivirus firms. They’re unpatched and unprotected, leaving them open to exploit by spy agencies, criminal hackers, and others.

From Reuters, color them embarrassed:

U.S. Homeland Security contractor reports computer breach

A company that performs background checks for the U.S. Department of Homeland Security said on Wednesday it was the victim of a cyber attack, adding in a statement that “it has all the markings of a state-sponsored attack.”

The computer breach at Falls Church, Virginia-based US Investigations Services (USIS) probably involved the theft of personal information about DHS employees, according to the Washington Post, which first reported the story.

DHS said it had suspended all work with the company amid an investigation by the FBI. A “multi-agency cyber response team is working with the company to identify the scope of the intrusion,” DHS spokesman Peter Boogaard said in a statement.

The Sacramento Bee covers another major embarrassment:

Homeland Security official arrested in sting involving sordid Sacramento Craigslist ad

A Homeland Security employee has been arrested in connection with a sting that alleges he used a Craigslist ad in an effort to get a mother and an underage daughter to have sex with him.

George Hristovski, 54, of Elverta, was booked into Sacramento County Jail on Monday after his arrest by the Federal Bureau of Investigation. His LinkedIn posting identifies him as an inspector for the U.S. Department of Homeland Security.

A federal court filing requesting an arrest warrant for Hristovski said that Placer County Sheriff’s Department detectives noticed an ad on Craigslist on July 14 in the “Casual Encounters” section of the Sacramento area part of the website.

The person who placed the ad sought a mother who wanted a man to teach a daughter about sex. Detectives, posing as a mother and a 13-year-old daughter, corresponded via e-mails with the person who took out the ad.

And from the Guardian, yet another embarrassment:

‘Jedi Council’ sex ring: 171 Australian Defence Force staff disciplined

  • Ten soldiers were sacked and another 161 received censures, warnings, performance counselling or punishment

More than 170 defence personnel were sacked or disciplined over the allegations around the creation and distribution of explicit and degrading emails, including images of a woman having sex which were taken without her knowledge.

In June 2013 the chief of army, Lieutenant General David Morrison, revealed the Australian Defence Force (ADF) was investigating a large number of military personnel who had allegedly created or shared the “explicit, derogatory, demeaning and repugnant” emails. A number of ADF personnel were sacked over the incident, and several were referred to police.

The army has since terminated the service of 10 soldiers ranked from lance corporal to major – six of them in November last year – in response to the ADF investigation into the allegations, and another 161 officers and noncommissioned officers were identified as involved.

From Greek Reporter, austerity blowback:

Greek Armed Forces Protest Merging of Pensions; Prepare For Strike

Members of the Greek armed forces protested in Athens on Wednesday morning against the Greek government’s plans to merge their auxiliary pension funds with others.

According to the president of the Panhellenic Federation of Police Officers, Christos Fotopoulos, Greek police officers are considering going on strike.

“If our demands, which are absolutely reasonable, are not met, the members of Greek armed forces will take the next step” he said during the Greek police officers protest in central Athens on August 6.

And yet another embarrassment, via Bloomberg News:

TSA Checkpoints Vulnerable to Hacks Through Backdoors

The Transportation Security Administration, that guardian of airports for whom we have all shed shoes, jackets, and loose change, has a worrisome safety issue of its own, according to a cyber researcher for Qualys.

Two devices that may be used at airport and other security checkpoints have “backdoors”—usernames and passwords hard-coded into the equipment that a hacker could use to get into the machines, says Billy Rios, in findings he discussed yesterday at the Black Hat security conference in Las Vegas.

Why would a manufacturer create that kind of risk? It’s actually quite common—usually for ease of maintenance, so technicians can get in and service the machine.

From RT, another hack attack:

Smartphone hack: Malware able to steal anything infects 500,000+ devices

Banks should look for new – secure – ways of exchanging information with their clients after the emergence of malicious software which allows criminals to steal passwords and text message security codes from people’s phones, security firm Group-IB warned.

More than 541,000 smartphones running on Android in Russia, Europe and the US are already infected with malware which grants the perpetrators full access to people’s mobile devices, a report by the Moscow-based company said.

The hostile program is distributed through “massive spam on the SMS-messages,” Nikita Kislitsin, head of botnet intelligence at Group-IB, told RT.

And another one from Wired threat level:

Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins

Among all the scams and thievery in the bitcoin economy, one recent hack sets a new bar for brazenness: Stealing an entire chunk of raw internet traffic from more than a dozen internet service providers, then shaking it down for as many bitcoins as possible.

Researchers at Dell’s SecureWorks security division say they’ve uncovered a series of incidents in which a bitcoin thief redirected a portion of online traffic from no less than 19 Internet service providers, including data from the networks of Amazon and other hosting services like DigitalOcean and OVH, with the goal of stealing cryptocurrency from a group of bitcoin users. Though each redirection lasted just 30 second or so, the thief was able to perform the attack 22 times, each time hijacking and gaining control of the processing power of a group of bitcoin miners, the users who expend processing power to add new coins to the currency’s network.

The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces.

From TheLocal.it, really?:

‘Jail pro-anorexia web writers’: Italian MPs

A group of Italian MPs has proposed jail terms and hefty fines for people encouraging eating disorders, an idea rejected as criminalizing mental illness by one organization.

The law put forward would make it a crime to “incite practicing a diet which causes anorexia and bulimia,” Tgcom24 reported.

The multiparty proposal has been put forward by MPs including Michela Marzano, from the ruling Democratic Party (PD), Forza Italia’s Mara Carfagna and Valentina Vezzali from Civic Choice (Scelta Civica).

From TheLocal.it again, isn’t this more worthy of their zeal?:

Italy’s journalists live in fear of mafia threat

Journalists in parts of Italy are being forced to live in fear due to an increase in mafia intimidation of the press, with one journalist in Calabria telling The Local that he was recently given state protection due to “very violent threats” from the mafia.

Journalists in Calabria, the stronghold of the ‘Ndrangheta mafia clan, are most at risk, with 89 out of the every 1,000 members registered with the Order of Journalists, receiving “verbal and physical threats”, according to a study by the research group, Istituto Demoskopika.

The next most under threat are journalists in Basilicata, Sicily, the home of the Camorra, and Campania.

The Independent answers that Cui Bono?:

Google removes links to notorious criminals’ Wikipedia pages

Some of Europe’s most notorious criminals are among those to have successfully sanitised their past, after Google agreed to remove links to content on Wikipedia, it has emerged.

New information released by the Wikimedia Foundation, the organisation behind Wikipedia, today reveals that Google has deleted 50 links to information on the website. It comes in the wake of a controversial European court ruling earlier this year granting people the right to be forgotten.

One of the latest beneficiaries of the ruling is Renato Vallanzasca, a former crime boss who has committed seven murders, three kidnappings and scores of armed robberies. A link to the gang he led in Italy, Banda della Comasina, has also been removed.

And the Telegraph trumpets support:

Information Commissioner defends ‘right to be forgotten’

  • The UK’s data protection watchdog insists that the EU’s Right to be Forgotten legislation is working

The UK’s data protection watchdog has defended the EU’s Right to be Forgotten legislation, claiming that the House of Lords’ criticism of the judgment as “unworkable” is misplaced.

Last month the House of Lords EU Committee published a report claiming that the EU’s Right to be Forgotten is “unworkable and wrong”, and that it is based on out-dated principles.

“We do not believe that individuals should have a right to have links to accurate and lawfully available information about them removed, simply because they do not like what is said,” it said.

After the jump, the latest form Asia, including a texting crackdown, spy busts, and the latest escalations — including some biggies — in the Game of Zones, plus a couple of headlines indicating the End is Nigh. . . Continue reading

American spooks and their role in Gaza


Yet another revelatory report from The Real News Network, this time a discussion between Glenn Greenwald, attorney and journalist who played the leading role in the Pulitzer-winning Snowden reporting by the Washington Post and the Guardian, and TRNN’s Paul Jay.

From The Real News Network:

Greenwald: US Intelligence Enables Israeli Attacks

From the transcript:

JAY: So what do we know about this targeting? If I understand it correctly, the documents that Snowden released aren’t about this particular attack or this specific attack on Gaza, but in the past there’s evidence not only of intelligence sharing, but the word that leaked off the page to me when I was reading your piece was targeting. What do we know about that?

GREENWALD: It’s no secret that the U.S. is the key party enabling Israeli militarism and aggression. In general, it provides, obviously, huge amounts of cash to the Israelis, even in an ongoing attack, such as the one currently taking place in Gaza. The U.S. just in the last week has furnished arms and munitions and grenades to the Israelis that they’re using in the attack.

So our piece focused on the role that the NSA and the intelligence apparatus that the United States has built plays in enabling the Israeli attack. And we revealed some documents showing that the relationship has grown substantially over the last decade between the NSA on the one hand and the Israeli counterpart, the SIGINT National Unit, on the other, in which the NSA provides the Israelis with all kinds of surveillance technology, training, but also lots of data that they collect in the course of doing surveillance that the Israelis then use to target people in Gaza, in the West Bank, and throughout the region, first for surveillance, but then, obviously, also for targeting with violence. And so the U.S. really is at the center of every form of Israeli aggression that takes place in that region.

JAY: Now, we’re led to believe that the American satellites have the capability of actually seeing faces on streets. I mean, one, I guess, do we know whether that’s true? And two, if that level of technology is being transferred, that would mean active, real-time involvement of the U.S. intelligence or U.S. army in Israeli warfare.

GREENWALD: I mean, the Americans share the vast bulk of their surveillance technology and surveillance activities in the region with the Israelis. It’s a very close cooperative sharing arrangement.

I don’t think there’s any question that the Israelis are being reckless and more or less indiscriminate in the violence they’re wreaking on Gaza. I mean, there are Israeli generals who have inadvertently acknowledged, essentially, that they are attacking heavily civilian areas and with their knowledge that lots of civilians are going to be killed. They have targeted UN schools that they knew and that coordinates for which had been provided to them many, many times. And so I don’t think there’s a lot of efforts being undertaken by the Israelis to be very precise or careful in the kinds of people that they’re killing.

JAY: So it’s not so much that they need these real-time face pictures on streets, ’cause they’re bombing all over the place.

GREENWALD: Yeah. I mean, I think they’re interested in knowing the whereabouts of people who are of greatest interest to them. And certainly the sharing arrangement with the U.S. helps them to know where people are, and it helps them to geo-locate them. And use of that technology by both the Israelis and the Americans is something that we’ve been able to document by virtue of the Snowden reporting.

But I think the important point is this is not a careful and precise operation, where they’re targeting people very carefully and then killing only them. They’re engaged in the destruction of entire blocks, blowing up huge apartment buildings and homes. And that’s why the death toll of innocent people has been so high.

InSecurityWatch: Hacks, hackery, spooks, zones


And so much more.

We begin today’s collection of tales from the world of spooks, corporate voyeurs, militarism, and the constantly escalating Asian Games of Zones on as rare upbeat note, the story of a woman whose unrelenting struggle for truth in a dark war by secret police has led to a major, tearful victory.

From BBC News:

Argentina Plaza de Mayo activist finds ‘stolen grandson’

Estela de Carlotto promised to carry on searching for other “stolen children”

An Argentine activist who searches for people who were snatched as babies by the 1970s military junta has found her own grandson.

Estela de Carlotto said finding her grandson, a victim of the practice, was “reparation” for her and for Argentina. She said he had come forward for DNA testing because he had doubts about his own identity.

The junta snatched hundreds of babies from their opponents and gave them to sympathisers to bring up.

And an interview with de Carlotto via Journeyman Pictures:

Estela Carlotto On Searching For Abducted Grandson

Program notes:

Missing Generation: Today Estela Carlotto, the leader of Argentina’s famous Grandmothers of the Plaza de Mayo, finally meets her grandson. Filmed over a decade ago in the powerful documentary ‘Missing Generation’, Estela expressed her hope that one day she would embrace her kidnapped grandson.

It has been 36 years since Estela Carlotto’s pregnant daughter was abducted and murdered by the Argentine military dictatorship.

These clips show the incredible resolve fuelling Estela’s search for the disappeared before she found her grandson. “I don’t want to die without having had him in my arms”, she says. “I believe this is a dream that will never abandon me. I’m faithful, I do have hope.”

‘Missing Generation’ tells the haunting tale of families torn apart by Argentina’s brutal military dictatorship. During the reign of the junta, thousands of men, women and children simply disappeared. Parents lost their children; orphans were forced into unknown and uncaring families. Estela is head of the Grandmothers of the Plaza de Mayo, an internationally renowned charity that tries to find missing children. Since 1979, her unending work has found just 23. She too, suffers the absence of her murdered daughter and missing grandson, but also of her husband. Her work is motivated by the desire not to die, like her husband, never having known her grandson “He is here. In every corner. But physically I have lost him”, she chokes. “What keeps me going is an affection that transcends death”.

The full documentary is available here.

And now back to the SOS [in both sense of that acronym, first from the McClatchy Washington Bureau:

Senate Intelligence Committee members protest administration deletions to CIA torture report

Senate Intelligence Committee members protested Tuesday over the Obama administration’s censorship of a report on the CIA’s use of “brutal” interrogation methods, charging that the deletions hid key facts and blacked out information that was made public years ago.

The senators raised their objections to the redactions in emailed statements sent within minutes of each other, indicating a coordinated effort to drive home their anger and further highlighted the serious frictions between the Democratic administration and Democrat-run panel that oversees the 17 U.S. intelligence agencies.

Relations between the committee and the CIA also have soured over the agency’s admission last week that it had broken into a computer database that by agreement was supposed to have been accessed only by the panel staffers who compiled the report.

From the Guardian, California’s plutocratic senator’s outrage affirmed as the ornamental variety:

Shrewd Feinstein shows restraint in bid to reverse CIA torture report redactions

  • Chair of the Senate intelligence committee has yet to demand John Brennan’s resignation – and it could help her cause

As the Senate intelligence committee continues its battle to declassify evidence of CIA torture, two members of the panel have called for Director John Brennan’s head. Not among them is the committee chairwoman, and her restraint is striking observers as a shrewd strategic move.

Senator Dianne Feinstein, a California Democrat typically inclined to defend the intelligence agencies she oversees, has drawn a line short of demanding Brennan resign in the wake of a CIA inspector general report released last week that found five agency officials breached a network firewall and accessed emails of committee staffers investigating torture. Whatever her intent – Feinstein’s office would not field questions on the subject – her restraint has benefits for her effort over the coming weeks to roll back CIA redactions to her committee’s forthcoming report.

As much as the agency has no choice but to do business with its lead Senate overseer, “by withholding that demand, I think she has kept open the possibility of negotiating the further disclosures,” said Steven Aftergood, a longtime intelligence observer at the Federation of American Scientists.

From Techdirt, that good ol’ ever-profitable revolving door/cash cow spins out another tanker-load of cream:

Ex-NSA Boss Defends Patenting His Totally Brand New, Not Developed On Gov’t Time, Patent-Pending Cybersecurity Brilliance

  • from the yeah-that’s-believable dept

We recently wrote about Keith Alexander claiming that he’s worth as much as $1 million a month (actually, the number is now being lowered to $600k) because he’s magically come up with a totally brand new anti-hacking concept that will have many patents. As we noted, this story raised all sorts of questions. First, if he had such a brilliant idea to stop hackers, why didn’t he use it back when he was in charge of the NSA and the US Cyber Command? His answer to that was that he magically came up with it after he left office in March. Of course, if that’s the case, it’s difficult to see how it can be worth many hundreds of thousands of dollars per month because it’s a totally untested and totally brand new idea. He can’t both be claiming that his years of NSA experience make it worthwhile and that this idea has nothing to do with his work at the NSA — but he seems to be doing exactly that.

Either way, he’s given an interview to the Associated Press in which he tries (and fails) to defend himself concerning the new operation, IronNet Cybersecurity:

“If I retired from the Army as a brain surgeon, wouldn’t it be OK for me to go into private practice and make money doing brain surgery?” he asked. “I’m a cyber guy. Can’t I go to work and do cyber stuff?”

The “brain surgery” analogy is not even close to be analogous. This is more like he was the administrator of an army hospital who has now retired and says, despite never having personally done a brain surgery, he’s now invented a miraculous new way to do brain surgeries so powerful people have only dreamed of them before. Naturally, most people should be skeptical of such claims.

From BuzzFeed, Orwellian rhetoric a Tea Partyer might endorse:

Government Declares Undocumented Immigrant Child, Mother A “National Security Threat”

  • Homeland Security attorneys are using a Bush-era Department of Justice ruling in opposing bond requests by undocumented immigrants at a New Mexico facility.

The Obama administration is using a Bush-era decision by former Attorney General John Ashcroft to classify the flood of undocumented immigrants that have hit the southern border as a “national security threat” in an effort to deny them bond during immigration status hearings.

Immigration attorneys said the argument, based on a 2003 decision by Ashcroft, has been employed against undocumented immigrant mothers with children being held at the Artesia, New Mexico, detention facility.

The nation’s immigration courts are overseen by the Department of Justice, and the attorney general has the authority to rule on any appeal of a case before it can be taken to the judicial system for review.

More Orwelliianism from the Center for Public Integrity:

Nuclear weapons lab employee fired after publishing scathing critique of the arms race

  • Los Alamos lets a 17-year employee go after retroactively classifying his published article

James E. Doyle’s ordeal with Washington began one morning in early February last year, when his supervisor stopped by his desk at Los Alamos National Laboratory and told him that senior managers wanted copies of all his publications.

The 55-year-old political scientist asked the reason for the request, and he eventually was told that someone at the House Armed Services Committee wanted to see the publications. But Doyle said officials refused to tell him who it was or why.

Later that day at the lab’s New Mexico campus, he said, two members of a Security Inquiries Team abruptly arrived with a special, silver-colored briefcase for secure documents, and pulled out an article he published a few days earlier on the website of a London nonprofit group.

They claimed that the article, an impassioned critique of the political theories undergirding the nuclear arms race and a defense of President Obama’s embrace of a nuclear weapons-free future, contained classified information.

From the San Francisco Chronicle, their deepest regrets:

San Jose police: We regret secrecy about drone

San Jose police officials said Tuesday that they “should have done a better job of communicating” with the public about the department’s recent purchase of a drone that hasn’t yet taken to the skies.

Officials released a statement a week after they came under fire from civil rights activists for not informing the public of the device either before or after its purchase in January.

On Tuesday, the department said it will create a community outreach plan before deploying the unmanned aircraft system.

San Jose police bought the drone for just under $7,000 in federal grant money to help the bomb squad assess threats and inspect explosives, officials said.

And from Jacobin, an all-too-familiar story:

Another Professor Punished for Anti-Israel Views

  • Pro-Israel forces have consistently been on the wrong side of the academic freedom debate.

Until two weeks ago, Steven Salaita was heading to a job at the University of Illinois as a professor of American Indian Studies. He had already resigned from his position at Virginia Tech; everything seemed sewn up. Now the chancellor of the University of Illinois has overturned Salaita’s appointment and rescinded the offer. Because of Israel.

The sources familiar with the university’s decision say that concern grew over the tone of his comments on Twitter about Israel’s policies in Gaza….

For instance, there is this tweet: “At this point, if Netanyahu appeared on TV with a necklace made from the teeth of Palestinian children, would anybody be surprised? #Gaza.” Or this one: “By eagerly conflating Jewishness and Israel, Zionists are partly responsible when people say antisemitic shit in response to Israeli terror.” Or this one: “Zionists, take responsibility: if your dream of an ethnocratic Israel is worth the murder of children, just fucking own it already.”

From BBC News the governmental-corporate panopticon strikes again:

Microsoft tip leads to child porn arrest in Pennsylvania

A tip-off from Microsoft has led to the arrest of a man in Pennsylvania who has been charged with receiving and sharing child abuse images.

It flagged the matter after discovering that an image involving a young girl had been allegedly saved to the man’s OneDrive cloud storage account.

According to court documents, the man was subsequently detected trying to send two illegal pictures via one of Microsoft’s live.com email accounts.

From SecurityWeek, the panopticon Down Under:

Australia PM Says New Terror Laws Will Not Invade Privacy

Australian Prime Minister Tony Abbott on Wednesday defended tough new terror laws under which digital data will be retained for up to two years, denying it is an invasion of privacy.

The government plans to overhaul laws to make it easier to arrest and prosecute terrorists and make it an offense to travel to designated hotspots overseas without a valid reason.

It has also substantially increased resources to security and intelligence agencies and wants telecommunications companies to retain metadata for up to two years.

“They’re not invading privacy,” Abbott told the Australian Broadcasting Corporation of the proposed laws which were announced Tuesday.

Ditto from Deutschland, via Deutsche Welle:

German agencies pinpoint cell phone users via SMS

German police and intelligence agencies are increasingly using “silent” SMS messages to localize cell phones, unbeknownst to their users. Details have emerged in a government answer to a parliamentary question.

Four of Germany’s agencies sent more than 150,000 “silent” short-service-messages (SMS) to trace mobile phone users in the first half of this year, according to a disclosure published on Wednesday by the German federal government.

It was replying to a formal question lodged by the opposition leftist parliamentary group in Germany’s Bundestag federal parliament in Berlin at a time when government officials are increasingly focused on their own anti-spying protection.

So-called “silent” or empty SMSs are not displayed on cell phones, but, when sent en masse to a single device, an agency can pinpoint the location of the user and observe his or her geographical movements within the mobile phone network.

From TheLocal.fr, brownshirts go to camp:

Commando camps sound alarm bells in France

The emergence of a video posted on the website of a notorious French far-right activist, showing commando training camps in a forest near Paris has caused a fair bit of concern among France’s Socialist Party.

French newspaper Le Canard Enchainé revealed on Wednesday that the Socialist Party is deeply worried over commando training camps, videos of which appeared on the website of far-right polemicist Alain Soral.

According to the site the courses are aimed at helping participants become a “responsible citizen” but rather than being like a scouts training camp, a video posted on Soral’s website “Egalité et Réconciliation”(equality and reconciliation) shows “students” engage in combat, using knives and firearms.

From PCWorld, digital Alzheimer’s?:

Wikimedia: Right to be forgotten results in ‘Internet riddled with memory holes’

Google has removed over 50 links to Wikipedia from its search results on European domains as a consequence of the EU’s “right to be forgotten” ruling which, according to Wikimedia, “punches holes in free knowledge.”

The foundation behind Wikipedia last week started receiving notices that certain links to Wikipedia content would no longer appear in search results served to people in Europe, Wikimedia’s general counsel Geoff Brigham and legal counsel Michelle Paulson wrote in a blog post Wednesday.

The links to Wikipedia were removed as a direct result of a May ruling by the Court of Justice of the European Union (CJEU). The decision gave EU citizens the right to compel search engines to remove results for queries that include a person’s name, if the results are “inadequate, irrelevant or no longer relevant, or excessive.”

After the jump, the Asian Game of Zones amps us across a wide front, from missiles to media gambits and hardening divisions, plus yet another proof that our minds are more susceptible to subtle suasion than we might like to admit. . . Continue reading

Bellicose bullshit: Phony pretexts for war


From Breaking the Set, Abby Martin looks at the bizarre pretexts used for launching wars, with her focus on the 50th anniversary of the Gulf of Tonkin incident, the pretext seized by the Lundon Johnson administration to dramatically escalate America’s role in the war that would end with the nation’s first major military defeat.

It’s a timely reminder that citizens should turn a very skeptical ear to the explanations offered by politicians for slaughtering other people, something folks have a hard time remembering when the rhetoric amps up.

From Breaking the Set:

Top 5 Most Absurd Pretexts for War in Modern History | Brainwash Update

Program notes:

Abby Martin remarks on the 50th Anniversary of the Gulf of Tonkin incident, going a few of the most absurd pretexted for war in modern history.