Category Archives: Warfare

InSecurityWatch: Liars, spyers, bluffs, triers


Today’s collection of tales from the dark side begins with actions that in some other countries might be considered treasonous.

From the Guardian:

CIA admits to spying on Senate staffers

  • CIA director apologises for improper conduct of agency staff
  • One senator calls on John Brennan to resign in wake of scandal

The director of the Central Intelligence Agency, John Brennan, issued an extraordinary apology to leaders of the US Senate intelligence committee on Thursday, conceding that the agency employees spied on committee staff and reversing months of furious and public denials.

Brennan acknowledged that an internal investigation had found agency security personnel transgressed a firewall set up on a CIA network, which allowed Senate committee investigators to review agency documents for their landmark inquiry into CIA torture.

Among other things, it was revealed that agency officials conducted keyword searches and email searches on committee staff while they used the network.

The London Daily Mail has the inevitable mea culpa:

CIA director apologizes after government spooks snooped on US Senate computers

  • John Brennan said he’s investigating the CIA employees who hacked into Senate Intelligence Committee PCs
  • CIA created a fake user account to retrieve documents they believed Senate staffers had improperly accessed
  • Department of Justice has no plans to prosecute anyone

And from The Hill, a reasonable call:

Senators call for CIA chief’s resignation

Pressure is building on CIA Director John Brennan to resign following the agency’s admission Thursday that it spied on the computers of Senate staffers.

Two members of the Senate Intelligence Committee called for Brennan’s resignation on Thursday after a classified briefing on an agency watchdog report that concluded five CIA staffers had “improperly accessed” Senate computers.

Sen. Mark Udall (D-Colo.) became the first senator to make the call when he issued a statement declaring that he had “no choice but to call for the resignation of CIA Director John Brennan.”

“The CIA unconstitutionally spied on Congress by hacking into Senate Intelligence Committee computers,” he said.

More details from the Associated Press:

Leaked White House file addresses ‘torture by CIA’

The State Department has endorsed the broad conclusions of a harshly critical Senate report on the CIA’s interrogation and detention practices after the 9/11 attacks that accuses the agency of brutally treating terror suspects and misleading Congress, according to a White House document.

“This report tells a story of which no American is proud,” says the four-page document, which contains the State Department’s preliminary proposed talking points in response to the classified Senate report, a summary of which is expected to be released in the coming weeks.

“But it is also part of another story of which we can be proud,” adds the document, which was circulating this week among White House officials and which the White House accidentally e-mailed to an Associated Press reporter. “America’s democratic system worked just as it was designed to work in bringing an end to actions inconsistent with our democratic values.”

Still more from Techdirt:

CIA Torture Report Reveals That State Department Officials Knew About Torture; Were Told Not To Tell Their Bosses

  • from the loose-lips-stop-war-crimes dept

We continue to wait and wait for the White House to finish pouring black ink all over the Senate’s torture report, before releasing the (heavily redacted) 480-page executive summary that the Senate agreed to declassify months ago. However, every few weeks it seems that more details from the report leak out to the press anyway. The latest is that officials at the State Department were well aware of the ongoing CIA torture efforts, but were instructed not to tell their superiors, such that it’s likely that the top officials, including Secretary of State Colin Powell, may have been kept in the dark, while others at the State Department knew of the (highly questionable) CIA actions.

A Senate report on the CIA’s interrogation and detention practices after the 9/11 attacks concludes that the agency initially kept the secretary of state and some U.S. ambassadors in the dark about harsh techniques and secret prisons, according to a document circulating among White House staff.

The still-classified report also says some ambassadors who were informed about interrogations of al-Qaida detainees at so-called black sites in their countries were instructed not to tell their superiors at the State Department, the document says.

Still more from the Guardian:

CIA initially ‘kept Colin Powell in the dark’ about torture practices

  • It’s not entirely clear exactly which US officials knew about the practices at the time they began, a Senate report concludes

A Senate report on the CIA’s interrogation and detention practices after the 9/11 attacks concludes that the agency initially kept the secretary of state and some US ambassadors in the dark about harsh techniques and secret prisons, according to a document circulating among White House staff.

The still-classified report also says some ambassadors who were informed about interrogations of al-Qaida detainees at so-called black sites in their countries were instructed not to tell their superiors at the State Department, the document says.

The 6,300-page Senate report on the CIA’s interrogation program has been years in the making. The findings are expected to reveal additional details about the CIA’s program and renew criticisms that the US engaged in torture as it questioned terrorism suspects after the 2001 attacks.

From Wired threat level, Keeping us ignorant:

U.S. Marshals Seize Cops’ Spying Records to Keep Them From the ACLU

A routine request in Florida for public records regarding the use of a surveillance tool known as a stingray took an extraordinary turn recently when federal authorities seized the documents before police could release them.

The surprise move by the U.S. Marshals Service stunned the American Civil Liberties Union, which earlier this year filed the public records request with the Sarasota, Florida, police department for information detailing its use of the controversial surveillance tool.

Stingrays, also known as IMSI catchers, simulate a cellphone tower and trick nearby mobile devices into connecting with them, thereby revealing their location. A stingray can see and record a device’s unique ID number and traffic data, as well as information that points to its location. By moving a stingray around, authorities can triangulate a device’s location with greater precision than is possible using data obtained from a carrier’s fixed tower location.

And from Techdirt, in cyberspace nobody can hear you scream:

Court Says Who Cares If Ireland Is Another Country, Of Course DOJ Can Use A Warrant To Demand Microsoft Cough Up Your Emails

  • from the say-what-now? dept

A NY judge has ruled against Microsoft in a rather important case concerning the powers of the Justice Department to go fishing for information in other countries — and what it means for privacy laws in those countries. As you may recall, back in April, we wrote about a magistrate judge first ruling that the DOJ could issue a warrant demanding email data that Microsoft held overseas, on servers in Dublin, Ireland. Microsoft challenged that, pointing out that you can’t issue a warrant in another country. However, the magistrate judge said that this “warrant” wasn’t really a “warrant” but a “hybrid warrant/subpoena.” That is when the DOJ wanted it to be like a warrant, it was. When it wanted it to be like a subpoena, it was.

Microsoft fought back, noting that the distinction between a warrant and a subpoena is a rather important one. And you can’t just say “hey, sure that’s a warrant, but we’ll pretend it’s a subpoena.” As Microsoft noted:

This interpretation not only blatantly rewrites the statute, it reads out of the Fourth Amendment the bedrock requirement that the Government must specify the place to be searched with particularity, effectively amending the Constitution for searches of communications held digitally. It would also authorize the Government (including state and local governments) to violate the territorial integrity of sovereign nations and circumvent the commitments made by the United States in mutual legal assistance treaties expressly designed to facilitate cross-border criminal investigations. If this is what Congress intended, it would have made its intent clear in the statute. But the language and the logic of the statute, as well as its legislative history, show that Congress used the word “warrant” in ECPA to mean “warrant,” and not some super-powerful “hybrid subpoena.” And Congress used the term “warrant” expecting that the Government would be bound by all the inherent limitations of warrants, including the limitation that warrants may not be issued to obtain evidence located in the territory of another sovereign nation.

Off to Germany and humor with serious intent from the Guardian:

Bug spotting: Germans hold ‘nature walks’ to observe rare NSA spy

  • Weekly walks from Griesheim to nearby US Dagger Complex lead way in multi-generational protest against digital surveillance

One morning last July, the German intelligence service knocked on Daniel Bangert’s door. They had been informed by the US military police that Bangert was planning to stage a protest outside the Dagger Complex, an American intelligence base outside Griesheim in the Hesse region. Why hadn’t he registered the protest, and what were his political affiliations? they asked.

Bangert explained that he wasn’t planning a protest and that he didn’t have any links to political groups. All he had done was put a message on Facebook inviting friends to go on a “nature walk” to “explore the endangered habitat of NSA spies”. Eventually, the agents left in frustration.

Twelve months later, Bangert’s nature trail has not only become a weekly ritual in Griesheim, but also the frontrunner of a new multi-generational German protest movement against digital surveillance.

RT covers another German NSA-related story:

Germany rolls out surveillance-proof phone after NSA spying debacle

Program notes:

Germany is looking to take-on the NSA on its own ground – technology. It has come up with a cell phone which is claimed to be spy-proof. RT’s Peter Oliver talks to Karsten Nohl, crypto specialist, Security Research Labs.

And from the Guardian, a new lower profile:

NSA keeps low profile at hacker conventions despite past appearances

  • Though agency actively recruits security engineers and experts, NSA chiefs won’t speak at Black Hat or Def Con this year

As hackers prepare to gather in Las Vegas for a pair of annual conventions, the leadership of the National Security Agency won’t make the trek.

While the technically sophisticated US surveillance entity has often mingled in recent years with some of the world’s elite engineers and digital security experts at Black Hat and Def Con, Admiral Mike Rogers and Rick Ledgett, the newly minted director and deputy director of the agency, won’t prowl the Mandalay Bay and Rio hotel-casinos this year.

Vanee Vines, a spokeswoman for the NSA who confirmed Rogers and Ledgett’s absences, said she was unaware of any invitations the hacker conferences extended to NSA officials, and did not know if staffers would attend, either.

From BBC News, a whistleblower’s uncertain fate:

Snowden’s temporary asylum status expires in Russia

Fugitive US whistleblower Edward Snowden’s year-long leave to stay in Russia has expired without confirmation that it will be extended.

His lawyer said he could stay in the country while his application for an extension was being processed.

The man who exposed US intelligence practices to the world’s media won leave to remain in Moscow a year ago.

From the London Telegraph, a Cold War tradition continues:

Vienna named as global spying hub in new book

  • Vienna is the world leader in espionage with at least 7,000 spies plying their trade in the Austrian capital

Its reputation as a centre of espionage long predates its notoriety as the setting for the 1949 film The Third Man but only now can a figure be put on the number of spies operating in Vienna.

A survey compiled by experts in spying activities in the Austrian capital shows that at least 7,000 agents work undercover in the city.

As neutral country, Vienna was a Cold War spying hub where both sides were able to ply their trade and openly dealt with each other. Its allure was explained in the opening sequence in the Third Man when the narrator observed that Vienna allows agents a free run: “We’d run anything if people wanted it enough, and had the money to pay.”

From EurActiv, secrecy in the interest of corporadoes and banksters:

EU Ombudsman demands more TTIP transparency

The European Ombudsman today (31 July) opened two investigations into the EU Council and Commission over a lack of transparency around the Transatlantic Trade and Investment Partnership (TTIP).

Emily O’Reilly investigates complaints about maladministration in the EU institutions. She called on both Council and Commission to publish EU negotiating directives related to the EU-US trade deal, and take measures to ensure timely public access to TTIP documents, and stakeholder meetings.

It is a blow to the Commission, which has regularly protested that the talks are the most open ever held. MEPs, pressure groups, unions and other organisations have said that they are not transparent enough.

RT covers a symbolic hack:

Anonymous ‘knocks out’ Mossad website over Israel’s Gaza offensive

Hacker group Anonymous has reportedly taken down the website of the Israeli secret service Mossad in protest of Israel’s military incursion in Gaza. The ‘hacktivists’ have already targeted a number of organizations in their mission to stop the “genocide.”

Mossad’s website went offline at around 00:40 GMT and is still down at the time of writing. The Israeli government has yet to make any comment on the supposed hack attack.

In a previous attack on Monday, Anonymous knocked out multiple Israeli government sites after one of the organization’s members died in the West Bank over the weekend. 22-year-old Tayeb Abu Shehada was killed during a protest in the village of Huwwara in the West Bank after Israeli settlers and soldiers opened fire on demonstrators, reported Bethlehem-based Ma’an News Agency.

Off to Asia and still more NSA-directed ire — this time from India. Via the Hindu:

Sushma confronts Kerry with snooping

In India’s strongest statement on the issue yet, External Affairs Minister Sushma Swaraj called the U.S. surveillance of Indian entities “unacceptable”, and said she had taken up the issue of “snooping” by the National Security Agency (NSA) with Secretary of State John Kerry during the India-U.S. strategic dialogue here on Thursday.

“I did raise the snooping issue with Mr. Kerry,” Ms. Swaraj told presspersons at a joint press conference. “I told him that people in India were angry. I told him that since we are friendly nations, it is not acceptable to us.”

In reply, Mr. Kerry said, “We do not discuss intelligence matters in public. We value our relationship with India. President [Barack] Obama has undertaken a unique and unprecedented review of our intelligence.”Ms. Swaraj said India and the U.S. had now hit a “new level” in their relationship.

From the Associated Press, adding some spin, the latest from a militarized Thailand:

Thai junta appoints army-dominated legislature

Thailand’s junta has appointed a military-dominated interim legislature in another step in the slow return of promised electoral democracy. The junta announced Thursday night that King Bhumibol Adulyadej has officially endorsed the appointments.

The junta, which took power on May 22, announced a timetable a month ago for the gradual return to nominally civilian rule, culminating in a general election late next year.

Just over half of the 200 members of the interim legislature, formally known as the National Legislative Assembly, hold military ranks, and 11 are police. It is to convene on Aug. 7 and is to nominate an interim prime minister. The junta, officially called the National Council for Peace and Order, has already given itself what amounts to supreme power over political developments.

Want China Times draws a trans-Pacific line:

Canada has to pick between China and the US

Former Canadian ambassador to Beijing David Mulroney said recently that the intensifying relationship between Canada and China has been seen in both a positive and a negative light in his country.

Mulroney said that although the economic and trade relationship between the two countries has improved since 2012, especially in light of Canada’s increased uranium exports to China, and a memorandum of understanding on cooperation in agricultural technologies and agricultural trade signed during agricultural minister Gerry Ritz’s trip to Beijing in June of this year and the additional trade service offices that Canada plans to set up in China, boosting the number from four to 15, suspicion between the two countries is on the rise.

The Canada-China Foreign Investment Promotion and Protection Agreement, which has already been ratified by Beijing, is yet to be adopted by the Canadian government pending a legal challenge. The intensifying strategic contest between the US and China in the Asia-Pacific is also putting a damper on the Sino-Canadian economic and trade relationship.

From Xinhua, another trans-Pacific tension:

China accuses U.S. over military reconnaissance

China’s Defense Ministry on Thursday accused the United States of regular reconnaissance by naval ships and aircraft in Chinese waters and airspace.

“Vessels and aircraft of the U.S. military have for a long time carried out frequent reconnaissance in waters and airspace under Chinese jurisdiction, which seriously affects China’s national security and could easily cause accidents,” spokesman Geng Yansheng said at a monthly briefing.

His comments came in response to a question regarding a Chinese naval ship’s sailing in areas near the ongoing U.S.-organized RIMPAC (Exercise Rim of the Pacific) maritime exercise.

From South China Morning Post, a military concomitant:

Millions of Hong Kong fliers delayed by mainland military restrictions

  • About 100,000 flights using Chek Lap Kok each year have up to 20 minutes added to flight time thanks to height restrictions, analysis shows

About 100,000 flights carrying almost 15 million passengers to and from Hong Kong airport each year are affected by military airspace restrictions, analysis of official civil aviation data shows.

Environmental group Green Sense and the Airport Development Concern Network revealed their analysis yesterday, pointing out that a so-called “sky wall” imposed by the PLA was extending flight times by between 10 and 20 minutes.

“We found that, between 2010 and 2012, about 30 per cent of planes needed to fly through this ‘sky wall’. It is not the 23 per cent the Airport Authority has claimed,” network spokesman Michael Mo said.

From NHK WORLD, a pointed gesture:

Japan’s GSDF, Australian troops plan joint drills

Japan’s Ground Self-Defense Force will hold a disaster-preparedness drill with US and Australian forces in northeastern Japan in November.

Chief of Staff Kiyofumi Iwata of the Ground Self-Defense Force made the announcement at a news conference on Thursday.

Iwata said Japanese, US, and Australian troops will simulate a response to a massive earthquake in Miyagi Prefecture and other areas for 4 days starting from November 6th.

And a vulnerability reminder from WIRED:

Hackers Can Control Your Phone Using a Tool That’s Already Built Into It

A lot of concern about the NSA’s seemingly omnipresent surveillance over the last year has focused on the agency’s efforts to install back doors in software and hardware. Those efforts are greatly aided, however, if the agency can piggyback on embedded software already on a system that can be exploited.

Two researchers have uncovered such built-in vulnerabilities in a large number of smartphones that would allow government spies and sophisticated hackers to install malicious code and take control of the device.

The attacks would require proximity to the phones, using a rogue base station or femtocell, and a high level of skill to pull off. But it took Mathew Solnik and Marc Blanchou, two research consultants with Accuvant Labs, just a few months to discover the vulnerabilities and exploit them.

Plus a puzzler from TMZ:

Hollywood Cops, Prosecutors Stumped Over Drones

Hollywood cops and prosecutors want to go after a guy who flew a drone over the Hollywood police dept., but we’ve learned they’re stumped.

Law enforcement sources tell TMZ … several people have become a thorn in the side of the LAPD — trying to expose what they claim are police misdeeds.  One of them flew a drone over the Hollywood Division Tuesday afternoon, shooting video of the parking lot with prisoners and undercover officers.

The parking lot is shielded by a wall for security reasons — so it’s not visible from the street.

We’re told police detectives and lawyers from the L.A. County D.A. and the L.A. City Attorney had a meeting to figure out what criminal laws might have been violated, but they concluded as long as the drone flies lower than 400 feet … there’s nothing they can do.  Anything above is covered by the FAA.

For our final item, cross-border security hypocrisy from the Washington Post:

House GOP leaders spike border bill rather than see it defeated

House Republican leaders were ambushed by another conservative insurrection on Thursday, forced to scrap a pivotal vote on a border security bill and scramble to find a solution amid a familiar whirlwind of acrimony and finger-pointing.

The failure to move forward with legislation aimed at coping with a surge of unaccompanied minors at the U.S.-Mexico border left Republicans unable to act on a problem that they have repeatedly described as a national crisis. As the drama unfolded in the House, the Senate also failed to advance legislation to address the immigration crisis, unable to overcome a procedural hurdle and then leaving town for five-week summer break.

The congressional chaos ensured that President Obama’s administration will not have the resources necessary to stem the recent tide of tens of thousands of migrants from Central America, many of them children entering the United States alone, until mid-September at the earliest. The only two significant measures approved by Congress as of Thursday were bills authorizing broad reforms at the Department of Veterans Affairs and a nine-month -extension of federal highway-construction funding.

InSecurityWatch: Pols, ploys, snoops, zones


Today’s collection of tales from the dark side begins with more symbol than substance, via the Guardian:

Obama-backed surveillance reform bill introduced in US Senate

  • Patrick Leahy’s popular bill contains stricter privacy measures than the USA Freedom Act, which the House passed in May

A surveillance reform bill backed by the Obama administration was introduced in the Senate on Tuesday, raising the possibility that Congress could this year take the National Security Agency out of the business of collecting and storing all US phone data.

Introduced by Senator Patrick Leahy, the bill is a counterpart to the USA Freedom Act, which the House of Representatives passed in May, but contains some stricter privacy measures and broader transparency requirements – the absence of which caused civil libertarians, privacy groups and technology firms to abandon their support for the House version. Many of them are backing Leahy’s bill.

The question underlying the legislation is “whether we are in control of our own government or the other way around,” Leahy, the chairman of the Senate judiciary committee, said on the Senate floor.

From Truthdig, and why are we not surprised?:

NSA Court Judges Invest in Verizon While Surveillance Warps Law and Journalism

We must never be surprised when we learn once again that our lawmakers and law interpreters are in bed with the country’s largest corporations—this is how the American government now operates. A July 25 article in Vice includes documentation that shows three judges from the Foreign Intelligence Surveillance Act Court, the tribunal that evaluates the legality of the NSA’s practices, own stock in Verizon. Although there doesn’t seem to be a direct financial incentive for judges to allow the NSA to rifle through the data (our data) of a company in which they have invested, it does show the intimate relationship the NSA, the FISA Court and Verizon share.

Specifically, the article states: “On May 28 last year, Judge James Zagel, a FISA Court member since 2008, purchased stock in Verizon. In June of this year, Zagel signed off on a government request to the FISA Court to renew the ongoing metadata collection program.” The piece goes on to say that FISA Court Judges Susan Wright and Dennis Saylor also own shares in the company, and although Vice wasn’t able to obtain accurate numbers for the amount invested, it appears to be in the thousands of dollars.

The Vice article notes that judges are supposed to remove themselves from cases in which they might have a “financial stake in the outcome” or from any case in which they might find it difficult to be impartial. The Verge also pointed out that telecommunication companies like Verizon receive millions of dollars from the government in their “record-sharing deals.”

From Wired threat level, a question about California’s plutocratic and most powerful Democrat and Senate Select Committee on Intelligence chair:

Personal Privacy Is Only One of the Costs of NSA Surveillance

There is no doubt the integrity of our communications and the privacy of our online activities have been the biggest casualty of the NSA’s unfettered surveillance of our digital lives. But the ongoing revelations of government eavesdropping have had a profound impact on the economy, the security of the internet and the credibility of the U.S. government’s leadership when it comes to online governance.

These are among the many serious costs and consequences the NSA and those who sanctioned its activities—including the White House, the Justice Department and lawmakers like Sen. Dianne Feinstein—apparently have not considered, or acknowledged, according to a report by the New America Foundation’s Open Technology Institute.

“Too often, we have discussed the National Security Agency’s surveillance programs through the distorting lens of a simplistic ‘security versus privacy’ narrative,” said Danielle Kehl, policy analyst at the Open Technology Institute and primary author of the report. “But if you look closer, the more accurate story is that in the name of security, we’re trading away not only privacy, but also the U.S. tech economy, internet openness, America’s foreign policy interests and cybersecurity.”

And a reminder of Feinstein’s nature, this time as vulture capitalist via Pueblo Lands:

Richard Blum and Dianne Feinstein Make Big Investment in Foreclosure to Rental Housing

I’ve reported for a while now on the phenomenon of the Wall Street landlord. During the depths of the foreclosure crisis private equity firms and real estate investors bought up thousands of single family homes in Florida, Illinois, Arizona, Georgia, and especially California. These investors did quick rehabs on these properties and then rented them out, often to households that lost their homes between 2008 and 2013 due to the global financial crash. These elite investors bet that housing prices would rebound, and thanks to the actions of the US Federal Reserve and Treasury Department they did. They also bet that there would be a shift in America’s housing market toward more renter demand. Households that lost their savings and jobs have been forced into the rental market, creating an opportunity for those with capital to obtain higher returns on real estate.

One of the biggest investors in foreclosed single family homes has been Colony Capital, the private equity firm controlled by Thomas Barrack, Jr. Colony has purchased thousands of foreclosed houses in California and other states. Colony has also sustained recent complaints from tenants who accuse the company and its rental property managers of running slum housing and charging above-market rents. Activists in Los Angeles and other cities are now pressing local and federal officials to take a closer look at the Wall Street landlord business.

But some Washington D.C. insiders have already done due diligence with respect to the new corporate landlords. A recent financial disclosure filing by Richard C. Blum, husband of California Senator Dianne Feinstein, shows that Blum and Feinstein have made a major investment in Barrack’s Colony American Homes. As a member of the University of California Board of Regents Blum is required to disclose his economic interests each year. In his filing for 2014, Blum listed an investment in Colony American Homes Holdings, LP of over $1,000,000, making Blum and Feinstein major owners of one of the largest Wall Street landlord corporations.

From SECURITYWEEK, another cost of Big Brotherism run amok:

NSA Surveillance Programs Directly Damage Internet Security: Report

  • “The NSA has both weakened overall trust in the network and directly harmed the security of the Internet.”

A report published by the New America Foundation’s Open Technology Institute on Tuesday details the impact of NSA surveillance activities on the United Sates economy, foreign policy and Internet security.

There have been numerous discussions on the intelligence agency’s controversial spying programs over the past year, ever since former NSA contractor Edward Snowden started leaking classified information obtained from the organization’s systems. However, the Open Technology Institute argues that most discussions have revolved around the impact of surveillance programs on privacy and civil liberties, and not so much on how they affect the interests of the United States and the global Internet community.

The 64-page paper focuses on the costs to cybersecurity, the direct economic costs to U.S businesses, the economic and technological costs of data localization and data protection proposals, and political costs to American foreign policy.

Motherboard adds up other costs:

NSA Spying Will Cost US Tech Titans Billions, and That’s Just the Start

The National Security Agency spying scandal will cost the US technology and telecommunications industries billions of dollars in coming years if potential clients—including corporations and governments—take their business elsewhere following revelations of rampant US surveillance, according to a new study.

The financial cost to US corporate giants like IBM, Microsoft, Oracle, AT&T and Verizon is just the tip of the iceberg.

The NSA spying scandal, which was prompted by former NSA contractor Edward Snowden’s disclosure of classified documents, has already harmed US foreign policy efforts, jeopardized key relationships with US allies, and imperiled the ambitious US Internet Freedom Agenda, according to the report, which was published Tuesday by New America’s Open Technology Institute.

The basic architecture of the global internet could also be at risk if governments close off their networks in response to US surveillance efforts, the report warns.

From TechWeekEurope, a notable deal:

BlackBerry Buys Secusmart – The Firm That NSA-Proofed Merkel’s Phone

BlackBerry is to buy the German anti-eavesdropping solutions provider, Secusmart GmbH, which is already its partner in providing secure phones for Angela Merkel and other German officials.

BlackBerrywants to maintain its reuptation for security and capitalise on concerns about the snooping habits of the NSA, exposed by the whistleblower Edward Snowden. In 2013 it was revealed that German Chancellor Angela Merkel was a target of NSA eavesdropping, a move that soured Germany’s relationship with the US. However, it is believed that any attempts to crack her encryption likely failed, thanks to an ongoing agreement with Secusmart to provide BlackBerry phones with heightened security to German agencies and politicians.

BlackBerry announced the acquisition of Secusmart, for an undisclosed sum, and confirmed reports that the two organisation had previously collaborated to produce Secusmart-equipped BlackBerry phones for German government agencies, as well as German government leaders including Chancellor Angela Merkel.

From Techdirt, advice from Big Brother:

UK Government Report Recommends Ending Online Anonymity

  • from the dangerous-and-stupid dept

Every so often, people who don’t really understand the importance of anonymity or how it enables free speech (especially among marginalized people), think they have a brilliant idea: “just end real anonymity online.” They don’t seem to understand just how shortsighted such an idea is. It’s one that stems from the privilege of being in power. And who knows that particular privilege better than members of the House of Lords in the UK — a group that is more or less defined by excess privilege?

The Communications Committee of the House of Lords has now issued a report concerning “social media and criminal offenses” in which they basically recommend scrapping anonymity online. It’s not a true “real names” proposal — as the idea is that web services would be required to collect real names at signup, but then could allow those users to do things pseudonymously or anonymously. But, still, their actions could then easily be traced back to a real person if the “powers that be” deemed it necessary. Here’s the key bit:

From our perspective in the United Kingdom, if the behaviour which is currently criminal is to remain criminal and also capable of prosecution, we consider that it would be proportionate to require the operators of websites first to establish the identity of people opening accounts but that it is also proportionate to allow people thereafter to use websites using pseudonyms or anonymously. There is little point in criminalising certain behaviour and at the same time legitimately making that same behaviour impossible to detect. We recognise that this is a difficult question, especially as it relates to jurisdiction and enforcement.

And a German pol feels the heat, via EurActiv:

German minister under attack over Snowden remarks

Germany’s Justice Minister Heiko Maas has advised US whistleblower Edward Snowden to return to the United States, sparking outrage from opposition parties in the Bundestag. EurActiv Germany reports.

Maas has sparked criticism for suggesting Snowden should go back to the US amid an ongoing debate about whether the former National Security Agency (NSA) employee should testify in Germany on US surveillance activities.

“As we have heard, Snowden’s lawyers are in negotiations with American officials and looking into the possibility of Snowden returning to the US to go on trial,” Maas told the news agency DPA in Berlin.

“From Snowden’s point of view, I can completely understand this,” he said.

Homeland Security News Wire sounds an insecurity alert:

U.S. faces serious future threats in space

Gen. William Shelton, the commander of Air Force Space Command, said last week that U.S. dominance in space will be challenged by very real threats in the years ahead. The general said that those threats might consist of “jammers, lasers and tactical space nukes,” with any of these challenges exponentially more dangerous than in the past as the technology becomes more common.

Gen. William Shelton, the commander of Air Force Space Command, said last week that U.S. dominance in space will be challenged by very real threats in the years ahead.

As Defense One reports, the general also added that those threats might consist of “jammers, lasers and tactical space nukes,” with any of these challenges exponentially more dangerous thhan in the past as the technology becomes more common.

Off to Asia, starting with an Indian Watergate? From the Economic Times:

Nitin Gadkari bugging issue set to rock Parliament on Thursday again

Congress is set to keep up the heat on BJP over alleged bugging of Union Minister Nitin Gadkari’s house with the opposition party deciding to raise it aggressively in parliament for the second consecutive day tomorrow pressing for a discussion on the issue.

“We will raise it in Parliament tomorrow as well. There has to be a discussion on it, which culminates into an inquiry by a judge. We doubt that some internal agency is involved in the bugging.

“If a minister is being snooped, then it raises doubts that leaders of Opposition parties and other important personalities may also be facing it. That is why we say the inquiry should be done by a judge. The investigation has to be credible,” Leader of the Opposition in Rajya Sabha Ghulam Nabi Azad told reporters here.

Chinese internal security eruption from South China Morning Post:

Dozens of axe-wielding attackers shot dead by police during attacks in Xinjiang

Assailants wielding axes are shot dead by police during ‘organised and premeditated’ violence

Dozens of people, ethnic Han and Uygur, were killed or injured in at least one terror attack in the restive Xinjiang region early on Monday, state media reported late last night.

Xinhua said that a group of assailants, wielding knives and axes, attacked the government office and police station in Elixku township in Kashgar’s Yarkand, or Shache, county. Some attacked residents in neighbouring Huangdi township, the report said.

Police said they shot dead dozens of the attackers, describing the incident as an “organised and premeditated” act of terror.

Gaming in the Asian Game of Zones from the Japan Times:

India naval drill with Japan, U.S. seen as signal to China

Traffic at the Maritime Self-Defense Force base at Sasebo, Nagasaki Prefecture, is typically dominated by Japanese and U.S. warships, but in July it saw an unusual variety of vessel. An Indian frigate and destroyer docked en route to joint exercises in the Western Pacific.

The INS Shivalik and INS Ranvijay’s appearance at the port near Nagasaki showed Japan’s interest in developing ties with the South Asian nation as Prime Minister Shinzo Abe’s government faces deepening tensions with China. Japan for the third time joined the U.S. and India in the annual Malabar drills that usually are held in the Bay of Bengal.

With Abe loosening limits on his nation’s military, the exercises that conclude Wednesday showcase Japan’s expanding naval profile as China pushes maritime claims in disputed areas of the East and South China Seas. For newly installed Indian Prime Minister Narendra Modi, Japan’s attention adds to that of China itself, in an opportunity to expand his own country’s sway.

Another Japanese gambit, via Want China Times:

Japan and Brazil to make joint statement against China: Kyodo

Japanese prime minister Shinzo Abe and Brazilian president Dilma Rousseff are to announce a joint statement on August 1 which will include mention of counter-measures against China, reports Japan’s Kyodo International News on July 27.

A leaked draft of the statement says that both Japan and Brazil respect rule of law and that China’s declaration of an air defense identification zone (ADIZ) over the East China Sea last November and its growing aggression in the East and South China seas require counter measures. The draft states that “conflicts in the South China Sea should be resolved peacefully and in line with international law without the use of force or threat,” according to the report. The statement also says Japan and Brazil will cooperate in their efforts to reform the UN Security Council.

Both Sankei Shimbun and Nikkei Japan Review interpreted Abe’s visit shortly after Xi’s visits to the same region in early July, as intended to strengthen Japan’s influence in Latin America and to counter growing Chinese power there.

And for our final item, the wild card, upping ante. From the Japan Times:

North Korea may be closer to full ICBM test: U.S. think tank

  • Leading U.S. think tank says North Korea may conduct flight test soon

Fresh satellite images suggest North Korea might be wrapping up engine trials on an intercontinental ballistic missile, fueling speculation of a full-scale flight test to come, a U.S. think tank said Wednesday.

Development of a working ICBM would be a game-changing step, bringing the continental United States into range and adding a whole new threat level to the North’s regular nuclear-strike warnings.

“The rocket engine test program may wind down by the end of this year,” The U.S.-Korea Institute at Johns Hopkins University said on its closely followed 38 North website. “If the engine tests are concluded, the next stage in development of the KN-08 road-mobile ICBM may be full-scale flight tests of the missile.”

Quote of the day: The non-barking watchdog


From “The Secrecy Complex and The Press in Post-9/11 America,” a Chattaqua Institution speech delivered earlier this month by recently fired New York Times Executive Editor Jill Abramson. The full summary and an audio of the speech are here:

In her long career of covering Washington and in her executive role at the Times, Abramson has frequently been charged with deciding whether to print sensitive stories, calling this dilemma a “balancing test” in which members of the press weigh national security concerns against the public’s right to know about government activities.

In the aftermath of 9/11, Abramson said, the press listened closely to the government in deciding what to print. 

“In some ways, it wasn’t complicated to make that agreement, because the press always will not reveal certain sensitive intelligence information about, for instance, troop movements,” she said. “In general, you do not publish stories where you know publishing details are going to put anybody’s life in immediate danger.”

But as the Iraq War coalesced in 2003, Abramson admitted to a failure of the press to maintain true skepticism of the government.

“The press, in some ways, let the public down,” she said. “The press, including The New York Times , I will freely say, was not skeptical enough about the so-called ‘evidence’ about Saddam Hussein and weapons of mass destruction.”

The torture and prisoner abuse scandal at Abu Ghraib in 2003 and 2004 was another wake-up call to the press, Abramson said. Then, in 2005, the Times ran a Pulitzer Prize-winning story that revealed warrantless wiretapping by the National Security Agency — a report that had been held for a year at the behest of personnel within the Bush administration. 

Mark Fiore: Flying high with a high flyer


Another cheery animation from editorial cartoonist Mark Fiore and a perfect accompaniment for our Chart of the Day below.

From Mark Fiore:

Blasty the Drone, To Protect & Swerve

Program notes:

The rise of killer drones abroad continues, as does the rise of fireworks-photographing, beer-delivering drones at home. With a huge variety of uses and a very politicized, lethal start, these robots in the sky promise to be one of the most difficult-to-regulate gadgets in the United States.

Chart of the day: Global drone opposition


From the Pew Research Center [PDF], dramatic evidence that American drone strikes on alleged terrorists are wildly and almost universally unpopular:

Microsoft Word - Pew Research Center Balance of Power Report FIN

The other Holocaust: Hitler’s war on the Roma


We’ve explored at some length previously Hitler’s other Holocaust, the one targeting those peoples often grouped under the name “Gypsy,” a term assigned them because of their once-supposed Egyptian origin.

We are therefore pleased with a new to the University of California Television channel on YouTube, featuring Ian Hancock, European-born Roma professor from the University of Texas:

From University of California Television:

Porrajmos: The Romani and the Holocaust with Ian Hancock – Holocaust Living History 

Program notes:

The Holocaust claimed anywhere between 500,000 and 1.5 million Romani lives, a tragedy the Romani people and Sinti refer to as the Porrajmos, or “the Devouring.” Notwithstanding the scope of the catastrophe, the Romani genocide was often ignored or minimized until Ian Hancock and others exposed this misfortune. A Romani-born British citizen, activist, and scholar, Hancock has done more than anyone to raise awareness about the Romani people during World War II. Now a professor at the University of Texas at Austin, Hancock is presented here as part of the Holocaust Living History Workshop, a partnership between Judaic Studies at UCSD and the UC San Diego Library.

Recorded on 05/07/2014. Series: “The Library Channel”

In light of Hancock’s insights on the common links the Nazis drew between the Romani people and Jews, another UCTV video recorded at an address for CARTA [the Center for Academic Research and Training in Anthropogeny] makes an interesting point.

University of Southern California social anthropologist Christopher Boehm looks at patterns of aggression among hunter/gatherer peoples and friends that ethnic identity was the cause of most in intergroup violence. He notes that virtually every foraging group self-identifies as “the people” and other groups as something less.

From UCTV:

Violence in Human Evolution – Christopher Boehm: Warfare and Feuding in Pleistocene Society

Program notes:

In this talk, Christopher Boehm (USC) discusses how today’s hunter-gatherers are used to portray likely patterns of male aggression among culturally-modern foragers in the Late Pleistocene epoch. Patterns of aggressive behavior are considered at three levels: within groups, between groups of the same ethnicity, and between groups that consider one another strangers.

Recorded on 05/16/2014. Series: “CARTA – Center for Academic Research and Training in Anthropogeny”

InSecurity Watch: Censors/spooks/zones/deals


Today’s collection of tales from the worlds of spooks, deep politics, resurgent militarism, and more opens with the latest — stunning — revelation from WikiLeaks:

Australia bans reporting of multi-nation corruption case involving Malaysia, Indonesia and Vietnam

Today, 29 July 2014, WikiLeaks releases an unprecedented Australian censorship order concerning a multi-million dollar corruption case explicitly naming the current and past heads of state of Indonesia, Malaysia and Vietnam, their relatives and other senior officials. The super-injunction invokes “national security” grounds to prevent reporting about the case, by anyone, in order to “prevent damage to Australia’s international relations”. The court-issued gag order follows the secret 19 June 2014 indictment of seven senior executives from subsidiaries of Australia’s central bank, the Reserve Bank of Australia (RBA). The case concerns allegations of multi-million dollar inducements made by agents of the RBA subsidiaries Securency and Note Printing Australia in order to secure contracts for the supply of Australian-style polymer bank notes to the governments of Malaysia, Indonesia, Vietnam and other countries.

The suppression order lists 17 individuals, including “any current or former Prime Minister of Malaysia”, “Truong Tan San, currently President of Vietnam”, “Susilo Bambang Yudhoyono (also known as SBY), currently President of Indonesia (since 2004)”, “Megawati Sukarnoputri (also known as Mega), a former President of Indonesia (2001–2004) and current leader of the PDI-P political party” and 14 other senior officials and relatives from those countries, who specifically may not be named in connection with the corruption investigation.

The document also specifically bans the publication of the order itself as well as an affidavit affirmed last month by Australia’s representative to ASEAN Gillian Bird, who has just been appointed as Australia’s Permanent Representative to the United Nations. The gag order effectively blacks out the largest high-level corruption case in Australia and the region.

The last known blanket suppression order of this nature was granted in 1995 and concerned the joint US-Australian intelligence spying operation against the Chinese Embassy in Canberra.

Wikileaks has posted the court order here.

The Christian Science Monitor covers a concession:

US is no safer after 13 years of war, a top Pentagon official says

The outgoing head of the Defense Intelligence Agency says that new players on the scene are more radical than Al Qaeda, and the core Al Qaeda ideology has lost none of its potency.

The nation is no safer after 13 years of war, warns a top US military official who leads one of the nation’s largest intelligence organizations.

“We have a whole gang of new actors out there that are far more extreme than Al Qaeda,” says Lt. Gen. Michael Flynn, head of the Defense Intelligence Agency, which employs some 17,000 American intelligence collectors in 140 countries around the world.

That the United States is no safer – and in some respects may be less safe – even after two wars and trillions of dollars could prove to be disappointing news for Americans, noted the journalist questioning General Flynn at the Aspen Security Forum last week.

From the Guardian, a legislative battle against The Most Transparent Administration in History™:

Senators consider obscure rule in CIA torture report declassification debate

  • Mark Udall said procedure could be invoked to compel Obama administration to release more of landmark Senate report

Senators are considering the use of an obscure parliamentary procedure to compel the Obama administration to release more of a landmark Senate report into the Central Intelligence Agency’s abusive post-9/11 interrogations should they be unsatisfied with the administration’s first version.

“If the redacted version of the Senate Intelligence Committee’s study that we receive appears to be an effort to obscure its narrative and findings — and if the White House is not amenable to working toward a set of mutually agreed-upon redactions — I believe the committee must seriously consider its other option,” Senator Mark Udall, a Colorado Democrat on the intelligence committee, told the Guardian on Monday.

It is believed that the White House will provide its completed redactions to sections of the Senate intelligence committee’s landmark torture report in the coming days. The committee will subsequently review the redactions as preparation for the report’s public release, something chairwoman Dianne Feinstein of California, a Democrat, had wanted to happen in early May.

From The Hill, groping toward compromise?:

Leahy unveils ‘historic’ NSA reform bill

Sen. Patrick Leahy (D-Vt.) on Tuesday introduced legislation to put sweeping new limits on U.S. surveillance and peel back the curtain on controversial spying programs.

The aggressive bill seeks to address concerns that tech companies and civil liberties proponents had over the House’s attempt to rein in the National Security Agency (NSA) by restricting agents to narrow, targeted searches of records about people’s phone calls as well as making the spying regime more transparent.

For civil libertarians, it is the best hope for reining in the NSA this year, though defenders of the spy agency in Congress are likely to push back.

“If we can enact this bill, get it signed into law, it would represent the most significant reform of government surveillance authorities since Congress passed the USA Patriot Act 13 years gap,” Leahy said on the Senate floor

But Ars Technica notes a subtlety with deep significance:

Analysis: Bill banning phone metadata collection gives NSA access to it

  • Proposal “is not perfect” but less surveillance is better than mass surveillance.

A prominent senator unveiled legislation Tuesday that would end the National Security Agency’s bulk collection of all telephone metadata—a package that still provides the nation’s spooks limited access to the data of every phone call made to and from the US. And the probable-cause standard under the Fourth Amendment is not present.

Conceding the realpolitik, civil rights groups and others are backing the proposal from Patrick Leahy, the Democratic chairman of the Senate Judiciary Committee, even though the NSA may acquire the data absent constitutional protections.

And signs of repair efforts from Techdirt:

Senators Wyden And Udall Pledge To Strengthen USA Freedom Act By Closing Surveillance Backdoor

  • from the that-would-be-good dept

By now, it should be well known that Senators Ron Wyden and Mark Udall are the two key truth-tellers in Congress when it comes to what kind of surveillance is being done by the intelligence community. If they ask a question, assume the answer is “yes.”

With the introduction of the new USA Freedom Act in the Senate, we noted that, while it does take a big step forward, there is a lot more that can be done.

Wyden and Udall have released a statement noting that they plan to seek to strengthen the bill with an amendment to close the backdoor search “loophole” which is used by the entire intelligence community to spy on Americans. It’s unfortunate that Leahy didn’t include that in the original bill — and it suggests that there might not (yet) be enough support to close the backdoor. But

From The Verge, a profitable but hardly surprising transition:

Former NSA chief makes up to $1 million a month selling cybersecurity services

  • Gen. Keith Alexander stepped down from the NSA after the Snowden leaks, now he’s back with a new security firm related to his government work

General Keith Alexander was in charge of the National Security Agency when all hell broke loose and former security contractor Edward Snowden leaked documents showing the organization was spying far beyond the extent to which most people were aware (or comfortable with). But he’s not letting that episode stop him from launching what looks to be an exceptionally lucrative private career selling…you guessed it, cybersecurity software.

As Bloomberg first reported last week, Alexander has spent the last few months since his retirement as NSA head in March giving paid talks on cybersecurity to banks and other large financial institutions. Bloomberg also noted that Alexander has charged up to $1 million a month for his services, and even co-founded his own private security firm, IronNet Cybersecurity, Inc. In a more recent interview with Foreign Policy, Alexander admitted that his firm has developed “unique” technology for detecting and fighting so-called “advanced persistent threats” — cyberattacks that can extend for months or years at a time without being noticed, and are directed against specific targets like big companies or governments.

Beyond the somewhat uncomfortable optics created by America’s leading spymaster turning his skill-set to the private security sector, there are other problems with Alexander’s new job. As Foreign Policy points out, the former NSA chief plans to file patents on his firm’s technology, patents that are “directly related to the job he had in government.” In other words, Alexander stands to profit directly off of his taxpayer-funded experience, and may do so with a competitive advantage over other competing private firms.

From the Dept. Of Extremely Curious, via the Guardian:

US government increases funding for Tor, giving $1.8m in 2013

  • Despite attempts by the National Security Agency to crack the anonymous browser, the US increased state funding through third parties

Tor, the internet anonymiser, received more than $1.8m in funding from the US government in 2013, even while the NSA was reportedly trying to destroy the network.

According to the Tor Project’s latest annual financial statements, the organisation received $1,822,907 from the US government in 2013. The bulk of that came in the form of “pass-through” grants, money which ultimately comes from the US government distributed through some independent third-party.

Formerly known as “the onion router”, Tor is software which allows its users to browse the internet anonymously. It works by bouncing connections through encrypted “relays”, preventing any eavesdropper from determining what sites a particular user is visiting, or from determining who the users of a particular site actually are. That makes it popular amongst organisations trying to promote freedom of speech in nations like China and Syria – but also popular amongst users trying to evade surveillance in the West.

CBC News covers a trans-Pacific hack

Chinese cyberattack hits Canada’s National Research Council

Foreign Affairs Minister John Baird raises issue during visit to Beijing

A “highly sophisticated Chinese state-sponsored actor” recently managed to hack into the computer systems at Canada’s National Research Council, according to Canada’s chief information officer, Corinne Charette.

The attack was discovered by Communications Security Establishment Canada.

In a statement released Tuesday, Charette, confirmed that while the NRC’s computers operate outside those of the government of Canada as a whole, the council’s IT system has been “isolated” to ensure no other departments are compromised.

Foreign Affairs Minister John Baird was in Beijing as news of the cyberattack became public.

The Guardian covers a done deal:

UK-US sign secret new deal on nuclear weapons

  • Closed contents of updated Mutual Defence Agreement
  • Vital for Britain’s Trident nuclear weapons system
  • MPs also demand debate on UK’s future world role

A new agreement critical to Britain’s Trident nuclear weapons system, was signed the other day by British and US officials.

Whitehall was silent. We had to rely on the White House, and a message from Barack Obama to the US Congress, to tell us that the 1958 UK-US Mutual Defence Agreement (MDA) had been updated.

A new amendment to the treaty will last for 10 years. Obama told Congress it will “permit the transfer between the United States and the United Kingdom of classified information concerning atomic weapons; nuclear technology and controlled nuclear information; material and equipment for the development of defense plans; training of personnel; evaluation of potential enemy capability; development of delivery systems; and the research, development, and design of military reactors.”

From intelNews, high crime by a vanished regime?:

Did South African spy services kill Swedish prime minister in 1986?

The usually tranquil waters of Swedish national politics were stirred violently on February 28, 1986, when the country’s Prime Minister, Olof Palme, was shot dead. He was walking home from the cinema with his wife when he was gunned down by a single assassin who shot him from behind in Stockholm’s central street of Sveavägen. Following the 1988 acquittal of Christer Pettersson, who had been initially convicted of the assassination, several theories have been floating around, but the crime remains unsolved to this day.

Now the BBC has aired an investigation into the incident, which revisits what some say is the most credible theory behind the killing: that Palme was targeted by the government of apartheid-era South Africa because of his strong support for the African National Congress (ANC). Palme was among the leading figures of the left wing in Sweden’s Social Democratic Party.

He had served as Prime Minister from 1969 to 1976, and was reelected in 1982 on a left-wing program of “revolutionary reform” that included expanding the role of the trade unions and increasing progressive taxation rates. He was also a strong international opponent of South Africa’s apartheid system and under his leadership Sweden became the most ardent supporter of the ANC.

On to the Asian security from, starting with suspicion of security crimes from the New York Times:

China Says Zhou Yongkang, Former Security Chief, Is Under Investigation

In President Xi Jinping’s most audacious move yet to impose his authority by targeting elite corruption, the Communist Party on Tuesday announced an investigation of Zhou Yongkang, the retired former head of domestic security who accumulated vast power while his family accumulated vast wealth.

Mr. Zhou, who retired from the Politburo Standing Committee in late 2012, is the most senior party figure ever to face a formal graft inquiry. Until now, no standing or retired member of the Standing Committee has faced a formal investigation by the party’s anticorruption agency.

The party leadership has “decided to establish an investigation of Zhou Yongkang for grave violations of discipline,” Xinhua, the state-run news agency, reported Tuesday, citing a decision by the party’s anticorruption agency. The terse announcement gave no details of the charges against Mr. Zhou.

Want China Times covers a goose getting gander sauced:

‘Cradle of Chinese hackers’ sees 70-80 cyber attacks a day

Shandong Lanxiang Vocational School’s ties with the military have led it to be seen increasingly as an incubator for Chinese hackers, and as a result the school has experienced frequent cyber attacks.

The school began assisting the People’s Liberation Army in training soldiers in various fields shortly after its establishment in 1984.

The school has also worked with state businesses and agencies under the State Council.

School founder Rong Lanxiang acknowledges that the school worked with the military during its early days and had introduced members of the military into its management.

The Japan Times covers the latest symptoms of centuries’ old tensions:

Japan feels ‘strong concern’ over France-Russia warship deal

The government on Tuesday expressed “strong concern” about the planned sale of French helicopter carriers to Russia, joining some EU countries in opposing the deal as the West believes Russia has failed to meet international demands to end violence in Ukraine.

President Francois Hollande has defied allies Britain and the United States by confirming plans to deliver a helicopter carrier to Russia.

A €1.2 billion ($1.62 billion) contract for two warships, signed by France’s then-President Nicolas Sarkozy’s conservative government in 2011, was the first by a NATO member country to supply Russia with military equipment.

Jiji Press question resurgent militarism:

DPJ’s Noda Urges Abe to Clarify Risks of Collective Self-Defense

Former Japanese Prime Minister Yoshihiko Noda called on incumbent Prime Minister Shinzo Abe Tuesday to explain the risks involved in Japan exercising its right to collective self-defense.

“Obviously, risks increase when the scope of activities by the Self-Defense Forces is extended. Abe should fully explain if he raised the issue out of concern for the future of Japan,” Noda said in a speech to the Research Institute of Japan, a Jiji Press affiliate.

Noda, a member of the opposition Democratic Party of Japan, urged Abe to tell the public about the risks including the possibility that the SDF may become involved in combat.

While the Japan Times covers a possible militarism-enabler:

Abe eyes Ishiba for new Cabinet post on defense legislation

Prime Minister Shinzo Abe plans to replace Shigeru Ishiba as the No. 2 man in the ruling Liberal Democratic Party and has sounded him out about assuming a newly created Cabinet post for defense legislation, a party source said Tuesday.

The envisioned changes would be part of Abe’s Cabinet reshuffle scheduled for the first week of September, his first since taking office in December 2012. Abe, who heads the LDP, also plans to reshuffle party executives.

Ishiba, the LDP’s secretary-general, is widely regarded as a potential future prime minister. He has refrained from making his stance clear on the proposed move, the LDP source said.

Nikkei Asian Review courts compromise:

Europe sees rule of law as key in South China Sea disputes

The European Union (EU) on Tuesday prodded countries with competing territorial claims in the South China Sea to resolve their disputes peacefully through the rule of law.

In a joint briefing with Philippine Foreign Affairs Secretary Albert del Rosario following a bilateral meeting, Catherine Ashton, the EU’s high representative for foreign affairs and security policy, restated the EU position:

“The European Union encourages all parties to seek peaceful solutions through dialogue and cooperation in accordance with the international law, in particular with the UN Convention on the Law of the Sea,” Ashton said.

From Want China Times, a remarkable statistic:

North Korea has largest fleet of submarines worldwide

North Korea has the largest fleet of submarines in the world, with 78 currently in its arsenal, according to the Global Firepower Index of the Business Insider based in New York.

The United States has six fewer at 72, while China came in third place with 69 submarines. Russia was ranked fourth with 63 and Iran was in fifth place fifth with around 31 submarines, while Japan has 16 and South Korea has 14.

The Global Security website run by a group of defense and intelligence experts estimated that the Korean People’s Navy is in possession of at least 78 submarines, including eight semi-submersible infiltration crafts.

And for our final item, the London Daily Mail covers a costly security gesture:

Rick Perry: National Guard on US-Mexico border can’t make arrests but serve as ‘a powerful reminder that what you are doing is a crime’

  • Texas governor deployed up to 1,000 National Guard troops to the US-Mexico border this month but didn’t give them arrest powers
  • He argues that their deterrent factor alone is worth the exercise
  • Troops will work alongside state police agencies Perry activated as a supplement to what he says are inadequate measures from Washington
  • Hundreds of children and teens pour across the border from Mexico every day, following a 2012 amnesty announcement from President Obama that only affects illegal immigrants brought to America as children before 2007

And to make you really, really insecure. . .


Just watch this chilling compendium assembled by John Oliver for the latest installment of his HBO series Last Week Tonight with John Oliver.

By the time you’ve finished his debunking of the purported security of America’s nukes, you’ll be thoroughly disabused of any lingering doubt that, as Pogo famously said, “We have met the enemy, and he is us.”

From Last Week Tonight with John Oliver

Last Week Tonight with John Oliver: Nuclear Weapons

Program notes:

America has over 4,800 nuclear weapons, and we don’t take terrific care of them.

It’s terrifying, basically.

InSecurity Watch: Spies, pols, laws, flaws


Lots of ground to cover and the hour’s growing late, so on with the show, starfing with the latest from the Asian wild card via SINA English:

North Korea threatens nuclear strike on White House

A top-ranking North Korean military official has threatened a nuclear strike on the White House and Pentagon after accusing Washington of raising military tensions on the Korean peninsula.

The threat came from Hwang Pyong-So, director of the military’s General Political Bureau, during a speech to a large military rally in Pyongyang on Sunday on the anniversary of the armistice that ended the 1950-53 Korean War.

Hwang, who holds the rank of vice marshal in the Korean People’s Army, said a recent series of South Korea-US military drills, one of which included the deployment of a nuclear-powered US aircraft carrier, had ramped up tensions.

Heading to the other wise of the Pacific and the not-so-surprising but tragic, via the McClatchy Washington Bureau:

Obama’s crackdown on leakers damages constitutional protections, activists say

Recent revelations of the U.S. government’s pervasive surveillance program and its crackdown on leaks are making it increasingly difficult for American journalists and lawyers to do their jobs, the advocacy group Human Rights Watch and the American Civil Liberties Union said in a report released Monday.

It’s becoming impossible to ensure privacy for sources and clients by protecting their information, the report found. Government officials not only are substantially less willing to be in contact with journalists than they were a few years ago, but they also are even refusing to discuss unclassified matters or personal opinions.

“They are afraid of losing their security clearances, being fired or even being prosecuted,” Alex Sinha, the author of the report and a fellow at Human Rights Watch, said in a news conference at the National Press Club.

More from Common Dreams:

Government Surveillance Threatens Journalism, Law and Thus Democracy: Report

  • Interviews with dozens of leading journalists and attorneys found that U.S. government overreach is eroding critically important freedoms

The impunity with which the American government spies on journalists and attorneys is undermining the American people’s ability to hold their leaders accountable, thus threatening the core of our democracy, charged a joint report published Monday by two leading rights organizations.

The report—With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy, published by the American Civil Liberties Union and Human Rights Watch—draws from extensive interviews with dozens of top journalists, lawyers and senior government officials. What the authors found is that recent revelations of widespread government surveillance have forced many professionals to alter or abandon work related to “matters of great public concern.”

According to the report, “Surveillance has magnified existing concerns among journalists and their sources over the administration’s crackdown on leaks.” With increasing prosecution of whistleblowers, restrictions on communication between intelligence officials and the media, and snitch programs for federal workers, journalists say that their sources have become “increasingly scared to talk about anything.”

On a related note, there’s this from MintPress News:

You’ve Got Mail: Judge Grants Feds Unrestricted Access To Gmail Account

In giving law enforcement unfettered access to search for “some needles” in one individual’s “computer haystack,” a judge fans the flames of the data debate.

Privacy advocates were dealt a major blow on July 18, when a federal judge in New York ruled that law enforcement has the legal authority to search the entire email account of an unnamed individual who police believe was involved in a money laundering scheme.

Google is now legally required to hand over the entire contents of the unnamed individual’s Gmail account — including all emails sent, received and drafted, all contacts, and other information —  to federal prosecutors.

In his 23-page ruling, U.S. Magistrate Judge Gabriel Gorenstein wrote that email accounts should be treated like hard drives when it comes to search and seizure principles. In other words, Gorenstein believes law enforcement should be able to go through an individual’s entire email account if prosecutors can demonstrate probable cause showing a “sufficient chance of finding some needles in the computer haystack.”

Next up, the latest on the iSpy — er, iPhone, via PandoDaily:

Apple hit with class action suit for spying on iPhone users

Apple has been hit with a class action suit on behalf of 100 million iPhone users who, allegedly, are being spied on by the phone’s location tracking tools.

According to the suit, filed in Federal Court in San Jose by lead plaintiff Chen Ma…

In or around September 2012, Apple released iPhone 4 which contains an iOS operating system software that enables iPhone 4 to track its users’ whereabouts down to every minute, record the duration that users stay at any given geographical point, and periodically transmit these data stored on the users’ devices to Apple’s data base for future references.

…Plaintiff alleges that while using her iPhones, including her current iPone [sic] 5S, she was not given notice that her daily whereabouts would be tracked, recorded, and transmitted to Apple database to be stored for future reference. She was not asked for and thus has not given her consent, approval and permission nor was she even made aware that her detailed daily whereabouts would be tracked, recorded and transmitted to Apple database.

Want China Times adds insult to injury:

Apple admits iPhone security flaw

Consumer electronics giant Apple has admitted for the first time that company employees can circumvent backup encryption to extract personal data including text messages, contact lists and photos from user iPhones, according to a report from Reuters.

Tech researcher Jonathan Zdziarskiv said at a conference presentation last week that because Apple is collecting a lot more data as part of its diagnostic services than necessary, the company’s staff, law enforcement agencies or anyone else with access to “trusted” computers to which Apple devices have been connected can use the same methods to gain access to this highly personal data.

The problem is compounded by the fact that Apple users are not notified that the services are running, meaning there is no way they can know what computers have been granted trusted status. They also cannot disable the service by “unpairing” a device from a computer unless the phone is formatted, Zdziarski said.

From CNN, making out like bandits:

Pentagon security clearance holders owe $730M in taxes

About 83,000 Defense Department employees and contractors with security clearances to protect the nation’s secrets have delinquent federal tax debts totaling $730 million, according to an internal government audit.

The findings in the new Government Accountability Office study raise security concerns for the U.S. government. Officials say employees and contractors who have financial problems are top targets of foreign intelligence agents.

Federal regulations governing security clearances say that a person “who is financially overextended is at risk of having to engage in illegal acts to generate funds” and that indebtedness should be among factors considered when someone applies for a clearance, the GAO study said. But the study found that government agencies in charge of the issue can’t readily collect data on tax debt, in part because IRS privacy rules prohibit sharing certain taxpayer data.

And from intelNews, a blast from the past that fortunately fizzled:

FBI searched for Soviet atom bombs in 1950s’ New York, files show

American authorities suspected that Soviet intelligence had smuggled atom bombs in New York City and that Moscow was planning to detonate them “at an expedient time”, according to declassified documents. The revelation comes from a set of internal FBI files, which were declassified and released in redacted form in 2010.

Copies of the documents, which date from the early 1950s, were posted (.pdf) on The Government Attic, a website specializing in publishing US government files obtained through Freedom of Information Act requests. The documents were then noticed last week by The Village Voice’s Anna Merlan. The file, titled “Atomic Bomb in Unknown Consulate, New York City”, is nearly 80 pages-long. It indicates that the search for a supposed Soviet atomic weapon in New York began shortly after the summer of 1950, when the FBI received a tip from a source in Brazil. The source reportedly told the Bureau that Soviet operatives had “placed an atom bomb in a consulate [...] in New York City to be detonated at such time as the Soviets consider expedient”.

The problem was that the FBI was not aware of the identity of the consulate, which was presumed to belong to the USSR or to a country politically aligned with it. The Bureau thus actively engaged in searching for the bomb during the years of 1951 and 1952.

Off to Europe and a more contemporary blast [of sorts] from TheLocal.no:

Swedish terror expert slams Norway terror alert

A Swedish terrorism researcher has blasted Norway’s handling of its recent terror threat, saying the day the threat began was a “total intelligence failure”.

Sweden has started analysing Norway’s reaction to its recent threat.

“It created unnecessary anxiety in Norway,”  Magnus Ranstorp, terrorist expert at the Swedish National Defence College, told The Local.

Norway has been on high-powered, ultra-defensive tip-toe for the past few days, since its intelligence service (PST) said last Thursday that it suspected an “imminent” terror attack.

And from TheLocal.se, a pullback:

Norway set to reduce terror alert

Norway’s terror alert level will be reduced from Tuesday, but security will still be somewhat tighter than normal, police chiefs said on Monday.

Police director Odd Reidar Humlegård informed at a press conference on Monday afternoon in Oslo that all police forces have received a directive to lower security across Norway.

Humlegård said: “The police are still going to be armed, but we are to start preparing for a reduction of visible presence.”

He announced a gradual reduction and change of measures, now more focused towards intelligence and analysis. Humlegård said that the increased security alert level has already come at the cost of several tens of millions of kroner of police resources.

The Guardian covers a setback for Washington:

Venezuelan government joy as Aruba frees former military intelligence head

  • President Maduro’s supporters jubilant after Hugo Carvajal is released instead of facing extradition to the US

Venezuela’s former military intelligence head Hugo Carvajal, wanted by the United States over drug accusations and arrested four days ago on the Caribbean island of Aruba, was released on Sunday.

Instead of being extradited to the US, the retired general flew home after the Netherlands government ruled he had diplomatic immunity, his lawyer and Venezuelan officials said.

Jubilant Venezuelan officials at a congress of the ruling Socialist Party celebrated the release as a “victory” over their ideological foes in Washington who wanted to extradite him.

And from the Independent, playing by the rules of a familiar game:

The secret report that helps Israelis to hide facts

  • The slickness of Israel’s spokesmen is rooted in directions set down by the pollster Frank Luntz

Israeli spokesmen have their work cut out explaining how they have killed more than 1,000 Palestinians in Gaza, most of them civilians, compared with just three civilians killed in Israel by Hamas rocket and mortar fire. But on television and radio and in newspapers, Israeli government spokesmen such as Mark Regev appear slicker and less aggressive than their predecessors, who were often visibly indifferent to how many Palestinians were killed.

There is a reason for this enhancement of the PR skills of Israeli spokesmen. Going by what they say, the playbook they are using is a professional, well-researched and confidential study on how to influence the media and public opinion in America and Europe. Written by the expert Republican pollster and political strategist Dr Frank Luntz, the study was commissioned five years ago by a group called The Israel Project, with offices in the US and Israel, for use by those “who are on the front lines of fighting the media war for Israel”.

Every one of the 112 pages in the booklet is marked “not for distribution or publication” and it is easy to see why. The Luntz report, officially entitled “The Israel project’s 2009 Global Language Dictionary, was leaked almost immediately to Newsweek Online, but its true importance has seldom been appreciated. It should be required reading for everybody, especially journalists, interested in any aspect of Israeli policy because of its “dos and don’ts” for Israeli spokesmen.

Off to Asia and the latest on the Game of Zones, starting with a headline from Kyodo News:

Japan announces additional sanctions on Russia over Ukraine

Japan will impose additional sanctions on Russia for failing to defuse the crisis in Ukraine, where the recent downing of a Malaysia Airlines jet killed all 298 people aboard, the government said Monday.

Assets held in Japan by individuals or groups directly involved in Russia’s annexation of Crimea or the instability in eastern Ukraine will be frozen, Chief Cabinet Secretary Yoshihide Suga said during a daily press briefing.

Japan will also follow the European Bank for Reconstruction and Development’s recent decision to freeze funding for new projects in Russia, and limit imports of Crimea-made products, Suga said.

But the McClatchy Washington Bureau makes an interesting point:

U.S. sales to Russia have only risen since sanctions imposed

In the months since the United States imposed sanctions on Russian businesses and close associates of President Vladimir Putin’s, an odd thing has happened: U.S. exports to Russia have risen.

U.S. Census Bureau foreign trade data show that exports rose 17 percent from March through May _ the most recent months for which the data is available _ compared with the previous three months, before sanctions were imposed. The value of exports has risen in each consecutive month this year, an unusual trend in a trade relationship that historically fluctuates on a monthly basis.

Russian markets account for less than 1 percent of U.S. exports, but what the U.S. sells to Russia is largely high-tech and expensive goods, including technology and equipment for the energy sector, which faces the threat of targeted sanctions.

Meanwhile, Japan makes a push ion a new venue. From Nikkei Asian Review:

Japan moves to counter China, Russia influence in Caribbean

Japan’s prime minister met here Monday with leaders and top officials representing 14 Caribbean nations, in a bid to shore up ties in a region where Russia and China have recently made robust overtures of their own.

Attending a summit of the Caribbean Community, or Caricom, Shinzo Abe pledged continued economic assistance and sought support for Japan’s bid for a nonpermanent seat in the United Nations Security Council election next year.

As an ally of the U.S., Japan also aims to counter recent moves by China and Russia to strengthen their influence in what is effectively “America’s backyard.”

And from Xinhua, another blast from the past:

Japanese war criminal confession reveals persecution of Chinese

A written confession by Japanese war criminal Ryusuke Sako made public on Sunday revealed the persecution of thousands of Chinese including underground anti-Japanese operators during World War II.

The document is the latest in a series published on the website of China’s State Archives Administration (SAA) following denials of war crimes by Japanese Prime Minister Shinzo Abe and Japanese right-wing politicians.

According to Sako’s confession, before his capture in August 1945, he served as section chief of Inspection Department of the Railway Security Police Forces of the “Manchukuo” puppet state and major general and brigade commander of Railway Security Forces in Jilin and Mudanjiang.

And for our final item, Frontera NorteSur covers a travesty of justice:

Massive Rights Violations Charged at New Mexico Detention Facility

After touring a New Mexico detention facility housing Central American refugees, immigrant advocates and lawyers have charged the Obama Administration with violating due process rights.

In a July 24 telephonic press conference hosted by the National Immigration Law Center, representatives of an advocates’ group that were allowed to conduct a short visit July 22 of the Federal Law Enforcement Training Center (FLTEC) in Artesia, New Mexico, where hundreds of Central American women and children are being held, detailed a laundry list of grievances.

In comments to reporters, advocates said women and children were held in crowded conditions; not adequately informed of their due process rights or given timely access to legal counsel, as per U.S. refugee law;  hustled through deportation proceedings; and forced to read  complex forms in English.  Additionally, serious concerns were raised about the physical and emotional health of children and their mothers.

InSecurity Watch: Spies, lies, laws, zones, drones


Our latest edition of tales form the dark side begins with a legal question from Wired:

New Ruling Shows the NSA Can’t Legally Justify Its Phone Spying Anymore

The Eleventh Circuit Court of Appeals said no this week to tracking your movements using data from your cell phone without a warrant when it declared that this information is constitutionally protected.

The case, United States v. Davis , is important not only because it provides substantive and procedural protections against abuse of an increasingly common and highly invasive surveillance method. It also provides support for something Christopher Sprigman and I have said before — that the government’s other “metadata” collection programs are unconstitutional.

The Davis decision, in effect, suggests that the U.S. government’s collection of all kinds of business records and transactional data — commonly called “metadata” — for law enforcement and national security purposes may also be unconstitutional.

The Washington Post raises more legal questions:

4 senators worry about NSA collection of Americans’ e-mails, phone calls

Four Democratic senators have sent a letter to the director of national intelligence expressing concerns about the scope of the collection of Americans’ e-mails and phone calls under a National Security Agency program that targets foreigners overseas.

The lawmakers, led by Jon Tester (D-Mont.), told Director of National Intelligence James R. Clapper Jr. that they were concerned by recent reports by The Washington Post and an independent executive branch panel about the surveillance.

The Post examined 160,000 communications intercepted under the program, which was authorized by Section 702 of the Foreign Intelligence Surveillance Act of 2008. The law does not require individualized warrants.

The Post found that “nearly half of the surveillance files . . . contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents.”

And Wired offers opposition:

A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying

The internet is littered with burgeoning email encryption schemes aimed at thwarting NSA spying. Many of them are focused on solving the usability issues that have plagued complicated encryption schemes like PGP for years. But a new project called Dark Mail plans to go further: to hide your metadata.

Metadata is the pernicious transaction data involving the “To”, “From” and subject fields of email that the NSA finds so valuable for tracking communications and drawing connections between people. Generally, even when email is encrypted, metadata is not. Dark Mail ambitiously aims to revamp existing email structures to hide this data while still making the system universally compatible with existing email clients.

The project has made for an interesting pairing between Texas technologist Ladar Levison and convicted hacker Stephen Watt, whom he’s hired to help develop the code. Both have had previous battles with the government in very different ways.

From Social Science Research Network, a research summary raises troubling questions:

Government Surveillance and Internet Search Behavior

This paper uses data from Google Trends on search terms from before and after the surveillance revelations of June 2013 to analyze whether Google users’ search behavior shifted as a result of an exogenous shock in information about how closely their internet searches were being monitored by the U. S. government.

We use data from Google Trends on search volume for 282 search terms across eleven different countries. These search terms were independently rated for their degree of privacy-sensitivity along multiple dimensions.

Using panel data, our result suggest that cross-nationally, users were less likely to search using search terms that they believed might get them in trouble with the U. S. government. In the U. S., this was the main subset of search terms that were affected. However, internationally there was also a drop in traffic for search terms that were rated as personally sensitive. These results have implications for policy makers in terms of understanding the actual effects on search behavior of disclosures relating to the scale of government surveillance on the Internet and their potential effects on international competitiveness.

From The Hill, another agency, another challenge:

Ex-officials demand to see CIA report

Former top officials at the CIA want to make sure that they get a chance to see an upcoming report about the spy agency’s “enhanced interrogation techniques,” according to new reports on Saturday.

Former CIA Directors George Tenet, Porter Goss and Michael Hayden drafted a letter asking to see the Senate’s executive summary of the so-called “torture report,” which they sent to Senate Intelligence Chairwoman Dianne Feinstein (D-Calif.), the New York Times reported.

The three chiefs and two former acing directors, John McLaughlin and Michael Morell, did reportedly get a chance to see the document, which reviews how controversial practices such as waterboarding were used. But many other top staffers did not.

About a dozen former officials who are named in the report were initially promised the chance to read it, according to the Associated Press. That offer was taken back on Friday, however, due to what CIA officials said was miscommunication.

More from Techdirt:

Senator Wyden Toying With The Idea Of Releasing The Senate’s CIA Torture Report

  • from the the-pressure’s-on dept

Senator Ron Wyden is apparently getting tired of waiting for the White House to use up its buckets of black ink in redacting everything important in the Senate’s big torture report. He’s publicly pondering the idea of using Senate privilege to just release it himself.

As you may recall, the Senate Intelligence Committee spent years and $40 million investigating the CIA’s torture program, and the 6,000+ page report is supposedly devastating in highlighting (1) how useless the program was and (2) how far the CIA went in torturing people (for absolutely no benefit) and (3) how the CIA lied to Congress about all of this. The CIA, not surprisingly, is not too happy about the report. At all. Still, despite its protests, the Senate Intelligence Committee voted to declassify the executive summary of the report.

However, the CIA got to take first crack at figuring out what to redact, which seemed like a massive conflict of interest. Either way, the CIA apparently finally ran out of black ink in late June, and asked the White House to black out whatever else was left. The State Department has already expressed concerns that releasing anything will just anger the public (our response: probably should have thought of that before sending the CIA to torture people). And, now it appears the report is being held up due to “security” concerns.

From Motherboard, Look! Up in the sky! It’s a bird! It’s a plane ! It’s Fibbie Drone!:

Do the FBI’s Drones Invade Your Privacy? Sorry, That’s Private

The FBI has been flying drones since 2005, according to a trickle of documents released over the last eight months. Agents called in a small surveillance drone on a hostage situation in Alabama in February 2013, and to monitor a dog-fighting scheme in August 2011.

But despite a mandatory process designed to mitigate privacy concerns, the question of how FBI drones may be impacting Americans’ privacy rights remains unanswered.

Federal law requires the FBI to assess its own surveillance technologies for potential privacy and civil liberties snags. While these technology assessments are typically prepared for public consumption, the FBI has refused to release its privacy reviews on drones.

The E-Government Act of 2002 obliges federal agencies to conduct a privacy impact assessment (PIA) prior to deploying any information technology that collects personal information. Per Department of Justice guidelines, the PIA process ensures that privacy protections “are built into the system from the start—not after the fact,” in order to “promote trust between the public and the Department by increasing transparency of the Department’s systems and missions.”

Meanwhile, another conflict, another sanction from South China Morning Post:

EU hits Russian intelligence chiefs in new round of sanctions over Ukraine

  • European Union announces broadened sanctions on Russia targeting 15 new individuals and 18 entities with asset freezes and visa bans

The European Union announced on Saturday it had widened its sanctions against Russia over Moscow’s role in conflict-torn Ukraine to include the heads of intelligence services.

The Russian foreign ministry responded later on Saturday, saying the measures put at risk international cooperation over security issues

The director of the FSB security service, Alexander Bortnikov, and the head of the Russian Foreign Intelligence Service, Mikhail Fradkov are on the new list of 15 people and 18 entities targeted by an asset freeze and visa bans, the EU’s Official Journal said. Also on the list is Chechen President Ramzan Kadyrov.

And from Bulletin of the Atomic Scientists, mythbusters:

The evidence that shows Iron Dome is not working

In the early weeks of July, the conflict between Palestinians in Gaza and Israel flared up again, resulting in a new round of large-scale rocket attacks, launched by Hamas, operating from Gaza, against Israeli population centers. The last such large-scale rocket attacks occurred in November 2012.

Initially, the Israeli military responded to the rocket attacks with air strikes in Gaza, and with protective measures that include deployment of the Iron Dome rocket-defense system and a civil defense effort that includes an efficient system for early warning and sheltering of citizens. As of this writing, only one Israeli had died from Hamas fire, apparently from a mortar round (although that number increased with the Israeli invasion of the Gaza Strip begun late last week).

During the November 2012 conflict, a detailed review of a large number of photographs of Iron Dome interceptor contrails revealed that the rocket-defense system’s success rate was very low—as low as 5 percent or, perhaps, even less. A variety of media outlets have attributed the low casualty number to the supposed effectiveness of the Iron Dome system, quoting Israeli officials as saying it has destroyed 90 percent of the Hamas rockets it targeted. But close study of photographic and video imagery of Iron Dome engagements with Hamas rockets—both in the current conflict and in the 2012 hostilities—shows that the low casualties in Israel from artillery rocket attacks can be ascribed to Israeli civil defense efforts, rather than the performance of the Iron Dome missile defense system.

From the Associated Press, who do they think they are? The NSA?:

Turkey: 20 police arrested for illegal wiretaps

Turkey’s state-run news agency says an Istanbul court has charged 20 police officers with illegal wiretapping and ordered their arrest pending a trial.

The Anadolu Agency says 49 other officers are still waiting on Saturday to be questioned and face possible charges.

The officers were detained on July 22 in raids to their homes on suspicion of wiretapping officials, including Prime Minister Recep Tayyip Erdogan.

After the jump, off to Asia for the latest installment of the Games of Zones, Google’s persistent cyberstalking, cops in the Klan, and so much more. . . Continue reading

Chart of the day: China’s new navy dwarfs Japan’s


From South China Morning Post, comparisons of the relative sizes at the time of the Sino-Japanese War 120 years ago and today. Click on the image to enlasrge:

BLOG Sino Japan navies

InSecurity Watch: Spooks, hacks, & tensions


Today’s collection of headlines about matters of spooks, soldiers, and privacy privateers begins with the unsurprising but notable, via the Washington Post:

Proliferation of new online communications services poses hurdles for law enforcement

Federal law enforcement and intelligence authorities say they are increasingly struggling to conduct court-ordered wiretaps on suspects because of a surge in chat services, instant-messaging and other online communications that lack the technical means to be intercepted.

A “large percentage” of wiretap orders to pick up the communications of suspected spies and foreign agents are not being fulfilled, FBI officials said. Law enforcement agents are citing the same challenge in criminal cases; agents, they say, often decline to even seek orders when they know firms lack the means to tap into a suspect’s communications in real time.

“It’s a significant problem, and it’s continuing to get worse,” Amy S. Hess, executive assistant director of the FBI’s Science and Technology Branch, said in a recent interview.

From the McClatchy Washington Bureau, Big Brother is watching:

After CIA gets secret whistleblower email, Congress worries about more spying

The CIA obtained a confidential email to Congress about alleged whistleblower retaliation related to the Senate’s classified report on the agency’s harsh interrogation program, triggering fears that the CIA has been intercepting the communications of officials who handle whistleblower cases.

The CIA got hold of the legally protected email and other unspecified communications between whistleblower officials and lawmakers this spring, people familiar with the matter told McClatchy. It’s unclear how the agency obtained the material.

At the time, the CIA was embroiled in a furious behind-the-scenes battle with the Senate Intelligence Committee over the panel’s investigation of the agency’s interrogation program, including accusations that the CIA illegally monitored computers used in the five-year probe. The CIA has denied the charges.

The email controversy points to holes in the intelligence community’s whistleblower protection systems and raises fresh questions about the extent to which intelligence agencies can elude congressional oversight.

Defense One charts spooky trepidation:

The CIA Fears the Internet of Things

The major themes defining geo-security for the coming decades were explored at a forum on “The Future of Warfare” at the Aspen Security Forum on Thursday, moderated by Defense One Executive Editor Kevin Baron.

Dawn Meyerriecks, the deputy director of the Central Intelligence Agency’s directorate of science and technology, said today’s concerns about cyber war don’t address the looming geo-security threats posed by the Internet of Things, the embedding of computers, sensors, and Internet capabilities into more and more physical objects.

“Smart refrigerators have been used in distributed denial of service attacks,” she said. At least one smart fridge played a role in a massive spam attack last year, involving more than 100,000 internet-connected devices and more than 750,000 spam emails. She also mentioned “smart fluorescent LEDs [that are] are communicating that they need to be replaced but are also being hijacked for other things.

And from The Intercept, partners in crime:

The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police

The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters.

The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents.

But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them. The move is part of the Obama Administration’s increasingly close ties with the Saudi regime; beyond the new cooperation with the MOI, the memo describes “a period of rejuvenation” for the NSA’s relationship with the Saudi Ministry of Defense.

IDG News Service covers another partnership:

Dutch spy agencies can receive NSA data, court rules

Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.

The possibility that data received by Dutch intelligence services AIVD and MIVD could have been collected in a way that would not be legal for the Dutch services, doesn’t mean that receiving this data violates international and national treaties, the court said.

The Hague District Court ruled in a civil case file by a coalition of defense lawyers, privacy advocates and journalists who sued the Dutch government last November. They sought a court order to stop the AIVD and MIVD from obtaining data from foreign intelligence agencies that was not obtained in accordance with European and Dutch law.

A tale of dissension from the McClatchy Washington Bureau:

In Kansas, candidates spar over NSA

As a member of the House Select Committee on Intelligence, Kansas Rep. Mike Pompeo had a front-row seat to the brouhaha that erupted in Washington last year over revelations that the government was secretly collecting Americans’ data.

Todd Tiahrt, Pompeo’s challenger in the upcoming Republican primary for Kansas’ 4th Congressional District, has seized on the incumbent’s proximity to the controversy _ and his voting record _ to attack him. Now Pompeo finds himself in the awkward position of defending the National Security Agency’s surveillance program while campaigning as a tea party stalwart who sympathizes with voters’ distrust of the federal government.

Tiahrt is vulnerable on the issue of privacy too. As a former congressman who also served on the intelligence committee, he voted in favor of warrantless wiretapping and the Patriot Act, which expanded the government’s surveillance powers _ facts that the Pompeo campaign is quick to point out.

While the Washington Post covers the not-so-spooky:

CNN’s Diana Magnay is latest reminder that Twitter can be a journalist’s worst enemy

Since the advent of Twitter, Facebook and other instantaneous digital platforms, reporters have lost their jobs, been suspended or been reassigned after posting things deemed inappropriate by readers, viewers and — most important — their bosses. The objectionable posts have usually called into question the journalists’ ability to remain neutral and fair to both sides of any story.

The latest casualty: CNN correspondent Diana Magnay, who last week stirred criticism for a tweet about a group of Israelis who were cheering a missile attack on Gaza. Magnay said in her tweet that members of the group had threatened her. “Scum,” she concluded. Amid an outraged reaction, the network apologized, saying Magnay was referring only to the group’s alleged harassment of her, not to its support of the military action. She was quickly reassigned to Moscow.

The incident echoed CNN’s dismissal in 2010 of Octavia Nasr, a longtime foreign-affairs editor. The network cut Nasr loose after she tweeted her thoughts about the death of a leader of Hezbollah, the Lebanese terrorist organization, calling him “one of Hezbollah’s giants I respect a lot.”

From intelNews, Washington pulls the reins:

Aruba arrests ex-head of Venezuelan intelligence, after US request

The former director of Venezuela’s military intelligence, who was a close associate of the country’s late president Hugo Chavez, has been arrested in Aruba following a request by the United States. Authorities in the Dutch-controlled Caribbean island announced on Thursday the arrest of Hugo Carvajal Barrios, former director of Venezuela’s Dirección General de Inteligencia Militar (DGIM), which is Venezuela’s military intelligence agency. A close comrade of Venezuela’s late socialist leader, Carvajal was accused by the US Department of the Treasury in 2008 of weapons and drugs smuggling. According to the US government, Carvajal was personally involved in illegally providing weapons to the Revolutionary Armed Forces of Colombia (FARC), a leftwing guerrilla group involved in a decades-long insurgency war against the government of Colombia.

It also accused the Venezuelan official of helping the FARC smuggle cocaine out of the country, in a bid to help them raise funds to support their insurgency against Colombian authorities. But the government of Venezuela rejects all charges and has been sheltering Carvajal. In January of this year it appointed him consul-general to Aruba, a Dutch colony in the Caribbean located just 15 miles off Venezuela’s coast.

Bloomberg raises the terror alert:

Norway on High Alert Amid Warnings of Attack Next Week

Police in Norway are on high alert after receiving intelligence that nationals returning from Syria may be plotting a terrorist attack within days against the Scandinavian country.

Information obtained by Norway’s security service, PST, suggests an attack could be imminent, the unit’s chief, Benedicte Bjoernland, said July 24. Authorities have strengthened their presence at Norway’s borders, airports and train stations, and police in all districts are at a heightened state of preparedness.

Police officers in Norway’s capital, Oslo, have been stationed at focal points in the city including parliament and the royal palace as well as at shopping centers, spokesman Kaare Hansen said by phone yesterday. Authorities have followed up on a number of tips received since yesterday, the police said, without providing more details.

More from TheLocal.no:

Statoil tightens security amid terror threat

Statoil, Norway’s biggest energy company, has ‘increased’ security after this week’s terror warning announcement, said the firm’s CEO on Friday.

Helge Lund, Statoil’s CEO, said to NTB that: “The security level of Statoil has increased as a consequence of the terror threat.”
“We are following the situation very closely. We have close contact with Norwegian authorities and are taking the measures we think are necessary, based on their threat evaluations.”

One-and-a-half year ago the company was struck by the worst terror action that has ever been directed towards a Norwegian company, when terrorists attacked the gas facility Tigantourine in In Aménas in Algeria. Five Norwegian Statoil employees were killed during the four days the hostage drama lasted.

Meanwhile, the Toronto Globe and Mail covers consequences of aggression:

The Gaza war has done terrible things to Israeli society

Earlier this month, one of Israel’s most famous writers announced in his weekly newspaper column that he was packing up his family and moving to the United States – permanently. Sayed Kashua, an Arab-Palestinian citizen of Israel who resides in Jerusalem, is the author of critically acclaimed novels and a popular television series, all written in Hebrew with wit and insight into the complex, conflicted society of Arabs and Jews living uneasily side-by-side. But after more than two decades of believing that ultimately Arabs and Jews would find a way to co-exist as equals, he wrote, something inside him “had broken.” He no longer believed in a better future.

Mr. Kashua’s decision to emigrate came in response to a series of events that were marked by violence and incitement against the Arab population, from the government to the street. One member of the Knesset, Israel’s parliament, called for a war against the Palestinian people on her Facebook page. Another called an Arab legislator a “terrorist” during a parliamentary committee session, while still another, the leader of an ostensibly centrist party, submitted a proposal to ban an established Arab nationalist party with sitting members of the Knesset. The editor of a right-wing newspaper suggested that now was the time to transfer the Arab population out of the occupied West Bank. In Jerusalem, mobs of hyper nationalist youth rampaged through the cafe-lined downtown streets chanting “death to Arabs,” assaulting random passersby because they looked or sounded Palestinian.

Most horrifically of all, a 17 year-old Palestinian boy from East Jerusalem was abducted from the street by six young Jewish men, three of them minors. The police found Mohammed Abu Khdeir’s corpse in the nearby Jerusalem Forest shortly after CCTV cameras recorded some young men forcing him into a car. He had been doused with gasoline and burned alive. Three of the six boys confessed to the crime and re-enacted it for the police.

On to the latest developments in the trans-Pacific Game of Zones, via China Daily:

Confessions of Japanese war criminals online

The State Archives Administration started releasing a large number of files on major Japanese war criminals on its website on Thursday to offer a clearer picture of history.

“The confessions written by all the war criminals and the detailed trial records contained in the archived files are irrefutable evidence of the heinous crimes committed by the Japanese militarist aggressors against the Chinese people,” Li Minghua, deputy director of Central Archives of China, said on Thursday.

Since the Abe Cabinet came to power in Japan, it has openly confused right and wrong to mislead the public on history, he said at a news conference of the State Council Information Office.

With the upcoming 77th anniversary of the Marco Polo Bridge Incident – an incident that marked the start of Japan’s full aggression against the nation – the release of such materials can prove their crimes during the Japanese War of Aggression against China, experts said.

Pressure from Foggy Bottom, via the Japan Daily Press:

U.S. Senators seek Obama’s help to resolve issue of ‘comfort women’

With Japan’s announcement last week that it has begun reviewing the accounts of former “comfort women,” a euphemistic term for those forced into sexual labor by the Japanese Imperial Army during the Second World War, former victims and their supporters have expressed outrage over the development. Three senators from the United States are urging President Barack Obama to keep its interest and exert more effort in addressing the matter.

The letter calling for Obama’s actions was signed and sent by Senators Martin Heinrich, Tim Johnson and Mark Begich. The trio called upon the US president’s passionate statement regarding the atrocities done to the women. In his recent trip to Asia, Obama called what was done to the comfort women as a “terrible and egregious violation of human rights.” The trio of senators echoed his statement, noting “We affirm your statement that the ‘women were violated in ways that even in the midst of war was shocking.” They further went on to describe the women’s plight as deserving “to be heard and respected.” The letter closed by expressing their request that he continue to help resolve this particular issue.

The senators believe that finding a resolution to the issue of comfort women will be vital in further improving trilateral ties of the United States with Japan and South Korea. While both Asian countries are known U.S. allies, the two remain at odds with each other because of their wartime history that has prevented them from fostering cordial ties in recent years.

The Asahi Shimbun raises the heat:

NHK governor’s remarks on prewar Koreans in news show may violate law

A conservative Japan Broadcasting Corp. (NHK) governor complained about comments made on prewar Korean immigrants to Japan in a news program, possibly violating the Broadcast Law that forbids governors from interfering with shows, according to insiders.

Naoki Hyakuta questioned and disputed NHK newscaster Kensuke Okoshi’s remarks at a July 22 meeting of the NHK Board of Governors.

Hyakuta, handpicked for the 12-member board by Prime Minister Shinzo Abe, is a writer who has generated controversy over his conservative stance on historical issues, such as calling the Nanking Massacre a fabrication crafted to cancel out U.S. atrocities.

Haruo Sudo, a professor emeritus of Hosei University whose specialty is media theory, said Hyakuta’s latest outburst was an obvious violation of the Broadcast Law.

Nextgov covers insecurity closer to home:

Virtual Border Fence Project Halted After Raytheon Protest

A major border security project involving the deployment of 50 surveillance towers across southern Arizona is temporarily on hold, following a protest by Raytheon that the government improperly awarded the work to a rival.

In a protest decision released Thursday afternoon, the Government Accountability Office ruled the Department of Homeland Security should reevaluate the competitors’ proposals. Among other things, it is possible Raytheon was “prejudiced by the agency’s errors” during an evaluation of proposals, the ruling stated.

U.S. Customs and Border Protection — part of DHS — had planned to initially build seven towers during the first year of a potentially 8 and 1/2 year, $145 million deal with vendor EFW, of Fort Worth, Texas. The contract was awarded in February, after a two-year competition among 14 companies.

PandoDaily resets the WABAC  Machine:

Report: Google has removed around 50,000 links thanks to Europe’s “right to be forgotten”

Europeans have asked Google to remove more than 91,000 links from its search results, and the company has granted more than half of those requests, according to a Bloomberg report. Combined, the requests are said to apply to more than 328,000 Internet addresses. The majority of removal requests have come from people who are living in France and Germany.

Google is thought to have revealed these numbers to privacy watchdogs and the press to show that it’s taking the right to be forgotten, which it has criticized in the past for being too broad and difficult to implement, more seriously than it seems. As the Wall Street Journal reports:

Google’s disclosure could also soothe tensions with privacy regulators, who called Thursday’s meeting and have been critical of how the search company has implemented the ruling. Some have been demanding that Google end its notifications to websites that have been the subject of right to be forgotten requests, which have in some cases made it possible to identify the person making the request.

From IDG News Service, a familiar plea, this time from Moscow:

Russian government offers money for identifying Tor users

The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.

The Tor software anonymizes Internet traffic by encrypting it and passing it through several random relays in order to prevent potential network eavesdroppers from identifying the traffic’s source and destination. The software was originally developed as a project of the U.S. Naval Research Laboratory, but is now being maintained by a nonprofit organization called The Tor Project.

The Tor network is popular with journalists, political activists and privacy-conscious users in general, but has also been used by pedophiles and other criminals to hide their tracks from law enforcement.

Four our final items, we focus on another cause for insecurity, at least for half the population. First, this from Newswise:

Link Between Ritual Circumcision Procedure and Herpes Infection in Infants Examined by Penn Medicine Analysis

A rare procedure occasionally performed during Jewish circumcisions that involves direct oral suction is a likely source of herpes simplex virus type 1 (HSV-1) transmissions documented in infants between 1988 and 2012, a literature review conducted by Penn Medicine researchers and published online in the Journal of the Pediatric Infectious Diseases Society found. The reviewers, from Penn’s Center for Evidence-based Practice, identified 30 reported cases in New York, Canada and Israel.

The practice—known as metzitzah b’peh—and its link to HSV-1 infections have sparked international debate in recent years, yet no systematic review of the literature has been published in a peer-reviewed journal examining the association and potential risk. During metzitzah b’peh, the mohel, a Jewish person trained to perform circumcisions, orally extracts a small amount of blood from the circumcision wound and discards it.

Lead author Brian F. Leas, MS, MA, a research analyst in the Center for Evidence-based Practice at the University of Pennsylvania Health System, identified six relevant studies for the systematic review. All six studies were descriptive case reports or case series that documented neonatal HSV-1 infections after circumcision with direct oral suction.

And it’s not just babes in arm with cause for concern. Form the Independent:

US patient Johnny Lee Banks sues doctors over circumcision that ended up as amputation

Something was absent without leave when Johnny Lee Banks came out of the anaesthetic after what should have been a routine circumcision at a hospital in Birmingham, Alabama, last month. That, at least, is the claim in a medical malpractice suit filed this week that has men across the state, if not America, clenching their midriffs in horror.

“When the plaintiff … woke from his aforesaid surgical procedure, his penis was amputated,” the lawsuit states. It goes on to contend that no one at the Princeton Baptist Medical Centre in Birmingham has been able to explain why it had become necessary to remove the entire organ rather than just the foreskin as he had expected.

“My client is devastated,” said John Graves, a lawyer for Mr Banks. The lawsuit names two doctors as defendants in the suit as well as the facility attached to the hospital that was responsible for the procedure. It was filed jointly by Mr Banks, who is 56, and his wife, who is claiming the marvellously legalistic “loss of consortium”.

Pottery Barn Rule redux: Another Iraqi tragedy


Remember the Pottery Barn Rule? That’s how Gen. Colin Powell described American responsibility toward that deeply wounded nation in the wake of Operation Desert Storm, Bush I’s war to destroy the nation then headed by Saddam Hussein: You break it, you buy it.

Turns out that Pottery Barn had no such rule, and now it appears the U.S. doesn’t either.

The latest item to be added to Washington’s tab is the tomb of Jonah, that Old Testament prophet who was swallowed by a whale and acquired a reputation to resisting imperatives.

From RT:

ISIS militants blow up Prophet Jonas’ tomb in Iraq

The shrine of Jonas – revered by Christians and Muslims alike – has been turned “to dust” near Iraq’s Mosul. Footage of the event was posted online, and witnesses said it took ISIS militants just an hour to stuff the mosque with explosives.

“ISIS militants have destroyed the Prophet Younis (Jonah) shrine east of Mosul city after they seized control of the mosque completely,” an anonymous security source told the Iraq-based al-Sumaria News.

The extremist group ISIS changed its name from the Islamic State of Iraq and Syria (ISIS/ISIL) to just the Islamic State (IS), after formally declaring a new caliphate in Syria and Iraq at the end of June.

Here’s an ISIS video of their assault on history:

So did the White House any idea of what was happening in a nation Washington had blasted back into the Middle Ages?

Of course they did.

From the McClatchy Washington Bureau:

Obama administration knew Islamic State was growing but did little to counter it

Like the rest of the world, the U.S. government appeared to have been taken aback last month when Mosul, Iraq’s second largest city, fell to an offensive by jihadis of the Islamic State that triggered the collapse of five Iraqi army divisions and carried the extremists to the threshold of Baghdad.

A review of the record shows, however, that the Obama administration wasn’t surprised at all.

In congressional testimony as far back as November, U.S. diplomats and intelligence officials made clear that the United States had been closely tracking the al Qaida spinoff since 2012, when it enlarged its operations from Iraq to civil war-torn Syria, seized an oil-rich province there and signed up thousands of foreign fighters who’d infiltrated Syria through NATO ally Turkey.

But, hey, who’s going stop the U.S. from continuing to fuel violent conflicts with little or no regard for the consequences when events turn out far more grim than all those rosy scenarios?

Chart of the day II: Running deadly numbers


From MintPress News. Whatever happened to “proportional response”? Click on the image to enlarge:

BLOG Kill4Peace

Which reminds us of a favorite song of ours from back when the U.S. was doing pretty much the same thing to a place called Vietnam.

From the late, great rock band, the Fugs, “Kill for Peace”:

Slay for pay: The rise of the mercenary


Way back when, in the days when esnl was but a mere high school student, he was told by his Latin and World History teachers that one clear symptom of the decline of ancient Rome was the transformation of the empire’s formidable citizen army into a force increasingly manned by mercenaries, hired swords with allegiance not to the distant imperial seat but to their own financial gain — or, in other words, always open to a better offer.

The words that begin this Vice documentary thus struck a resonant chord:

At the start of the Iraq War in 2003, for every ten U.S. military servicemembers, there was one private military contractor.

By 2007, there were more contractors than actual U.S. military.

From Vice:

Superpower for Hire: Rise of the Private Military

Program notes:

Vice takes an unprecedented look into the shadowy industry of Private Military Companies. For the past two decades these private companies, like Black Water, Aegis and G4S have silently consumed military operations around the world, doing everything from back end logistics, protection of government VIP’s and diplomats to actual combat duties. In this documentary we explore the origins of this industry, their rise in the war on terror and their future operations around the world.

InSecurity Watch: Spooks, woes, and dirty deals


While we’re unsure what’s to become of our blog, we remain committed to pointing out developments likely to impinge on the future of folks, both those alive today and the yet-to-be-born.

Developments in the realm of technology and their potential to shred the last remaining vestiges of privacy in the interests of corporations and their symbiotes in the National Security State in an era of enforced globalization — and thus creating a new context for the human experience in which all our vulnerabilities become transparent to folks with a powerful interest in exploiting them in the interests of deep politics and corporate profiteering.

And with that preamble, on with the shoe, starting with deplorable military action in a perennial tinderbox. Via The Independent:

Israel-Gaza conflict: UN school shelled by Israeli tanks, leaving 15 dead and 200 wounded

  • Doctors and officials described the strike as a ‘massacre’ mostly impacting children

While the Israeli Defence Forces (IDF) had no immediate comment on the incident, news agency photographers reported seeing pools of blood on the ground in the courtyard of the school near the apparent impact mark of a shell.

Israeli Radio, without citing a source, said that most of those killed at the UN compound were children.

It comes after the UN’s humanitarian chief drew attention to the “major concern” of child fatalities in the conflict, which has seen one child killed every hour over the past three days.

On Tuesday, a spokesperson for the UN’s Office for the Coordination of Humanitarian Affairs (OCHA) said: “There is literally no safe place for civilians [in Gaza].”

From The Hill, the ornamental fruits of ornamental umbrage:

Senate NSA compromise likely to come next week

Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) is close but not yet ready to unveil a negotiated measure to rein in government surveillance.

Despite reports that the bill could be revealed this week, people familiar with the discussions said Leahy will actually release the compromise legislation as early as Tuesday.

Leahy has been working with the administration on a compromise.

Earlier this week, an aide said conversations had turned a corner and they were “within inches” of an agreement. Leahy said Tuesday that he was “far more encouraged that we can finally come up with some legislation that will do two things.”

Whilst the Guardian adds critical context:

US warned: surveillance reform hinges on change to Reagan executive order

  • John Napier Tye, a former State Department official, says Americans’ data remains vulnerable until executive order that provides NSA with a path to collect data is reformed

John Napier Tye is not Edward Snowden. He says he has no surveillance documents to disclose to journalists. He takes a nuanced position on Snowden’s disclosures.

Yet the 38-year old former State Department official has raised a Snowden-like alarm that Americans’ communication data remains highly vulnerable to surreptitious collection by the National Security Agency – and will remain vulnerable despite the legislative fixes wending through Congress to redress the bulk domestic phone data collection Snowden revealed.

Like Snowden, Tye means to spark a debate on the proper boundaries of NSA authorities. His focus is on an obscure, Reagan-era executive order that serves as a foundational set of rules for the intelligence apparatus. The order, known as Executive Order 12333, renders the current surveillance debate hollow, he said, even as it shows signs of traction in the Senate.

Next up, a critical Washington ally grows increasingly pissed, via intelNews:

Up to 20 US spies inside German government: media reports

German counterintelligence has intensified its surveillance of “certain employees of the United States embassy” in Berlin, after internal reports suggested that “up to 20″ agents of the American government are operating inside the German federal bureaucracy.

Citing information “from American security circles”, German newspaper Bild am Sonntag said on Sunday that the agents are German citizens who are secretly employed by a variety of American civilian and military intelligence agencies in return for money.

The Berlin-based tabloid noted that at least a dozen such agents have infiltrated four departments of the German federal government, namely the Ministries of Defense, Finance, Interior, as well as the Ministry for Economic Cooperation and Development. The paper said that the latter has been targeted by the US Central Intelligence Agency because it is routinely employed by the BND, Germany’s main external intelligence organization, as a cover for clandestine activities.

From The Independent again, a response:

Germany begins spying on Britain and America for the first time since 1945

  • Government responds to a series of spy scandals which began last year with revelations that the NSA had bugged Chancellor Angela Merkel’s mobile phone

Chancellor Angela Merkel has ordered her counter-espionage services to begin surveillance of British and American intelligence gathering in Germany for the first time since 1945 in response to a series of US spy scandals which have badly soured relations between Berlin and Washington.

The Süddeutsche Zeitung and two-state funded German TV channels, WDR and NDR, quoted an unnamed Berlin government source who said Ms Merkel’s Chancellery and her interior and foreign ministries had agreed to launch counter-espionage measures against Britain and the US for the first time.

“Right now we need to send a strong signal,” the Süddeutsche Zeitung quoted the source as saying. The extraordinary measures are a direct response to a series of embarrassing US and British spying scandals in Germany which began last year with revelations that the US National Security Agency had bugged Ms Merkel’s mobile phone.

More from Spiegel:

Keeping Spies Out: Germany Ratchets Up Counterintelligence Measures

  • Officials in Berlin were long in denial that their closest allies were spying on Germany. Now, ministries are undertaking measures to improve security and counterintelligence. They’re anticipating frosty relations with the US for some time to come.

Last Wednesday, German Interior Minister Thomas de Maizière paid a visit to his colleague in the Foreign Ministry, Frank-Walter Steinmeier for a strictly confidential conversation about the currently tense relationship with the United States. Specifically, they planned to address the latest spying revelations and accusations. Before the meeting began, both ministers turned in their mobile phones. Foreign Minister Frank-Walter Steinmeier has a small side room he uses for this purpose; part of the Foreign Ministry is in the former Nazi Reichsbank and has very thick walls. The room is now used to store smartphones and tablet computers when sensitive discussions take place.

The precaution reflects the significant disquiet and anxiety in Berlin’s ministries and in the Chancellery as the summer holidays get underway. Slowly, ministry officials are starting to grapple with the true meaning of “360 degree” counterintelligence. It means defending yourself not just usual suspects like Russia or China. But also against Germany’s closest allies, particularly the United States.

A few days ago, Chancellor Merkel reportedly told US President Barack Obama in a telephone conversation that anger over the US spying activities in Berlin’s government quarter as well as the recruitment of an informant inside Germany’s Bundesnachrichtendienst (BND) foreign intelligence service has in no way subsided. Because Obama apparently expressed little understanding for the commotion in Germany, Merkel is now taking action.

From the McClatchy Washington Bureau, a Washington diplomatic blitzkrieg:

Top Obama aides fly to Berlin to talk about spying allegations

Two weeks after Germany demanded that the top U.S. intelligence official stationed in its country leave, President Barack Obama has dispatched two top aides to Berlin.

White House Chief of Staff Denis McDonough and Lisa Monaco, assistant to the president for counterterrorism and homeland security, met with their German counterparts in Berlin Tuesday “for intensive talks on the state of bilateral relations and future cooperation,” according to the White House.

The meeting came after German authorities said they were investigating new instances of spying, including one that targeted the parliamentary committee probing National Security Agency eavesdropping. Last year, reports indicated that the NSA was monitoring the communications of millions of Germans, including listening in on Merkel’s cellphone.

Meanwhile, from the Washington Post’s David Ignatius, meet that old Foggy Bottom familiar, Rosy Scenario:

Germany, U.S. rebuild a spy partnership

Given recent German indignation about the National Security Agency, it has been easy to overlook the fact that for decades the German government has cooperated extensively with the NSA on surveillance activities. But after a high-level meeting in Berlin this week, this long-standing but veiled cooperation may have a firmer legal and political base.

The two countries’ past partnership became so extensive that they even developed a special logo for their joint signals—intelligence activity, known by its initials, “JSA.” It shows an American bald eagle against the colors of the German flag, next to the words Der Zeitgeist, or “the spirit of the age.”

Like so much else we know about the NSA, the details about its activities in Germany come from Edward Snowden, the former NSA contractor now living in Moscow. He provided a trove of secret documents to Der Spiegel, which published more than 50 online last month.

German anger about American spying boiled over recently with the expulsion of the CIA station chief in Berlin. The Germans were furious when they discovered that the CIA was paying a “walk-in” German agent, adding to their anger that the NSA had tapped Chancellor Angela Merkel’s cellphone.

From the New York Times, more fallout from the Dark Side:

European Court Censures Poland Over C.I.A. Rendition Program

The European Court of Human Rights ruled Thursday that Poland had violated the rights of two terrorism suspects by allowing their transfer to a secret detention center run by the C.I.A. in Poland, where the two men were tortured.

The ruling says Poland failed to prevent the two men — Abu Zubaydah, born in Saudi Arabia, and Abd al-Rahim al-Nashiri, a Saudi citizen — from being subjected to “torture and inhuman or degrading treatment” after they were brought to a clandestine prison in northeast Poland. It ordered Poland to pay 100,000 euros, about $135,000, to Mr. Nashiri and $175,000 to Abu Zubaydah. Both are being held at the American detention center in Guantánamo Bay, Cuba.

Abu Zubaydah is believed to have overseen the operation of guesthouses in Pakistan where terrorism recruits arrived; he vetted them and provided letters of recommendation allowing them to be accepted for training at a paramilitary camp in Afghanistan, a former Guantánamo detainee said in a military court filing, for example. Mr. Nashiri is accused of plotting the 2000 bombing of the American destroyer Cole.

While The Intercept covers the Kafkaesque:

The Secret Government Rulebook For Labeling You a Terrorist

The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept.

The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted.

Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases—though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In an affidavit, Holder called them a “clear roadmap” to the government’s terrorist-tracking apparatus, adding: “The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed … could cause significant harm to national security.”

From Newser, the War on Photography continues, this time with violence [as well as another touch of Kafka]:

Border Official Points Gun… at Boy Scout: Troop Leader

  • Another scout gets threatened with 10 years in prison

A couple weeks ago, a US border patrol official held a gun to the head of … a Boy Scout. A troop leader explains what happened now that the scouts and adult volunteers from Mid-Iowa Scout Troop 111 have returned from their 23-day trip: Ten days into the trip, their four vans attempted to cross from Canada into Alaska. One scout made an innocent error: He snapped a photo of a US border official. Troop Leader Jim Fox tells KCCI that officials detained everyone in that van and searched them and their luggage, and one agent confiscated the boy’s camera, telling him “he would be arrested, fined possibly $10,000 and 10 years in prison.” But it didn’t end there.

When another scout removed some luggage to comply with the search, Fox says the boy heard “a snap of a holster, and here’s this agent, both hands on a loaded pistol, pointing at the young man’s head.” No one was ultimately hurt or arrested—just scared—and after a four-hour ordeal, the group was allowed to enter Alaska. A Boy Scout official says the scouts learned an important lesson about being a “good citizen” and following rules. But as for that cited rule against photographing federal agents? It’s not exactly true. According to Reason.com, the American Civil Liberties Union says that photographing “things that are plainly visible from public spaces,” including government officials, “is a constitutional right.”

From ZDNet, suspicions confirmed!:

Forensic scientist identifies suspicious ‘back doors’ running on every iOS device

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.

The HOPE conference started in 1994 and bills itself as “one of the most creative and diverse hacker events in the world.”

Zdziarski, better known as the hacker “NerveGas” in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is the author of five iOS-related O’Reilly books including “Hacking and Securing iOS Applications.”

And from Military & Aerospace Electronics, there’s more than angels looking over our shoulders:

U.S. UAV spending to triple over next 5 years

The U.S. market for unmanned aerial vehicles (UAVs) will triple in size over the next five years, and should grow from $5 billion in 2013 to $15 billion in 2020, predict analysts at market researcher Information Gatekeepers Inc. (IGI) in Boston.

The IGI study entitled 2014 UAV Market Research Study takes a look at the total UAV market from large military UAVs to do-it-yourself (DIY) UAVs for amateurs, company officials say.

The study includes the following major market sectors including the U.S. Department of Defense (DOD), civil, commercial, small UAVs, amateur and hobby UAVs, and radio-controlled UAVs.

TechWeekEurope covers another private sector initiative:

European Central Bank Held To Ransom Over Stolen Data

  • Hackers steal partially encrypted records from an events website that belongs to the bank

Hackers have breached the public website of the European Central Bank (ECB) and made off with names, email addresses and other personal details of people who had registered for events there.

The attack came to light on Monday, after the organisation received an anonymous email which demanded an unspecified amount of money for the data.

The ECB said most of the stolen information was encrypted, and no sensitive market data has been compromised in the breach. It didn’t indicate whether it was going to pay the ransom.

The institution, which administers the monetary policy of the 18 members of the Eurozone who chose to adopt the single currency, was established by the Treaty of Amsterdam in 1998 and is one of the world’s most important central banks.

After the jump, the latest on the ever-escalation Sino-American trans-Pacific confrontation [including Latin American plays],  Britain goes all Orwell, why some Spanish cops have to pee in a bottle daily [and not for te reasons you might expect], and Rob Ford falls prey top a Sharknado. . . Continue reading

Headlines II: Spies, pols, threats, hacks, zones,


Lotsa ground to cover, so straight ahead, first with the Washington Times:

Greenwald to publish list of U.S. citizens NSA spied on

Glenn Greenwald, one of the reporters who chronicled the document dump by National Security Agency leaker Edward Snowden via the U.K. press, now said he’s set to publish his most dramatic piece yet: The names of those in the United States targeted by the NSA.

“One of the big questions when is comes to domestic spying is, ‘Who have been the NSA’s specific targets?’ Are they political critics and dissidents and activists? Are they genuinely people we’d regard as terrorists? What are the metrics and calculations that go into choosing those targets and what is done with the surveillance that is conducted? Those are the kinds of questions that I want to still answer,” Mr. Greenwald told The Sunday Times of London.

And a video report from RT America:

Greenwald to reveal Americans targeted by NSA

Program Notes:

Journalist Glenn Greenwald will end his National Security Agency series by revealing the names of American citizens targeted for surveillance by the agency. Documents provided to Greenwald by whistleblower Edward Snowden have been central to his series, revealing the massive extent of the government’s surveillance on international and domestic populations. The journalist promises his last reveal will be similar to a fireworks display; the best and most impressive portion of the show is the finale. RT’s Ameera David has more information on the tantalizing tease by Greenwald.

From the McClatchy Washington Bureau, there’s a deeper story here:

Spy whistleblower advocate stays put

Less than two months ago, a high-profile government whistleblower advocate found himself under scrutiny — ironically in an investigation of an alleged leak to Congress.

The Pentagon’s inspector general was trying to suspend and possibly revoke the top secret access of Dan Meyer, that office’s former director of whistleblowing. At the time, the news triggered concerns in Congress that he was being retaliated against for doing his job. But Meyer, who is now executive director for intelligence community whistleblowing, doesn’t appear to be going anywhere.

Although he won’t comment on the specifics, he did say his security badge “had been restored.” Asked if he had any concerns about his future, he was cryptic, but upbeat. “I have been treated very well by the intelligence community,” he said.

From NBC News, both spook and eavesdropper:

Edward Snowden Tells Brian Williams: ‘I Was Trained as a Spy’

Edward Snowden, in an exclusive interview with “Nightly News” anchor Brian Williams, is fighting back against critics who dismissed him as a low-level hacker — saying he was “trained as a spy” and offered technical expertise to high levels of government.

Snowden defended his expertise in portions of the interview that aired at 6:30 p.m. ET on Nightly News. The extended, wide-ranging interview with Williams, his first with a U.S. television network, airs Wednesday at 10 p.m. ET on NBC.

“I was trained as a spy in sort of the traditional sense of the word, in that I lived and worked undercover overseas — pretending to work in a job that I’m not — and even being assigned a name that was not mine,” Snowden said in the interview.

From New Europe, politically inconvenient:

Austria constant partner of NSA: journalist

American journalist Glenn Greenwald has said in an interview with newspaper Der Standard on Monday that Austria “constantly” works together with the American National Security Agency (NSA).

This came despite recent claims from Austrian Minister for Defence Gerald Klug that the two work together only “occasionally.”

The confidant for NSA whistleblower Edward Snowden said the cooperation is discreet and aimed at specific goals, though added the NSA sees countries such as Austria — which it puts in a “Tier B” category — primarily as a monitoring target, and as a partner “only secondarily.”

He said further documents on the cooperation between Austria and the NSA would “probably” be released as he understood the Austrian public is interested in the information, and added that “we” are currently deciding the best way to distribute the documents amongst journalists to speed up their reporting.

From intelNews.org, raising curious questions:

Alleged CIA spy seeks retrial after Iranian court slashes his sentence

A United States citizen held in Iran since 2011 on spy charges has appealed for a retrial after an Iranian court quashed his earlier death sentence for espionage. Amir Mirzaei Hekmati, a former Marine born in the US state of Arizona, was arrested in August of 2011 in Iran and charged with carrying out a covert mission for the Central Intelligence Agency.

In December of 2011, Hekmati appeared on Iranian state television and acknowledged that he was an operative of the CIA. He said in an interview that he had been trained “in languages and espionage” while in the US Army and that, in 2009, after nearly a decade of intelligence training, he was recruited by the CIA and specifically prepared to carry out what intelligence operatives sometimes refer to as a ‘dangling operation’ in Iran.

The aim of the mission, said Hekmati, was to travel to Tehran, contact Iran’s Ministry of Intelligence and National Security, and pose as a genuine American defector wishing to supply the Iranians with inside information about American intelligence. His immediate task was to gain the trust of Iranian authorities by giving them some correct information in order to set the stage for a longer campaign of disinformation aimed at undermining a host of Iranian intelligence operations.

From the New York Times, street level spookery:

In Complaint, Activists Seek Audit of New York Police Surveillance

Several groups plan to file a formal complaint on Tuesday seeking an audit of the New York Police Department’s intelligence gathering operations, after recent revelations that the department had been monitoring political activists, sending undercover officers to their meetings and filing reports on their plans.

The groups said the complaint would be the first over surveillance to be filed with the department’s new office of inspector general; it is likely be a closely watched test for the office, whose duty is to oversee the tactics and the policies of the police.

The City Council, despite opposition from former Mayor Michael R. Bloomberg, created the office last year after complaints about the overuse of stop-and-frisk tactics and surveillance of Muslim communities.

From Homeland Security News Wire, repudiating another form of domestic “security”:

U.S. recalibrating Secure Communities

As more and more municipalities across the country refuse to hold undocumented immigrants in jail on behalf of DHS’ Secure Communities program, President Barack Obama is adopting a strategy to limit deportations to undocumented immigrants who have been convicted of violent crimes. The new strategy would help relieve political pressure on the White House as immigrant rights activists continue to label Obama as the “deporter in chief” for his administration’s aggressive enforcement of immigration laws.

Secure Communities began under the George W. Bush administration to coordinate enforcement of federal immigration laws with local communities. The FBI collects the fingerprints of individuals arrested by local and state police, to identify fugitives or individuals wanted in other jurisdictions. With Secure Communities, Immigration and Customs Enforcement (ICE) officials review the fingerprints against immigration databases to see whther arrested individuals are deportable.

Secure Communities requires that local law enforcement agencies hold detainees until an ICE agent arrives, but police chiefs say that the law has made undocumented immigrants less likely to report crimes when they have been victims or witnesses. “The immigrant community are the prey; they are not the predators,” said Ron Teachman, chief of police in South Bend, Indiana. “We need them to be the eyes and ears. They are exploited in their workplace, in their neighborhoods and in their own homes with domestic violence.”

From the Guardian, revelations assessed:

Privacy under attack: the NSA files revealed new threats to democracy

Thanks to Edward Snowden, we know the apparatus of repression has been covertly attached to the democratic state. However, our struggle to retain privacy is far from hopeless

The 20th-century question was how many targets could be simultaneously followed in a world where each of them required hack, tap, steal. But we then started to build a new form of human communication. From the moment we created the internet, two of the basic assumptions began to fail: the simplicity of “one target, one circuit” went away, and the difference between home and abroad vanished too.

That distinction vanished in the United States because so much of the network and associated services, for better and worse, resided there. The question “Do we listen inside our borders?” was seemingly reduced to “Are we going to listen at all?”

At this point, a vastly imprudent US administration intervened. Their defining characteristic was that they didn’t think long before acting. Presented with a national calamity that also constituted a political opportunity, nothing stood between them and all the mistakes that haste can make for their children’s children to repent at leisure. What they did – in secret, with the assistance of judges appointed by a single man operating in secrecy, and with the connivance of many decent people who believed themselves to be acting to save the society – was to unchain the listeners from law.

And from RT, a curious blacklisting:

Snowden, Greenwald, Appelbaum, WikiLeaks ‘blacklisted’ from Stockholm Internet Forum

Key digital rights activists – including Edward Snowden and hacker Jacob Appelbaum – have been blacklisted from the Stockholm Internet Forum (SIF) on internet openness and freedom. The move has caused a stir at the gathering and outraged Twitter users.

The third annual European meeting of internet activists kicked off in Sweden on May 26, with its main theme being “Internet– privacy, transparency, surveillance and control.”

But strangely enough, those whose names immediately spring to mind when it comes to the issue of surveillance are not allowed to attend the event.

And a video report from RT, focusing on the waffling of program organizations when put to the question:

Where’s Ed? Stockholm web summit slammed as Snowden, Greenwald ‘blacklisted’

Program note:

Blacklisting Edward Snowden, Glenn Greenwald, hacker Jacob Appelbaum and others by the Stockholm Internet Forum (SIF) on internet freedom provoked strong criticism from participants and outrage on Twitter.

From the New York Times, rewards for switching sides:

Hacker Who Helped Disrupt Cyberattacks Is Allowed to Walk Free

The New York man who helped the authorities infiltrate the shadowy world of computer hacking and disrupt at least 300 cyberattacks on targets that included the United States military, courts and private companies was given a greatly reduced sentence on Tuesday of time served, and was allowed to walk free.

Federal prosecutors had sought leniency for the hacker, Hector Xavier Monsegur, citing what they called his “extraordinary cooperation” in helping the Federal Bureau of Investigation take down an aggressive group of hackers who were part of the collective Anonymous, of which he was a member, and its splinter groups, which had taken credit for attacking government and corporate websites.

Mr. Monsegur’s information, the authorities said, led to the arrest of eight “major co-conspirators,” including Jeremy Hammond, whom the F.B.I. had called its top “cybercriminal target” and who was sentenced to 10 years in prison in November.

The Washington Post covers an equally spooky form of everyday espionage:

Brokers use ‘billions’ of data points to profile Americans

Are you a financially strapped working mother who smokes? A Jewish retiree with a fondness for Caribbean cruises? Or a Spanish-speaking professional with allergies, a dog and a collection of Elvis memorabilia?

All this information and much, much more is being quietly collected, analyzed and distributed by the nation’s burgeoning data broker industry, which uses billions of individual data points to produce detailed portraits of virtually every American consumer, the Federal Trade Commission reported Tuesday.

The FTC report provided an unusually detailed account of the system of commercial surveillance that draws on government records, shopping habits and social media postings to help marketers hone their advertising pitches. Officials said the intimacy of these profiles would unnerve some consumers who have little ability to track what’s being collected or how it’s used — or even to correct false information. The FTC called for legislation to bring transparency to the multi-billion-dollar industry and give consumers some control over how their data is used.

From the New York Times, caught in the crossfire:

Technology Companies Are Pressing Congress to Bolster Privacy Protections

A law that allows the government to read email and cloud-stored data over six months old without a search warrant is under attack from technology companies, trade associations and lobbying groups, which are pressing Congress to tighten privacy protections. Federal investigators have used the law to view content hosted by third-party providers for civil and criminal lawsuits, in some cases without giving notice to the individual being investigated.

Nearly 30 years after Congress passed the law, the Electronic Communications Privacy Act, which government officials have interpreted to cover newer technologies, cloud computing companies are scrambling to reassure their customers, and some clients are taking their business to other countries.

Ben Young, the general counsel for Peer 1, a web hosting company based in Vancouver, British Columbia, said his customers were keeping their business out of the United States because the country “has a serious branding problem.”

Defense One asks for spare change:

Are Paychecks the Problem? Senate Considers Bonuses for Pentagon’s Cyber Workforce

Current and aspiring Defense Department personnel with cyber skills could see a boost in pay under a Senate 2015 defense policy bill that lawmakers detailed on Friday.

Defense is up against the private sector’s lucrative salaries as it endeavors to boost cyber mission forces. Pentagon Secretary Chuck Hagel recently said these forces, expected to include 1,800 personnel by year’s end, should number 6,000 professionals in 2016.

The Senate Armed Services Committee on Thursday approved a measure that directs each military service to determine “whether recruiting, retention, and assignment of service members with cyber skills requires bonuses or special and incentive pays,” according to the new details. The services would have to report their decisions to Congress by Jan. 31, 2015.

BBC News hacks you pocket pal:

Apple devices ‘hijacked for ransom’ in Australia

Several users of Apple devices in Australia have reported that their gadgets have been “hijacked” – with a message demanding money.

Experts believed the hack had targeted users by exploiting the Find my iPhone feature.

A message appeared on some targeted phones asking for “$100 USD/EUR” to be sent to a PayPal account.

Mobile networks have advised affected users to contact Apple, which has not yet commented on the problem.

And it’s not just Down Under, as the London Telegraph reports:

iPhones frozen by hackers demanding ransom

  • People around the world have found their iPads and iPhones frozen by hackers who are demanding cash ransoms to unlock their devices

Owners of iPhones and iPads have been targeted by a hacker who is freezing iOS devices and demanding a ransom of up to £55 to unlock them.

The majority of the attacks have taken place in Australia although there are also reports of Britons being affected.

It appears that the hacker, who goes by the name Oleg Pliss, has managed to exploit the Find My iPhone feature which can track and remotely lock stolen devices.

Reuters covers another hack attack:

Spotify to ask users to re-enter passwords after cyberattack

Music streaming service Spotify AB will ask some of its 40 million users to re-enter their passwords and upgrade their software in coming days after detecting unauthorized access to its internal systems and data.

Chief Technology Officer Oskar Stal said in a blogpost on Tuesday that it has found evidence of attackers accessing just one user’s data, which did not include payment or password information. But as a precaution, it intends to ask “certain Spotify users” to re-enter their log-in credentials, and upgrade their Google (GOOGL.O) Android app.

Spotify said it is not recommending any action yet for users of Apple Inc (AAPL.O) iPhones or devices based on Microsoft’s (MSFT.O) Windows.

From CBC News, a spy in the bedroom, and for a good cause:

Spy cam nabs care worker stealing from 82-year-old Winnipegger

  • ‘What you did is despicable,’ Manitoba judge says in giving thief 2 years probation, community work

Viola Dufresne said she noticed money vanishing from her wallet starting last January, totalling nearly $1,100 over six months.

“My dad taught us morals, and all of a sudden I’m in my home and somebody rips me off. It made me mad,” she told CBC News on Monday.

Winnipeg police told Dufresne there wasn’t much they could do without evidence, so she went online and bought a spy camera. The camera, which resembles a clock radio, showed the home-care aide taking $25 from Dufresne’s wallet.

Techdirt laments:

Former CIA Director And Defense Secretary Says CIA Tried, But Failed, To Do Economic Espionage

  • from the this-doesn’t-make-the-us-look-any-better dept

US intelligence officials still seem to think that there’s some big distinction between the kind of intelligence work the US does versus the kind that other countries do. US officials time and time again claim that they don’t do “economic espionage” — even though it’s pretty clear that they do it, just through indirect means (i.e., while they don’t hand trade secrets over to companies, they’re certainly using economic information to impact policy and trade discussions).

Former Defense Secretary and CIA boss Robert Gates continued this sort of tone deaf line of thinking from US intelligence defenders by claiming that French intelligence downloads the contents of laptops from businessmen visiting Paris:

“There are probably a dozen or 15 countries that steal our technology in this way,” Gates said in an interview the Council on Foreign Relations posted online Thursday. “In terms of the most capable, next to the Chinese, are the French — and they’ve been doing it a long time.”

After the jump, the latest developments in the ongoing, ever-transforming Asian Game of Zones, including the latest American plans for Afghanistan, Sino-American cyberwar gambits, allegations of ramming, corporate targeting, the relentless push for Japanese militarization, and Pyongyang blusters belicosely. . . Continue reading

Is The South China Sea On The Brink Of War?


A documentary from ABC Australia on the increasing tension in the oil-rich region of the Pacific where a host of nations are struggling to control potentially vast undersea petroleum and gas reserves — the struggle we’ve dubbed the Game of Zones.

Shot from a Philippine perspective and reported by Eric Campbell, the documentary gives the viewer an excellent first-hand view of the daily jockeying for possession consuming the politicians and military of a half-dozen Asian nations, hungry for the potential riches below.

Via Journeyman Pictures:

Is The South China Sea On The Brink Of War?

Program notes:

The Spratly Islands are an unremarkable scattering of reefs and sandbars in the South China Sea. But, rich in resources and claimed by six countries, could they be the trigger for the world’s next major conflict?

“We call our Kalayaan Island group the submerged Saudi Arabia of the Philippines.” Eugenio Bito-Onon is mayor of a seemingly innocuous islet municipality, home to just 150 residents.

But with the region crosshatched by important shipping lanes, the undersea bed replete with oil and gas, and the marine life furnishing vast fishing grounds, the surrounding waters are simmering with tension. China, the Philippines,

Vietnam, Malaysia, Taiwan and Brunei all lay claim to a portion of the territory, in a little-known diplomatic contest that for decades has regularly brought the area to the brink of war, and put it firmly off-limits to Western media.

“China is doing a lot of things besides bullying our fishermen and small navies,” explains the mayor as he points out a Chinese development on a small atoll known as ‘Mischief Reef’. Here, the only way to secure the land is to occupy it. So as competing claimants continue to build, could this high-stakes game of island Monopoly erupt into a fully fledged conflict?

Headlines II: Spies, laws, lies, zones & more


And lots of ground to cover in today’s tales from the dark side, including political shenanigans, spooky revelations, and all the latest from the ongoing and ever-escalating Asian Game of Zones.

For our first headline, the Buenos Aires Herald covers a major Obama security breach:

The White House blows top CIA official cover in Afghanistan

The White House inadvertently included the name of the top CIA official in Afghanistan on a list of participants in a military briefing with President Barack Obama that was distributed to reporters yesterday, the Washington Post reported.

The newspaper said the official, identified as “Chief of Station” in Kabul, was named as being among those at a briefing with Obama during the president’s trip to Bagram Air Base near the Afghan capital.

The list of names was sent by email to reporters traveling with Obama on his surprise Afghanistan visit and included in a “pool report” shared with correspondents and others not on the trip.

The Post said the White House issued a revised list deleting the CIA official’s name after it recognized the mistake.

From the Guardian, guess who helped in the cover-up?:

White House staff tried to ‘un-ring the bell’ after revealing CIA chief’s identity

  • White House press office unaware it had circulated name
  • Washington Post journalist sounded alert after filing report

The White House blew the cover of the top CIA agent in Afghanistan on Sunday, when the person’s name was included on a list given to reporters during a visit to the country by President Barack Obama.

The name was then emailed by the White House press office to a distribution list of more than 6,000 recipients, mostly members of the US media.

The agent in question, listed as chief of station, would be a top manager of CIA activity in Afghanistan, including intelligence collection and a drone-warfare programme under which unmanned aerial vehicles mount cross-border attacks into Pakistan.

From IDG News Service, a snitch in time saves nine [years?]:

US seeks leniency for ‘Sabu,’ Lulzsec leader-turned-snitch

  • Prosecutors contend the seven months time he has served is enough for Hector Xavier Monsegur

U.S. prosecutors say a hacking group’s mastermind should be spared a long prison sentence due to his quick and fruitful cooperation with law enforcement.

The man, Hector Xavier Monsegur of New York, is accused of leading a gang of international miscreants calling themselves “Lulzsec,” short for Lulz Security, on a noisy hacking spree in 2011, striking companies such as HBGary, Fox Entertainment and Sony Pictures.

Lulzsec, an offshoot of Anonymous, led a high-profile campaign that taunted law enforcement, released stolen data publicly and bragged of their exploits on Twitter. Their campaign touched off a worldwide law enforcement action that resulted in more than a dozen arrests.

From intelNews.org, they shall be released:

Spain shelves charges against French alleged ‘assassin’ spies

A court in Spain has quietly shelved charges against two French spies who were caught in Barcelona with a custom-designed sniper rifle. The two men were detained in the Catalonian town of Manresa in April of 2002. The Audi car in which they were riding was stopped at a checkpoint manned by members of the Mossos d’Esquadra, the Catalan regional police, who promptly searched it.

In the back of the car, police officers found a large PVC tube that contained a sniper rifle complete with a laser telescopic light and a silencer. The two men carried French travel documents identifying them as “Christian Piazzole” and “Rachid Chaouati”. Piazzole’s documents were found to be false, and there were suspicions that Chaouati’s may also have been forged.

Spanish authorities concluded that the two men, who admitted they were officers of France’s General Directorate for External Security (DGSE), were in Spain to conduct an assassination. In a words of a state prosecutor in Barcelona, the DGSE spies had come to Spain “to kill”. Their arrest prompted an emergency visit to Madrid of a high-level French government delegation headed by General Philippe Rondot, a former senior intelligence officer at the DGSE. Rondot told Spanish officials that the two men were “on a training exercise”.

Feelin’ insecure theatrically Down Under, via RT:

Security stunt: Australian politician brings pipe bomb into parliament

An Australian senator stunned fellow politicians after bringing explosives into a session, saying he had “brought this through security: a pipe bomb,” which brought gasps from stunned onlookers.

Senator Bill Heffernan wanted to make a point about relaxed security in the building. The 71-year-old wheat farmer has been warning for months about a rising security risk facing the $1 billion building.

Under a 12-month trial, hundreds of MPs, senators, political and departmental staff no longer need to be scanned by metal detectors or have their bags checked.

And the stunt itself, via the Liberal [i.e., conservative] senator who serves on the Legal and Constitutional Affairs Legislation Committee. From the Australian Senate video feed via ABC News [Australia]:

Liberal Senator brings fake pipe bomb into Parliament

Program notes:

Senator Bill Heffernan presents a fake pipe bomb he has smuggled into Australian Parliament House to demonstrate the potential risks of reduced security arrangements.

From Ars Technica, woe to esnl:

Unsafe cookies leave WordPress accounts open to hijacking, 2-factor bypass

  • Accounts accessed from Wi-Fi hotspots and other unsecured networks are wide open.

Memo to anyone who logs in to a WordPress-hosted blog from a public Wi-Fi connection or other unsecured network: It’s trivial for the script kiddie a few tables down to hijack your site even if it’s protected by two-factor authentication.

Yan Zhu, a staff technologist at the Electronic Frontier Foundation, came to that determination after noticing that WordPress servers send a key browser cookie in plain text, rather than encrypting it, as long mandated by widely accepted security practices. The cookie, which carries the tag “wordpress_logged_in,” is set once an end user has entered a valid WordPress user name and password. It’s the website equivalent of a plastic bracelets used by nightclubs. Once a browser presents the cookie, WordPress servers will usher the user behind a velvet rope to highly privileged sections that reveal private messages, update some user settings, publish blog posts, and more. The move by WordPress engineers to allow the cookie to be transmitted unencrypted makes them susceptible to interception in many cases.

Cause for insecurity in Africa, via Antiwar.com:

Sisi Is Torture and Suffering, Confirms Sisi

Orchestrating a military coup against a demcoratically elected government, leading a junta that killed thousands of protesters and has sentenced many more to death for organizing those protests, Egypt’s incoming president Abdel Fattah el-Sisi is worried people think he’s “too soft,” and gave a harsh statement on his incoming regime in a television interview and leaked comments associated with it.

“I’m not leaving a chance for people to act on their own,” Sisi declared, going on to promise he would forcibly turn Egypt into a “first-class nation.”

“People think I’m a soft man. Sisi is torture and suffering,” declared Sisi, who among other things, vowed to send troops to people’s houses to install energy efficient lightbulbs as a way of solving the nation’s fuel shortage.

After the jump, the latest developments in the ever-accelerating, ever expanding Asian Game of Zones, including claims of a new top dog, hacks, exclusion threats, a ship sinking, threats, warnings, and the latest moves in the Washington-pushed Japanese remilitarization drive. . . Continue reading

Headlines II: Spies, laws, pols, zones, drones


For today’s tales from the dark side, we begin with this from MintPress News:

Will The House’s Gutted USA Freedom Act Really Stop The NSA?

“While it represents a slight improvement from the status quo, it isn’t the reform bill that Americans deserve,” says a staff attorney with the ACLU.

In a Thursday op-ed for Hays Post, Kansas Rep. Tim Huelskamp explained his reasoning for not voting for the USA Freedom Act, which cleared the House earlier in the day in a 303-121 vote.

“[The] bill presented on the House floor today does not address many of privacy and constitutional concerns expressed by Kansans over the warrantless bulk collection of Americans’ personal information,” wrote Huelskamp.

Huelskamp was an original sponsor to the bill. Originally meant to end the National Security Agency’s bulk collection of metadata from Americans’ phone records, the bill was initially heralded as the first serious attempt to bring balance to the way the nation handles electronic surveillance.

From the Guardian, the obvious conclusion:

The year of living more dangerously: Obama’s drone speech was a sham

  • We were promised drone memos. And a case for legal targeted killing. And no more Gitmo. We’re still waiting

Twelve months ago today, Barack Obama gave a landmark national security speech in which he frankly acknowledged that the United States had at least in some cases compromised its values in the years since 9/11 – and offered his vision of a US national security policy more directly in line with “the freedoms and ideals that we defend.” It was widely praised as “a momentous turning point in post-9/11 America”.

Addressing an audience at the National Defense University (NDU) in Washington, the president pledged greater transparency about targeted killings, rededicated himself to closing the detention center at Guantánamo Bay and urged Congress to refine and ultimately repeal the Authorization for the Use of Military Force, which has been invoked to justify everything from military detention to drones strikes.

A year later, none of these promises have been met. Instead, drone strikes have continue (and likely killed and wounded civilians), 154 men remain detained at Guantanamo and the administration has taken no steps to roll back the AUMF. This is not the sort of change Obama promised.

Coming up with a drone report the old-fashioned way with RT:

Over 60% of US drone targets in Pakistan are homes – research

The CIA has been bombing Pakistan’s domestic buildings more than any other targets over the past decade of the drone war launched by the US, says the latest research by the Bureau of Investigative Journalism.

Almost two thirds, or over 60 percent, of all US drone strikes in Pakistan targeted domestic buildings, says joint research conducted by the Bureau of Investigative Journalism (BIJ), a London-based non-profit news group, along with Forensic Architecture, a research unit based at Goldsmiths University, London, and Situ Research in New York.

The authors of the paper analyzed thousands of media reports, witness testimonies and field investigations to obtain the data on drone strikes in Pakistan’s Federally Administered Tribal Areas (Fata).

According to the study, at least 132 houses have been destroyed in more than 380 strikes over the past decade with at least 222 civilians being among the 1,500 or more people killed.

Security checks and no security, from Quartz:

You should fear background checks even if you’ve done nothing wrong

  • 41% error rate

This issue matters not only because innocent people and employers who hire screening companies are getting ensnared by a digital dragnet; it also matters because 65 million Americans have criminal records, and those who want to turn their lives around are hurt by background check mistakes. Maybe you don’t care that employers end up screening out deserving applicants. Maybe you scoff at liberals like me who worry that background screening has a discriminatory impact on people of color.  At least you should care that the mistakes cut both ways: employers can end up hiring applicants whose full criminal records are not showing up on background screens.

You can find a litany of common screw-ups in this report by the National Consumer Law Center (NCLC). It’s impossible to quantify the extent of the errors, partly because the industry has no registration requirements and any fly-by-night operation with web access can set up shop. But the NCLC says “tens of millions of workers may pay for these third-party errors with their jobs.” One screening company studied federal corrections databases and found a “41% error rate.”

If you got arrested 30 years ago for selling a little weed but were never charged, or if you went to trial but were never convicted, you still might be tagged with a criminal record. That’s because too many screeners don’t bother to check original court records to verify the status of cases, according to Welby. These screening companies often rely only on bulk databases that aren’t properly updated.

Techdirt covers another reason for insecurity:

Another Bogus Hit From A License Plate Reader Results In Another Citizen Surrounded By Cops With Guns Out

  • from the verification-to-be-performed-at-gunpoint dept

We recently covered a story about a lawyer who found himself approached by cops with guns drawn after an automatic license plate reader misread a single character on his plate as he drove by. The police did make an attempt to verify the plate but were stymied by heavy traffic. Unfortunately, it appears they decided to force the issue rather than let a potential car thief escape across the state line.

As I pointed out then, the increasing reliance on ALPRs, combined with the one-billion-plus records already in storage and the millions being collected every day, means the number of errors will only increase as time goes on — even as the technology continues to improve. This person was lucky to escape with nothing more than an elevated heart rate. Others won’t be so lucky… like Denise Green of San Francisco.

Green’s civil rights lawsuit has just been reinstated by Ninth Circuit Court of Appeals, which overturned an earlier decision that granted summary judgment in favor of the San Francisco Police Department. The lower court found that the officers had made a “good faith, reasonable mistake” when they performed a felony stop of Green, which included being ordered out of her vehicle and onto the ground at gunpoint and held in cuffs for nearly 20 minutes while officers verified the plates and filled out paperwork.

From the Christian Science Monitor, righting wrongs:

Dallas targets wrongful convictions, and revolution starts to spread

The Conviction Integrity Unit formed in Dallas to correct wrongful convictions has become a national model that is slowly changing prosecutors’ willingness to reopen the books nationwide.

Some of these units are window dressing created mostly for public relations, critics say. But the Dallas CI Unit has had a profound impact in the city and has come at a time when concerns about wrongful convictions are rippling through the American justice system.

Indeed, as exonerations nationwide force prosecutors to reconsider their role in public safety, Mr. Watkins has cast himself as a leading reformer, taking on the insular culture within district attorneys’ offices and challenging the credo that the most effective district attorney is the one who wins the most convictions.

“One overriding truth is that the prosecutor is by far the most important and powerful actor in the criminal justice system,” says Samuel Gross, editor of the National Registry of Exonerations.

RT covers a curious possibility:

Snowden ‘considers’ returning to US – report

American whistleblower Edward Snowden is “considering” returning home to the USA under certain conditions, his lawyer told German news magazine Der Spiegel.

“There are negotiations,” Snowden’s German lawyer Wolfgang Kaleck told Der Spiegel. “Those who know the case are aware that an amicable agreement with the US authorities will be most reasonable.”

All efforts are now focused on finding a solution acceptable for Edward Snowden, at least in the medium term, according to Kaleck, who is also secretary-general for the European Center for Constitutional and Human Rights.

From Medill News Service, snitchin’ in the kitchen?:

With ‘Internet of Things,’ your fridge will know when milk is low

Americans are adapting to a world in which virtually everything _ from cellphones and cars to washing machines and refrigerators _ is going to be connected to the Internet or networks. Many of these devices will _ and do _ “talk” to one another via tiny sensors that function almost like human senses, logging information such as temperature, light, motion and sound.

Theoretically, the sensors could allow a new refrigerator, for example, to send an alert to a homeowner’s smartphone whenever the fridge is running low on milk. This concept of device conversation is known as the Internet of Things. The technology will make life easier, but it also means more people are vulnerable to device malfunction or hacking.

Experts and government officials acknowledge the transformative power of the Internet of Things. But the authors of a White House report in May on the effects of big data _ including all the information that devices collect _ are also concerned about the potential for privacy abuses that comes with the technology.

Getting censorious with the New York Times:

Twitter Agrees to Block ‘Blasphemous’ Tweets in Pakistan

At least five times this month, a Pakistani bureaucrat who works from a colonial-era barracks in Karachi, just down the street from the former home of his country’s secularist founder, Mohammed Ali Jinnah, asked Twitter to shield his compatriots from exposure to accounts, tweets or searches of the social network that he described as “blasphemous” or “unethical.”

All five of those requests were honored by the company, meaning that Twitter users in Pakistan can no longer see the content that so disturbed the bureaucrat, Abdul Batin of the Pakistan Telecommunications Authority: crude drawings of the Prophet Muhammad, photographs of burning Qurans, and messages from a handful of anti-Islam bloggers and an American porn star who now attends Duke University.

The blocking of these tweets in Pakistan — in line with the country-specific censorship policy Twitter unveiled in 2012 — is the first time the social network has agreed to withhold content there. A number of the accounts seemed to have been blocked in anticipation of the fourth annual “Everybody Draw Muhammad Day” on May 20.

Digital Alzheimer’s from the Associated Press:

Europe’s move to rein in Google would stall in US

Europe’s moves to rein in Google — including a court ruling this month ordering the search giant to give people a say in what pops up when someone searches their name — may be seen in Brussels as striking a blow for the little guy.

But across the Atlantic, the idea that users should be able to edit Google search results in the name of privacy is being slammed as weird and difficult to enforce at best and a crackdown on free speech at worst.

“Americans will find their searches bowdlerized by prissy European sensibilities,” said Stewart Baker, former assistant secretary for policy at the U.S. Department of Homeland Security. “We’ll be the big losers. The big winners will be French ministers who want the right to have their last mistress forgotten.”

Mountain View, California -based Google says it’s still figuring out how to comply with the European Court of Justice’s May 13 ruling, which says the company must respond to complaints about private information that turns up in searches. Google must then decide whether the public’s right to be able to find the information outweighs an individual’s right to control it — with preference given to the individual.

After the jump, the latest developments from the Asian Game of Zones, including Chinese strategy, bonding afloat with Moscow and Beijing, playing chicken over the China Seas, nukes afloat, Chinese domestic insecurity, and Japan’s relentless remilitarization push. . . Continue reading