Category Archives: Warfare

Headlines II: Spies, pols, threats, hacks, zones,


Lotsa ground to cover, so straight ahead, first with the Washington Times:

Greenwald to publish list of U.S. citizens NSA spied on

Glenn Greenwald, one of the reporters who chronicled the document dump by National Security Agency leaker Edward Snowden via the U.K. press, now said he’s set to publish his most dramatic piece yet: The names of those in the United States targeted by the NSA.

“One of the big questions when is comes to domestic spying is, ‘Who have been the NSA’s specific targets?’ Are they political critics and dissidents and activists? Are they genuinely people we’d regard as terrorists? What are the metrics and calculations that go into choosing those targets and what is done with the surveillance that is conducted? Those are the kinds of questions that I want to still answer,” Mr. Greenwald told The Sunday Times of London.

And a video report from RT America:

Greenwald to reveal Americans targeted by NSA

Program Notes:

Journalist Glenn Greenwald will end his National Security Agency series by revealing the names of American citizens targeted for surveillance by the agency. Documents provided to Greenwald by whistleblower Edward Snowden have been central to his series, revealing the massive extent of the government’s surveillance on international and domestic populations. The journalist promises his last reveal will be similar to a fireworks display; the best and most impressive portion of the show is the finale. RT’s Ameera David has more information on the tantalizing tease by Greenwald.

From the McClatchy Washington Bureau, there’s a deeper story here:

Spy whistleblower advocate stays put

Less than two months ago, a high-profile government whistleblower advocate found himself under scrutiny — ironically in an investigation of an alleged leak to Congress.

The Pentagon’s inspector general was trying to suspend and possibly revoke the top secret access of Dan Meyer, that office’s former director of whistleblowing. At the time, the news triggered concerns in Congress that he was being retaliated against for doing his job. But Meyer, who is now executive director for intelligence community whistleblowing, doesn’t appear to be going anywhere.

Although he won’t comment on the specifics, he did say his security badge “had been restored.” Asked if he had any concerns about his future, he was cryptic, but upbeat. “I have been treated very well by the intelligence community,” he said.

From NBC News, both spook and eavesdropper:

Edward Snowden Tells Brian Williams: ‘I Was Trained as a Spy’

Edward Snowden, in an exclusive interview with “Nightly News” anchor Brian Williams, is fighting back against critics who dismissed him as a low-level hacker — saying he was “trained as a spy” and offered technical expertise to high levels of government.

Snowden defended his expertise in portions of the interview that aired at 6:30 p.m. ET on Nightly News. The extended, wide-ranging interview with Williams, his first with a U.S. television network, airs Wednesday at 10 p.m. ET on NBC.

“I was trained as a spy in sort of the traditional sense of the word, in that I lived and worked undercover overseas — pretending to work in a job that I’m not — and even being assigned a name that was not mine,” Snowden said in the interview.

From New Europe, politically inconvenient:

Austria constant partner of NSA: journalist

American journalist Glenn Greenwald has said in an interview with newspaper Der Standard on Monday that Austria “constantly” works together with the American National Security Agency (NSA).

This came despite recent claims from Austrian Minister for Defence Gerald Klug that the two work together only “occasionally.”

The confidant for NSA whistleblower Edward Snowden said the cooperation is discreet and aimed at specific goals, though added the NSA sees countries such as Austria — which it puts in a “Tier B” category — primarily as a monitoring target, and as a partner “only secondarily.”

He said further documents on the cooperation between Austria and the NSA would “probably” be released as he understood the Austrian public is interested in the information, and added that “we” are currently deciding the best way to distribute the documents amongst journalists to speed up their reporting.

From intelNews.org, raising curious questions:

Alleged CIA spy seeks retrial after Iranian court slashes his sentence

A United States citizen held in Iran since 2011 on spy charges has appealed for a retrial after an Iranian court quashed his earlier death sentence for espionage. Amir Mirzaei Hekmati, a former Marine born in the US state of Arizona, was arrested in August of 2011 in Iran and charged with carrying out a covert mission for the Central Intelligence Agency.

In December of 2011, Hekmati appeared on Iranian state television and acknowledged that he was an operative of the CIA. He said in an interview that he had been trained “in languages and espionage” while in the US Army and that, in 2009, after nearly a decade of intelligence training, he was recruited by the CIA and specifically prepared to carry out what intelligence operatives sometimes refer to as a ‘dangling operation’ in Iran.

The aim of the mission, said Hekmati, was to travel to Tehran, contact Iran’s Ministry of Intelligence and National Security, and pose as a genuine American defector wishing to supply the Iranians with inside information about American intelligence. His immediate task was to gain the trust of Iranian authorities by giving them some correct information in order to set the stage for a longer campaign of disinformation aimed at undermining a host of Iranian intelligence operations.

From the New York Times, street level spookery:

In Complaint, Activists Seek Audit of New York Police Surveillance

Several groups plan to file a formal complaint on Tuesday seeking an audit of the New York Police Department’s intelligence gathering operations, after recent revelations that the department had been monitoring political activists, sending undercover officers to their meetings and filing reports on their plans.

The groups said the complaint would be the first over surveillance to be filed with the department’s new office of inspector general; it is likely be a closely watched test for the office, whose duty is to oversee the tactics and the policies of the police.

The City Council, despite opposition from former Mayor Michael R. Bloomberg, created the office last year after complaints about the overuse of stop-and-frisk tactics and surveillance of Muslim communities.

From Homeland Security News Wire, repudiating another form of domestic “security”:

U.S. recalibrating Secure Communities

As more and more municipalities across the country refuse to hold undocumented immigrants in jail on behalf of DHS’ Secure Communities program, President Barack Obama is adopting a strategy to limit deportations to undocumented immigrants who have been convicted of violent crimes. The new strategy would help relieve political pressure on the White House as immigrant rights activists continue to label Obama as the “deporter in chief” for his administration’s aggressive enforcement of immigration laws.

Secure Communities began under the George W. Bush administration to coordinate enforcement of federal immigration laws with local communities. The FBI collects the fingerprints of individuals arrested by local and state police, to identify fugitives or individuals wanted in other jurisdictions. With Secure Communities, Immigration and Customs Enforcement (ICE) officials review the fingerprints against immigration databases to see whther arrested individuals are deportable.

Secure Communities requires that local law enforcement agencies hold detainees until an ICE agent arrives, but police chiefs say that the law has made undocumented immigrants less likely to report crimes when they have been victims or witnesses. “The immigrant community are the prey; they are not the predators,” said Ron Teachman, chief of police in South Bend, Indiana. “We need them to be the eyes and ears. They are exploited in their workplace, in their neighborhoods and in their own homes with domestic violence.”

From the Guardian, revelations assessed:

Privacy under attack: the NSA files revealed new threats to democracy

Thanks to Edward Snowden, we know the apparatus of repression has been covertly attached to the democratic state. However, our struggle to retain privacy is far from hopeless

The 20th-century question was how many targets could be simultaneously followed in a world where each of them required hack, tap, steal. But we then started to build a new form of human communication. From the moment we created the internet, two of the basic assumptions began to fail: the simplicity of “one target, one circuit” went away, and the difference between home and abroad vanished too.

That distinction vanished in the United States because so much of the network and associated services, for better and worse, resided there. The question “Do we listen inside our borders?” was seemingly reduced to “Are we going to listen at all?”

At this point, a vastly imprudent US administration intervened. Their defining characteristic was that they didn’t think long before acting. Presented with a national calamity that also constituted a political opportunity, nothing stood between them and all the mistakes that haste can make for their children’s children to repent at leisure. What they did – in secret, with the assistance of judges appointed by a single man operating in secrecy, and with the connivance of many decent people who believed themselves to be acting to save the society – was to unchain the listeners from law.

And from RT, a curious blacklisting:

Snowden, Greenwald, Appelbaum, WikiLeaks ‘blacklisted’ from Stockholm Internet Forum

Key digital rights activists – including Edward Snowden and hacker Jacob Appelbaum – have been blacklisted from the Stockholm Internet Forum (SIF) on internet openness and freedom. The move has caused a stir at the gathering and outraged Twitter users.

The third annual European meeting of internet activists kicked off in Sweden on May 26, with its main theme being “Internet– privacy, transparency, surveillance and control.”

But strangely enough, those whose names immediately spring to mind when it comes to the issue of surveillance are not allowed to attend the event.

And a video report from RT, focusing on the waffling of program organizations when put to the question:

Where’s Ed? Stockholm web summit slammed as Snowden, Greenwald ‘blacklisted’

Program note:

Blacklisting Edward Snowden, Glenn Greenwald, hacker Jacob Appelbaum and others by the Stockholm Internet Forum (SIF) on internet freedom provoked strong criticism from participants and outrage on Twitter.

From the New York Times, rewards for switching sides:

Hacker Who Helped Disrupt Cyberattacks Is Allowed to Walk Free

The New York man who helped the authorities infiltrate the shadowy world of computer hacking and disrupt at least 300 cyberattacks on targets that included the United States military, courts and private companies was given a greatly reduced sentence on Tuesday of time served, and was allowed to walk free.

Federal prosecutors had sought leniency for the hacker, Hector Xavier Monsegur, citing what they called his “extraordinary cooperation” in helping the Federal Bureau of Investigation take down an aggressive group of hackers who were part of the collective Anonymous, of which he was a member, and its splinter groups, which had taken credit for attacking government and corporate websites.

Mr. Monsegur’s information, the authorities said, led to the arrest of eight “major co-conspirators,” including Jeremy Hammond, whom the F.B.I. had called its top “cybercriminal target” and who was sentenced to 10 years in prison in November.

The Washington Post covers an equally spooky form of everyday espionage:

Brokers use ‘billions’ of data points to profile Americans

Are you a financially strapped working mother who smokes? A Jewish retiree with a fondness for Caribbean cruises? Or a Spanish-speaking professional with allergies, a dog and a collection of Elvis memorabilia?

All this information and much, much more is being quietly collected, analyzed and distributed by the nation’s burgeoning data broker industry, which uses billions of individual data points to produce detailed portraits of virtually every American consumer, the Federal Trade Commission reported Tuesday.

The FTC report provided an unusually detailed account of the system of commercial surveillance that draws on government records, shopping habits and social media postings to help marketers hone their advertising pitches. Officials said the intimacy of these profiles would unnerve some consumers who have little ability to track what’s being collected or how it’s used — or even to correct false information. The FTC called for legislation to bring transparency to the multi-billion-dollar industry and give consumers some control over how their data is used.

From the New York Times, caught in the crossfire:

Technology Companies Are Pressing Congress to Bolster Privacy Protections

A law that allows the government to read email and cloud-stored data over six months old without a search warrant is under attack from technology companies, trade associations and lobbying groups, which are pressing Congress to tighten privacy protections. Federal investigators have used the law to view content hosted by third-party providers for civil and criminal lawsuits, in some cases without giving notice to the individual being investigated.

Nearly 30 years after Congress passed the law, the Electronic Communications Privacy Act, which government officials have interpreted to cover newer technologies, cloud computing companies are scrambling to reassure their customers, and some clients are taking their business to other countries.

Ben Young, the general counsel for Peer 1, a web hosting company based in Vancouver, British Columbia, said his customers were keeping their business out of the United States because the country “has a serious branding problem.”

Defense One asks for spare change:

Are Paychecks the Problem? Senate Considers Bonuses for Pentagon’s Cyber Workforce

Current and aspiring Defense Department personnel with cyber skills could see a boost in pay under a Senate 2015 defense policy bill that lawmakers detailed on Friday.

Defense is up against the private sector’s lucrative salaries as it endeavors to boost cyber mission forces. Pentagon Secretary Chuck Hagel recently said these forces, expected to include 1,800 personnel by year’s end, should number 6,000 professionals in 2016.

The Senate Armed Services Committee on Thursday approved a measure that directs each military service to determine “whether recruiting, retention, and assignment of service members with cyber skills requires bonuses or special and incentive pays,” according to the new details. The services would have to report their decisions to Congress by Jan. 31, 2015.

BBC News hacks you pocket pal:

Apple devices ‘hijacked for ransom’ in Australia

Several users of Apple devices in Australia have reported that their gadgets have been “hijacked” – with a message demanding money.

Experts believed the hack had targeted users by exploiting the Find my iPhone feature.

A message appeared on some targeted phones asking for “$100 USD/EUR” to be sent to a PayPal account.

Mobile networks have advised affected users to contact Apple, which has not yet commented on the problem.

And it’s not just Down Under, as the London Telegraph reports:

iPhones frozen by hackers demanding ransom

  • People around the world have found their iPads and iPhones frozen by hackers who are demanding cash ransoms to unlock their devices

Owners of iPhones and iPads have been targeted by a hacker who is freezing iOS devices and demanding a ransom of up to £55 to unlock them.

The majority of the attacks have taken place in Australia although there are also reports of Britons being affected.

It appears that the hacker, who goes by the name Oleg Pliss, has managed to exploit the Find My iPhone feature which can track and remotely lock stolen devices.

Reuters covers another hack attack:

Spotify to ask users to re-enter passwords after cyberattack

Music streaming service Spotify AB will ask some of its 40 million users to re-enter their passwords and upgrade their software in coming days after detecting unauthorized access to its internal systems and data.

Chief Technology Officer Oskar Stal said in a blogpost on Tuesday that it has found evidence of attackers accessing just one user’s data, which did not include payment or password information. But as a precaution, it intends to ask “certain Spotify users” to re-enter their log-in credentials, and upgrade their Google (GOOGL.O) Android app.

Spotify said it is not recommending any action yet for users of Apple Inc (AAPL.O) iPhones or devices based on Microsoft’s (MSFT.O) Windows.

From CBC News, a spy in the bedroom, and for a good cause:

Spy cam nabs care worker stealing from 82-year-old Winnipegger

  • ‘What you did is despicable,’ Manitoba judge says in giving thief 2 years probation, community work

Viola Dufresne said she noticed money vanishing from her wallet starting last January, totalling nearly $1,100 over six months.

“My dad taught us morals, and all of a sudden I’m in my home and somebody rips me off. It made me mad,” she told CBC News on Monday.

Winnipeg police told Dufresne there wasn’t much they could do without evidence, so she went online and bought a spy camera. The camera, which resembles a clock radio, showed the home-care aide taking $25 from Dufresne’s wallet.

Techdirt laments:

Former CIA Director And Defense Secretary Says CIA Tried, But Failed, To Do Economic Espionage

  • from the this-doesn’t-make-the-us-look-any-better dept

US intelligence officials still seem to think that there’s some big distinction between the kind of intelligence work the US does versus the kind that other countries do. US officials time and time again claim that they don’t do “economic espionage” — even though it’s pretty clear that they do it, just through indirect means (i.e., while they don’t hand trade secrets over to companies, they’re certainly using economic information to impact policy and trade discussions).

Former Defense Secretary and CIA boss Robert Gates continued this sort of tone deaf line of thinking from US intelligence defenders by claiming that French intelligence downloads the contents of laptops from businessmen visiting Paris:

“There are probably a dozen or 15 countries that steal our technology in this way,” Gates said in an interview the Council on Foreign Relations posted online Thursday. “In terms of the most capable, next to the Chinese, are the French — and they’ve been doing it a long time.”

After the jump, the latest developments in the ongoing, ever-transforming Asian Game of Zones, including the latest American plans for Afghanistan, Sino-American cyberwar gambits, allegations of ramming, corporate targeting, the relentless push for Japanese militarization, and Pyongyang blusters belicosely. . . Continue reading

Is The South China Sea On The Brink Of War?


A documentary from ABC Australia on the increasing tension in the oil-rich region of the Pacific where a host of nations are struggling to control potentially vast undersea petroleum and gas reserves — the struggle we’ve dubbed the Game of Zones.

Shot from a Philippine perspective and reported by Eric Campbell, the documentary gives the viewer an excellent first-hand view of the daily jockeying for possession consuming the politicians and military of a half-dozen Asian nations, hungry for the potential riches below.

Via Journeyman Pictures:

Is The South China Sea On The Brink Of War?

Program notes:

The Spratly Islands are an unremarkable scattering of reefs and sandbars in the South China Sea. But, rich in resources and claimed by six countries, could they be the trigger for the world’s next major conflict?

“We call our Kalayaan Island group the submerged Saudi Arabia of the Philippines.” Eugenio Bito-Onon is mayor of a seemingly innocuous islet municipality, home to just 150 residents.

But with the region crosshatched by important shipping lanes, the undersea bed replete with oil and gas, and the marine life furnishing vast fishing grounds, the surrounding waters are simmering with tension. China, the Philippines,

Vietnam, Malaysia, Taiwan and Brunei all lay claim to a portion of the territory, in a little-known diplomatic contest that for decades has regularly brought the area to the brink of war, and put it firmly off-limits to Western media.

“China is doing a lot of things besides bullying our fishermen and small navies,” explains the mayor as he points out a Chinese development on a small atoll known as ‘Mischief Reef’. Here, the only way to secure the land is to occupy it. So as competing claimants continue to build, could this high-stakes game of island Monopoly erupt into a fully fledged conflict?

Headlines II: Spies, laws, lies, zones & more


And lots of ground to cover in today’s tales from the dark side, including political shenanigans, spooky revelations, and all the latest from the ongoing and ever-escalating Asian Game of Zones.

For our first headline, the Buenos Aires Herald covers a major Obama security breach:

The White House blows top CIA official cover in Afghanistan

The White House inadvertently included the name of the top CIA official in Afghanistan on a list of participants in a military briefing with President Barack Obama that was distributed to reporters yesterday, the Washington Post reported.

The newspaper said the official, identified as “Chief of Station” in Kabul, was named as being among those at a briefing with Obama during the president’s trip to Bagram Air Base near the Afghan capital.

The list of names was sent by email to reporters traveling with Obama on his surprise Afghanistan visit and included in a “pool report” shared with correspondents and others not on the trip.

The Post said the White House issued a revised list deleting the CIA official’s name after it recognized the mistake.

From the Guardian, guess who helped in the cover-up?:

White House staff tried to ‘un-ring the bell’ after revealing CIA chief’s identity

  • White House press office unaware it had circulated name
  • Washington Post journalist sounded alert after filing report

The White House blew the cover of the top CIA agent in Afghanistan on Sunday, when the person’s name was included on a list given to reporters during a visit to the country by President Barack Obama.

The name was then emailed by the White House press office to a distribution list of more than 6,000 recipients, mostly members of the US media.

The agent in question, listed as chief of station, would be a top manager of CIA activity in Afghanistan, including intelligence collection and a drone-warfare programme under which unmanned aerial vehicles mount cross-border attacks into Pakistan.

From IDG News Service, a snitch in time saves nine [years?]:

US seeks leniency for ‘Sabu,’ Lulzsec leader-turned-snitch

  • Prosecutors contend the seven months time he has served is enough for Hector Xavier Monsegur

U.S. prosecutors say a hacking group’s mastermind should be spared a long prison sentence due to his quick and fruitful cooperation with law enforcement.

The man, Hector Xavier Monsegur of New York, is accused of leading a gang of international miscreants calling themselves “Lulzsec,” short for Lulz Security, on a noisy hacking spree in 2011, striking companies such as HBGary, Fox Entertainment and Sony Pictures.

Lulzsec, an offshoot of Anonymous, led a high-profile campaign that taunted law enforcement, released stolen data publicly and bragged of their exploits on Twitter. Their campaign touched off a worldwide law enforcement action that resulted in more than a dozen arrests.

From intelNews.org, they shall be released:

Spain shelves charges against French alleged ‘assassin’ spies

A court in Spain has quietly shelved charges against two French spies who were caught in Barcelona with a custom-designed sniper rifle. The two men were detained in the Catalonian town of Manresa in April of 2002. The Audi car in which they were riding was stopped at a checkpoint manned by members of the Mossos d’Esquadra, the Catalan regional police, who promptly searched it.

In the back of the car, police officers found a large PVC tube that contained a sniper rifle complete with a laser telescopic light and a silencer. The two men carried French travel documents identifying them as “Christian Piazzole” and “Rachid Chaouati”. Piazzole’s documents were found to be false, and there were suspicions that Chaouati’s may also have been forged.

Spanish authorities concluded that the two men, who admitted they were officers of France’s General Directorate for External Security (DGSE), were in Spain to conduct an assassination. In a words of a state prosecutor in Barcelona, the DGSE spies had come to Spain “to kill”. Their arrest prompted an emergency visit to Madrid of a high-level French government delegation headed by General Philippe Rondot, a former senior intelligence officer at the DGSE. Rondot told Spanish officials that the two men were “on a training exercise”.

Feelin’ insecure theatrically Down Under, via RT:

Security stunt: Australian politician brings pipe bomb into parliament

An Australian senator stunned fellow politicians after bringing explosives into a session, saying he had “brought this through security: a pipe bomb,” which brought gasps from stunned onlookers.

Senator Bill Heffernan wanted to make a point about relaxed security in the building. The 71-year-old wheat farmer has been warning for months about a rising security risk facing the $1 billion building.

Under a 12-month trial, hundreds of MPs, senators, political and departmental staff no longer need to be scanned by metal detectors or have their bags checked.

And the stunt itself, via the Liberal [i.e., conservative] senator who serves on the Legal and Constitutional Affairs Legislation Committee. From the Australian Senate video feed via ABC News [Australia]:

Liberal Senator brings fake pipe bomb into Parliament

Program notes:

Senator Bill Heffernan presents a fake pipe bomb he has smuggled into Australian Parliament House to demonstrate the potential risks of reduced security arrangements.

From Ars Technica, woe to esnl:

Unsafe cookies leave WordPress accounts open to hijacking, 2-factor bypass

  • Accounts accessed from Wi-Fi hotspots and other unsecured networks are wide open.

Memo to anyone who logs in to a WordPress-hosted blog from a public Wi-Fi connection or other unsecured network: It’s trivial for the script kiddie a few tables down to hijack your site even if it’s protected by two-factor authentication.

Yan Zhu, a staff technologist at the Electronic Frontier Foundation, came to that determination after noticing that WordPress servers send a key browser cookie in plain text, rather than encrypting it, as long mandated by widely accepted security practices. The cookie, which carries the tag “wordpress_logged_in,” is set once an end user has entered a valid WordPress user name and password. It’s the website equivalent of a plastic bracelets used by nightclubs. Once a browser presents the cookie, WordPress servers will usher the user behind a velvet rope to highly privileged sections that reveal private messages, update some user settings, publish blog posts, and more. The move by WordPress engineers to allow the cookie to be transmitted unencrypted makes them susceptible to interception in many cases.

Cause for insecurity in Africa, via Antiwar.com:

Sisi Is Torture and Suffering, Confirms Sisi

Orchestrating a military coup against a demcoratically elected government, leading a junta that killed thousands of protesters and has sentenced many more to death for organizing those protests, Egypt’s incoming president Abdel Fattah el-Sisi is worried people think he’s “too soft,” and gave a harsh statement on his incoming regime in a television interview and leaked comments associated with it.

“I’m not leaving a chance for people to act on their own,” Sisi declared, going on to promise he would forcibly turn Egypt into a “first-class nation.”

“People think I’m a soft man. Sisi is torture and suffering,” declared Sisi, who among other things, vowed to send troops to people’s houses to install energy efficient lightbulbs as a way of solving the nation’s fuel shortage.

After the jump, the latest developments in the ever-accelerating, ever expanding Asian Game of Zones, including claims of a new top dog, hacks, exclusion threats, a ship sinking, threats, warnings, and the latest moves in the Washington-pushed Japanese remilitarization drive. . . Continue reading

Headlines II: Spies, laws, pols, zones, drones


For today’s tales from the dark side, we begin with this from MintPress News:

Will The House’s Gutted USA Freedom Act Really Stop The NSA?

“While it represents a slight improvement from the status quo, it isn’t the reform bill that Americans deserve,” says a staff attorney with the ACLU.

In a Thursday op-ed for Hays Post, Kansas Rep. Tim Huelskamp explained his reasoning for not voting for the USA Freedom Act, which cleared the House earlier in the day in a 303-121 vote.

“[The] bill presented on the House floor today does not address many of privacy and constitutional concerns expressed by Kansans over the warrantless bulk collection of Americans’ personal information,” wrote Huelskamp.

Huelskamp was an original sponsor to the bill. Originally meant to end the National Security Agency’s bulk collection of metadata from Americans’ phone records, the bill was initially heralded as the first serious attempt to bring balance to the way the nation handles electronic surveillance.

From the Guardian, the obvious conclusion:

The year of living more dangerously: Obama’s drone speech was a sham

  • We were promised drone memos. And a case for legal targeted killing. And no more Gitmo. We’re still waiting

Twelve months ago today, Barack Obama gave a landmark national security speech in which he frankly acknowledged that the United States had at least in some cases compromised its values in the years since 9/11 – and offered his vision of a US national security policy more directly in line with “the freedoms and ideals that we defend.” It was widely praised as “a momentous turning point in post-9/11 America”.

Addressing an audience at the National Defense University (NDU) in Washington, the president pledged greater transparency about targeted killings, rededicated himself to closing the detention center at Guantánamo Bay and urged Congress to refine and ultimately repeal the Authorization for the Use of Military Force, which has been invoked to justify everything from military detention to drones strikes.

A year later, none of these promises have been met. Instead, drone strikes have continue (and likely killed and wounded civilians), 154 men remain detained at Guantanamo and the administration has taken no steps to roll back the AUMF. This is not the sort of change Obama promised.

Coming up with a drone report the old-fashioned way with RT:

Over 60% of US drone targets in Pakistan are homes – research

The CIA has been bombing Pakistan’s domestic buildings more than any other targets over the past decade of the drone war launched by the US, says the latest research by the Bureau of Investigative Journalism.

Almost two thirds, or over 60 percent, of all US drone strikes in Pakistan targeted domestic buildings, says joint research conducted by the Bureau of Investigative Journalism (BIJ), a London-based non-profit news group, along with Forensic Architecture, a research unit based at Goldsmiths University, London, and Situ Research in New York.

The authors of the paper analyzed thousands of media reports, witness testimonies and field investigations to obtain the data on drone strikes in Pakistan’s Federally Administered Tribal Areas (Fata).

According to the study, at least 132 houses have been destroyed in more than 380 strikes over the past decade with at least 222 civilians being among the 1,500 or more people killed.

Security checks and no security, from Quartz:

You should fear background checks even if you’ve done nothing wrong

  • 41% error rate

This issue matters not only because innocent people and employers who hire screening companies are getting ensnared by a digital dragnet; it also matters because 65 million Americans have criminal records, and those who want to turn their lives around are hurt by background check mistakes. Maybe you don’t care that employers end up screening out deserving applicants. Maybe you scoff at liberals like me who worry that background screening has a discriminatory impact on people of color.  At least you should care that the mistakes cut both ways: employers can end up hiring applicants whose full criminal records are not showing up on background screens.

You can find a litany of common screw-ups in this report by the National Consumer Law Center (NCLC). It’s impossible to quantify the extent of the errors, partly because the industry has no registration requirements and any fly-by-night operation with web access can set up shop. But the NCLC says “tens of millions of workers may pay for these third-party errors with their jobs.” One screening company studied federal corrections databases and found a “41% error rate.”

If you got arrested 30 years ago for selling a little weed but were never charged, or if you went to trial but were never convicted, you still might be tagged with a criminal record. That’s because too many screeners don’t bother to check original court records to verify the status of cases, according to Welby. These screening companies often rely only on bulk databases that aren’t properly updated.

Techdirt covers another reason for insecurity:

Another Bogus Hit From A License Plate Reader Results In Another Citizen Surrounded By Cops With Guns Out

  • from the verification-to-be-performed-at-gunpoint dept

We recently covered a story about a lawyer who found himself approached by cops with guns drawn after an automatic license plate reader misread a single character on his plate as he drove by. The police did make an attempt to verify the plate but were stymied by heavy traffic. Unfortunately, it appears they decided to force the issue rather than let a potential car thief escape across the state line.

As I pointed out then, the increasing reliance on ALPRs, combined with the one-billion-plus records already in storage and the millions being collected every day, means the number of errors will only increase as time goes on — even as the technology continues to improve. This person was lucky to escape with nothing more than an elevated heart rate. Others won’t be so lucky… like Denise Green of San Francisco.

Green’s civil rights lawsuit has just been reinstated by Ninth Circuit Court of Appeals, which overturned an earlier decision that granted summary judgment in favor of the San Francisco Police Department. The lower court found that the officers had made a “good faith, reasonable mistake” when they performed a felony stop of Green, which included being ordered out of her vehicle and onto the ground at gunpoint and held in cuffs for nearly 20 minutes while officers verified the plates and filled out paperwork.

From the Christian Science Monitor, righting wrongs:

Dallas targets wrongful convictions, and revolution starts to spread

The Conviction Integrity Unit formed in Dallas to correct wrongful convictions has become a national model that is slowly changing prosecutors’ willingness to reopen the books nationwide.

Some of these units are window dressing created mostly for public relations, critics say. But the Dallas CI Unit has had a profound impact in the city and has come at a time when concerns about wrongful convictions are rippling through the American justice system.

Indeed, as exonerations nationwide force prosecutors to reconsider their role in public safety, Mr. Watkins has cast himself as a leading reformer, taking on the insular culture within district attorneys’ offices and challenging the credo that the most effective district attorney is the one who wins the most convictions.

“One overriding truth is that the prosecutor is by far the most important and powerful actor in the criminal justice system,” says Samuel Gross, editor of the National Registry of Exonerations.

RT covers a curious possibility:

Snowden ‘considers’ returning to US – report

American whistleblower Edward Snowden is “considering” returning home to the USA under certain conditions, his lawyer told German news magazine Der Spiegel.

“There are negotiations,” Snowden’s German lawyer Wolfgang Kaleck told Der Spiegel. “Those who know the case are aware that an amicable agreement with the US authorities will be most reasonable.”

All efforts are now focused on finding a solution acceptable for Edward Snowden, at least in the medium term, according to Kaleck, who is also secretary-general for the European Center for Constitutional and Human Rights.

From Medill News Service, snitchin’ in the kitchen?:

With ‘Internet of Things,’ your fridge will know when milk is low

Americans are adapting to a world in which virtually everything _ from cellphones and cars to washing machines and refrigerators _ is going to be connected to the Internet or networks. Many of these devices will _ and do _ “talk” to one another via tiny sensors that function almost like human senses, logging information such as temperature, light, motion and sound.

Theoretically, the sensors could allow a new refrigerator, for example, to send an alert to a homeowner’s smartphone whenever the fridge is running low on milk. This concept of device conversation is known as the Internet of Things. The technology will make life easier, but it also means more people are vulnerable to device malfunction or hacking.

Experts and government officials acknowledge the transformative power of the Internet of Things. But the authors of a White House report in May on the effects of big data _ including all the information that devices collect _ are also concerned about the potential for privacy abuses that comes with the technology.

Getting censorious with the New York Times:

Twitter Agrees to Block ‘Blasphemous’ Tweets in Pakistan

At least five times this month, a Pakistani bureaucrat who works from a colonial-era barracks in Karachi, just down the street from the former home of his country’s secularist founder, Mohammed Ali Jinnah, asked Twitter to shield his compatriots from exposure to accounts, tweets or searches of the social network that he described as “blasphemous” or “unethical.”

All five of those requests were honored by the company, meaning that Twitter users in Pakistan can no longer see the content that so disturbed the bureaucrat, Abdul Batin of the Pakistan Telecommunications Authority: crude drawings of the Prophet Muhammad, photographs of burning Qurans, and messages from a handful of anti-Islam bloggers and an American porn star who now attends Duke University.

The blocking of these tweets in Pakistan — in line with the country-specific censorship policy Twitter unveiled in 2012 — is the first time the social network has agreed to withhold content there. A number of the accounts seemed to have been blocked in anticipation of the fourth annual “Everybody Draw Muhammad Day” on May 20.

Digital Alzheimer’s from the Associated Press:

Europe’s move to rein in Google would stall in US

Europe’s moves to rein in Google — including a court ruling this month ordering the search giant to give people a say in what pops up when someone searches their name — may be seen in Brussels as striking a blow for the little guy.

But across the Atlantic, the idea that users should be able to edit Google search results in the name of privacy is being slammed as weird and difficult to enforce at best and a crackdown on free speech at worst.

“Americans will find their searches bowdlerized by prissy European sensibilities,” said Stewart Baker, former assistant secretary for policy at the U.S. Department of Homeland Security. “We’ll be the big losers. The big winners will be French ministers who want the right to have their last mistress forgotten.”

Mountain View, California -based Google says it’s still figuring out how to comply with the European Court of Justice’s May 13 ruling, which says the company must respond to complaints about private information that turns up in searches. Google must then decide whether the public’s right to be able to find the information outweighs an individual’s right to control it — with preference given to the individual.

After the jump, the latest developments from the Asian Game of Zones, including Chinese strategy, bonding afloat with Moscow and Beijing, playing chicken over the China Seas, nukes afloat, Chinese domestic insecurity, and Japan’s relentless remilitarization push. . . Continue reading

Headlines II: Spies, hacks, zones, militarism


The latest tales from the dark side covers everything from deceptive legislation in Washington to the Games of Zones in Asia, plus lots more sandwiched in between.

First up, from MintPress News, listing the veil at an American concentration camp:

Judge Orders Release Of Guantanamo Force-Feeding Videos

  • For Guantanamo detainees, their last bargaining chip is the U.S. government’s determination to keep them alive. But their hunger strikes come at a cruel, painful cost: force-feeding.

U.S. District Judge Gladys Kessler has lifted the temporary restraining order which blocked federal officials from force-feeding Mohammed Abu Wa’el Dhiab.

“Thanks to the intransigence of the Department of Defense, Mr. Dhiab may well suffer unnecessary pain from certain enteral feeding practices and forcible cell extractions,” wrote Kessler. “However, the court simply cannot let Mr. Dhiab die.”

Dhiab has indicated that he would submit to being force-fed by tube if it was done at a hospital at Guantanamo Bay, adding that he wished to “be spared the agony of having the feeding tubes inserted and removed for each feeding, and…the pain and discomfort of the restraint chair.”

According to Kessler, the Department of Defense has declined this request.

Al Jazeera America lifts another veil ever so slightly:

The unexpected way Congress is making the drone program more transparent

  • The confirmation process for Obama nominees has turned up some of the only disclosures about the US drone program

The Senate confirmed David Jeremiah Barron to the 1st U.S. Circuit Court of Appeals on Thursday, but only after Barack Obama’s administration agreed to make public a controversial secret memo about the U.S. targeted killing program it has long sought to keep secret.

The administration’s decision is a revealing look at how nomination hearings have become an effective new weapon in the fight for more transparency in the government’s covert counterterrorism policies.

Though the president nominated the Harvard Law professor in September, several influential senators from both sides of the aisle — including Mark Udall of Colorado and Ron Wyden of Oregon — threatened to block the nomination unless key memos written by Barron while he was acting head of the Office of Legal Counsel in 2009 and 2010 were disclosed.

From The Hill, belated gumption:

Tech companies: FBI ‘gag orders’ violate Constitution

  • Four tech companies claim that the FBI is ignoring their First Amendment rights by barring them from revealing what types of information they turn over to the government

In court documents unsealed on Friday, Google, Yahoo, Microsoft and Facebook claimed that the national security letter (NSL) orders are a “prohibition on speech [that] violates the First Amendment.”

“The government has sought to participate in public debate over its use of the NSL statute,” the companies wrote in a friend-of-the-court brief. “It should not be permitted to gag those best suited to offer an informed viewpoint in that debate; the parties that have received NSLs.”

The FBI uses the letters to get information from banks, Web companies and others about their customers. Under the terms of the letters, though, companies are prevented from disclosing details about having received the request and handed over information.

Al Jazeera America covers a half-measure:

Anti-spy phone firm gets major funding boost

  • Silent Circle’s Blackphone received $30 million this week and is slated to ship this summer

The smartphone encryption startup Silent Circle announced a boost in funding Wednesday, grabbing $30 million in investment capital ahead of the June shipping of its signature Blackphone, which the company says can deflect cybersnooping.

The announcement came a day before the House of Representatives on Thursday approved a bill that would end mass spying by the National Security Agency (NSA). It also comes in the wake of charges against more than 100 people announced this week for unleashing a sophisticated malware that has infected half a million computers in more than 100 countries.

Silent Circle’s founder, however, warned that Blackphone still wouldn’t deter the most determined efforts of the National Security Agency to monitor mobile phones.

From China Daily, corporate blowback from NSA spooks:

Cisco weighs in on new Chinese cyber security policy

Cisco Systems Inc said it will take “active measures” to safeguard product safety and reliability after a Chinese government announcement to impose tighter cyber security checks on overseas information technology providers.

The California-based IT firm was the first overseas company to directly respond to a government decision that IT products, services and suppliers related to national security and key public interest should submit to a review program before being put into use.

Cisco is planning to work with the US government and industry contacts to learn more about the new regulation and any implications for IT companies in China, the company said in an e-mail reply to China Daily.

From the Guardian, muzzling the inconvenient press:

Scotusblog loss of Senate press credentials fuels media uproar

  • Website to mount appeal of press gallery decision on Friday
  • Legendary reporter Lyle Denniston may be affected

It is widely praised for doing what no other news organisation can. But now Scotusblog may lose what hundreds of other publications take for granted: access to the Senate.

Scotusblog, a website dedicated to coverage of the US supreme court, is preparing to mount an appeal Friday morning to a decision last month by the Senate press gallery not to renew its press credentials. The gallery granted Scotusblog credentials in 2013.

The blog’s reporters appear likely to retain access to the supreme court through temporary arrangements. The court has traditionally honored Senate credentials but is currently reviewing its press procedures.

The London Daily Mail, crusading Pee Tardies:

Three more Tea Party activists arrested over photo taken of Mississippi Senator Thad Cochran’s ailing wife in a nursing home

  • Mark Mayfield, a Tea Party board member, school teacher Richard Sager and John Mary were arrested Thursday
  • The activists were hoping to use the picture of Rose Cochran in an ad claiming Thad Cochran is having an affair
  • Mrs Cochran has been suffering from dementia for 13 years and is in hospice care
  • The men were hoping to support the campaign of Tea Party challenger Chris McDaniel

International Business Times covers the latest vileness from a household name:

Facebook Microphone Update: Electronic Surveillance Experts React To Smartphone Mic Data Collection

  • Digital Privacy Experts React To Facebook’s Intentions To Collect Data Through Smartphone Mics

On Thursday, the International Business Times reported that Facebook will use a forthcoming mobile app update to save and collect data captured by your smartphone’s microphones–a development that privacy experts found worrisome.

Though Facebook guaranteed users that “no sound is stored” by the new feature, the social media giant confirmed to the IBTimes that “data is saved, but all data is anonymized and aggregated.”

The social networking company declined to comment on how it planned to use the data once they were gleaned.

A hack attack from TechWeekEurope:

Pro-Russian Hackers Attack Central Election Commission Of Ukraine

  • CyberBerkut steals a huge archive of emails three days before the elections, sends it to the media agencies

Ukrainian hacker outfit CyberBerkut, which was previously spotted defacing at least 40 local media websites and carrying out a DDoS attack against NATO infrastructure, has struck again.

This time, the group has managed to break into the systems of the Central Election Commission (CEC) of Ukraine – an independent body of the Ukrainian government. The hackers have stolen large archive of emails, as well as the technical documentation of the CEC system administrators.

They refer to the current government of the country as a “junta” – a word which describes the ruling council of a military dictatorship.

After the jump, it’s on to Asia and the last chapter in the Games of Zones, including an Iranian stand-down, Sino-Russian exercises afloat, Japanese remilitarization, and more. . . Continue reading

Organic kitty blamed in nuke waste debacle


The explosive release of plutonium from the underground tunnels of the Waste Isolation Pilot Project created to store nuclear waste from national laboratories long associated with UC Berkeley has raised a host of questions, many unanswered.

The Valentine’s Day “incident” at the underground facility near New Mexico’s famous Carlsbad Caverns has closed the country’s only nuclear waste storage facility for up to three years and raised fears among New Mexico resident.

The Department of Energy has downplayed concerns, saying the release poses no more danger than a chest X-ray, but statements that plutonium had been detected in the air at some distance from the facility cast doubts on that claim, given that even a microscopic particle of the man-made nuclear isotope can be fatal.

Now comes word that the trouble may have resulted from the switch from a mineral-based cat litter used as an absorbent filler in drums and other storage containers of waste to one made from wheat may have precipitated the “event.”

First up, a report from SimplyInfo:

WIPP Officials Unable To Answer Questions About Incident

Officials from WIPP and DOE were in attendance at a weekly town hall meeting on the series of incidents at the WIPP nuclear site. A rather long list of blunt questions came from the local audience, online audience and the press. The official from the WIPP contractor and DOE were unable to answer many of the questions asked. There was no one from Los Alamos (the source of the exploding barrels) or NMED (New Mexico Environmental Department) in attendance at the meeting.

What they were able to tell people was that the entry on May 15th did give them some new information. The barrels in question were in row 16, column 4 towards the top of the stack. The two drums that failed contained “organic material”. They further clarified it to be nitrate salts with organic absorbents. We were able to confirm through other channels that the organic material was a wheat based cat litter. They confirmed that 55 of the barrels in panel 7, room 7 were the same barrel type from Los Alamos that contain nitrate salts and organic absorbent. The nitrate salts were a byproduct of plutonium processing at Los Alamos and were described as a sludge from evaporators.

More from the Carlsbad Current-Argus:

Next WIPP entry will seek samples; new photos and video upcoming

Investigators are readying for the next step in the tedious process of finding the cause of the February radiation leak at WIPP.

Two entries were made by investigators underground at the Waste Isolation Pilot Plant, located 26 miles southeast of Carlsbad, and the next entry planned for the near future will focus “less on photographic evidence and more on samples,” according to WIPP Recovery Manager Jim Blankenhorn.

Crews entered the salt mine twice this week, including once on Thursday and the new photographs and video are expected to be processed and ready to view by Friday. Previous entries on May 15 and May 19 showed photographic evidence that a hole was blown into the upper-lid of one waste drum that originated from Los Alamos National Laboratory, as well as discoloration on the side of the panel according to Blankenhorn.

DOE investigators checked about four or five of the rows looking for further evidence of either heat damage or any breaches in the transuranic nuclear waste containers, and no additional drums showed signs of breaches according to Blankenhorn. He added that a lot of heat damage was apparent on the top of the room, while a little heat damage was visible on the middle slip sheets of the drums.

And still more from the Associated Press via the Minneapolis Star Tribune on that wheat-based kitty litter:

Has cat litter turned barrels of New Mexico nuclear waste into ticking time bombs?

The cat litter was used to absorb moisture in sealed barrels of nuclear waste at Los Alamos, home to the some of the world’s finest scientists. Officials have said cat litter has long been used to pack waste because of its absorption and neutralizing qualities. It’s commonly used, for example, by people to soak up oil spills in driveways. But Los Alamos switched from nonorganic to organic litter for packing waste in 2013, and the theory is that some kind of chemical reaction occurred between waste containing nitrate salts and the new litter. Officials said they are investigating who made the decision to make the switch and what process was followed.

Investigators have said the litter theory is just one possible cause being explored, but it is being studied seriously enough to prompt New Mexico Environment Secretary Ryan Flynn this week to order Los Alamos and the underground nuclear dump to put together plans for immediately isolating all 500-plus barrels of waste known to contain nitrate salts and organic cat litter. Based on evidence from crews that have been down in the mine since the release, a barrel of waste from Los Alamos experienced some type of “heat event” that burned the exterior and popped the waste container’s lid.

Finally, this from the Verge:

There are no indications that anyone has been injured from the radiation leak. (All employees went through examinations for radiation exposure; a DOE press release says most workers were not affected, and those who were “received less exposure than a person receives from a chest X-ray.”) But for months, nothing has changed. The standstill remains. WIPP’s 850 or so employees are mainly sitting around, waiting (or “performing surface facilities maintenance or assisting with procedure reviews and revisions”) while investigators from the US Department of Energy (DOE), the New Mexico Environment Department and elsewhere attempt to figure out what happened.

Initially, there were two hypotheses. The first was that something had gone wrong with the supports inside the cavern where waste was being stored. If that were the case, it meant a piece of salt rock or a steel support had fallen into one of the sealed barrels, puncturing it and releasing radiation into the air.

“That was an unlikely possibility,” says Norbert T. Rempe, PhD, a retired geologist who spent decades as a principal engineer at WIPP. The cavern where the radiation monitor went off had been dug only recently, so the chances that supports had eroded or collapsed were probably slim.

The shutdown of the New Mexico facility will leave the bay Area’s nuclear weapons development facility at Lawrence Livermore National Laboratory without a place to store all that hot stuff created as a by-product of crafting next generation nuclear weapons.

Headlines II: Spooks, pols, laws, hacks, & zones


Today’s tales form the dark side covers a lot of ground, with a lot of domestic developments, new NSA questions, and much more — including the latest developments in the ongoing every-shifting Asian Game of Zones, including the Washington-pushed remilitarization of Japan.

We begin with an item sure to make you feel more secure. From the Associated Press:

AP Exclusive: Botched nuclear silo drill revealed

An Air Force security team’s botched response to a simulated assault on a nuclear missile silo has prompted a blistering review followed by expanded training to deal with the nightmare scenario of a real attack.

The Air Force recognized the possibility of such an intrusion as more worrisome after the 9/11 terrorist attacks. But an internal review of the exercise held last summer at Malmstrom Air Force Base in Montana said the security forces were unable to speedily regain control of the captured silo, and called this a “critical deficiency.”

The Associated Press obtained a copy of the report through a Freedom of Information Act request.

Next up, a looming conflict of interests from the McClatchy Washington Bureau:

CIA secrecy over detention program threatens 9/11 prosecutions, senators warned Obama

Two powerful Senate committee chairs told President Barack Obama earlier this year that the CIA’s insistence on keeping secret how it treated prisoners under its enhanced interrogation program threatens the country’s ability to bring to justice the perpetrators of the Sept. 11, 2001, attacks.

Sens. Dianne Feinstein, D-Calif., chair of the Intelligence Committee, and Carl Levin, D-Mich., head of the Armed Services Committee, sought the president’s help in getting information declassified about the CIA’s so-called harsh interrogation techniques and stressed the need for transparency on a program that essentially had ended in 2006 and that Obama formally killed when he took office in 2009.

The two senators blamed the CIA’s obsession with hiding the details of the program for the logjammed military commission process that has yet to try any of the alleged 9/11 conspirators, some of whom have been in custody for nearly a dozen years.

And about those detentions. . . From the Guardian:

Guantánamo inmate vomited blood after force-feeding, documents show

  • Ahmed Rabbani held without charge for more than 10 years
  • New filing details force-feeding regime in hunger strike

New documents filed in a federal court in Washington have revealed that a Guantánamo Bay detainee contracted a chest infection as a result of force-feeding, leading him to repeatedly vomit blood.

The filing on Thursday came a day after a federal court forced the government to reveal that it has secretly recorded dozens of force-feedings of one hunger-striking Guantánamo detainee, raising the possibility that the US military may have similar films of other detainees.

The fresh documents, filed in the US district court for the District of Columbia, relate to a detainee named Ahmed Rabbani, a Pakistani father of three who has been held without charge for more than a decade.

On to NSAgate, starting with an alarmist assessment, via the Guardian:

Pentagon report: scope of intelligence compromised by Snowden ‘staggering’

  • Classified assessment describes impact of leaks as ‘grave’
  • Report does not include specific detail to support conclusions
  • 12 of 39 heavily redacted pages released after Foia request

A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.

The Guardian has obtained a copy of the Defense Intelligence Agency’s classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”

But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.

From the Guardian, when “victory” proves largely ornamental:

NSA reform bill loses backing from privacy advocates after major revisions

  • Facebook, Google and others warn of ‘unacceptable loopholes’
  • Bill’s passage expected in House even after 11th-hour changes

A landmark surveillance bill, likely to pass the US House of Representatives on Thursday, is hemorrhaging support from the civil libertarians and privacy advocates who were its champions from the start.

Major revisions to the USA Freedom Act have stripped away privacy protections and transparency requirements while expanding the potential pool of data the National Security Agency can collect, all in a bill cast as banning bulk collection of domestic phone records. As the bill nears a vote on the House floor, expected Thursday, there has been a wave of denunciations.

“It does not deserve the name ‘USA Freedom Act’ any more than the ‘Patriot Act’ merits its moniker,” wrote four former NSA whistleblowers and their old ally on the House intelligence committee staff.

More from the McClatchy Washington Bureau:

Wyden opposes House USA Freedom Act, says it’s “watered down”

The USA Freedom Act may change the federal government’s bulk data collection system, but Sen. Ron Wyden, a leader critic of surveillance policy, sees the measure as “watered down.”

Wyden, D-Ore., issued a stinging statement Friday as the House passed the act, 303 to 121.

“I am gravely concerned that the changes that have been made to the House version of this bill have watered it down so far that it fails to protect Americans from suspicionless mass surveillance,” he said.

Wyden noted that the new text says the government has to use a “selection term” to collect Americans’ records, but the bill’s definition of such terms is too vague–and, Wyden said, “could be used to collect all of the phone records in a particular area code, or all of the credit card records from a particular state.”

Still more from Wired threat level:

NSA Reform Bill Passes the House—With a Gaping Loophole

The U.S. House of Representatives has passed a bill that would end the NSA’s mass collection of Americans’ phone records. Unfortunately, it may not end the NSA’s mass collection of Americans’ phone records.

The House voted 303 to 121 Thursday in favor of the USA Freedom Act, broad legislation aimed at reforming the NSA’s surveillance powers exposed by Edward Snowden. The central provision of the bill, which now moves on to debate in the Senate, is intended to limit what the intelligence community calls “bulk” collection–the indiscriminate vacuuming up of citizen’s phone and internet records. But privacy advocates and civil libertarians say last-minute changes to the legislation supported by the White House added ambiguous language that could essentially give the NSA a generous loophole through which it can continue its massive domestic data collection.

In the House’s final version of the bill, the NSA would be stripped of the power to collect all Americans’ phone records for metadata analysis, a practice revealed in the first Guardian story about Snowden’s leaks published last year. It instead would be required to limit its collection to specific terms. The problem is that those terms may not be nearly specific enough, and could still include massive lists of target phone numbers or entire ranges of IP addresses.

And the latest shot from Snowden’s cache via RT:

NSA spies on OSCE HQ in Vienna – report

Among the many targets for the UN National Security Agency’s electronic surveillance is the Vienna-based headquarters of the Organization of Security and Cooperation in Europe (OSCE), Austrian media reported.

The OSCE is mentioned among the targets for NSA in the National Intelligence Priorities Framework (NIPF), a confidential document outlining intelligence gathering priorities, reported on Wednesday Austrian newspaper Die Presse. It cites German journalist Holger Stark with Der Spiegel magazine, who has access to NSA documents leaked by Edward Snowden.

The NIPF update from April 9, 2013, lists OSCE’s foreign policy as a Level 4 point of interest for the US and its involvement in arms trade control as a Level 3 point of interest, Stark told the newspaper. Level 3 information is considered important enough by the US intelligence community to make its way to the US secretaries of defense and state, he added.

More from TheLocal.at:

NSA ‘spying on OSCE and IAEA’ in Vienna

The US National Security Agency (NSA) has reportedly bugged the Vienna-based OSCE (Organisation for Security and Co-operation in Europe), according to Germany’s Spiegel magazine.

Spiegel reporter and NSA expert Holgar Stark said it was highly likely that the IAEA headquarters in Vienna, as well as the Russian, Iranian and North Korean embassies in the Austrian capital, were bugged as well.

The “foreign policy goals” of the OSCE are of particular interest to the NSA, the Austrian daily Presse said.

The current crisis in Ukraine has revived the prominence of the OSCE – previously it became important as a connection between the east and west during the Cold War.

A trip through the NSA hackery from TheLocal.de:

How the NSA may have tapped Merkel’s phone

German security services have come up with five different ways the US National Security Agency (NSA) may have succeeded in spying on Chancellor Angela Merkel’s mobile phone, a leaked report revealed on Thursday.

The seven-page secret report by the Federal Office for Information Security (BSI), seen by Bild newspaper, discusses five possible ways the NSA could have gained access to Merkel’s phone. The story caused outrage in Germany when it came to light in October last year.

Possibilities considered most likely were that US agents either used “passive receiving antenna” planted in central Berlin or else intercepted Merkel’s communications as they were transmitted through undersea cables.

The first “very likely” scenario would have involved placing receiving antennas near the capital’s Reichstag parliament building and using these to listen to the Chancellor’s phone calls and read her text messages. . .

And a retraction demanded, via the Associated Press:

German university rector faults Snowden doctorate

The rector of a German university where academics voted to award NSA leaker Edward Snowden an honorary doctorate is trying to have the decision reversed — arguing that his actions don’t fulfill the required criteria.

The University of Rostock’s philosophy faculty decided by a large majority last week to award Snowden the title.

But rector Wolfgang Schareck said in a statement Thursday that Snowden’s leaking to media of NSA documents doesn’t constitute the “special academic achievement” required by law in the state of Mecklenburg-Western Pomerania for a doctorate to be granted.

Today’s lone drone headline, via The Hill:

Senate confirms drone memo author

The Senate narrowly voted Thursday to confirm the author of memos justfying drone strikes against U.S. citizens to a federal court.

In a 53-45 vote, the Senate confirmed David Barron to serve on the First Circuit Court of Appeals.

The successful vote came after the administration said it would make public the memos Baron authored on the drone program.

From Ars Technica, a challenge declined:

FBI withdraws national security letter following Microsoft challenge

  • Rather than litigating gag order, FBI goes directly to the customer.

The FBI withdrew a national security letter targeting an Office 365 enterprise customer following Microsoft’s challenge to a provision of the letter gagging the company from informing the target, according to court documents unsealed Thursday.

“In this case, the Letter included a nondisclosure provision and we moved forward to challenge it in court. We concluded that the nondisclosure provision was unlawful and violated our Constitutional right to free expression. It did so by hindering our practice of notifying enterprise customers when we receive legal orders related to their data,” Brad Smith, Microsoft’s general counsel wrote in a blog post Thursday.

While it’s not everyday that a company’s policy benefits the customer, the flap highlights the unsettled state of gag orders associated with national security letters. The letters, which come directly from the FBI, require entities like Internet companies, banks, or others to cough up a wealth of information to the authorities. Recipients of them are generally forbidden from disclosing them.

From RT, a de facto beginning of recriminalized debt in Old Blighty:

Brits jailed as Interpol takes ‘debt collector’ role for Gulf States – rights group

UK residents go to jail and lose jobs over unpaid loans as Interpol has started issuing ‘red notices’ – their strongest criminal alert – over unfunded checks, which are a criminal offense in states with sharia law, a rights group has found.

The Fair Trials International has labeled the International Criminal Police Organization a ‘debt collector’ for countries like Oman, Qatar and the United Arab Emirates. The UK-registered charity has stated that by this, Interpol’s services are being ‘misused’.

The rights group wrote a letter to Interpol’s Secretary General, Ronald K. Noble, urging safeguards to be put in place “so that its Red Notice system focuses on bringing serious international criminals to justice rather than wrecking the lives of normal people who have provided blank cheques as security, a common practice in a number of countries across the region,” said a statement published on the group’s website.

When photography is a crime [criminal trespass and invasion of privacy] via United Press International:

Top Mississipi Tea Party official charged in videotaping of Sen. Cochran’s wife in nursing home

  • Primary challenger says those involved in secretly videotaping Sen. Thad Cochran’s wife in a Mississippi nursing home should be prosecuted.

The vice chairman of the Mississippi Tea Party was charged Thursday with being involved in the nursing home videotaping of Sen. Thad Cochran’s wife.

Bail was set at $250,000 for Mark Mayfield. Mayfield, a lawyer, is also an official with the Central Mississippi Tea Party.

Two other men were also charged Thursday. Last week, Clayton Kelly, a right-wing blogger, was charged with entering a Madison nursing home surreptitiously and videotaping Rose Cochran.

Corporate hack generates blowback, via Sky News:

Hacked eBay Faces Multiple Investigations

  • Several inquiries have been launched in the US into the data breach, as UK authorities also consider a formal investigation.

Web retailer eBay is facing transatlantic scrutiny from the authorities over a massive cyber attack that compromised the personal data of its 145 million users.

Connecticut, Florida and Illinois have launched a joint inquiry over the hack, which came to light on Wednesday.

The investigation will focus on the scope of the data breach and eBay’s response, said Connecticut officials.

Another, even more ominous hack, via The Wire:

An American Utility’s Control System Was Hacked

This week in hacking: The control system for a U.S. public utility was compromised. The Department of Homeland Security did not specify which utility was affected in the agency’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) report.

A DHS official told Reuters, “While unauthorized access was identified, ICS-CERT was able to work with the affected entity to put in place mitigation strategies and ensure the security of their control systems before there was any impact to operations.”

Details of these cyber attacks are rarely revealed to the public, and even more rarely do they provide details into the matter. What we do know: this particular attack was on a utility that was previously hacked and the hackers used the employee access portal to get in. The actual hack was relatively simple: they determined the password through a tactic known as “brute forcing.” In a brute force hack, the attackers auto generate a variety of password combinations and try them until something clicks.

And another security violation from TheLocal.de:

Officer puts neo-Nazi stickers in police van

Police in Bavaria have been forced onto the defensive after an officer stuck neo-Nazi stickers in a police van. State prosecutors are investigating a 25-year-old policeman.

An unnamed passer-by on their way to a football match on Sunday in Fürth was shocked to find several far-right stickers stuck on a box in the trunk of a USK police car – a special unit used for crowd control.

Zeit Online on its far-right watch blog, Störungsmelder, wrote on Thursday that the passer-by took a photo which then opened the police force up to a host of criticism.

The stickers, which were clearly visible through the rear window, were printed with well known far-right slogans advocating violence against anti-fascists. “Good Night Left Side” and “Organize against Antifa. Know your enemy. Name your enemy,” they read.

From the Verge, sanctions blowback hinders spy satellite programs?:

Russian rocket ban could delay US space missions for years, report says

The United States military’s space program could see more than 30 missions delayed for an average of three and a half years each if Russia follows through with its threat to ban exports of the RD-180 rocket engines used for launching satellites, according to a Pentagon report obtained by SpaceNews. The Pentagon reportedly also found that, in a worst-case scenario, the delays may cost the US as much as $5 billion. In a best-case scenario, the numbers drop to nine missions delayed by around two years each and a loss of $2.5 billion.

“The US ‘needs to develop a domestic engine’”Russia’s Deputy Prime Minister said the ban would be going into place earlier this month, but SpaceNews reports that the government is yet to see signs that it’s been put in place. While that remains the case, the Pentagon suggests accelerating the pace at which RD-180s are purchased to increase the remaining US stock. Right now, there are reportedly only 15 of the engines left between the military’s rocket contractors, United Launch Alliance and RD Amross.

The Pentagon reportedly also found that speeding up production of a US-made engine that’s in the works from United Launch Alliance would not be able to avoid the delays.

After the jump, the latest developments in Asia’s increasingly dangerous Game of Zones, starting with a major Chinese hit for American corporations as “high tech” and “spy tech” become synonymous, a Korean artillery exchange, posturing in Vietnam, Japan ups the ante, and alliances form. . . Continue reading

Headlines II: Spies, lies, laws, zones, more


We open today’s tales from the dark side with a demand via The Intercept:

The Bahamas Wants to Know Why the NSA is Recording Its Phone Calls

Government officials in the Bahamas want their U.S. counterparts to explain why the National Security Agency has been intercepting and recording every cell phone call taking place on the island nation.

Responding to a report published by The Intercept on Monday, which revealed that the NSA has been targeting the Bahamas’ entire mobile network and storing the audio of every phone call traversing the network for up to 30 days, Bahamian officials told the Nassau Guardian that they had contacted the U.S. and vowed to release a statement regarding the revelations.

In a front-page story published Tuesday, Bahamian Minister of Foreign Affairs Fred Mitchell told the Guardian that his government had reached out to the U.S. for an explanation. Mitchell said the cabinet was set to meet to discuss the matter and planned to issue a statement on the surveillance. The Bahamian minister of national security told the paper he intended to launch an inquiry into the NSA’s surveillance but did not provide a comment.

The New York Times parses spookery:

Fine Line Seen in U.S. Spying on Companies

The National Security Agency has never said what it was seeking when it invaded the computers of Petrobras, Brazil’s huge national oil company, but angry Brazilians have guesses: the company’s troves of data on Brazil’s offshore oil reserves, or perhaps its plans for allocating licenses for exploration to foreign companies.

Nor has the N.S.A. said what it intended when it got deep into the computer systems of China Telecom, one of the largest providers of mobile phone and Internet services in Chinese cities. But documents released by Edward J. Snowden, the former agency contractor now in exile in Russia, leave little doubt that the main goal was to learn about Chinese military units, whose members cannot resist texting on commercial networks.

The agency’s interest in Huawei, the giant Chinese maker of Internet switching equipment, and Pacnet, the Hong Kong-based operator of undersea fiber optic cables, is more obvious: Once inside those companies’ proprietary technology, the N.S.A. would have access to millions of daily conversations and emails that never touch American shores.

Then there is Joaquín Almunia, the antitrust commissioner of the European Commission. He runs no company, but has punished many, including Microsoft and Intel, and just reached a tentative accord with Google that will greatly change how it operates in Europe.

In each of these cases, American officials insist, when speaking off the record, that the United States was never acting on behalf of specific American companies. But the government does not deny it routinely spies to advance American economic advantage, which is part of its broad definition of how it protects American national security. In short, the officials say, while the N.S.A. cannot spy on Airbus and give the results to Boeing, it is free to spy on European or Asian trade negotiators and use the results to help American trade officials — and, by extension, the American industries and workers they are trying to bolster.

From Agence France Presse, taking it on the road:

Eric Holder To Discuss NSA Spying Scandal In Germany

US Attorney General Eric Holder will travel to Germany to discuss privacy concerns after the NSA spying scandal damaged relations between the two allies, Germany said Wednesday.

German interior minister Thomas de Maiziere told journalists in Washington that Holder has accepted an invitation from Berlin to explain how the US would curb spying on foreign nationals overseas.

“We will have this discussion together in Germany,” he said.

The Christian Science Monitor raises a reasonable question:

US hacking charges against China for economic cyber-spying: Why now?

The US indictment of five military officials in China’s secret ‘Unit 61398′ aims to put China on notice but also plays to US corporate concerns that Washington has done too little to curb cyber threats.

While many believe it is unlikely those Chinese military officers will ever be extradited for trial in the US, the public outing of China’s military for engineering the cyber theft of the crown jewels of US companies’ intellectual property is the punitive part of a multipart “carrot and stick” policy the Obama administration adopted to deal with a problem shortly after it took office, these experts say.

In the administration’s early days, cyber threats were already a priority. But by 2010, cyber espionage had vaulted to the top of the list. The next year, a nonpublic internal federal review determined that “China’s economic espionage activities were greater than all others combined, including Russia,” says James Lewis, a senior fellow at the Center for Strategic and International Studies in Washington.

By early 2013, the US and China had agreed to regular diplomatic talks – a cyber working group – that was one of the White House “carrots” designed to deal with sensitive cyber issues behind closed doors. In those talks, the US told Chinese representatives that using the powerful state-controlled military to conduct cyber-espionage operations against hundreds of US corporations was unacceptable.

From the Associated Press, stupid is as stupid does:

U.S. hacking victims fell prey to slapstick, mundane ruses

The hacking techniques the U.S. government says China used against American companies turned out to be disappointingly mundane, tricking employees into opening e-mail attachments or clicking on innocent-looking website links.

The scariest part might be how successfully the ruses worked. With a mouse click or two, employees at big-name American makers of nuclear and solar technology gave away the keys to their computer networks.

In a 31-count indictment announced on Monday, the Justice Department said five Chinese military officials operating under hacker aliases such as “Ugly Gorilla,” “KandyGoo” and “Jack Sun” stole confidential business information, sensitive trade secrets and internal communications for competitive advantage. The United States identified the alleged victims as Alcoa World Alumina, Westinghouse, Allegheny Technologies, U.S. Steel, United Steelworkers Union and SolarWorld.

From the Verge, an embarrassment:

The US Navy was hacked from inside its own aircraft carrier

When the Navy Criminal Investigative Service started looking into a breach of one of their low-security networks, the team got an unpleasant surprise: at least one of the culprits was a Navy sailor, performing the attacks from an aircraft carrier at sea.

The hacking group called Team Digi7al breached at least 24 websites in 2012, including the Navy’s own SmartMove system, used to help sailors coordinate changes of address. The team was looking for social security numbers and other personal data, the raw material for identity theft, targeting sites like the Toronto Police Service and Stanford University. For the most part, the attacks were small enough to stay under the radar — but when a tweet posted to Team Digi7al’s Twitter account from an internal Navy network, NCIS realized the SmartMove attack had been an inside job, and sprang into action.

It took an elaborate sting operation to find Digi7al’s inside, including a fake database designed as an attractive target, but finally NCIS traced the breach back to Nicholas Paul Knight, the systems administrator for the nuclear reactor onboard the USS Harry Truman aircraft carrier. On Tuesday, Knight plead guilty to charges of identity theft and obstruction of justice in federal court. He faces five years in prison and a $250,000 fine.

A paradigm shifts from Homeland Security News Wire:

Snowden revelations spur a surge in encrypted e-mail services

The Edward Snowden revelations about National Security Agency(N.S.A) surveillance programs have fueled a surge of new e-mail encryption services. “A lot of people were upset with those revelations, and that coalesced into this effort,” said the co-developer of a new encrypted e-mail service which launched last Friday. The company notes that its servers are based in Switzerland, making it more difficult for U.S. law enforcement to reach them.

The Edward Snowden revelations about National Security Agency (NSA) surveillance programs have fueled a surge of new e-mail encryption services. “A lot of people were upset with those revelations, and that coalesced into this effort,” said Jason Stockman, a co-developer of ProtonMail, a new encrypted e-mail service which launched last Friday with collaboration from scientists from Harvard University, the Massachusetts Institute of Technology, and the European research lab CERN.

Yahoo News reports that ProtonMail is marketed as user-friendly as major commercial e-mail services such as Google Gmail and Yahoo Mail, but it offers extra security. The company notes that its servers are based in  Switzerland, making it more difficult for U.S. law enforcement to reach them. E-mail encryption has been a go-to-tool for dissident activists in China and Iran to avoid detection by the authorities, but the adoption of encryption services is now favored by many Americans who want to avoid surveillance from the NSA or other intelligence services.

From the Washington Post, a legacy for the University of California’s new president [former Homeland Security Secretary Janet Napolitano]:

Planned Homeland Security headquarters, long delayed and over budget, now in doubt

The construction of a massive new headquarters for the Department of Homeland Security, billed as critical for national security and the revitalization of Southeast Washington, is running more than $1.5 billion over budget, is 11 years behind schedule and may never be completed, according to planning documents and federal officials.

In the aftermath of the Sept. 11, 2001, attacks, the George W. Bush administration called for a new, centralized headquarters to strengthen the department’s ability to coordinate the fight against terrorism and respond to natural disasters. More than 50 historic buildings would be renovated and new ones erected on the grounds of St. Elizabeths, a onetime insane asylum with a panoramic view of the District.

The entire complex was to be finished as early as this year, at a cost of less than $3 billion, according to the initial plan.

The Tribune Washington Bureau seeks release:

Obama administration to release drone memo on killing US citizens

President Barack Obama’s Justice Department will release a long-sought secret document laying out the legal basis for using drones to kill Americans suspected of terrorist activities abroad, administration officials confirmed Tuesday.

Rather than appeal a court order that the so-called “drone memo” be released under the Freedom of Information Act, Attorney General Eric H. Holder Jr. concurred with the decision of Solicitor Gen. Donald Verrilli not to pursue the appeal and agreed to release a redacted version of the document, the officials said.

Officials requested anonymity to discuss the closed-door deliberations, first disclosed Tuesday by The Associated Press. The documents will be released later, pending court approval.

From CNN, an announcement with suspicious timing:

Stream of al Qaeda threats has U.S. intelligence concerned

A series of al Qaeda-based threats to attack American and Western targets in Europe, as well as threats to launch attacks inside the United States, has caused significant concern inside the U.S. intelligence community, CNN has learned.

Officials are trying to determine the extent to which the threats may be linked and determine what it may mean about the strength of al Qaeda in several countries. While the “threat stream” has evolved during the past six months, according to a senior U.S. official, none of the threats has been corroborated.

The official said the threats appear to detail “a lot of activity where intelligence suggests there are operational cells,” but so far, “we do not see operational cells of al Qaeda inside the United States,” the official said, although he emphasized it could not be ruled out.

From the Arizona Republic, about damn time:

FBI reverses no-recording policy for interrogations

Since the FBI began under President Theodore Roosevelt in 1908, agents have not only shunned the use of tape recorders, they’ve been prohibited by policy from making audio and video records of statements by criminal suspects without special approval.

Now, after more than a century, the U.S. Department of Justice has quietly reversed that directive by issuing orders May 12 that video recording is presumptively required for interrogations of suspects in custody, with some exceptions.

There was no news release or press conference to announce the radical shift. But a DOJ memorandum —obtained by The Arizona Republic — spells out the changes to begin July 11.

From the Dept. of Oh, Puhleeeze via The Wire:

GOP Senator Does Not Think the FBI Director’s Weed Joke Was Very Funny

FBI Director James Comey made a weed joke earlier this week; turns out the Senate Judiciary Committee didn’t find it funny. Speaking at a conference on Monday, the FBI chief made headlines when he admitted that the agency is “grappling with the question” of whether it could be more open to hiring people who smoke pot, especially as the demand for cybercrime fighters increases.

What went mostly unreported was a little funny that Comey made when he added that some of the prospective hires “want to smoke weed on the way to the interview.”

Today we found out that Alabama Sen. Jeff Sessions was not so amused:

Do you understand that that could be interpreted as one more example of leadership in America dismissing the seriousness of marijuana use and that could undermine our ability to convince young people not to go down a dangerous path?”

From the Boston Globe, with maximum security:

Ohio Prison Shows Pirated Movies to Prisoners Convicted of Pirating Movies

Pirated movies are being shown to Ohio inmates convicted for selling pirated films, according to Cleveland.com. The Lorain County Correctional Institution confirmed that prison officials know about the practice and that it’s being investigated.

Richard Humphrey, who was released on May 6 for a parole violation, posted on torrentfreak.com that guards let the inmates watch “Ride Along” and “The Wolf of Wall Street” before the films’ DVD releases. Humphrey faced a 29-month sentence in 2010 for selling pirated copies of movies on a subscription-based website.

From CNN, keeping kids secure from security people:

Cop, rabbi, scoutmaster among arrests in child porn bust

They are people children are supposed to trust: A New York Police Department officer, a Fire Department of New York paramedic, a rabbi and a scoutmaster were among more than 70 people arrested in a major child porn bust, a U.S. law enforcement official said Wednesday.

The police officer allegedly used the video chatting service Skype to have women pose their children naked for him, another law enforcement official said.

Another of those arrested — a supervisor with the Transportation Security Administration — allegedly traveled to the Dominican Republic to have sex with children, the official said. He allegedly made more than 50 trips there.

From Reuters, how much for a hack attack?:

EBay says client information stolen in hacking attack

E-commerce company eBay Inc said hackers stole email addresses, birthdays and other identity information between late February and early March in a data breach that may have affected a “large number” of accounts.

In the latest major cyber attack at a U.S. company, eBay said it had found no evidence of unauthorized access to financial or credit card information, which is stored separately in encrypted formats.

But the company urged all of its users, including the 145 million customers who bought or sold something on eBay in the last 12 months, to change their passwords.

Blowback blues from Global Times:

Microsoft ‘surprised’ at move to change systems

  • Windows 8 ban to aid security

In an e-mail to the Global Times, Microsoft said they are surprised by the news.

“Windows 8 has some unique back doors reserved by developers for later system upgrade and daily maintenance. The downside of the back doors is the potential risk of leaking sensitive personal information to developers or Internet hackers,” Zhang Yi, CEO of Shenzhen-based iiMedia Research, told the Global Times.

Zhang’s opinion was echoed by Ni Guangnan, a research fellow with the Chinese Academy of Engineering, who reportedly appealed that the government should not purchase Windows 8 devices.

Ni was quoted by China Electronics News as saying the new generation of Windows system would leave information vulnerable to monitoring from the US government, as shown in the scandal of PRISM.

More blowback from South China Morning Post:

US cyberespionage charges may cool Westinghouse’s China nuclear deal

  • Business ties at risk after Washington accuses five PLA officers of hacking

China may consider postponing negotiations for buying eight nuclear reactors from an American nuclear company embroiled in a US indictment of five PLA military officers for alleged cyberespionage, Chinese experts say.

The deal, together with parts and services, would potentially be worth more than 24 billion yuan (HK$30 billion) and create thousands of jobs.

Five cybertechnology experts, allegedly from the People’s Liberation Army’s Shanghai-based Unit 61398 that has been accused of being a major source of cyberattacks abroad, are now wanted by the FBI for hacking into a number of US firms, including Westinghouse Electric, the company tendering to supply the Chinese nuclear power plants.

And north of the border, and sure to move south, from CBC News:

La Ronde under fire for scanning visitors’ fingerprints

  • Quebec privacy commissioner says La Ronde has not been cleared to have biometric database

La Ronde, the Montreal amusement park owned by Six Flags, is scanning biometric data from its users to admit them to the park. The only problem is, it hasn’t been cleared to do so.

This year, the park brought in measures to scan what it calls “fingerpoints.” The scans of season-pass holders’ index fingers are then used to admit them to the amusement park.

“So what happens is season-pass owners come to the park, they have two options. Either they can do a traditional way, so they can get a season pass with picture or they can go through our new system, which is quicker,” La Ronde’s communications officer Jules Hébert told CBC Daybreak on Wednesday.

After the jump, the latest developments in the ongoing and ever-escalating Asian Games of Zones, with an emphasis on the latest efforts of to send Japan down Abe’s Road of rash remilitarization. . . Continue reading

Headlines: Spies, pols, hacks, zones, drones


We’re reversing the normal sequence of headline posts and starting with today’s very newsy tales from the dark side, featuring major developments in Asia [after the jump], drones, the SinoAmerican EspioCyberwar, and a whole lot more.

But first, the toke’s on J. Edgar, with Fibbie pragmatism triumphant, via The Verge:

The FBI admits it might have to toke up to fight cybercrime

As the FBI looks to hire more cybersecurity agents, it’s running into a big problem: the siren song of marijuana. The FBI has a no-tolerance policy for employees using illegal drugs, but new statements by director James Comey suggest the agency is considering loosening that policy to attract employees from the cybersecurity community.

To hear Comey tell it, it’s a talent pool that’s notorious for rampant weed-smoking. “I have to hire a great work force to compete with those cybercriminals,” Comey told an audience at the New York City Bar Association, “and some of those kids want to smoke weed on the way to the interview.”

The bureau’s weed problem is particularly severe given the rise of legal marijuana use within the US, implicating many potential FBI hackers along the way. As a result, Comey said he was “grappling with the issue” of how the bureau’s policies might be amended.

From The Age, suspicions confirmed:

Assange targeted by FBI probe, US court documents reveal

WikiLeaks publisher Julian Assange remains the subject of an active criminal investigation by the United States Justice Department and Federal Bureau of Investigation, newly published court documents reveal.

Papers released in US legal proceedings have revealed that a “criminal/national security investigation” by the US Department of Justice and FBI probe of WikiLeaks is “a multi-subject investigation” that is still “active and ongoing” more than four years after the anti-secrecy website began publishing secret US diplomatic and military documents.

Confirmation that US prosecutors have not closed the book on WikiLeaks and Mr Assange comes as a consequence of litigation by the US Electronic Privacy Information Centre to enforce a freedom of information request for documents relating to the FBI’s WikiLeaks investigation.

Justice Department lawyers last month told the US District Court in Washington DC that there had been “developments in the investigation over the last year.”  In a document filed with the court on Monday, the US Government further affirmed that the “main, multi-subject, criminal investigation of the [Department of Justice] and FBI remains open and pending” making it necessary “to withhold law enforcement records related to this civilian investigation.”

There’s just no rest for the Wiki-ed, via South China Morning Post:

WikiLeaks vows to reveal second country where NSA is recording all mobile phone calls

  • WikiLeaks to name second country where the NSA is said to be recording the content of phone calls, despite warnings from Glenn Greenwald that this could “lead to deaths”

WikiLeaks has pledged to reveal the name of a second country that is having virtually all of its mobile phone calls recorded by the US National Security Agency, despite a warning that leaking the information could “lead to deaths”.

The pledge came after The Intercept revealed that the Bahamas and one other country were having most of their mobile calls recorded and stored by a powerful NSA program called SOMALGET. While the Bahamas was named, the identity of the mystery second country was kept hidden.

Greenwald, who first broke the Edward Snowden story to the world, had said on Twitter the decision not to reveal the name was made because “we were *very convinced this 1 would –> [lead to] deaths”.

Meanwhile, Truthdig raises a crucial question:

What’s the Point of a Source Protection Law That Wouldn’t Protect Chelsea Manning or Edward Snowden?

Laws are bad when they don’t do what they are meant to and even worse when they cause harm instead. The journalist-source protection law being debated by Congress—the Free Flow of Information Act (FFIA or “federal shield law”) fails in both respects. Despite being pushed by media organizations after Associated Press reporters and other journalists were served court orders last summer, it is doubtful that the proposed law will meaningfully protect anyone. Instead, it sets the stage to punish whomever the government decides are “illegitimate” journalists.

Indeed, any outlet committed to giving voice to whistle-blowers—such as The Intercept or WikiLeaks—is not considered a “covered journalist” under the measure. Sen. Chuck Schumer, D-N.Y., who drafted the bill, conceded that The Intercept’s Glenn Greenwald, whose coverage of whistle-blower Snowden’s releases won a Pulitzer for The Guardian, would probably not be covered. The FFIA would fail to protect Snowden, or Manning, who provided evidence of war crimes and military cover-ups to WikiLeaks. Both sparked unprecedented public debates on government accountability and suffered the full wrath of the federal government. In other words, they are precisely the sources we need a shield law to protect.

The FFIA does not include those “whose principal function, as demonstrated by the totality of such person or entity’s work, is to publish primary source documents that have been disclosed to such person or entity without authorization.” This is colloquially called the WikiLeaks clause. But The Intercept is also in trouble owing to what its new editor-in-chief, John Cook, described in mid-April as a “commitment to continue the work of reporting on, publishing, and explicating” Snowden’s releases.

Techdirt, as usual, spots the ironic:

Keith Alexander: We Need More Spying In The Future Because All Of Our Previous Spying Has Only Increased The Number Of Terrorist Attacks

  • from the No-Such-Agency:-no-such-thing-as-‘too-much-surveillance’ dept

The New Yorker has published excerpts of a lengthy interview with retired NSA head Gen. Keith Alexander. Along with the usual defenses of the surveillance apparatus he ran for eight years (with his fiery “collect it all” attitude), Alexander makes the case for continued pervasive surveillance while admitting the last decade-plus of spying hasn’t made the US — or the world — any safer.

Al Jazeera America acts symbolically:

California bill would require judge’s warrant for government spying

  • Measure passes state Senate with just one opposing vote; proponents argue surveillance is unconstitutional

A bill in California’s state legislature would require the federal government to have a warrant from a judge if it wants state officials to cooperate when federal agencies search residents’ cellphone and computer records.

The bill, which passed the state Senate with just one opposing vote this week, was introduced in the wake of information leaked by former National Security Agency contractor Edward Snowden, revealing massive internal surveillance of U.S. citizens by the NSA.

“The Fourth Amendment to the U.S. Constitution is very clear. It says the government shall not engage in unreasonable search and seizure,” said the bill’s author, Democratic State Sen. Ted Lieu, of Torrance. “The National Security Agency’s massive and indiscriminate collecting of phone data on all Americans, including more than 38 million Californians, is a threat to our liberty and freedom.”

The bill wouldn’t bar the NSA or any other federal government agency from continuing to spy. But it would prohibit the state from participating in that surveillance or providing material support to the agencies involved.

And on to that conveniently timed [for Washington] SinoCyberwar, first from Global Times:

China summons US ambassador over indictment against Chinese military officers

Chinese Assistant Foreign Minister Zheng Zeguang summoned US Ambassador to China Max Baucus on Monday night, lodging a complaint with the US over its indictment against five Chinese military officers despite China’s protests, according to a press release by the Foreign Ministry Tuesday morning.

The United States seriously violated the norms of international relations, breached China-US cooperation in cyber security and badly hurt China-US ties by fabricating information and indicting Chinese military officers on allegations of cyber theft, Zheng said.

China expressed strong indignation and opposition to the move by the United States, he added.

More from South China Morning Post:

China warns Washington it could take ‘further action’ over US hacking charges

  • The US Justice Department on Monday indicted five members of the Chinese military on charges they stole US secrets through hacking to aid state-owned companies. Beijing quickly rejected the claims

The US Ambassador to China, Max Baucus, met with Zheng Zeguang, assistant foreign minister, shortly after the United States charged the five Chinese, accusing them of hacking into American nuclear, metal and solar companies to steal trade secrets.

Zheng “protested” the actions by the United States, saying the indictment had seriously harmed relations between both countries, state news agency Xinhua said.

Zheng told Baucus that depending on the development of the situation, China “will take further action on the so-called charges by the United States”.

Sky News raises the obvious defense:

China Angry Over US Spy Charges ‘Hypocrisy’

  • The United States is accused of “double standards” on cyber security after five Chinese officers are charged over alleged hacking.

Geng Yansheng, a Chinese defence spokesman, said the steps taken by the United States had “severely damaged the mutual trust” between the two countries.

“From Wikileaks to the Snowden incident, America’s hypocrisy and double standards on issues of cyber security are abundantly clear,” he said. “The Chinese military is a severe victim of America’s behaviour.

“According to statistics, the servers used by the Chinese military have been widely attacked by foreigners and according to the IP addresses, a significant number of them come from America.”

And then, inevitably, came this, from Sina English:

China publishes evidence of US cyber attack

A spokesperson for China’s State Internet Information Office on Monday published the latest data of US cyber attack, saying that China is a solid defender of cyber security.

The US is the biggest attacker of China’s cyber space, the spokesperson said, adding that the US charges of hacking against five Chinese military officers on Monday are “groundless”.

Latest data from the National Computer Network Emergency Response Technical Team Coordination Center of China (NCNERTTCC) showed that from March 19 to May 18, a total of 2,077 Trojan horse networks or botnet servers in the US directly controlled 1.18 million host computers in China.

intelNews.org backgrounds:

The mysterious Chinese unit behind the cyberespionage charges

On Monday, the United States government leveled for the first time charges against a group of identified Chinese military officers, allegedly for stealing American trade secrets through cyberespionage.

The individuals named in the indictment are all members of a mysterious unit within the Chinese People’s Liberation Army (PLA) command structure, known as Unit 61398. It is estimated that the unit has targeted at least 1,000 private or public companies and organizations in the past 12 years. Western cybersecurity experts often refer to the group as “APT1″, which stands for “Advanced Persistent Threat 1″, or “Byzantine Candor”. It is believed to operate under the Second Bureau of the PLA’s General Staff Department, which is responsible for collecting foreign military intelligence.

Many China military observers argue that Unit 61398 is staffed by several thousand operatives, who can be broadly categorized into two groups: one consisting of computer programmers and network operations experts, and the other consisting of English-language specialists, with the most talented members of the Unit combining both skills.

And Reuters strikes back:

China bans use of Microsoft’s Windows 8 on government computers

China has banned government use of Windows 8, Microsoft Corp’s latest operating system (OS), in a blow to the U.S. technology company which has long been plagued by sales woes in the country.

The Central Government Procurement Center issued the ban on installing Windows 8 on government computers as part of a notice on the use of energy-saving products, posted on its website last week.

The official Xinhua news agency said the ban was to ensure computer security after Microsoft ended support for its Windows XP operating system, which was widely used in China.

The same concept, another front, via the Associated Press:

Germany clamps down on exports of spy tech

Germany says it will restrict exports of surveillance technology to states that fail to respect their citizens’ human rights.

Economy Minister Sigmar Gabriel says the move is designed to prevent spy software ‘Made in Germany’ from being used for internal repression by autocratic regimes.

Amnesty International and Reporters Without Borders welcomed the decision. Rights groups have in the past accused German companies of selling spy software to countries such as Bahrain and Uzbekistan, where the technology is allegedly used to monitor dissidents and journalists.

Meanwhile, Agence France-Presse covers old school business, run both profitably and hypocritically:

Peace-loving Sweden ‘arms dictators’ as defence exports soar

Alongside a global reputation for peacemaking and generous foreign aid, Sweden has become a major world supplier of weapons counting a number of regimes criticised for human rights abuses among its customers.

Ranked the third largest arms exporter per capita after Israel and Russia, Sweden’s booming industry has stirred up ethical concerns among Swedes about some countries it is doing business with.

[C]ritics charge that Sweden has become more inclined to arm regimes accused of human rights abuses, including Saudi Arabia, UAE and Pakistan, as demand from Western nations has declined since the Cold War ended.

On to the Game of Drones, first with The Hill:

Reid: Drone-memo author is a go

Senate Majority Leader Harry Reid (D-Nev.) says he has the votes to confirm David Barron, the author of memos justifying drone strikes against American citizens, to the 1st Circuit Court of Appeals.

Reid said most of the members of the Senate Democratic caucus were satisfied with the defense of Barron provided by White House lawyers at a private briefing last week.

“We’ll vote on the Barron filibuster, stopping that tomorrow. I think we’ll be okay,” Reid said at a Tuesday press conference.

Anchors Aweigh with United Press International:

Navy taps Textron Systems Unmanned Systems for task order work

The U.S. Navy has issued a task order to Textron Systems Unmanned Systems to support intelligence, surveillance and reconnaissance data using its catapult-launched Aerosonde SUAS.

Textron Systems Unmanned Systems reports receipt of a new Navy task order to provide mission support services with its Aerosonde Small Unmanned Aircraft System.

The task order was issued under the Navy Intelligence, Surveillance and Reconnaissance contract, and indefinite-delivery/indefinite-quantity program under which Textron will supply the SUAS, together with system operators and field service representatives on a fee-for-service basis.

And from Aviation Week & Space Technology, strike up Le Marseillaise:

France Weighs Arming UAVs

  • France inches closer to a decision on arming UAVs

The French government is carefully avoiding raising ethical objections to the French air force’s use of unmanned aerial vehicles (UAV), including General Atomics MQ-9 Reapers acquired from the U.S. and recently delivered to the 1/33 Sqdn. French authorities believe UAV reconnaissance capabilities -offer unprecedented advantages, while weapons continue to be carried only by manned combat aircraft such as Dassault -Mirage 2000Ds and Rafales.

Official comments on France’s employment of UAVs are rare and cautiously focus on their complementary role. “They are not expected to replace aircraft; they don’t cover the complete spectrum of operational needs,” says Col. Christophe Fontaine, head of the 1/33 Sqdn. “They complement other capabilities.”

The French forces, which long delayed expressing a clear policy on UAV use, have been operating limited numbers of EADS Harfangs and General Atomics MQ-1 Predators in the last few years and selected the Reaper in the absence of a satisfactory domestic candidate. The U.S. UAV entered service in France recently, and two have already accumulated 700 flight hours across several theaters of operation. The French air force plans to order a total of 12 Reapers, which are capable of carrying weapons—although only with Pentagon approval. To date, Washington has been reluctant to allow even allies such as France or Italy to arm the UAVs it sells them.

And for our final dronal item, sharing the wealth with TheLocal.it:

Finmeccanica launches European drone project

A subsidiary of Finmeccanica has joined forces with fellow aerospace companies in France and Germany to develop a European drone, months after the Italian company built the UN’s first such aircraft.

Alenia Aermacchi will work with France’s Dassault Aviation and Airbus Group in Germany to develop an unmanned aircraft by 2020, Finmeccanica said in a statement released on Monday.

Announcement of the project follows preliminary discussions at the Paris Air Show last year, Finmeccanica said. The three European companies have delivered the joint proposal to their respective governments and aim to develop the plans along with national defence ministries.

From the Christian Science Monitor, the first of three Libyan headlines, with the stinger at the end:

Rogue Libyan general attracts militia support as parliament flails

  • Libyans are waiting to see how the government responds to Khalifa Haftar’s recent attacks – but even decisive action is probably not enough to stem rising chaos.

A former Libyan general appears to be gaining allies among armed factions for his self-described campaign to restore stability in defiance of a weak government.

Two camps are taking shape: The Islamist politicians who dominate Libya’s interim parliament, and their rivals, who are gradually amassing behind Khalifa Haftar, the retired general. His forces have attacked Islamist militias in Benghazi and claimed credit for an attack on the General National Congress (GNC), as parliament is called.

In a bid yesterday to diffuse the crisis, acting prime minister Abdullah Al-Thinni called on the GNC to vote immediately on a 2014 budget and to confirm his successor, the prime minister-elect, before a recess and elections for a new interim legislature.

The Los Angeles Times gets clandestine:

Libyan lawmakers meet in secret after being targeted by ex-general

Libyan lawmakers met in hiding Tuesday, two days after forces loyal to a renegade ex-general stormed the parliament building and demanded that the Islamist-dominated body disband.

Onetime general Khalifa Haftar’s offensive against Islamists and their allied militias, launched last week in the eastern city of Benghazi, threatened to escalate into the worst fighting Libya has seen in the three years since an uprising ousted and killed dictator Moammar Kadafi.

It also posed a stark challenge to the weak central government, which has flailed in its attempts to establish order.

But it takes the World Socialist Web Site to get to the heart of the matter:

CIA-linked general launches Libya coup bid

The leader of the latest military revolt is a former Libyan army general, Khalifa Haftar. A supporter of the 1969 military revolt led by Colonel Gaddafi that overthrew the US and British-backed monarch, King Idris, Haftar was captured during the 1980s Libyan intervention in Chad and then released at Washington’s request, becoming an “asset” of the US Central Intelligence Agency. The CIA moved him to Virginia, near the agency’s headquarters in Langley, and helped him set up training camps for a “Libyan National Army”—the same name he has given to the collection of military and militia units now fighting to overthrow the regime in Tripoli.

When the US and NATO launched their war for regime change in Libya three years ago, Haftar was airlifted back into Benghazi to assume military command of proxy forces on the ground as the US and NATO bombarded the country. He was supplanted in this role, however, by a former Gaddafi interior minister, Abdel Fatah Younis, who was himself subsequently assassinated. He was then eclipsed by the Islamist militias who came to dominate the NATO-backed ground forces.

Meanwhile, from BBC News, a story few will believe in the countries where vaccinating for polio can be lethal to doctors and nurses because the program was arrogantly and lethally used by the CIA to suss out Osama bin Laden and presumably other things as well [can anyone saw war crime, giving the growing numbers of victims?]:

White House: CIA has ended use of vaccine programmes

The CIA has ended the use of vaccine programmes in its spying operations amid concerns for the safety of health workers, the White House has said.

In a letter to US public health schools, a White House aide said the CIA stopped such practices in August. The CIA used a fake vaccine programme to try to find Osama Bin Laden before US special forces killed him in 2011.

The CIA’s move comes after a wave of deadly attacks by militants on polio vaccination workers in Pakistan.

After the jump, shots fired in Korean waters, China/Vietnam tensions remain high, new alliances form, the Japanese remilitarization push morphs, and, oh yeah, folks claim North Korea’s got nuclear-capable missiles. . .
Continue reading

A kitty litter explosion spews bad stuff


An update on the plutonium release from the New Mexico Waste Isolation Pilot Plant, the temporary nuclear waste repository holding all that radioactive waste from the national labs where UC Berkeley has kept Uncle Sam armed with all those nuclear weapons.

The site sustained an atmospheric leak from its underground vaults on Valentine’s Day, signaled by the release of detectable amounts of plutonium, one of the deadliest things on earth.

Now we can see just what happened, the apparent result of a reaction between the deadly waste and a new brand of kitty litter used as a mixer in storage drums, in this case one from Los Alamos National Laboratory, home of the world’s first nukes.

Here’s what a remote camera found:

BLOG WIPP

The story, via the Albuquerque Journal:

Photos show cracked LANL container at WIPP

A radiation leak at the government’s troubled nuclear waste dump has been linked to a waste container shipped from Los Alamos National Laboratory, officials said Friday, raising questions about the safety of other barrels being stored on the lab’s northern New Mexico campus and at a temporary site in West Texas.

Lab Director Charlie McMillan, in a memo Friday to lab employees, said Los Alamos “is fully cooperating” with state and federal officials and has taken extra precautions to ensure that similar waste drums at the lab and those sent to Waste Control Specialists in Texas “are in a safe and controlled configuration.”

“Based on this,” he wrote, “we do not believe there is any imminent threat to the safety of our employees, the public, or the environment at this time.”

Watchdog Don Hancock, however, said that until more is known about the breach, “we can’t have assurances.”

From the waste site’s website:

Last week a photograph showed a waste container with a cracked lid and heat damage, providing further evidence of a significant heat event in WIPP’s Room 7 of Panel 7. The investigation into the exact cause of the release is ongoing.

Los Alamos and Savannah River National Laboratories are testing the waste stream’s chemical and radiological content and looking at possible scenarios for what might have caused a reaction in the drum.

Headlines II: Spies, Zones, Drones, & Pols


Much ground to cover in today’s Tales from the Dark Side, so we’ll start with imperial dreams from Nextgov:

Former NSA Director: Big Data Is the Future

According to Gen. Keith Alexander, who retired in March after eight years as the director of the NSA, the world will produce some 3.5 zettabytes of information in 2014 – enough to fill the hard drives of 3.5 billion high-end desktop computers.

“We’re living in the age of big data and we have to figure out how to harness it,” said Alexander, speaking at the American Council for Technology – Industry Advisory Council’s (ACTIAC’s) Management of Change conference on Monday.

“That’s what the future is going to be about,” Alexander said. “Think about 3.5 zettabyes of data. Big data is absolutely vital. The changes that will come to our nation in science, technology, biomedical and health care will be phenomenal.”

And from the Guardian, as tensions heat up in the Asian Game of Zones, Washington takes the moment to hoist Beijing on the same petard that Snowden hoisted Washington with:

US accusations of Chinese hacking point to eight-year spying campaign

  • Department of Justice indictment confirms existence of projects such as ‘Titan Rain’ and pattern of attacks against US firms

The US Department of Justice indictment against a number of alleged Chinese military hackers goes back a long way, to 2006, and raises the question: why did it take them so long to take action?

In February 2013, a US security company called Mandiant released a report which said the Chinese army had launched hundreds of cyber-attacks against western companies and defence groups. It said that the attacks emanated from a building that housed a group called Unit 61398 –the same number that appears in the DOJ indictment.

If the DOJ indictments are correct, then Mandiant’s report appears to have been accurate in its description of what was happening. But that’s worrying, too: it described a decade-long series of attacks on US infrastructure, gave precise details, and even the location of the building from which it reckoned the attacks were being made.

The response from the Los Angeles Times:

China blasts ‘absurd’ U.S. charges of cyber-espionage

Chinese government officials on Monday strongly rebuked the U.S. over its claims of cyber-spying by five Chinese military officers, saying the Justice Department indictment was based on  “fabricated facts” and would jeopardize U.S.-China relations.

“The Chinese government, the Chinese military and their relevant personnel have never engaged or participated in cyber theft of trade secrets,” Foreign Ministry Spokesperson Qin Gang said in a statement. “The U.S. accusation against Chinese personnel is purely ungrounded and absurd.”

The Chinese government demanded that the U.S. indictment, unsealed Monday, be withdrawn. Chinese officials also said they would suspend activities of the China-U.S. Cyber Working Group, created last year to address allegations of hacking.

Details from the Associated Press:

Cyberspying case: charges at a glance

THE CHARGES: The indictment’s 31 counts include economic espionage, theft of trade secrets and aggravated identity theft. The federal grand jury indictment was filed in the Western District of Pennsylvania, where most of the companies that are said to have been targeted are located. The indictment accuses the officials of hacking into the computers of companies and a union to gain access to trade secrets and private communications.

THE ACCUSED: The indictment charges five officers of the Chinese People’s Liberation Army. They are Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui.

THE ALLEGED TARGETS: Westinghouse Electric Co., U.S. subsidiaries of SolarWorld AG, United States Steel Corp., Allegheny Technologies Inc., Alcoa Inc. and the United Steelworkers labor union.

Sky News covers consequences:

US And China Spy Row: Diplomatic Fallout ‘Huge’

The US is for the first time accusing a nation of state-sponsored economic espionage or as they called it 21st century burglary.

The United States government is, for the first time ever, accusing another nation of state-sponsored economic espionage or as they called it “21st century burglary”.

The diplomatic fallout will be huge.

The officials from the Department of Justice not only singled out individuals from Chinese People’s Liberation Army (PLA), but they named the unit within the PLA which they say has been doing the hacking: Unit 61398.

It is not the first time the unit 61398 has been in the frame.

Still more from the New York Times:

U.S. Treads Fine Line in Fighting Chinese Espionage

By indicting members of the People’s Liberation Army’s most famous cyberwarfare operation, called Unit 61398 but known among hackers by the moniker “Comment Crew,” the Obama administration is now using the legal system to make a case it has previously confined to classified briefings: that the Chinese military leadership is behind an enormous organized campaign to steal American intellectual property and designs for its own profit.

For two years now, President Obama and his aides have declared that when the United States spies on China, its goals are sharply different from those of the Chinese who engage in espionage. In public speeches and private conversations with Xi Jinping, the Chinese president, Mr. Obama has argued that it is far more pernicious to use the intelligence instruments of the state for commercial competitive advantage. The United States may do all it can to learn about China’s nuclear arsenal, or about Beijing’s intentions in its territorial disputes with Japan, but it does not, the administration says, steal from China Telecom to help A.T.&T.

The United States spies regularly for economic advantage when the goal is to support trade negotiations; it tapped the Japanese negotiator’s car in the 1990s, when the United States was trying to reach an accord on auto imports. It is also widely believed to be using intelligence in support of major trade negotiations now underway with European and Asian trading partners. But in the view of a succession of Democratic and Republican administrations, that is considered fair game.

Companies can also be targets. Documents revealed by Mr. Snowden have revealed that the American government pried deep into the servers of Huawei, one of China’s most successful Internet and communications companies. The documents made clear that the N.S.A. was seeking to learn whether the company was a front for the People’s Liberation Army and whether it was interested in spying on American firms. But there was a second purpose: to get inside Huawei’s systems, and to use them as a conduit to spy on countries that buy its equipment around the world.

Another consequence from China Daily:

China suspends cyber working group activities with US to protest cyber theft indictment

China on Monday decided to suspend activities of the China-U.S. Cyber Working Group as U.S. announced indictment against five Chinese military officers on allegation of cyber theft.

“Given the lack of sincerity on the part of the US to solve issues related to cyber security through dialogue and cooperation, China has decided to suspend activities of the China-U.S. Cyber Working Group,” said Foreign Ministry spokesman Qin Gang regarding the US Justice Department’s announcement on Monday.

The US side announced on Monday indictment against five Chinese military officers on allegation of cyber theft. This U.S. move, which is based on intentionally-fabricated facts, grossly violates the basic norms governing international relations and jeopardizes China-U.S. cooperation and mutual trust, Qin said.

BBC News reminds of Washington’s status as a player in the same game:

Cisco calls for curb on NSA surveillance efforts

The NSA’s wide-ranging surveillance programme should be curtailed, says hardware-maker Cisco in a letter to President Obama.

Cisco boss John Chambers said faith in US technology companies was being eroded by the NSA’s activities.

The letter comes after whistleblowers revealed the NSA regularly intercepted Cisco hardware to help it gather information on potential targets.

Mr Chambers said the NSA should be held to higher “standards of conduct”.

Meanwhile whack at the branch from the Guardian:

NSA to test legal limits on surveillance if USA Freedom Act becomes law

  • Aides and lawyers contend over terms of surveillance bill
  • Authors of first realistic reform seek to avoid loopholes

Those behind the legislation, which is expected to head to the House floor as early as this week, have labored to craft the terms of the bill in a way that avoids loopholes for the NSA to exploit. But some wonder whether the agency will lawyer the bill’s restrictions on bulk data collection into oblivion, as recent statements by Obama administration officials have suggested it might.

The NSA, its credibility hurt by whistleblower Edward Snowden’s disclosures, is trying to reassure its overseers that it will abide by new congressional action, even as its advocates labor to shape the bill to its liking. But the agency’s post-9/11 history has left the architects and advocates of the bill concerned about the ways in which it might once again reinterpret a law intended to restrain it into one allowing it more surveillance leeway than congressional architects intend.

Meetings last week between Hill aides and administration and intelligence lawyers yielded a sense of the legal reasoning likely to result if the USA Freedom Act becomes law.

And the guy behind it all faces a dilemma, via Spiegel:

‘Risks’: Snowden’s Lawyer Expresses Concerns about Testimony

  • Speculation has been brewing for weeks over whether Edward Snowden will testify against the NSA from Moscow or Germany. In a letter to a parliamentary investigative committee, his lawyer has said he will advise his client against speaking in Russia.

With the German parliament currently investigating spying by the National Security Agency on Chancellor Angela Merkel’s cell phone and the communications data of millions of German citizens, testimony by former NSA employee and whistleblower Edward Snowden was expected to take center stage in the proceedings. But a four-page letter from Snowden’s German attorney, Wolfgang Kaleck, obtained by SPIEGEL, casts doubt on whether he will be able to provide testimony from Moscow for the parliamentary investigative committee.

In the letter, Kaleck specifies the “risks” associated with Snowden providing testimony in Russia, where, he notes, his client has only been provided with temporary political asylum.

“Given the conditions of his right of residence,” Kaleck writes, “both I and his American lawyers will have to advise him against speaking in any manner from Moscow that might make his situation worse or possibly threaten his residency status.”

From the Los Angeles Times, major voyeurware busts:

Cybercrime: Creators, users of sinister Blackshades malware arrested

Federal prosecutors announced charges Monday against creators and users of a sinister software program called Blackshades, whose flagship feature, RAT, enabled hackers to watch victims in their own homes using their infected computers’ webcams.

At a news conference, FBI agents and the U.S. attorney in Manhattan, Preet Bharara, said they had arrested one of Blackshades’ alleged creators, Alex Yucel, in Moldova. Yucel is awaiting extradition to the United States. Also arrested was Brendan Johnston of Thousand Oaks, who, according to court documents, sold Blackshades to others and provided technical support to customers between August 2011 and September 2012.

According to the FBI, Blackshades had sales of more than $350,000 between September 2010 and April 2014. Buyers came from more than 100 countries and infected more than a half-million computers.

And a Blackshades video report from Canada, via The National:

Blackshades Takedown

Program note:

The FBI has arrested dozens of people suspected of distributing suspected a malicious software called BlackShades. It allows hackers to remotely control personal computers and webcams.

From Guardian, ringfencing the royals:

William and Kate ‘embarrassed’ by hacking revelations, says NoW reporter

  • Clive Goodman tells Old Bailey the police and CPS decided to ‘ringfence’ interception of royals to keep them out of a trial

The royal family has been “embarrassed” by revelations that the News of the World had frequently hacked the phones of Prince William and Kate Middleton, it has been claimed at the Old Bailey.

Clive Goodman, the former royal editor at the paper, said the police and the Crown Prosecution Service had known he had hacked their phones in 2006 when he was first arrested but they had decided to “ringfence” the royals so they wouldn’t have to be part of a public trial.

He was convicted of hacking three royal aides – Helen Asprey, Jamie Lowther-Pinkerton and Paddy Harverson – in 2006 but his hacking of the princes and William’s then girlfriend only emerged last week in the phone-hacking trial.

The Yomiuri Shimbun covers another species of hackery:

Identity thieves target customer loyalty websites

Websites for customer loyalty programs have seen a growing number of thefts of member program points and illegal access to customer accounts.

These companies have found cases of illegal access to loyalty program sites of airlines, home electronics makers, credit card companies and other firms. In some cases, online thieves have exchanged stolen points for gift certificates without the genuine holders knowing.

Affected companies and Internet crime experts say that some of the hackers appear to have used lists of user IDs and passwords, because in some cases the success rate of log-in attempts was unusually high.

One of the experts reminded users that “The best defense measure is changing passwords regularly and not using the same passwords for different websites.”

And the accompanying graphic:

The Yomiuri Shimbun

The Yomiuri Shimbun

From the Independent, a terror alert:

American student calls in bomb threat after dropping out so her ‘parents wouldn’t find out’

A Massachusetts dropout student was arrested after allegedly calling in two bomb threats to force her graduation ceremony to be cancelled on Sunday.

Danielle Shea, 22, reportedly told authorities she had dropped out of university, but kept receiving thousands of dollars in tuition fees money from her mother, who believed she was still attending classes.

Police say the former Quinnipiac University student panicked when her relatives did see not her name on the graduation roster and made two calls to the university’s public safety department in a bid to force the ceremony to be cancelled.

The Christian Science Monitor offers a modicum of security:

Supreme Court vacates police-immunity ruling in suit over multiple Tasering

The Supreme Court ordered the New Orleans-based Fifth Circuit to reexamine a case involving a suit against a police officer for repeatedly Tasering a handcuffed arrestee who was lying on the ground.

The US Supreme Court ordered a federal appeals court Monday to reexamine a case involving the alleged use of excessive force by a police officer in Louisiana who deployed an electronic “Taser” device eight times against a handcuffed arrestee who was lying on the ground.

The suspect, who later died, had reportedly refused to obey a police command to stand up and walk to the patrol car. The police officer was fired for using “unnecessary force,” but was found not guilty of manslaughter.

A panel of the New Orleans-based Fifth US Circuit Court of Appeals subsequently ruled that the officer was entitled to qualified immunity and could not be sued for allegedly violating the rights of the handcuffed prisoner.

CNBC offers another reason for insecurity, at least in the halls of the Pentagon:

Retired military leaders fret kids will be ‘too fat to fight’

  • Obese recruits are newest threat to US military

“It’s not just a school problem. It’s not just a Department (of Education) problem. It’s a national security issue and it needs to be prioritized that way,” said retired Maj. Gen. D. Allen Youngman.

He’s one of hundreds of former military officers who have gotten involved in Mission: Readiness, a nonprofit organization whose “Too Fat to Fight” reports attack junk food in schools. Its members also lobby lawmakers for improved school lunches and more widely available pre-K education.

These military officials say such interventions are necessary for increasing the pool of people who want to serve in the military and would be able to do so.

From RT, heightening tensions:

US missile cruiser to enter Black Sea amid NATO drills in Eastern Europe – military source

The US missile cruiser Vella Gulf is expected to arrive in the Black Sea on May 23, a military source told a Russian news agency. Another NATO vessel is already in the area, while the French Navy’s stealth frigate will reportedly be there by late May.

This comes as part of a wider buildup of NATO forces close to Russian borders against the backdrop of the Ukraine crisis.

The American Aegis guided missile cruiser will be in the Black Sea in time for the Ukrainian presidential elections on May 25, a military-diplomatic source told Russia’s Itar-Tass news agency on Monday.

And from The Hill, our first drone report:

Obama backs off drone strikes

President Obama is relying less on drones and more on foreign governments in the global fight against terrorists.

The shift, which also includes fewer unilateral special operations raids of the type that killed Osama bin Laden, is prompting criticism that Washington depends on unstable governments such as in Nigeria, where Boko Haram, an extremist group, has emerged as a new threat.

The Pentagon has hiked its budget for “Section 1206″ counterterrorism programs to train and equip foreign militaries from $218.6 million in 2012 to a requested $290.2 million in 2014, according to a recent Congressional Research Service report.

A second from Deutsche Welle:

European aviation firms Airbus, Dassault, Alenia poised to produce military drones

Europe’s leading aviation companies have teamed up to develop and produce drones for military purposes in a drive to become independent of US technology. But governments have to decide about the drone’s capabilities.

European aviation and defense companies Airbus, Dassault Aviation and Alenia Aermacchi said Monday they had launched a new initiative for the production of military drones for medium-altitude and long endurance (MALE) missions.

They offered to hold talks with the governments of Germany, France and Italy to agree on the drones’ future capabilities. The companies said they had already signed a cooperation accord between them and decided on the division of labor at an industrial level.

European policy-makers have long debated the need to develop a military drone but have so far not been able to agree on a joint program.

After the jump, the latest from the Asian Game of Zones, including evacuations, promises, threats, assertions, and a trans-border germ invasion. . . Continue reading

Map of the day: Japan’s expansive base plan


From the Yomiuri Shimbun, a map of Japan’s expansive plans for a vast military zone to be garrisoned by bases and fast-response military units as the nation move to remilitarize for the first time since World War II. More to follow in our next headlines compendium:

BLOG Game of ZOnes

Headlines: CorporoEconoEcoPoliFarce


Having lost a host of entries through a browser crash, we’re feeling touched by absurdity, and so we begin with this from Taiwanese Animators:

AT&T buys DirecTV for $48.5 billion: Monopoly Media Mergers Edition

Program notes:

AT&T announced it plans to buy DirecTV, the top US satellite TV operator, for $48.5 billion in an attempt to grow beyond an increasingly hostile cellular market.

The deal was announced on Sunday. AT&T said it is offering $95 per DirecTV share in a combination of cash and stock, a 10 percent premium over Friday’s closing price of $86.18. The cash portion, $28.50 per share, will be financed by cash, asset sales, financing already lined up and other debt market transactions.

If the deal is approved by US regulators, AT&T would add 20 million DirecTV customers to its paltry 5.7 million U-verse customers, plus another 18 million DirecTV customers in Latin America.

The Wire adds more, less theatrically:

AT&T Promises to Uphold Net Neutrality for Three Years if DirecTV Deal Goes Through

In the event the $48 billion AT&T-DirecTV deal closes, the new joint company is promising to uphold the current net neutrality rules for at least three years. This promise would be valid regardless of how the FCC vote on the issue goes later this year.

In their proposal for the DirecTV purchase, AT&T issued a list of commitments, which they are calling “benefits of the transaction.”  One of these “benefits” is the following:

Net Neutrality Commitment. Continued commitment for three years after closing to the FCC’s Open Internet protections established in 2010, irrespective of whether the FCC re-establishes such protections for other industry participants following the DC Circuit Court of Appeals vacating those rules.

In the event the FCC’s paid prioritization proposal passes, AT&T won’t actually participate in the potentially multi-million dollar scheme (if they keep their promise, that is.) This is also a major show of good faith to the FCC, which will have to approve the merger.

From the Guardian, a rare cause of a faint twinge of something approaching but not exactly qualifying as joy:

Credit Suisse pleads guilty to criminal charges in US tax evasion settlement

  • Bank is first in more than a decade to admit to a crime in US and will pay more than $2.5bn in penalties

Credit Suisse Group has pleaded guilty to criminal charges that it helped Americans evade taxes, becoming the first bank in more than a decade to admit to a crime in the US. It will now pay a long-expected fine of $2.5bn (£1.5bn).

“This case shows that no financial institution no matter its size or global reach is above the law,” said the attorney general, Eric Holder. He said the years-long investigation had uncovered evidence of an “extensive and wide-ranging” conspiracy to hide taxes from the Internal Revenue Service (IRS) and the bank’s involvement in it.

“The bank went to elaborate lengths to shield itself, its employees, and the tax cheats it served from accountability for their criminal actions. They subverted disclosure requirements, destroyed bank records, and concealed transactions involving undeclared accounts by limiting withdrawal amounts and using offshore credit and debit cards to repatriate funds. They failed to take even the most basic steps to ensure compliance with tax laws,” said Holder.

From Al Jazeera America, an unsurprising correlation:

Study: Student debt worst at universities with highest-paid presidents

  • Executives at 25 universities saw 14 percent higher salary increase than national average after 2008 recession

Student debt and the hiring of relatively low-paid adjunct faculty rather than full-time professors have grown fastest at public universities with the highest-paid presidents, a new report found.

University president pay has risen dramatically in the aftermath of the 2008 financial crisis, according to the report, which focuses on 25 state universities that pay their presidents almost double the national average. Released Sunday by the Institute for Policy Studies (IPS), a progressive Washington D.C.-based think tank, the study is called The One Percent at State U — referring to the financial gains made by executives after the 2008 recession.

Nationwide, between the fall of 2009 and the summer of 2012, average executive compensation at public research universities increased 14 percent to $544,544, according to the study

Another unsurprising correlation, via KCBS:

Inner City Oakland Youth Suffering From Post-Traumatic Stress Disorder

The Centers for Disease Control said 30 percent of inner city kids suffer from post-traumatic stress disorder (PTSD). The CDC said these children often live in virtual war zones. Doctors at Harvard said they actually suffer from a more complex form of PTSD.

Unlike soldiers, children in the inner city never leave the combat zone. They often experience trauma, repeatedly.

“You could take anyone who is experiencing the symptoms of PTSD, and the things we are currently emphasizing in school will fall off their radar. Because frankly it does not matter in our biology if we don’t survive the walk home,” said Jeff Duncan-Andrade, Ph.D. of San Francisco State University.

A cross-border legal beef from the Canadian Press, with that old “corporate person” free speech once again at issue:

Canada-U.S. meat labelling row hears free speech arguments

Canadian livestock producers were in an American courtroom Monday fighting against labelling requirements blamed for having devastated their exports to the United States.

The case revolves around the free-speech rights guaranteed in the First Amendment, one of the most sacrosanct provisions of the American Constitution.

Canadian and Mexican producers, and the U.S. partners they supply, argue that those speech rights are being violated by the requirement that they stamp country-of-origin labels on meat packaging.

On to Europe, with growth at the margin from TheLocal.st:

Europe’s far right expect election gains

Europe’s far-right is looking to overcome deep divisions and establish itself as a major player in Brussels after EU elections this week where it is expected to make significant gains.

With voters tired of a European Union handing down decisions from on high, parties like France’s National Front (FN), Britain’s UKIP and Austria’s Freedom Party (FPOe) are going strong in the polls ahead of the May 22-25 ballot.

But it might not be all plain sailing in the months to come.

Ireland next, and austerity once again victimizing its victims, via TheJournal.ie:

Two rape crisis centres are to close temporarily as cuts take hold

  • The services in Clare and Tipperary will be closed for at least a month because of a €120,000 shortfall.

TWO RAPE COUNSELLING services in the Midwest are to be temporaily closed because of a funding shortfall the service estimates at €120,000.

Rape Crisis Midwest has centres in Limerick, Clare and Tipperary but is to close the latter two services for a least one month to save costs.

The service provides confidential one to one counselling to survivors of rape and childhood sexual abuse and says that it helps about 80 people a week.

Cash flowing from one end of Eurasia to another, via TheLocal.no:

Chinese tycoon agrees to buy Norway land

The Chinese property billionaire blocked from buying a huge chunk of Iceland is reportedly close to buying up a 100 hectares of the scenic Lyngen coastline.

Huang Nubo, a Communist party member who spent ten years working in the country’s propaganda ministry, on Thursday agreed to buy the site, which has already received planning permission for a series of villas, from Ola OK Giæver Jr, a local landowner, pilot and businessman.

“I can promise you a new era for Lyngen municipality. I trust that Huang Nubo will create huge and positive financial ripples throughout the north of Norway,” Giæver jr said. “There is not a better capitalist than Huang.”

Sweden next, and one way to make homelessness vanish, the neooliberal version, via TheLocal.se:

Stockholm says no to ‘freakshow’ soup kitchen

Stockholm municipality has ruled that a soup kitchen which had served hearty broth to the city’s homeless for the past two years must move on due to the risk of the city square being “turned into a zoo”.

“Nazis can march freely and water is thrown on people begging, but to create a meeting place to challenge politicians and other people to actually do something is obviously very dangerous and terrible,” Elin Jakobsson at Soup Kitchen Stockholm said in response to the decision via social media.

The organization has been active for the past two years and works both as a source of food and a monthly meeting place for the city’s homeless population. The soup kitchen requires a police permit and on Monday its application for renewal was rejected.

But it can be carried to far, of course, via TheLocal.se:

Shopkeeper charged over beggar dousing

A Gothenburg shopkeeper has been charged over the drenching of a beggar with water in front of his shop in March, an incident which sparked an outraged response on social media.

The man was charged on Monday with two counts of harassment.

The first was for an incident on March 10th when he threw a bucket of warm water at his own Hemköp window, effectively soaking a beggar sitting nearby. The second charge was for the day after, when the man did the same thing with a bucket of cold water.

On both occasions, the woman begging by the windows was drenched, and the prosecutor argued on Monday that both acts were carried out with intent.

From GlobalPost, going medieval:

In Germany, no means yes

  • A regressive definition of rape highlights the country’s stubbornly traditional attitudes toward women.

No means yes, at least in this country.

When a rape court in the state of North Rhine-Westphalia acquitted the alleged rapist of a 15-year-old girl in 2012, women’s rights advocates were outraged.

The ruling found that saying no, or even screaming it, wasn’t enough to merit rape charges. Now findings from a new study indicate that case was hardly unique, despite a European initiative to step up efforts to stop violence against women.

The number of German rape cases ending in convictions has plummeted from 22 percent to 8 percent over the past 20 years, according to a study released by the Hanover-based Criminological Research Institute of Lower Saxony

A suggestion for a foreign visitor from TheLocal.de:

Mayor urges Erdogan to cancel German trip

German politicians called on Turkish Prime Minister Recep Tayyip Erdogan on Monday to cancel an upcoming pre-election appearance to Cologne in the wake of a deadly mine disaster.

Amid mounting anger within Turkey over his response to last week’s coal mine blast in which 301 died, Erdogan faced condemnation and calls to cancel his visit next Saturday from across the political spectrum in Germany.

Erdogan is due to address supporters in Germany, where three million Turks or people of Turkish origin live, with a visit to the western city of Cologne. For the first time, some 2.6 million Turks living abroad, including 1.5 million in Germany alone, will be able to cast their votes in the August presidential vote in which Erdogan is expected to stand.

More from Deutsche Welle:

Germany urges restraint ahead of Erdogan’s planned speech in Cologne

The German government has urged Turkey’s prime minister to exercise restraint when he visits the country on the weekend. This followed calls from some German politicians for Recep Tayyip Erdogan to cancel his visit.

Chancellor Angela Merkel’s spokesman, Steffen Seibert told reporters in Berlin on Monday that as the prime minister of a “really close and important partner” nation, Erdogan was welcome in Germany, where he plans to deliver a speech to local Turks on Saturday.

At the same time, though, Seibert said the German government expected Erdogan to choose his words carefully at what he described as a “difficult” time, given the political tensions in Turkey in light of the recent mining disaster and the fact that it comes one day before the European elections.

Seibert said in light of this, the government expected Erdogan to deliver a “sensitive, responsible” speech, when he addresses thousands of his fellow countrymen and women at an indoor stadium in the western city of Cologne.

Another bankster busted, from TheLocal.fr:

Rogue trader Kerviel imprisoned in France

The former trader Jérome Kerviel was finally behind bars in France on Monday after being picked up by French police at midnight. Kerviel is due to start a three year prison sentence over his role in losing former employers Société Général €5 billion through high-risk trading.

French police arrested rogue trader Jérôme Kerviel at midnight on Sunday, shortly after he had crossed the border from Italy into France on his walk home from Rome to Paris.

A local prosecutor then announced on Monday morning that Kerviel was behind bars in the Riviera city of Nice.

TheLocal.fr again, with some reassurance for the poorest:

French income tax cuts for poorest to last to 2017

A plan to exempt France’s poorest households from income tax will not just be a one-off for this year, the government finance minister said this week. The income tax breaks will actually apply until 2017, the minister Michel Sapin said.

There was more cheer for the more hard-up tax payers in France on Monday when the finance minister Michel Sapin announced a government plan to apply the recently revealed breaks until 2017.

Sapin’s pledge comes days after French Prime Minister Manuel Valls made the headlines by announcing that the government plans to exempt 1.8 million households from the income tax burden.

From El País, Spanish repos rising:

Home repossessions up 10% in 2013

  • Spanish lenders took back nearly 50,000 properties last year
  • Figures released by Bank of Spain suggest more borrowers are handing back keys in payment

Spanish lenders repossessed 49,694 homes from defaulting borrowers in 2013, a 10% rise from a year earlier, figures released on Monday by the Bank of Spain show.

Of these, 38,961 were first residences, according to statistics provided by the banks. The vast majority of properties were empty at the time of repossession.

Meanwhile, the proportion of cases involving dation in payment, in which borrowers in arrears hand over the keys of the property to the lender that approved the mortgage to cancel debt obligations, reached 32.5% of all repossessed homes.

Pimping the rich fails to enrich, via TheLocal.es:

Spain’s ‘golden visa’ scheme fails to shine

Just 72 people have signed on to a controversial Spanish ‘visa for cash’ scheme which grants automatic Spanish residency to people who buy a property worth at least €500,000 ($685,000).

The so-called ‘golden visa’ scheme has reaped only small rewards, according to Spain’s El País newspaper.

Introduced in September 2013, the law gives foreigners who invest large sums in Spanish property, public debt and projects of general interest the right to reside in Spain.

And from thinkSPAIN, another way California is like Spain:

Worst drought in 150 years hits southern and eastern Spain

A DROUGHT of the scale not seen in over a century and a half is threatening water resources in Spain’s south and east after the lowest rainfall on record over the autumn, winter and spring.

The worst-hit provinces are Valencia and Alicante where, following a sudden and unprecedented gota fría or Mediterranean ‘monsoon’ in late August, it has barely rained between September and June.

Murcia, Albacete, Cuenca, Teruel, Cádiz, Málaga, Jaén and Almería are also at high risk – the only provinces in Andalucía which are safe are Granada, Sevilla and Huelva.

From El País, and how [to employ a sexist term] broad-minded of them:

Spanish conservatives forgive sexist remarks by their European contender

  • Women at Popular Party rally play down Arias Cañete’s views about male “intellectual superiority”

It was just a minor “slip.” Popular Party (PP) voters are writing off as unimportant statements about the intellectual superiority of men made last week by the party’s top European candidate, Miguel Arias Cañete, despite leaders’ fears they might have jeopardized his chances of winning.

Several women who attended a Sunday rally by Prime Minister Mariano Rajoy and PP secretary general María Dolores de Cospedal in Cuenca sought to play down the controversy over the sexist remarks.

During a televised debate with Elena Valenciano, his Socialist rival in next Sunday’s European elections, Arias Cañete claimed that he had held back from serious intellectual confrontation because “if you abuse your intellectual superiority, you end up looking like a sexist intimidating a defenseless woman.”

Italy next and a wiseguy lipoff lambasted via ANSA.it:

Renzi hits back after Grillo mafia jibe

  • Premier says PD marks real face of change

Premier Matteo Renzi hit back Monday after Beppe Grillo, the leader of the anti-establishment 5-Star Movement (M5S), used a Mafia jibe to suggest his political career was close to ending as the campaign for Sunday’s European elections grew increasingly venomous.

Renzi’s centre-left Democratic Party (PD) is top in most polls, but Grillo is confident his M5S, who are second in the surveys after capturing a stunning 25% of the vote in last year’s general election, can come first with a late surge.

“Renzie has been hired on a temporary project to win the European elections, but he’ll lose them,” Grillo wrote Monday on his popular blog, using a nickname that refers to the premier’s alleged attempt to come across as cool like TV’s Fonzie.

TheLocal.it notes another grime number:

Italy’s employment rate is one of Europe’s worst

  • The Italian employment rate fell to 59.8 percent last year, one of the worst in Europe, according to figures released on Monday by the European Commission.

Fewer than 60 percent of Italians aged 20 to 64 were employed in 2013, far below the EU average of 68.3 percent.

The new figure sees Italy slip to figures not seen for over a decade, with last year’s rate just higher than the 59.2 percent recorded in 2002. Between then and 2008 the situation steadily improved for workers in Italy, until the global financial crisis struck and led to a steady decline in employment.

According to the European Commission data, Italy now has one of the worst employment rates in Europe, just slightly higher than Spain’s 58.2 percent. Only Greece, with 53.2 percent, and Croatia (53.9 percent) fared worse in 2013.

ANSA.it demands:

Napolitano says EU must help on migrants

  • Italy is main entrance for flow that’s creating emergency

President Giorgio Napolitano said Monday that the European Union must provide Italy with greater help in coping with a massive wave of migrants arriving from North Africa. “Today we are faced with the absolute need to achieve a concrete, operative model of cooperation with the European Union,” Napolitano told Italian officials at the United Nations in Geneva, ANSA sources said. The Head of State added that while migrant arrivals had caused an emergency for all of southern Europe, Italy is “the main entrance”. There has been friction between Rome and Brussels after two migrant boat disasters south of Italy last week in which around 60 people are confirmed dead and many more may have lost their lives.

Rome says the EU is not doing enough to support it after it launched the humanitarian Mare Nostrum (Our Sea) search-and-rescue border operation in October, after roughly 400 migrants drowned in two wrecks off the coast of Sicily.

On Wednesday Premier Matteo Renzi accused the European Union of looking the other way as Italy struggles to cope with the crisis.

After the jump, fascinating electoral news from Greece, the latest from the Ukraine, Libyan turmoil, pre-World Cup jitters in Brazil, polio rising, a Thai takeover, Chinese real estate developments, Japanese Trans-Pacific intransigence, melting polar caps, other environmental woes, and the latest in Fukushimapocalypse Now!. . . Continue reading

Headlines II: Spies, pols, drones, & zones


Today’s tales from the dark side begins with this from the Independent:

White House lawyers ‘unable to find’ critical Iraq letter from Tony Blair telling George Bush: ‘I’m with you whatever’

A letter sent by Tony Blair to George Bush that is “critical” to the Iraq Inquiry has gone missing from official White House records, it has been reported.

The publication of secret correspondence between the UK and US administrations in the build-up to the Iraq War has become a major stumbling block for Sir John Chilcot’s inquiry into the 2003 invasion.

While the Cabinet Office has said privately that it wants to release as many of the Blair-Bush communications as possible, there is one letter which lawyers at the White House say they have “not been able to locate”.

From the San Jose Mercury News, the panopticon on those other courts:

Big Data meets big-time basketball

As of this year, every NBA team has access to sophisticated tracking data that can tell them the position of the ball and every player on the court for every second of every game of the season. The data, provided by a system of cameras developed by a company called SportVU and installed in every NBA arena, is starting to revolutionize professional basketball, influencing everything from game strategy and player conditioning to how fans interact with the sport.

“It’s a real game changer,” said Ben Alamar, a professor of sport management at Menlo College in Atherton who works as a consultant to the NBA’s Cleveland Cavaliers. “It’s allowing us to ask questions that we really couldn’t ask before.”

The NBA’s new camera system is only the latest example of the power and pervasiveness of big data — the collection of large sets of small tidbits of information to explore everything from the farthest stars to individual consumer desires.

And on the roads, via the Los Angeles Times:

Use of license plate photo databases is raising privacy concerns

A growing number of cameras — hundreds around Los Angeles, thousands nationwide — are engaged in a simple pursuit: Taking pictures of license plates.

The digital photos, automatically snapped by cameras mounted on cars and street poles and then tagged with time and location, are transmitted to massive databases running on remote computer servers. Cops can then search those databases to track the past whereabouts of drivers.

Law enforcement officials say the data collection is invaluable for tracking down stolen cars and catching fugitives.

But such databases are also being built by private firms, which can sell access to anyone willing to pay, such as lenders, repo workers and private investigators. That is raising worries among privacy advocates and lawmakers, who say the fast-growing industry is not only ripe for conflicts of interest but downright invasive.

From TechWeekEurope, a victory perhaps, but also an exploit for Those Who Shall Not Be Named:

Minnesota Passes Smartphone Kill-Switch Legislation

  • Minnesota becomes the first US state to require manufacturers to offer kill switch for all smartphones sold

Minnesota has become the first US state to introduce legislation that requires all smartphones sold to have a kill-switch feature in the event that the device is lost or stolen.

Politicians on both sides of the Atlantic have been campaigning for such a measure and last month, manufacturers and operators agreed to include a “baseline anti-theft tool” in handsets sold in the US. However this is the first time such a requirement has been written into law.

“Any new smart phone manufactured on or after July 1, 2015, sold or purchased in Minnesota must be equipped with preloaded antitheft functionality or be capable of downloading that functionality,” reads the legislation. “The functionality must be available to purchasers at no cost.”

From the Miami Herald, more cause for domestic insecurity:

Behind bars, a brutal and unexplained death

The purported details of Darren Rainey’s last hour are difficult to read.

“I can’t take it no more, I’m sorry. I won’t do it again,’‘ he screamed over and over, according to a grievance complaint from a fellow inmate, as Rainey was allegedly locked in a shower with the scalding water turned on full blast.

A 50-year-old mentally ill inmate at the Dade Correctional Institution, Rainey was pulled into the locked shower by prison guards as punishment after defecating in his cell and refusing to clean it up, said the fellow inmate, who worked as an orderly. He was left there unattended for more than an hour as the narrow chamber filled with steam and water.

When guards finally checked on prisoner 060954, he was on his back and dead. His skin was so burned that it had shriveled from his body, a condition referred to as slippage, according to a medical document involving the death.

And via the Fort Collins Coloradoan, another whistleblower punished:

Whistleblower: VA punished me for not cooking books

The whistleblower behind the federal investigation of the Fort Collins Veterans Affairs clinic said she was put on two-week unpaid leave for not “cooking the books” when scheduling appointments.

Lisa Lee, a former Navy reservist now on active duty in Hawaii, told the Fort Collins Coloradoan she and another scheduler were transferred from Fort Collins, Colo., in March 2013 for refusing to hide wait times between desired appointment dates and actual dates. She said the suspension came after she filed an internal grievance about the transfer and scheduling practices.

The VA aims to see veterans within 14 days of desired appointment dates and uses it as a performance measure. It is a contributing factor to administrator bonuses, according to a VA spokesperson. Lee said a spreadsheet detailed which schedulers met the 14-day goal.

Bad news for would-be immigrants at home, via Homeland Security News Wire:

Records show Border Patrol agents typically not disciplined for abusing immigrants

Records obtained through a Freedom of Information Act request by the American Immigration Council(AIC) found that of 809 abuse complaints reported to the Border Patrol’s internal affairs unit between January 2009 and January 2012, only thirteen led to disciplinary action, and most of the agents cited for disciplinary action were only ordered to undergo counseling. One expert on unauthorized migration says that Border Patrol agents are not properly trained or disciplined by the agency.”People are not being held accountable for their actions,” he said. He conducted a survey in which he found that 10 percent of migrants reported abuse by Border Patrol agents when they were found illegally crossing the border.

And in Old Blighty, via the Observer:

MPs to investigate Serco over sex assault claim at Yarl’s Wood centre

  • Firm forced to disclose secret internal report as Keith Vaz says he is ‘shocked’ by events at immigration detention centre

Serco, the private outsourcing giant, is to be investigated by MPs after it was forced to disclose a secret internal report revealing evidence that it failed to properly investigate a claim of repeated sexual assaults by one of its staff against a female resident at Yarl’s Wood immigration detention centre.

The document, which was marked confidential, was made public last week following a four-month legal battle between Serco and Guardian News and Media. Lawyers said the report demonstrates a culture of disbelief towards women inside the detention centre, which is run by Serco, and hailed the high court’s decision forcing Serco to disclose the document as a victory for greater transparency.

The revelation comes a day after it was disclosed that Serco could be among companies to take over the running of privatised children’s social services, including child protection, under proposals being considered by Michael Gove’s Department for Education.

While Want China Times warns of other insecurities:

PLA wary of data leaks and malware from USB drives

In the internet era, mobile storage capacity is essential, especially in the form of USB flash drives or other portable storage drives. However, the risk of information leaks has prompted many, including the military, to consider how to monitor usage of such devices, reports the PLA Daily, the official newspaper of China’s armed forces.

The USB flash drives now readily available on the market are cheaper, smaller, faster and have thousands of times more capacity than the storage units that were around just a few years ago. Flash memory drives are also more durable and reliable than hard drives as they have no moving parts.

The drives present a significant security challenge for companies and organizations as their small size and ease of use allows unsupervised visitors or employees to smuggle out confidential data with little chance of detection. Both corporate and public computers are vulnerable to attackers connecting a flash drive to a free USB port to download material or to upload malicious software such as keyboard loggers or packet sniffers.

And Deutsche Welle sounds the panic alarm:

Spiegel: NATO unprepared if Russia moved into Baltic members

According to the German magazine Spiegel, NATO is examining scenarios in the event of a Russian military move in Eastern Europe. Alarm bells are already ringing in eastern states, and NATO is keen to show it could cope.

The article, which appeared in Spiegel’s online edition in German on Sunday, cites an internal North Atlantic Treaty Organization (NATO) draft document pertaining to discussions occurring within the military alliance and among individual members about possible scenarios if Russia were to launch a military campaign in Eastern Europe.

The draft document arrives at the conclusion that Russia’s ability to “execute a significant military action without much warning poses a wide-reaching threat for maintaining safety and stability in the Euro-Atlantic zone.”

NATO has observed a Russian troop buildup near its border with Ukraine, but Russia claims it has no current plans for a military move. Ukraine is not a member of NATO, but the alliance is keen to show that it can effectively defend its Baltic members should the need arise.

On to the drone front, first with a video report from RT America:

“Drone Memos” author headed for Senate confirmation

Program notes:

On Thursday, Senate Majority Leader Harry Reid announced President Barack Obama’s nominee to the First Circuit Court of Appeals, David Barron, will receive a confirmation vote in the Senate next week. The nomination has drawn calls from both sides of the aisle for the White House to release the drone memos, written by Barron, to the public. Those memos served as a legal basis for the drone strike that killed American citizen Anwar al Awlaki in 2011, but they remain classified. RT’s Sam Sacks reports.

From TheLocal.se, drones over Scandinavia:

Swedish police mull drone deployment

The Swedish National Police Board is to review how unmanned aerial vehicles, also known as drones, could be of use while conducting routine police work.

The National Police Board (Rikspolisstyrelsen) has been awarded funds to investigate possible applications of the technology.

Examples of when the unmanned aerial vehicles could be of use include incidents such as oil spills and at crime scenes when forensic scientists could send in the drones to take pictures, reducing the risk of evidence being destroyed.

After the jump, the latest from the Asian Game of Zones, including emerging alliances, political posturing, and the nearly completed remilitarization authorization in Japan. . . Continue reading

Headlines II: Spooks, pols, zones, drones, more


Today’s tales of from the dark side covers everything from political deception to the latest heated developments in the Asian Game of Zones as Washington pushes Japan into remilitarization and anxieties and violence rise.

But we begin at home with that political decepetion, covered by the McClatchy Washington Bureau:

Bill to curb NSA spying looks like change, but isn’t really

The bipartisan bill that aims to put serious curbs on the National Security Agency’s mass collection of Americans’ communications is being hailed by Republicans and Democrats as a big breakthrough.

It’s not.

“The bottom line: This is largely faux reform and a surveillance salve,” said Thomas Drake, a former NSA senior official turned whistle-blower who’s critical of the agency’s collection programs. “To date, neither the House nor Senate attempts go far enough.”

Another angle, covered by the Guardian:

Everyone should know just how much the government lied to defend the NSA

  • A web of deception has finally been untangled: the Justice Department got the US supreme court to dismiss a case that could have curtailed the NSA’s dragnet. Why?

If you blinked this week, you might have missed the news: two Senators accused the Justice Department of lying about NSA warrantless surveillance to the US supreme court last year, and those falsehoods all but ensured that mass spying on Americans would continue. But hardly anyone seems to care – least of all those who lied and who should have already come forward with the truth.

Here’s what happened: just before Edward Snowden became a household name, the ACLU argued before the supreme court that the Fisa Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional.

In a sharply divided opinion, the supreme court ruled, 5-4, that the case should be dismissed because the plaintiffs didn’t have “standing” – in other words, that the ACLU couldn’t prove with near-certainty that their clients, which included journalists and human rights advocates, were targets of surveillance, so they couldn’t challenge the law. As the New York Times noted this week, the court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans’ communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court.

From Süddeutsche Zeitung, a show of resistance from Berlin:

Germany Plans To Ban Tech Companies That Play Ball With NSA

It didn’t take an Edward Snowden to figure out that American espionage service providers had access to confidential information about German citizens. It’s been known for years that the Computer Sciences Corporation (CSC) works for American secret services.

It’s also known that a former CSC subsidiary was involved in the abduction of German citizen Khaled el-Masri, who was turned over to the CIA and subjected to abuse and degradation before the agency finally admitted his arrest and torture were a mistake.

Nevertheless, German CSC subsidiaries have in past years received more than 100 contracts from state and federal governments in Germany, as Süddeutsche Zeitung and public broadcaster NDR reported last fall. The operative rule at the time was that only companies that were found guilty of crimes could be excluded from public contracts. So far, no CSC employee has been prosecuted for the abduction of el-Masri. Per se, working for the U.S. intel agencies is not punishable. So Germany’s federal government tied its own hands over the issue.

Turning the panopticon into art, via the Guardian:

Conversnitch turns covert surveillance into an art form

Somewhere in Manhattan, a lightbulb, a Raspberry Pi and a Wi-Fi card are listening in on idle chat and tweeting what they hear

In the pre-Snowden era, believing that a household object was speaking to you was enough to have you committed to correctional facilities for state-sponsored reprogramming.

In his new book, Nowhere to Hide, the journalist Glenn Greenwald explains how he and the NSA contractor turned whistleblower put their phones in a freezer with the batteries disconnected to thwart spooks’ ability to operate phones remotely as microphones. But what would happen if the fridge itself was listening to your words?

Two American artists are now taking that concept to a logical conclusion. Using only a credit card-sized Raspberry Pi computer, a microphone and a Wi-Fi card hacked into a lightbulb fitting, and a piece of open source software hosted at Github, they have installed a listening device at an undisclosed spot in Manhattan, New York, and connected it to a Twitter feed.

RT covers the hackable:

Tor-provided web anonymity not PRISM-proof – Microsoft security guru

The Tor anonymity network cannot provide internet users shelter from government hackers and cyber criminals, a top Microsoft security expert has revealed.

“There is no such thing as really being anonymous on the internet. If [hackers and government agencies] want you, they will get you,” Andy Malone, of Microsoft Enterprise Security and founder of the Cyber Crime Security Forum, said at the Microsoft TechEd North America 2014.

While The Onion Router (Tor) remains more resilient than alternatives such as virtual private networks, cyber criminals are able to exploit weaknesses in the system.

From the McClatchy Washington Bureau, to tell the truth:

Spy satellite agency says it fixed its ‘broken’ polygraph program

The nation’s spy satellite agency has announced it overhauled its lie detector program after its inspector general found “significant shortcomings” that could put national security at risk.

The National Reconnaissance Office’s inspector general found the problems were so widespread that one senior official described the agency’s polygraph program as “terribly broken.”

“This official added that the current status of the NRO polygraph program is ‘bleak,’” the inspector general report said.

The Guardian covers a Russian cutoff:

Russia halts rocket exports to US, hitting space and military programmes

  • Russia announces decision to halt export of crucial rocket engines in response to US sanctions over annexation of Crimea

Russia’s deputy prime minister, Dmitry Rogozin, has announced it will halt the export of rocket engines crucial to the US military defence and space programmes.

The move marks a serious deterioration in US-Russian cooperation in space, which for two decades had remained largely above Earthly politics. It could prove a serious set back for the ailing US space programme.

The Russian RD-180 engine has been in production since 1999. The US has imported more than forty of them to power its Atlas V rockets into space.

From RT, an added twist to the already controversial:

GMO producers should be punished as terrorists, Russian MPs say

A draft law submitted to the Russian parliament seeks to impose punishment up to criminal prosecution to producers of genetically-modified organisms harmful to health or the environment.

The draft legislation submitted on Wednesday amends Russia’s law regulating GMOs and some other laws and provides for disciplinary action against individuals and firms, which produce or distribute harmful biotech products and government officials who fail to properly control them.

At worst, a criminal case may be launched against a company involved in introducing unsafe GMOs into Russia. Sponsors of the bill say that the punishment for such deeds should be comparable to the punishment allotted to terrorists, if the perpetrators act knowingly and hurt many people.

IDG News Service covers corporate snoopage:

Online advertising poses significant security, privacy risks to users, US Senate report says

  • The online ad industry should offer better protections against ‘malvertising,’ a US Senate investigation found

The current state of online advertising endangers the security and privacy of users and the U.S. Federal Trade Commission should force the industry to offer better protections through comprehensive regulation, the U.S. Senate said in a report.

The report includes findings and recommendations of the Permanent Subcommittee on Investigations of the Senate’s Committee on Homeland Security and Governmental Affairs following an investigation into the distribution of malware through online ads — also known as “malvertising.” It was followed by a hearing Thursday that included testimony from Yahoo and Google about their efforts to combat such threats.

“Consumers can incur malware attacks [through online ads] without having taken any action other than visiting a mainstream website,” the subcommittee said, referencing two attacks that involved malicious ads distributed through Yahoo and Google ad networks.

Criminalization in the corporate interest from the Guardian [and can the “terrorism” label be far behind?]:

Sussex police under fire for ‘criminalising’ fracking protests

  • Force accused of misusing section 14 orders last year with just 29 convictions resulting from 126 arrests at Cuadrilla site

Most of the people arrested during a summer of demonstrations against fracking in the village of Balcombe have been acquitted, leading to accusations that police tactics in a £4m operation criminalised peaceful protest.

The last of the criminal trials resulting from 126 arrests made by Sussex police during days of action outside the Cuadrilla site last summer finished this month. Of 114 charges, relating to 90 individuals, only 29 resulted in convictions, according to freedom of information responses from the Crown Prosecution Service (CPS) and the police.

Sussex police are accused of using mass arrests, draconian bail conditions and section 14 notices under the Public Order Act 1986 to criminalise peaceful protest at the site in Balcombe, where the energy firm Cuadrilla conducted exploratory drilling.

And an appealing possibility from the Guardian:

David Miranda allowed to appeal against ruling on Heathrow detention

  • Partner of former Guardian reporter to challenge high court ruling on legality of his detention under counter-terrorism powers

David Miranda, partner of the former Guardian journalist Glenn Greenwald, has been granted permission to appeal against a ruling that he was lawfully detained under counter-terrorism powers at Heathrow airport.

The case – which also involves a challenge to the police seizure of computer material related to the US National Security Agency (NSA) contractor Edward Snowden – will now go to the court of appeal.

In February, three high court judges – Lord Justice Laws, Mr Justice Ouseley and Mr Justice Openshaw – concluded that Miranda’s detention at Heathrow under schedule 7 to the Terrorism 2000 Act in last summer was legal, proportionate and did not breach European human rights protections of freedom of expression.

From the Guardian, grounds for domestic insecurity:

Albuquerque police promote officer accused of burning off man’s ear

  • Timothy Gonterman promoted despite report that was severely critical of Albuquerque police’s use of excessive force

Albuquerque police promoted a commander who was accused in a lawsuit of burning off part a homeless man’s ear with a stun gun, officials announced Thursday.

Albuquerque police department chief Gorden Eden said in a statement he was promoting two Albuquerque commanders to the newly created rank of major in response to a harsh US Justice Department report that was critical of Albuquerque police’s use of excessive force and demanded the agency adopt a number of reforms.

Foothills area commander Timothy Gonterman and criminal investigations commander Anthony Montano will now oversee the East and West Side field services divisions respectively, Eden said.

intelNews.org turns a blind eye:

US Secretary of Defense ‘not aware’ of Israel spying on America

The supreme official of the United States Department of Defense has said he is “unaware of the facts” behind recent media reports that Israel is aggressively spying on America.

Chuck Hagel, a former Republican Senator who assumed the leadership of the Pentagon in 2013, is on a three-day official visit to Israel, where he is scheduled to hold meetings with Israeli military and security officials.

He was responding to a question posed by an Israeli reporter about allegations, made by American newsmagazine Newsweek on Tuesday, that Israel’s spies “have gone too far” in targeting American interests. In

From the McClatchy Washington Bureau, prodding the bear:

Ukraine crisis may lead to Western military bases closer to Russia

When Pentagon chief Chuck Hagel and other NATO defense ministers meet in Brussels in early June, their summit will be dominated by questions that would have seemed surreal just a few months ago.

How should Western leaders respond to military aggression by Moscow in Ukraine?

With defense budgets flat or declining in most of NATO’s 28 member countries and U.S. forces in Europe at their lowest levels in decades, is the trans-Atlantic alliance adequately prepared to defend its vast territory?

In the most extreme scenario, are the United States and its European allies strong enough to go to war against Russia?

From CNBC, say hello to Skynet:

Military dream come true: One system, many drones

One of the strongest wishes of America’s increasingly digital defense industry is to find a way to monitor or control several pieces of equipment on a single operating system. This is especially true in the field of unmanned aerial vehicles (UAVs), where too often, each manufacturer creates a unique platform for its drone, and customers who buy several different kinds of drones cannot easily coordinate operation between them.

That’s changing.

Now, buyers of a version of one of the most prolific UAVs on the market will soon be able to buy an operating system that can work with other drones. General Atomics Aeronautical Systems has been given permission by the Defense Department to sell unarmed versions of its famed Predator, called the Predator XP, to international customers in places like the Middle East, or friendly allies bordering the Ukraine and Russia, like Poland.

As for Skynet, consider a clip from Terminator 3: Rise of the Machines:

Skynet takes over

But it’s not just drones, as another CNBC story reports:

Defense tech in 2039: The robots are coming

In 25 years, the U.S. military will operate under the principle of “less is more.”

Less manpower. More robots.

Robots on the battlefield of the future will carry a heavier load, both literally and figuratively. They will operate with more freedom and begin to think for themselves. They will be armed and take on more tasks.

“I think you’ll see many of the high-risk missions done by autonomous platforms,” said Tim Trainer, vice president of product management for defense and security at iRobot.

IRobot is perhaps best known for its Roomba vacuum, but it has a growing arsenal of defense and security robots—everything from a five-pound robot that can be easily tossed and even dropped on its head, to a 500-pound robot that can lift close to its own weight. A trainer demonstrated some of the robots at the company headquarters in Bedford, Mass., and he sees a future where one person can control multiple machines operating on a single software system without having to constantly monitor them.

With so many American drones striking at with Pakistan’s borders, Defense One joins the club:

Pakistan Wants Drones and It Doesn’t Need America’s Permission to Get Them

one breath to the next, Pakistani officials make the case for and against drone strikes. Ahsan Iqbal, Pakistan’s minister of planning and development, for instance, calls American drone operations “very counterproductive.” He says, “If they hit one target, they also bring collateral damage…. The whole tribe stands up, we get into more problems, and the U.S. gets bad publicity.”

But, Iqbal offers, Pakistan “should have the technology to do it.

Already, Pakistan has remote-piloted aircraft. Islamabad uses surveillance drones to provide the military with a real-time picture of its restive border areas or counterterrorism operations. Pakistan unveiled two new drones in November: Burraq, named after the winged horse from the heavens that transported Islamic prophets, and Shahpar. They were developed by Pakistan’s defense industry, the government said, and would not be armed.

From BBC News, an underwater drone tanks:

Malaysia flight MH370: Defective drone delays search

The search for a missing Malaysia Airlines plane has been delayed after the discovery of a technical issue with the underwater drone used in the hunt.

The communications equipment on the Bluefin-21, on loan from the US, has a “defect”, Australia’s Joint Agency Coordination Centre (JACC) said.

It is now awaiting spare parts from the UK before it can continue its search in the southern Indian Ocean.

Nextgov catches a virus:

Heartbleed Superbug Found in Utility Monitoring Systems

Software that monitors utility plants and other operations at several military installations has been found to be affected by the recently discovered superbug Heartbleed, when configured a certain way, according to the Homeland Security Department and the software’s manufacturer.

“The latest release of Schneider Electric Wonderware Intelligence Version 1.5 SP1 is not susceptible to the OpenSSL vulnerability. However, users have been known to reinstall Tableau Server, the vulnerable third-party component that is affected. Therefore, Schneider Electric Wonderware has issued a patch and a security bulletin addressing this vulnerability in all versions,” states a bulletin from the DHS Cyber Emergency Response Team.

Exploits made by hackers “that target this vulnerability are known to be publicly available” on the Web, DHS said. Heartbleed is a defect in common Web encryption software that researchers discovered in early April.

From Channel NewsAsia Singapore, considerations of privacy:

Sector-specific guidelines to offer clarity on personal data matters

SINGAPORE: The Personal Data Protection Commission (PDPC) will be releasing advisory guidelines for the education, social services and healthcare sectors to provide greater clarity on the sectors’ obligations under the Personal Data Protection Act (PDPA).

The guidelines will be open for public consultation on Friday.

In his opening address at the Personal Data Protection Seminar 2014 on Friday morning, Minister for Communications and Information Yaacob Ibrahim said the guidelines will address sector-specific matters.

After the jump, the Asian Game of Zones intensifies, with Chinese fleeing Vietnam as the body count and burned business costs become clearer inthe ake of violent portest over Chinese oil drilling on an Island claimed by Hanoi, Japan raises the pressure as remilitarization becomes a done deal, and a lot more. . . Continue reading

A powerful duo: Chris Hedges and Mr. Fish


For all you readers who are fond of Mr. Fish and inspired by the passionate words for former New York Times Mideast Bureau Chief Chris Hedges, here’s a chance to watch them together, during a joint speaking appearance last moth.

Without further ado [but not adieu], from videographer Leigha Cohen:

Chris Hedges and Dwayne “Mr. Fish” Booth: War and its Meaning

Program notes:

Chris Hedges and Dwayne Booth “Mr. Fish” spoke on April 24, 2014 at the University of Connecticut. This was part of a week long event sponsored by The Humanities Institute and the College of Liberal Arts and Sciences.

The Title for today was War and its Meaning. The first 32 minutes of the video Chris Hedges gives an impassioned talk on his personal experiences and political thoughts on this topic. This is then followed by an amazing 25 minute Q&A period where both Chris hedges and Dwayne Booth respond to several questions asked by the audience and as always what is said is amazingly thought provoking. Both Dwayne Booth and Chris Hedges have been working collaborators and good friends for the last 6 years.
.
Hedges spent nearly two decades as a foreign correspondent in Central America, the Middle East, Africa and the Balkans. He was an early and outspoken critic of the US plan to invade and occupy Iraq and called the press coverage at the time “shameful cheer leading.” In 2002, he was part of a team of reporters for The New York Times who won a Pulitzer Prize for the paper’s coverage of global terrorism.

That same year he won an Amnesty International Global Award for Human Rights Journalism.He speaks Arabic, French, and Spanish, and studied Latin and Ancient Greek at Harvard. On November 3, 2011, Hedges was arrested with others in New York as part of the Occupy Wall Street demonstration, during which Hedges and others staged a “people’s hearing “on the investment bank Goldman Sachs and then blocked the entrance to their corporate headquarters.

And here’s a separate interview with Mr. Fish:

Dwayne “Mr Fish” Booth Private Interview

Program notes:

Dwayne Booth “Mr. Fish” spoke on April 24, 2014 at the University of Connecticut. This was part of a week long event sponsored by The Humanities Institute and the College of Liberal Arts and Sciences “War and its Meaning”.

After the event I was granted a private interview with Mr. Fish where he reveals his early inspirations for his art, his politics and cartooning. He also describes his 5 year working relationship with Chris Hedges who attended and spoke at that days events. At the end of the short interview appears several on MR. Fish’s Cartoons.

Dwayne Booth (Mr. Fish) has been a cartoonist and freelance writer for twenty years, publishing under both his own name and the pen name of Mr. Fish with many of the nation’s most reputable and prestigious magazines, journals and newspapers. In addition to Harper’s Magazine and Truthdig.com, his work has appeared in The Los Angeles Times, The Village Voice, Vanity Fair, Mother Jones Magazine, the Advocate, Z Magazine, the Utne Reader, Slate.com, MSNBC.com and others.

Headlines II: Spies, drones, zones, and pols


We begin today’s tales from the dark side with a deal from the New York Times:

Sony Pictures Buys Film Rights to Book on Snowden

After a long, slow haul, the film rights to Glenn Greenwald’s book about Edward J. Snowden and his revelations about electronic surveillance by United States security officials have found a home, at Sony Pictures Entertainment.

Sony said on Wednesday that it had acquired rights to Mr. Greenwald’s book, “No Place to Hide: Edward Snowden, the NSA and the U. S. Surveillance State,” for the producers Michael G. Wilson and Barbara Broccoli. Mr. Wilson and Ms. Broccoli are known for their work on James Bond films like “Skyfall” and “Quantum of Solace,” both of which were released by Sony and Metro-Goldwyn-Mayer.

Mr. Greenwald’s book, whose rights were represented by both the Paradigm agency and Writers House, had been in consideration around Hollywood since the fall, as potential buyers fretted about how to tell a real-life story that is still playing out. Mr. Snowden remains in Russia, and is wanted by the authorities in the United States, where he faces criminal charges. Last month, he retained a Washington lawyer in hopes of reaching a plea deal with federal prosecutors.

Another whistleblower may also catch a break, though not nearly so lucrative, via BBC News:

US ‘considers Manning transfer’ to civilian prison

The Pentagon is considering transferring Private Chelsea Manning to a civilian prison in order to treat her gender dysphoria, US media report.

Pte Manning, formerly known as Bradley, was sentenced to 35 years in military prison for leaking a massive trove of classified US documents.

After the conviction, she announced the desire to live as a woman. However, the US military prohibits transgender people from serving openly in the military.

From Ars Technica, a major cyberfail:

Al-Qaeda’s new homebrew crypto apps may make US intel-gathering easier

NSA spying revelations led to development of three new encryption apps.

Terrorists loyal to al Qaeda and its offshoots are using new encryption software, most likely in response to revelations that the National Security Agency is able to bypass standard cryptographic protections as part of an expansive surveillance program, according to a recently released report from intelligence firm Recorded Future.

The three new major encryption tools were adopted within a three- to five-month period following leaks from former NSA contractor Edward Snowden, according to the report. The apps replace or bolster the original Mujahideen Secrets crypto program that al Qaeda members have mainly used for e-mail since 2007. One of the new releases, known as Tashfeer al-Jawwal, is a mobile program developed by the Global Islamic Media Front and released in September. A second, Asrar al-Ghurabaa, was released by the Islamic State of Iraq and Al-Sham in November, around the same time the group broke away from the main al Qaeda group following a power struggle. The third program is known as Amn al-Mujahid and was released in December by that Al-Fajr Technical Committee.

The influx of new programs for al Qaeda members came amid revelations that the NSA was able to decode vast amounts of encrypted data traveling over the Internet. Among other things, according to documents Snowden provided, government-sponsored spies exploited backdoors or crippling weaknesses that had been surreptitiously and intentionally built in to widely used standards.

The Guardian covers hackery by corporate hacks for the Rupester:

News of the World royal editor: I hacked Kate Middleton 155 times

  • Clive Goodman tells phone-hacking trial he himself intercepted princes’ voicemails, but has never been asked about it by police

Kate Middleton was hacked 155 times by a reporter on the News of the World who said he snooped on her voicemails on Christmas Eve and Christmas Day, the Old Bailey has heard.

Clive Goodman, the paper’s former royal editor, also revealed for the first time he directly hacked the phone of Prince William, adding that police had failed to ask him a single question about it in the eight years since he was arrested on related charges.

He told jurors he hacked Prince William 35 times, Prince Harry nine times and the Duchess of Cambridge 155 times.

CBC News covers specious secrecy involving a widely publicized Ottawa visit by U.K. Prime Minister David Cameron:

David Cameron’s ‘top-secret’ visit to Canada revealed

Access to Information request results in redaction of name of British PM on official visit to Canada The Privy Council Office, it seems, is working hard to protect the identity of those who visit the prime minister.

According to documents recently released under Access to Information, the name of an individual who paid an official visit to Canada in September 2011 must be withheld because it is considered “personal information.”

Owing to an apparent clerical error, however, CBC News has uncovered the identity of the mystery world leader in question. One page in the batch of documents was printed in duplicate: one time with names blanked out and the other with the names readable.

The documents show the deletion was meant to be “Prime Minister Cameron,” presumably referring to British Prime Minister David Cameron.

From PCWorld, about damn time:

Senators want to limit companies’ use of student data

Two U.S. senators want to prohibit companies from sharing students’ personal data when advertising their products or services and require that organizations holding student data put data security safeguards in place.

A proposal from Senators Ed Markey, a Massachusetts Democrat, and Orrin Hatch, a Utah Republican, would largely regulate the use of student data by private companies. The Family Educational Rights and Privacy Act (FERPA) of 1974 generally requires public schools to get parental consent before sharing students’ personal data with third parties, but lawmakers and some privacy groups have raised concerns in recent months that those protections are weakened when schools outsource data processing and other functions.

Markey and Hatch on Wednesday released a discussion draft of legislation called the Protecting Student Privacy Act. In addition to data protection and data-sharing rules, the proposal would allow parents to access personal information about their children held by private companies and change incorrect information.

From the Guardian, another despicable neoliberal move:

Privacy groups demand rethink over HMRC plan to sell tax data

  • Three groups hand in petition of 300,000 signatures, and Lib Dem MP says proposed scheme would undermine confidentiality

HM Revenue and Customs must rethink its plans to share millions of people’s personal tax data with private companies and researchers, a prominent Lib Dem MP and privacy campaigners have said – as they handed in a petition of 300,000 signatures to the government.

Julian Huppert, a Lib Dem member of the Commons home affairs committee, said HMRC would “seriously undermine the confidentiality we expect” if it proceeded with the proposal to relax restrictions on sharing taxpayer data and potentially selling it to private firms.

Although the data would be anonymised, critics fear it could include details about income, tax arrangements and payment history and carry a risk that people could be identified. The campaign groups 38 Degrees, Open Rights Group and Sum of Us handed in a petition calling for an end to the plans.

From Aero-News Network, our first drone story and an apparent win for the private sector:

FAA To Expedite Limited Commercial Operations Of UAS

  • Association For Unmanned Vehicle Systems International Welcomes Move To Advance UAS Integration

Perhaps realizing that the UAV train has already left the station … during a speech at AUVSI’s Unmanned Systems 2014, FAA Manager of UAS Integration Jim Williams on Tuesday announced that the FAA is working with several industries to expedite some limited commercial operations of UAS before UAS rules are finalized.

“We applaud the FAA for working collaboratively with the industry and other stakeholders to help UAS technology begin to take off,” said AUVSI President and CEO Michael Toscano. “UAS have a host of societal and economic benefits, and many industries are clamoring to harness their capabilities. Limited commercial operations is a good first step, but we also need to begin the small UAS rulemaking immediately. We look forward to continue working with the FAA to advance UAS integration safely and responsibly.”

Specifically, Williams said the FAA is expected to allow limited commercial operations for filmmaking, powerline inspection, precision agriculture and flare stack inspection. Williams said these industries approached the FAA for expedited approvals.

CNN covers the latest dronal body count:

Drone strike kills at least 10 militants near Afghan-Pakistani border, official says

A U.S. drone strike Wednesday morning killed at least 10 militants and injured 14 near the Afghan-Pakistani border, a Pakistani military official said.

The attack targeted militants in Afghanistan’s Nangarhar province, the official said, speaking on condition of anonymity.

It wasn’t immediately clear which militant group or groups were targeted.

And from Ars Technica, a good PR move for the military’s drones:

US sends its giant spy drone to look for kidnapped Nigerian girls

  • It can look through trees, but can a Global Hawk find 276 girls in the forest?

The drone that the United States Air Force sees as the replacement for the venerable U-2 spy plane is now flying surveillance missions over Nigeria as part of the search for 276 schoolgirls kidnapped by the Boko Haram terrorist group. A Northrop Grumman RQ-4 Global Hawk flew a mission over Nigeria on Tuesday, according to an NBC News report.

The Global Hawk, which first flew in 1998, can stay airborne for up to 28 hours and has a range of 8,700 miles. It has a wingspan close to that of a Boeing 747, weighs more than 32,000 pounds, and carries the Hughes Integrated Surveillance and Reconnaissance (HISAR) sensor system, a down-market version of the infrared, optical, and synthetic aperture radar gear Hughes developed for the U-2.

At least some of the current RQ-4 aircraft carry a signals intelligence sensor as well, which can be used to intercept radio transmissions from the ground. The latest generation of RQ-4s (Block 40) will carry an improved radar system called the Multi-Platform Radar Technology Insertion Program (MP-RTIP), which can both provide synthetic aperture radar imaging of the ground below and track multiple moving targets.

SecurityWeek covers snitches in unsuspected places, including those “smart” household thermostats, refrigerators, and suchlike:

The Massive Challenge of Securing the Internet of Things

If the buzz last year was all about software defined networking (SDN), this year’s buzz is about the Internet of Things – everyday devices that are IP-enabled, can communicate over the Internet and can transmit what may be very confidential and important data. In fact, according to data from Cisco, there are now more “things” connected to the Internet than there are people on Earth, and these “things” are not just smartphones and tablets. For example, a Dutch startup, Sparked, is using wireless sensors on cattle so that when one of them is sick or pregnant, it sends a message to the farmer.

While devices that are used in the Internet of Things (IoT) can address either consumer or enterprise needs, its use within enterprises and critical infrastructure such as manufacturing plants or transportation hubs may pose the biggest security risks, and the biggest targets for criminal organizations and nation states.

Spiegel covers a covert blast from the past starring some nasty Nazi volk:

Files Uncovered: Nazi Veterans Created Illegal Army

Newly discovered documents show that in the years after World War II, former members of the Nazi Wehrmacht and Waffen-SS formed a secret army to protect the country from the Soviets. The illegal project could have sparked a major scandal at the time.

For nearly six decades, the 321-page file lay unnoticed in the archives of the BND, Germany’s foreign intelligence agency — but now its contents have revealed a new chapter of German postwar history that is as spectacular as it is mysterious.

The previously secret documents reveal the existence of a coalition of approximately 2,000 former officers — veterans of the Nazi-era Wehrmacht and the Waffen-SS — who decided to put together an army in postwar Germany in 1949. They made their preparations without a mandate from the German government, without the knowledge of the parliament and, the documents show, by circumventing Allied occupation forces.

Independent.ie has Irish police behaving badly:

Doctor: ‘Special needs boy was stripped naked and whipped with belt in garda custody’

A RETIRED doctor has claimed a “special needs boy” was stripped naked and whipped with his own belt in Garda custody.

Dr Richard O’Flaherty told the Oireachtas Justice Committee the 17-year-old was arrested after he borrowed his father’s car.

He said the young man was arrested by gardai who took off his clothes and beat him while he was detained.

Dr O’Flaherty was speaking at an Oireachtas hearing on proposed changes to the Garda Siochana Act.

Relatively good news, at least for one state, from MintPress News:

Minn. Closer To Stopping “Policing For Profit”

Starting in August, police in Minnesota will no longer be able to seize property from people suspected of — but not charged with — criminal involvement.

Starting Aug. 1, new legislation goes into effect in Minnesota that will stop law enforcement from seizing a person’s property — including cash, stocks, real estate, vehicles, guns, cars and homes — if that person is only suspected of being involved with wrongdoing or crime.

Under the bipartisan supported legislation, Minnesota will soon require law enforcement to first convict an individual, or require the property owner to plead guilty to a crime or become an informant, in order for law enforcement to be able to seize that individual’s property under civil forfeiture rules.

The new law also shifts the burden of proof onto the government. Previously, those who had their property taken away under civil forfeiture practices had to prove that their property was not used in, or obtained through any illegal activity.

After the jump, a host of stories for the increasingly accelerating Game of Zones, including massive violence in Vietnam, a whole lot of serious saber-rattling, and a whole lot more. . . Continue reading

Headlines II: Spies, lies, hacks, drones, zones


We begin today’s tales form the dark side with another Snowden revelation via Ars Technica:

Encrypted or not, Skype communications prove “vital” to NSA surveillance

  • Newly published memo leaked by Edward Snowden details the value of Skype data.

Last year, Ars documented how Skype encryption posed little challenge to Microsoft abuse filters that scanned instant messages for potentially abusive Web links. Within hours of newly created, never-before-visited URLs being transmitted over the service, the scanners were able to pluck them out of a cryptographically protected stream and test if they were malicious. Now comes word that the National Security Agency is also able to work around Skype crypto—so much so that analysts have deemed the Microsoft-owned service “vital” to a key surveillance regimen known as PRISM.

Ars catches Microsoft accessing links we sent in our test messages.
“PRISM has a new collection capability: Skype stored communications,” a previously confidential NSA memo from 2013 declared. “Skype stored communications will contain unique data which is not collected via normal real-time surveillance collection.” The data includes buddy lists, credit card information, call records, user account data, and “other material” that is of value to the NSA’s special source operations.

The memo, which was leaked by former NSA contractor Edward Snowden and released Tuesday by Glenn Greenwald to coincide with the publication of his book No Place to Hide, said the FBI’s Electronic Communications Surveillance Unit had approved “over 30 selectors to be sent to Skype for collection.”

CNBC tracks the hack:

Hackers go after Google users in advanced phishing attack

Hackers are targeting Google users’ passwords in a new advanced phishing scheme that is difficult to detect and block, security experts at the firm Bitdefender said on Tuesday.

The attack began a couple of days ago and has managed to spread fast, said Bianca Stanescu, a security specialist at the firm.

“We haven’t spotted this type of phishing attack. It’s enhanced, usually the security solutions block the webpage for malicious activity before users open it, but this time security solutions receive the encoded content and they can’t really block it.”

And today’s drone coverage begins with a video report from France 24:

Drones: A military revolution

Program notes:

Drones: unmanned, discreet and economical planes, are the secret weapons of approximately 30 armies around the world. But these small remote-controlled aircraft are also criticized for the significant collateral damage they can cause on the ground. Our reporters in the United States bring you an exclusive report filmed on a US Army base in New Mexico.

When it comes to reporting on the use of drones by the United States, one can only scratch the surface, because of the secretive nature of the American drone programme. Only a relatively small part of it is public, and its deadliest component remains a secret.

According to the US military, drones don’t even exist. The term “drones”, that is. The planes are officially called “RPAs” by all US officials, except, notably, US President Barack Obama. RPA stands for remotely piloted aircraft. By using this term, the military wants to underscore that these machines are actually piloted by humans, and aren’t just robots.

Next, drones Down Under with United Press International:

Safe use of drones in Australian airspace to be studied

Northrop Grumman Australia and the Royal Melbourne Institute of Technology University have joined to study the requirements for the safe use of unmanned aerial systems in the country.

Requirements for operating unmanned aircraft in Australia are to be studied by Northrop Grumman and the Royal Melbourne Institute of Technology University.

Northrop Grumman Australia said the collaborative project is to develop solutions for the safe operation of the aircraft, particularly of large-sized UAVs.

“As a producer of large-scale unmanned aircraft systems, our goal is not only to provide the aircraft, but also to understand fully the Australian government’s needs to certify them for operation,” said Ian Irving, chief executive for Northrop Grumman Australia. “We’re extremely excited to work with RMIT University because of their leadership in the development of innovative approaches to civil and military airspace regulatory reform and air vehicle certification.”

And from Mashable, consulting with drones:

Consulting Firm Plans to Offer ‘Drone as a Service’ Option

On May 12, a strategic consulting firm called 32 Advisors announced the creation of a drone subsidiary it calls Measure. Rather than build or sell drones, the new company will offer what it calls “Drone as a Service.” Think Rent-a-Drone: Companies that believe they might have use for a drone — but don’t have the money, expertise, or interest to buy, run, and maintain their own drone or drone fleet — would hire Measure to do it for them.

Chief Executive Officer Brandon Torres Declet is a former legislative aide and lobbyist specializing in homeland security issues. Here’s what he says about it:

We have a lot of manufacturers trying to sell everything to everybody, and as a company we thought, look, there’s a space here to provide both advisory services for companies — let’s say in agriculture or oil and gas — to develop missions, to develop requirements and to develop the best drones they should use for those particular missions. And then to provide a “Drone as a Service” platform, a turnkey solution. So if an oil and gas company tells us, “Look, we have to fly our pipeline every two weeks,” we’ll provide the drone, the operator, the sensor or other payload, and fly it for them.

And the New York Times scrubs the Wayback Machine:

Google Must Honor Requests to Delete Some Links, E.U. Court Says

The highest court in the European Union decided on Tuesday that Google must grant users of its search engine a right to delete links about themselves in some cases, including links to legal records.

The decision by the European Court of Justice in Luxembourg is a blow for Google, which has sought to avoid the obligation to remove links when requested by European users of its service.

By ruling that an Internet company like Google must comply with European privacy laws when operating in the European Union — a consumer market of about 550 million people — the court is indicating that such companies must operate in a fundamentally different way than they do in the United States.

A more rational European move from MintPress News:

European Court Scraps EU Data Collection Law

An EU law requiring telecom companies to store their customers’ metadata for up to two years has been ruled “invalid” by the EU Court of Justice.

The Court of Justice of the European Union concluded last month that the EU law forcing telecommunication companies to retain customer data for up to two years is illegal.

In a press release issued after the ruling in April, the European judges said the Data Retention Directive “interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data,” and as such, the court considers the directive “invalid.”

The Data Retention Directive requires Internet service providers and telephone companies to store metadata — the details of digital communications, including the phone numbers of both a caller and a recipient, the date and duration of a call, the location where a call was placed, as well as email addresses, but not the actual content of a conversation — for a period of up to two years. This storage, according to the law, allows “for the prevention, investigation, detection, and prosecution of criminal offences [sic],” particularly organized crime and terrorism.

Sky News takes action in Old Blighty:

The first legal challenge against alleged GCHQ snooping on UK smartphones has been filed.

The challenge alleges that the Government Communications Headquarters listening post has infected “potentially millions” of computers and smartphones around the world with malicious software, which could be used to extract photos and text messages, switch on the phone’s microphone or camera, track locations and listen in to calls.

Privacy International, a UK-based charity, brought the case to demand “an end to the unlawful hacking being carried out by GCHQ which, in partnership with the NSA”.

More from The Intercept:

British Spies Face Legal Action Over Secret Hacking Programs

Privacy International argues in its 21-page legal complaint that the hacking tactics are more intrusive than more traditional eavesdropping methods, and that, if left unchecked, they could amount to “one of the most intrusive forms of surveillance any government has conducted”:

In allowing GCHQ to extract a huge amount of information (current and historical), much of which an individual may never have chosen to share with anybody, and to turn a user’s own devices against him by coopting them as instruments of video and audio surveillance, it is at least as intrusive as searching a person’s house and installing bugs so as to enable continued monitoring. In fact, it is more intrusive, because of the amount of information now generated and stored by computers and mobile devices nowadays, the speed, ease and surreptitiousness with which surveillance can be conducted, and because it allows the ongoing surveillance to continue wherever the affected person may be.

The case is the latest in a string of actions against GCHQ in the United Kingdom following the Snowden disclosures. But it is the first to focus specifically on the legality of hacking techniques used to infiltrate computers and spy on communications. It has been lodged with the U.K.’s Investigatory Powers Tribunal, a special judicial body that handles complaints about the conduct of spy agencies.

The Independent advocates:

Create independent oversight committee for spy agencies, says former MI6 chief Sir Richard Dearlove

An independent committee should be created to oversee the work of Britain’s spy agencies in the wake of damaging revelations from former US intelligence contractor Edward Snowden, according to the former head of MI6.

Sir Richard Dearlove told the Reuters news agency that while he did not believe that the UK’s spies had acted illegally, the heated public debate around Snowden’s actions meant that there was now a greater need for transparency and assurances that they were not misusing their powers.

“Snowden has damaged the West’s capability with his revelations,” Sir Richard said. “But I also think what he has done is increase the knowledge and understanding of what the Government’s capabilities are in these areas.

“There is probably a need to create some sort of committee which is independently appointed – isn’t from the judiciary, isn’t made up of politicians – that acts as a guarantor in terms of assuring the public that these powers are not being abused.”

While Spiegel casts doubt:

NSA Probe: Can Snowden Be Questioned in Germany?

A special investigative committee in Germany’s federal parliament, the Bundestag, is currently probing allegations first published in SPIEGEL that the United States’ National Security Agency intelligence apparatus spied on Chancellor Angela Merkel’s cell phone and also on the communications data of millions of German citizens. The allegations have become the source of significant tensions between Germany and the United States.

One of the central questions facing the committee is whether and how it will question former NSA employee and whistleblower Edward Snowden, whose archive has been the source of numerous investigative reports about the intelligence agency’s activities.

The German government under Chancellor Angela Merkel is adamantly opposed to having Snowden testify in Germany. In a classified position paper provided to the committee — that was leaked to the Süddeutsche Zeitung newspaper and other media in late April — the government argued that if Snowden testified in Germany, it would endanger the “welfare of the state.” It added that his questioning in Germany would “run contrary to important political interests of the Federal Republic,” and that if the former intelligence worker were allowed to travel to Germany, the US secret services “would at least temporarily” limit cooperation with their German counterparts. Indeed, according to SPIEGEL reporting, Merkel pledged to US President Barack Obama the NSA whistleblower would not be brought to Germany.

And from RT America, another crackdown:

US spy chief cracks down on whistleblowers

Program notes:

Open-information activists are calling a new rule being implemented by the Office of the Director of National Intelligence a “gag order” on public debate. The rule in question prohibits employees of the office from publically discussing or writing about leaked information. Activists believe this will prevent employees from speaking out on perceived wrongdoing by the intelligence community, forcing them to repeat official positions given by government officials. As many note, these official positions and the truth are often very different. RT’s Lindsay France discusses the controversial new policy with Kathleen McClellan, the national security and human rights counsel for the Government Accountability Project.

From the Associated Press, security south of the border:

Mexico sets security plan for violent border state

After a recent surge of bloodshed, Mexico’s top security official said Tuesday that military commanders will lead what he called a new security strategy in the northern border state of Tamaulipas.

But Interior Secretary Miguel Angel Osorio Chong’s description sounded more like a doubling down on the current approach rather than a new plan. He said the government will continue working to dismantle cartels, block smuggling routes for people, weapons and drugs, and vet local police for corruption. He gave no numbers for troop or federal police reinforcements.

At least 76 people have been killed in drug-related violence since the start of April in Tamaulipas from cartel infighting and clashes between gunmen and security forces.

MintPress News mulls Skynet controls:

UN Weighs Laws For Future ‘Killer Robots’

Campaigners say the ruling effectively backs individual privacy rights over the freedom of information.

Diplomats urged the adoption of new international laws Tuesday that could govern the use of “killer robots” if the technology becomes reality someday.

At the first United Nations meeting devoted to the subject, representatives began trying to define the limits and responsibilities of so-called lethal autonomous weapons systems that could go beyond human-directed drones.

The tone of the four-day gathering was set by Michael Moeller, acting head of the U.N.’s European headquarters in Geneva, who urged the delegates to take “bold action” by adopting pre-emptive new laws to ensure there is always a person directing the weapons.

After the jump, the latest from the Asian Game of Zones, including the latest outrageous umbrage from Pyongyang. . . Continue reading

Headlines II: Spooks, shockers, zones, drones


A lot to cover and little time to write, so onward.

From the Guardian, an Old Blighty hack alert:

Privacy is at risk owing to basic security failures, warns information regulator

  • Organisations are told that missed software updates and poor password management lead to same breaches being repeat

British people’s privacy is being put in danger because organisations are failing to get rudimentary security right, the information commissioner’s office warned on Monday.

In a review of the breaches reported to the privacy regulator, the ICO uncovered some common basic errors that led to data breaches, including failing to update software and poor password management.

“It’s the same sort of breaches occurring again and again,” the ICO’s group manager for technology Simon Rice told The Guardian.

Techdirt covers the latest form The Most Transparent Administration in History™:

The Government’s Antipathy Towards Transparency Has Made FOIA Lawsuits The Default Process

  • from the gov’t-resorting-more-and-more-to-‘make-me’-response dept

This is default mode for the Freedom of Information Act.

In a federal FOIA complaint, the ACLU and University of Arizona Professor Derek Bambauer and Associate Professor Jane Yakowitz Bambauer claim that the Department of Homeland Security has failed to respond to requests made in January and February for records that may “shed light on Border Patrol’s extensive but largely opaque interior enforcement operations.”

The professors seek “records related to U.S. Border Patrol’s interior enforcement operations in Tucson and Yuma Sectors, including relevant agency policies, stop data, and complaint records.”

From Spain, the panopticon extends its reach, via El País:

Government to create database for monitoring all Spanish bank accounts

  • Measure aimed at combating money laundering and terrorism funding
  • But experts fear new system could be used as a political weapon

The government is creating a massive database to monitor the banking activities of everyone living in Spain, with the goal of fighting money laundering and funding for terrorist activities.

Judges, prosecutors, police officers, intelligence agents and the Tax Agency will have access to the 34 million bank accounts, assets and deposit accounts included in this database.

This is the first time that the financial activities of all Spaniards and residents have become the targets of such a program. France and Germany are the only other European countries to have adopted the system.

Another disturbing alert, this time from Medill News Service:

Medical devices could fall prey to computer malfunctions, hackers

As more and more medical devices and hospital equipment become connected to the Internet or networks, they may become lucrative targets for cyber-criminals or hackers trying either to harm the users or make points about their own technological skills.

“The health care industry is not technically prepared to combat against cyber-criminals’ basic cyber intrusion tactics,” an April report from the cyber division of the FBI says. It also says the industry “is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely.”

Experts also are worried about the potentially deadly consequences of unsecured systems being violated accidentally. As people become more dependent on medical devices that share information, the chance increases that their codes could be scrambled, causing malfunctions.

Wired hedges a bet:

Obama: NSA Must Reveal Bugs Like Heartbleed, Unless They Help the NSA

After years of studied silence on the government’s secret and controversial use of security vulnerabilities, the White House has finally acknowledged that the NSA and other agencies exploit some of the software holes they uncover, rather than disclose them to vendors to be fixed.

The acknowledgement comes in a news report indicating that President Obama decided in January that from now on any time the NSA discovers a major flaw in software, it must disclose the vulnerability to vendors and others so that it can be patched, according to the New York Times.

But Obama included a major loophole in his decision, which falls far short of recommendations made by a presidential review board last December: According to Obama, any flaws that have “a clear national security or law enforcement” use can be kept secret and exploited.

And the first in a series of headlines with a common theme, first from the Guardian:

Glenn Greenwald: how the NSA tampers with US-made internet routers

The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide

For years, the US government loudly warned the world that Chinese routers and other internet devices pose a “threat” because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA’s documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.

From the Japan Times, eyes and ears turn East:

Book on whistleblower Snowden details U.S. spying on Japan

A Japanese edition of the book titled “No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State” and written by Glenn Greenwald, a former columnist with The Guardian newspaper, will hit bookstores in Japan on Wednesday after its worldwide release Tuesday.

The book says the NSA surveilled entities including the permanent mission of Japan to the United Nations in 2010 before the U.N. Security Council adopted a resolution on sanctions against Iran.

The U.S. used various methods, including hacking, to obtain information from Japan’s U.N. mission, the book says. Japan was one of the nonpermanent members of the UNSC at the time.

It also says the NSA placed bugs and hacked more than 50,000 computers in Japan and other countries, allowing it to see the words typed and the messages on the screens.

The Guardian again, with a Greenwald alert:

Glenn Greenwald: ‘I don’t trust the UK not to arrest me. Their behaviour has been extreme’

He has been lauded and vilified in equal measure. But did the journalist’s ‘outsider’ status help him land Edward Snowden’s NSA revelations? Why did he nearly miss the story? And how powerless did he feel when his partner was detained at Heathrow? One year after the scoop, we meet him in his jungle paradise in Rio

“I don’t trust them not to detain me, interrogate me and even arrest me. Their behaviour has been so extreme and offensive, and the political and media class was so supportive of it, that I feel uncomfortable with the entire atmosphere,” says Greenwald.

He insists he has never had animosity towards Britain. “But the more I’ve learned, the more troubling it has become.”

His new book, No Place to Hide, begins with Greenwald’s account of how, together with Poitras and the Guardian, he broke what may well be the story of the decade. The funny thing, as he recalls, is how close it came to never happening. This seems a good place to start our conversation when we meet down at sea level in the bustling heart of Rio.

From CNBC, duh:

NSA chief: US spy agency saw changed behavior after Snowden

Foreign governments, individuals and groups targeted by the U.S. National Security Agency for intelligence collection have changed their “behavior” following disclosures by former agency contractor Edward Snowden, the NSA’s new chief said on Monday.

“They’re changing the way they communicate,” said Admiral Mike Rogers, who became NSA’s new director last month following the retirement of U.S. Army General Keith Alexander. Rogers was speaking to the Reuters Cybersecurity Summit in Washington.

Rogers strongly condemned Snowden, who after fleeing to Hong Kong accepted an offer of asylum in Russia last year.

Salon hints at things to come:

Glenn Greenwald on Snowden docs: I’m saving the best for last

  • The Pulitzer Prize-winner talks Snowden, the “banal” Hillary Clinton, and why Tim Russert is so vastly overrated

TheLocakl.de takes us to Germany and a big bill:

Spy base will cost €1 billion (and it’s late)

The budget is not enough – Germany’s new spy headquarters is costing hundreds of millions of euros more than expected – and it’s late.

The cost of the huge new secret service complex in central Berlin has already risen to almost €1 billion, and is expected to tip over the billion mark.

The new home of the Bundesnachrichtendienst (BND) – Germany’s equivalent of the CIA in the US, or Britain’s MI6 – was supposed to be finished by 2013, at a cost of €720 million.

One part opened earlier this year, but Der Spiegel magazine reported on Monday that the spy base had joined Germany’s long list of flagship building projects which are late and over-budget.

Der Spiegel said the latest budget estimate of €912 million would not be enough to finish building the complex which has 260,000 square metres of office space. An internal government report seen by Der Spiegel put the cost at €1.034 billion.

After the jump, beaucoup stories from the Game of Drones and the ongoing, always portentous Asian Game of Zones. . . Continue reading

Headlines II: Zones, drones, spies, and lies


We begin today’s tales from the dark side with an ominous entry from Europe Online:

US private soldiers fighting in Ukraine

Soldiers from a private US security company with a record of alleged atrocities in Iraq are supporting Ukraine’s security forces in the volatile east of the country, the German newspaper Bild reported Sunday.

The report, citing Germany’s federal intelligence agency BND, said 400 of the heavily-armed men employed by the group formerly known as Blackwater were deployed in the vicinity of Lugansk where pro-Russian separatists are seeking self-rule.

The BND declined to comment on the report, while the security company – now known as Academi – dismissed similar reports in March.

Meanwhile, your daily dose of paranoia from the Observer:

Attempts to stay anonymous on the web will only put the NSA on your trail

The sobering story of Janet Vertesi’s attempts to conceal her pregnancy from the forces of online marketers shows just how Kafkaesque the internet has become

When searching for an adjective to describe our comprehensively surveilled networked world – the one bookmarked by the NSA at one end and by Google, Facebook, Yahoo and co at the other – “Orwellian” is the word that people generally reach for.

But “Kafkaesque” seems more appropriate. The term is conventionally defined as “having a nightmarishly complex, bizarre, or illogical quality”, but Frederick Karl, Franz Kafka’s most assiduous biographer, regarded that as missing the point. “What’s Kafkaesque,” he once told the New York Times, “is when you enter a surreal world in which all your control patterns, all your plans, the whole way in which you have configured your own behaviour, begins to fall to pieces, when you find yourself against a force that does not lend itself to the way you perceive the world.”

A vivid description of this was provided recently by Janet Vertesi, a sociologist at Princeton University. She gave a talk at a conference describing her experience of trying to keep her pregnancy secret from marketers. Her report is particularly pertinent because pregnant women are regarded by online advertisers as one of the most valuable entities on the net. You and I are worth, on average, only 10 cents each. But a pregnant woman is valued at $1.50 because she is about to embark on a series of purchasing decisions stretching well into her child’s lifetime.

The Register adds fuel to the flames:

Hey, does your Smart TV have a mic? Enjoy your surveillance, bro

  • Little reminder: Your shiny new telly is a computer, it can run malware

NSA whistleblower Edward Snowden told lawyers he met during his sojourn in Hong Kong to put their cell phones in his fridge to thwart any eavesdroppers.

But new research suggests he should have been worried about nearby TVs, too.

Smart tellies with built-in microphones and storage can be turned into bugging devices by malware and used to record conversations, security experts at NCC Group said. And they demonstrated exactly that just down the road from the Infosec Europe conference, held in London.

From Wired threat level, woes for the espionarchs:

How a Chinese Tech Firm Became the NSA’s Surveillance Nightmare

The NSA’s global spy operation may seem unstoppable, but there’s at least one target that has proven to be a formidable obstacle: the Chinese communications technology firm Huawei, whose growth could threaten the agency’s much-publicized digital spying powers.

An unfamiliar name to American consumers, Huawei produces products that are swiftly being installed in the internet backbone in many regions of the world, displacing some of the western-built equipment that the NSA knows — and presumably knows how to exploit — so well.

That obstacle is growing bigger each year as routers and other networking equipment made by Huawei Technologies and its offshoot, Huawei Marine Networks, become more ubiquitous. The NSA and other U.S. agencies have long been concerned that the Chinese government or military — Huawei’s founder is a former officer in the People’s Liberation Army — may have installed backdoors in Huawei equipment, enabling it for surveillance. But an even bigger concern is that with the growing ubiquity of Huawei products, the NSA’s own surveillance network could grow dark in areas where the equipment is used.

Vice covers wretched excess:

How a Power-Mad Illinois Mayor Launched a Police Crusade Against a Parody

On the night of April 15, police in Peoria, Illinois, raided the house of my friend Jon Daniel in response to his operating a parody Twitter account mocking Peoria mayor Jim Ardis. The incident sparked a media firestorm, with Peoria all of a sudden being covered by national outlets like Al Jazeera and the Washington Post, and Ardis was condemned for what looked like a clear violation of the First Amendment. (Daniel is not being charged with any crime in connection with the Twitter account because, obviously, it’s not illegal to mock a public official.)

What wasn’t clear at the time was how intimately involved Ardis and Chief of Police Steve Settingsgaard were in ordering the raid, but according to emails obtained through a Freedom of Information Act request, city officials were so eager to nail the author of the parody Twitter account that they had a detective comb through Illinois statutes to find something to charge him with, in the process bungling the legal aspects of the case and drawing the ire of local citizens.

Ardis and others learned of the account on March 11 and sent dozens of emails over the next few days, apparently panicked by the idea that someone with a few dozen Twitter followers was making fun of the mayor. On March 12, Ardis himself asked City Manager Patrick Urich, “Any chance we can put a sense of urgency on this?” Urich passed that request on to Settingsgaard, saying, “Quickly please.”

From the Observer, when domestic insecurity leads to insecurity:

In the Breaking Bad city, trust in the trigger-happy police has broken down

  • Albuquerque’s people are struggling with poverty, mental illness and drugs – and have had enough of a police force that has killed 25 in four years

Last month the US department of justice issued a 46-page report that detailed a pattern of excessive force, including a policy of shooting at moving vehicles to disable them, and officers being allowed to use personal weapons instead of standard-issue firearms. “Officers see the guns as status symbols,” it said. “APD personnel we interviewed indicated that this fondness for powerful weapons illustrates the aggressive culture.”

Concern about police heavy-handedness is spreading. Elsewhere in New Mexico this week state police killed Arcenio Lujan, 48, outside his home after he allegedly pointed a rifle. Dozens marched on police headquarters in the Texas town of Hearne after an officer shot dead a 93-year-old woman, Pearlie Golden, who allegedly brandished a gun. Las Vegas and Los Angeles have also been rocked by anger at police shootings.

Police and sheriff departments in towns and hamlets from Iowa to Connecticut have fuelled anxiety by snapping up the Pentagon’s offer of mine-resistant ambush-protected armoured personnel vehicles, behemoths known as MRAPs, back from Iraq and Afghanistan.

South China Morning Post lawyers up, famously:

Spy case legend hired by Edward Snowden speaks about five-decade career

  • Veteran of high-profile US espionage cases believes his vast experience will help NSA whistle-blower, who fled to Russia from HK

A veteran lawyer who could hold the key to Edward Snowden’s eventual return to the United States has spoken of his fivedecade career cutting deals for some of America’s most notorious spies.

Washington-based legal heavyweight Plato Cacheris has been retained by the whistle-blower, who was granted temporary asylum in Russia.

And he spoke to the Sunday Morning Post as the first anniversary approaches of former National Security Agency contractor going public in Hong Kong with revelations that mass digital surveillance by the US extended to targets in China.

From New Europe, turning a blind eye:

Merkel in Washington puts unity above NSA spying investigation

United States President Barack Obama welcomed German Chancellor Angela Merkel to Washington last week. He gave her a personal tour of the White House and showed her everything from the vegetable garden to the birds nesting in the Rose Garden. But what Obama did not do, at least in front of reporters, was to address the NSA spying scandal and the contentious no-spy deal that has since collapsed.

According to the German weekly news magazine, Der Spiegel, Merkel is no longer committed to investigating the extent of NSA spying in Germany, despite the fact that her own mobile telephone had also been bugged.

In the world of diplomacy, moments of candour are rare, obscured as they are behind a veil of amicability and friendly gestures, reports Der Spiegel. It was no different last week at the meeting between Obama and Merkel in Washington.

From the Guardian, a day that will live in [fill in the blank]:

Glenn Greenwald: the explosive day we revealed Edward Snowden’s identity to the world

In the hours after his name became known, the entire world was searching for the NSA whistleblower, and it became vital that his whereabouts in Hong Kong remained secret. In an extract from a new book, No Place to Hide, Glenn Greenwald recalls the dramatic events surrounding the moment Snowden revealed himself in June 2013

On Thursday 6 June 2013, our fifth day in Hong Kong, I went to Edward Snowden’s hotel room and he immediately said he had news that was “a bit alarming”. An internet-connected security device at the home he shared with his longtime girlfriend in Hawaii had detected that two people from the NSA – a human-resources person and an NSA “police officer” – had come to their house searching for him.

Snowden was almost certain this meant that the NSA had identified him as the likely source of the leaks, but I was sceptical. “If they thought you did this, they’d send hordes of FBI agents with a search warrant and probably Swat teams, not a single NSA officer and a human-resources person.” I figured this was just an automatic and routine inquiry, triggered when an NSA employee goes absent for a few weeks without explanation. But Snowden suggested that perhaps they were being purposely low-key to avoid drawing media attention or setting off an effort to suppress evidence.

From the Guardian, ancient sins stay buried:

Foreign Office secrecy continues over archive of illegally held files

Historian Katie Engelhart reports on last week’s FCO ‘records day’ to discuss the fate of thousands of historic files, some containing evidence of murder and torture by colonial authorities

Last Friday afternoon, 50 historians and archivists piled into the Entente Cordiale room in London’s Foreign & Commonwealth Office (FCO). They were there to discuss the fate of hundreds of thousands of historic files dating back to the 17th century, some of which contain damning evidence of murder and torture by British colonial authorities.

In October, the Guardian revealed that the FCO had unlawfully retained millions of historic documents in violation of the Public Records Act at a maximum security compound in Buckinghamshire known as Hanslope Park, which the FCO shares with intelligence agencies MI5 and MI6.

Friday’s “records day” was a kind of public airing – to which the public and media were barred from attending – at which FCO officials detailed “plans for the review and release of these legacy records” to the National Archives.

Computerworld covers unintended [?] consequences:

Hackers now crave patches, and Microsoft’s giving them just what they want

  • At least one of next Tuesday’s updates looks like an excellent candidate to hackers as they sniff for bugs in the now-retired Windows XP

Hackers will have at least one, perhaps as many as four, patches next week to investigate as they search for unfixed flaws in Windows XP, the 13-year-old operating system that Microsoft retired from support April 8.

“Come Tuesday, Microsoft will be patching some vulnerabilities in Windows, and it is realistic to assume that at least one of these will also affect Windows XP,” said Kasper Lindgaard, director of research and security at Secunia, in an email Friday. “Generally speaking, newly discovered vulnerabilities in XP will be unpatchable for private users, and therefore we will see a rise in attacks.”

On May 13, Microsoft’s regularly-scheduled monthly Patch Tuesday, the Redmond, Wash. company will issue eight security updates for its software. But because it has stopped providing updates to owners of Windows XP PCs, those customers will not see any of the eight.

From Ars Technica, more online insecurity:

Significant portion of HTTPS Web connections made by forged certificates

  • Scientists unearth first direct evidence of bogus certs in real-world connections.

Computer scientists have uncovered direct evidence that a small but significant percentage of encrypted Web connections are established using forged digital certificates that aren’t authorized by the legitimate site owner.

The analysis is important because it’s the first to estimate the amount of real-world tampering inflicted on the HTTPS system that millions of sites use to prove their identity and encrypt data traveling to and from end users. Of 3.45 million real-world connections made to Facebook servers using the transport layer security (TLS) or secure sockets layer protocols, 6,845, or about 0.2 percent of them, were established using forged certificates. The vast majority of unauthorized credentials were presented to computers running antivirus programs from companies including Bitdefender, Eset, and others. Commercial firewall and network security appliances were the second most common source of forged certificates.

At least one issuer of certificates—IopFailZeroAccessCreate—was generated by a known malware sample that was presented 112 times by users in 45 different countries. The discovery helps to explain bug reports such as this one made to developers of the Chromium browser describing the mysterious inclusion of a TLS certificate on a large number of end users’ computers.

Meanwhile, the spooks want more. From IDG News Service:

DOJ seeks new authority to hack and search remote computers

  • The agency asks that judges be allowed to issue warrants to search computers outside their judicial districts

The U.S. Department of Justice wants new authority to hack and search remote computers during investigations, saying the new rules are needed because of complex criminal schemes sometimes using millions of machines spread across the country.

Digital rights groups say the request from the DOJ for authority to search computers outside the district where an investigation is based raises concerns about Internet security and Fourth Amendment protections against unreasonable searches and seizures.

“By expanding federal law enforcement’s power to secretly exploit ‘zero-day’ vulnerabilities in software and Internet platforms, the proposal threatens to weaken Internet security for all of us,” Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, said by email.

Another case of insecurity in a familiar venue, via the Guardian:

Calls to class far-right Jewish settlers as terrorists after Israeli soldiers attacked

  • Senior ministers Tzipi Livni and Yitzhak Aharonovitch condemn ‘price-tag’ attacks as author Amos Oz calls militants neo-Nazis

Calls are mounting for hardline Jewish settlers to be classified as terrorists after a spate of attacks on Palestinian property in the West Bank and Israel, and threats of violence towards Israeli soldiers.

Last week, the justice minister, Tzipi Livni, and the internal security minister, Yitzhak Aharonovitch, both argued that rightwing extremists should be classified as terrorists following attacks on soldiers at the hardline West Bank settlement of Yitzhar.

And on Friday, the Israeli prize laureate author Amos Oz described the hardline Jewish settlers that carry out so-called “price tag” attacks on Palestinians as neo-Nazis.

And we begin today’s Game of Drones coverage with a bad from USA TODAY:

National parks say no to personal drones

A growing number of national parks are taking steps to prohibit the use of drones on park property, a move that has some drone users concerned.

A recent incident here in which an unmanned aerial system was seen separating several young bighorn sheep from adults in the herd spurred park officials to make it clear their use is illegal.

“If the young can’t find their way back to their parents they could actually die,” said Aly Baltrus, chief of interpretation for Zion National Park in Utah.

Marines go dronal, via Aviation Week & Space Technology:

U.S. Marine Corps Explores Extended-Range Blackjack

  • As the first RQ-21As deploy to Afghanistan, the U.S. Marine Corps is eyeing new payload and fuselage options

For a U.S. Marine Corps bent on remaining as light, mobile and lethal as possible on land and at sea, good things do come in small packages.

The service has deployed an early version of its newest unmanned aerial system (UAS), the small, rail-launched Block 1 RQ-21 Blackjack to begin early operations in Afghanistan in April in response to a Central Command urgent need for signals-intelligence collection there. The plan is to begin operations of the Marine Corps’ first full-up RQ-21As—different from their predecessors in that they are capable of shipboard operations—this fall.

Though the U.S. plans to sharply reduce the number of soldiers in Afghanistan by year-end, the Marine Corps expects to deploy on land in the future to support contingencies such as operations in the Horn of Africa. But as the Pentagon shifts its focus to the Pacific theater, the corps is also eager to reconnect with its roots as a premier amphibious force. The Blackjack will be used to support both goals.

And from the Guardian, sharing the wealth:

Iran claims copy of captured US drone will soon take test flight

  • Officer says on state TV: ‘We have broken its secrets’
  • White House blamed 2011 loss on technical problem
  • Iran captured the RQ-170 Sentinel Drone in 2011

Iran said on Sunday it had succeeded in copying a US drone it captured in December 2011. State television broadcast images apparently showing the replicated aircraft.

Iran captured the US RQ-170 Sentinel while it was in its airspace, apparently on a mission to spy on the country’s nuclear sites, US media reported.

At the time, the White House blamed the loss on a technical problem causing a loss of control. Iran claimed to have brought the drone down by electronically disrupting its GPS system.

And from the Yomiuri Shimbun, the Game of Drones meets the Game of Zones:

U.S. drone missions to monitor Chinese, N. Korean activities

Full-scale large military drone operations will start shortly in Japan and its nearby airspace to monitor Chinese military activities and North Korea’s nuclear and missile development.

The U.S. Air Force plans to deploy two Global Hawk unmanned aerial vehicles to its Misawa Air Base in Aomori Prefecture late this month and the Air Self-Defense Force plans to procure three UAVs of the same type in fiscal 2015 and later.

However, experts warn that regulations on their flights must be put in place because Japan’s current aviation laws lack clear stipulations on large drones.

After the jump, the latest from the Asia Game of Zones, including new players of zome very old games, social engineering, recruiting games, and more. . . Continue reading