Jimmy Carter backs Snowden. Surveillance via Drones & Electronic License
Plates
Newsletter published on 20 July 2013
(1) Merkel defends NSA surveillance, refutes Stasi
comparison
(2) NSA sucks in data from 50 companies. "We get a tip. We vet it.
Then
we mine the data"
(3) Australia: Telstra facilitates US electronic
spying
(4) NSA: Before PRISM there was ECHELON
(5) Rand Paul: Government
spied on Americans 'gazillions' of times
(6) Rand Paul takes on drone
surveillance
(7) Spy drone could have almost brought down a plane in
Colorado
(8) Police drones to be equipped with non-lethal weapons?
(9)
Obama signs anti-protest Trespass Bill
(10) Huawei spying for China: former
CIA head
(11) China is world's most malware-ridden nation
(12) Pentagon:
The Chinese stole our newest weapons
(13) China blamed after ASIO blueprints
stolen in major cyber attack on
Canberra HQ
(14) Chinese hackers steal
ASIO blueprints, Defence docs
(15) Jimmy Carter backs Snowden - ‘America has
no functioning democracy’
(16) Judge refuses to drop charge of aiding the
enemy against Manning
(17) US government using license plates to track
movements of millions
(18) 'You are being tracked': Police use License Plate
Readers for mass
surveillance
(19) Electronic License Plates spark
concerns about Big Brother
(20) California May Issue Digital License Plates,
Privacy Groups Concerned
(21) Invasion Of Privacy: Electronic License Plates
That Track Your
Every Move
(22) Privacy Coalition Sues NSA to Halt
Dragnet Surveillance
(23) EFF Sues NSA to Stop 'Dragnet' Surveillance
(24)
Surveillance cameras can now zoom in on individual faces in a crowd
of
thousands
(1) Merkel defends NSA surveillance, refutes Stasi
comparison
http://www.wsws.org/en/articles/2013/07/13/germ-j13.html
German
chancellor defends Western intelligence agencies
By Stefan
Steinberg
13 July 2013
In a long interview with the weekly
political magazine Die Zeit, German
Chancellor Angela Merkel vehemently
defended the work of US and western
intelligence agencies and reaffirmed
that her government was not
prepared to offer whistleblower Edward Snowden
asylum in Germany. Merkel
used the interview to whitewash the activities of
intelligence agencies,
and stressed that any discussions conducted over
intelligence matters
would be held in a spirit recognising that the US: “was
and is our most
trusted ally over decades.”
In recent weeks the
German and sections of the international media have
sought to play up
differences between the German government and the US
following the
revelations of the extent of the NSA spying operation
revealed by Snowden.
The data released by Snowden made clear that in
Europe Germany is the
country that is most clearly subject to US
surveillance.
Praising
Merkel’s “caustic” criticisms of US intelligence practices, Die
Tageszeitung
welcomed one week ago what it referred to as a
“transatlantic wake up
call.”
In fact, Merkel’s interview in Die Zeit makes clear that she will
not
lift a finger to challenge the illegal activities of the American or
German intelligence agencies.
At one point in the interview the
journalists from Die Zeit note that a
well-known German author, Uwe
Tellkamp, had made a direct comparison
between the activities of the NSA and
the State Security Service
(nicknamed Stasi) of the former Stalinist German
Democratic Republic. In
his own interview with Die Zeit Tellkamp declared:
“What the Stasi
carried out with enormous efforts is now completed with just
15 clicks
of the mouse.”
Merkel vigorously rejects such a comparison,
declaring: “For me, there
is absolutely no comparison” between the Stasi and
“the work of
intelligence agencies in a democratic state.” “Such a
comparison”, she
continues, “leads to trivialising what the State Security
in the GDR did
to people”. She concludes with a blanket justification of the
work of
all western intelligence agencies: “A country without the work of
intelligence agencies would be too vulnerable.”
Merkel is well aware
of the implications of a comparison between western
intelligence agencies
and the notorious Stalinist Stasi secret police. ...
Following the
reunification of Germany in 1990, the East German pastor’s
daughter and
former secretary for agitation and propaganda in the FDJ,
(the East German
youth organisation loyal to the SED regime) Angela
Merkel, made rapid
progress inside the conservative Christian Democratic
Union based on her
tirades against East German totalitarianism and
gushing praise for western
democratic values and its alleged respect for
individual liberties.
...
When asked in the Die Zeit interview whether she agreed with the
treatment afforded to the Bolivian President Evo Morales, whose life was
put at risk recently when European nations refused to grant airspace to
his plane, Merkel declares she does not know the background to the case
and refuses to comment. ...
(2) NSA sucks in data from 50 companies.
"We get a tip. We vet it. Then
we mine the data"
http://theweek.com/article/index/245311/sources-nsa-sucks-in-data-from-50-companies
Sources:
NSA sucks in data from 50 companies
JUNE 6, 2013, AT 8:02
PM
Ambinder is co-author of a new book about government secrecy and
surveillance, Deep State: Inside the Government Secrecy Industry.
**
Analysts at the National Security Agency can now secretly access
real-time user data provided by as many as 50 American companies,
ranging from credit rating agencies to internet service providers, two
government officials familiar with the arrangements said.
Several of
the companies have provided records continuously since 2006,
while others
have given the agency sporadic access, these officials
said. These officials
disclosed the number of participating companies in
order to provide context
for a series of disclosures about the NSA's
domestic collection policies.
The officials, contacted independently,
repeatedly said that "domestic
collection" does not mean that the target
is based in the U.S. or is a U.S.
citizen; rather, it refers only to the
origin of the data.
The Wall
Street Journal reported today that U.S. credit card companies
had also
provided customer information. The officials would not disclose
the names of
the companies because, they said, doing so would provide
U.S. enemies with a
list of companies to avoid. They declined to confirm
the list of
participants in an internet monitoring program revealed by
the Washington
Post and the Guardian, but both confirmed that the
program
existed.
"The idea is to create a mosaic. We get a tip. We vet it. Then
we mine
the data for intelligence," one of the officials said.
In a
statement, Director of National Intelligence James Clapper said
that
programs collect communications "pursuant to section 702 of the
Foreign
Intelligence Surveillance Act, " and "cannot be used to
intentionally target
any U.S. citizen, any other U.S person, or anyone
within the United
States."
He called the leaks "reprehensible" and said the program "is
among the
most important" sources of "valuable" intelligence information the
government takes in.
One of the officials who spoke to me said that
because data types are
not standardized, the NSA needs several different
collection tools, of
which PRISM, disclosed today by the Guardian and the
Washington Post, is
one. PRISM works well because it is able to handle
several different
types of data streams using different basic encryption
methods, the
person said. It is a "front end" system, or software, that
allows an NSA
analyst to search through the data and pull out items of
significance,
which are then stored in any number of databases. PRISM works
with
another NSA program to encrypt and remove from the analysts' screen
data
that a computer or the analyst deems to be from a U.S. person who is
not
the subject of the investigation, the person said. A FISA order is
required to continue monitoring and analyzing these datasets, although
the monitoring can start before an application package is submitted to
the Foreign Intelligence Surveillance Court. ...
This arrangement
allows the U.S. companies to "stay out of the
intelligence business," one of
the officials said. That is, the
government bears the responsibility for
determining what's relevant, and
the company can plausibly deny that it
subjected any particular customer
to unlawful government surveillance.
Previously, Congressional authors
of the FAA said that such a "get out of
jail free" card was insisted by
corporations after a wave of lawsuits
revealed the extent of their
cooperation with the government. ...
(3)
Australia: Telstra facilitates US electronic spying
http://www.wsws.org/en/articles/2013/07/15/tels-j15.html
By
Peter Symonds
15 July 2013
Australian company Telstra signed a
secret agreement in November 2001 to
ensure that US intelligence and police
agencies had unrestricted access
to all electronic communications carried in
its cables from the Asia
Pacific into the US.
The existence of the
contract was first exposed by the Washington Post
on July 6 and subsequently
in the Sydney Morning Herald. It is one of 28
national security agreements,
involving foreign telecommunications
corporations with connections to the
US, that have been published in
full on the Public Intelligence website. The
American signatories vary
from contract to contract, but include the US
Defence Department,
Justice Department, Homeland Security and the FBI.
...
The Telstra agreement has provided an alternative means for US spying
on
American and foreign citizens, by allowing access to the vast amounts of
Internet and phone data passing through the backbone of international
telecommunications—undersea fibre optic cables.
The binding contract
with the US Justice Department and the FBI involved
a joint venture company,
Reach, between Telstra and its Hong Kong
partner, Pacific Century CyberWorks
(PCCW). The joint venture has since
become the largest carrier of
intercontinental telecommunications in
Asia. It operates 82,300 kilometres
of undersea cables in the Pacific
linking China, Japan, Australia, New
Zealand and Fiji to Hawaii and the
continental US. It also has a major cable
joining the US east coast to
Europe via Cornwall in the US and Brittany in
France.
The network security agreement required the company to establish
“a
facility... physically located in the United States, from which
electronic surveillance can be conducted pursuant to lawful US
process.”
This facility had to be staffed by US citizens “eligible for
appropriate
US security clearances”, who “shall be available 24 hours per
day, seven
days per week, and shall be responsible for accepting service and
maintaining the security of classified information.” Reach and Telstra
were required to have the ability to provide:
* Any stored data
involving anyone—including Australian and other non-US
citizens—making any
form of communication with a point of contact in the US.
* Any stored
meta-data or information about, rather than the content of,
Internet and
telecommunications activity.
* Subscriber information and the billing
records for any US-domiciled
customers, or customers who make a “domestic
communication.” The latter
is broadly interpreted to extend to any
electronic communications which
“originate or terminate” in the US. The
company had to “take all
reasonable measures” to prevent the use of its
infrastructure being used
for surveillance by a foreign
government.
The contract also stipulated that Reach, Telstra and PCCW
agreed that
non-fulfilment of its obligations would result in “irreparable
injury”
to the US and “that monetary relief would not be an adequate
remedy.” At
the time, Telstra was majority-owned by the Australian
government. The
agreement was undoubtedly vetted and approved by the Howard
government
and intelligence agencies, who work in the closest collaboration
with
their counterparts in the US, Britain, Canada and New Zealand, as part
of the “Five Eyes” alliance.
The agreement undoubtedly remains in
place, though possibly in revised
form after Telstra and PCCW restructured
their partnership in 2011,
giving Telstra control of the majority of Reach’s
undersea cables. ...
(4) NSA: Before PRISM there was ECHELON
From:
Paul de Burgh-Day <pdeburgh@harboursat.com.au>
Date: Mon, 15 Jul
2013 14:25:44 +1000
http://dissidentvoice.org/2013/07/ECHELON-today-the-evolution-of-an-nsa-black-program/
ECHELON
Today: The Evolution of an NSA Black Program
by Tom Burghardt / July
12th, 2013
People are shocked by the scope of secret state spying on
their private
communications, especially in light of documentary evidence
leaked to
media outlets by former NSA contractor Edward
Snowden.
While the public is rightly angered by the illegal,
unconstitutional
nature of NSA programs which seize and store data for
retrospective
harvesting by intelligence and law enforcement officials,
including the
content of phone calls, emails, geolocational information,
bank records,
credit card purchases, travel itineraries, even medical
records–in
secret, and with little in the way of effective oversight–the
historical
context of how, and why, this vast spying apparatus came to be is
often
given short shrift.
Revelations about NSA spying didn’t begin
June 5, 2013 however, the day
when The Guardian published a top secret FISA
Court Order to Verizon,
ordering the firm turn over the telephone records on
millions of its
customers “on an ongoing daily basis.”
Before PRISM
there was ECHELON: the top secret surveillance program
whose
all-encompassing “dictionaries” (high-speed computers powered by
complex
algorithms) ingest and sort key words and text scooped-up by a
global
network of satellites, from undersea cables and land-based
microwave towers.
...
When investigative journalist Duncan Campbell first blew the lid off
NSA’s ECHELON program, his 1988 piece for New Statesman revealed that a
whistleblower, Margaret Newsham, a software designer employed by
Lockheed at the giant agency listening post at Menwith Hill in North
Yorkshire, England, stepped forward and told the House Permanent Select
Committee on Intelligence in closed session, that NSA was using its
formidable intercept capabilities “to locate the telephone or other
messages of target individuals.”
Campbell’s reporting was followed in
1996 by New Zealand investigative
journalist Nicky Hager’s groundbreaking
book, Secret Power, the first
detailed account of NSA’s global surveillance
system. A summary of
Hager’s findings can be found in the 1997 piece that
appeared in
CovertAction Quarterly. ...
In an 88-page report on
ECHELON published in 2000 by the Electronic
Privacy Information Center
(EPIC) Newsham said that when she worked on
the development of SILKWORTH at
the secret US base, described as “a
system for processing information
relayed from signals intelligence
satellites,” she told Campbell and other
reporters, including CBS News’
60 Minutes, that “she witnessed and
overheard” one of Thurman’s
intercepted phone calls. ...
ECHELON and
the UKUSA Agreement
Lost in the historical mists surrounding the origins
of the Cold War,
the close collaboration amongst Britain and the United
States as they
waged war against Nazi Germany and Imperial Japan, by war’s
end had
morphed into a permanent intelligence-military alliance which
predated
the founding of NATO. With the defeat of the Axis powers, a new
global
division of labor was in the offing led by the undisputed superpower
which emerged from the conflagration, the United States. ...
In 1946,
Britain and the United States signed the United Kingdom-United
States of
America Agreement (UKUSA), a multilateral treaty to share
signals
intelligence amongst the two nations and Britain’s Commonwealth
partners,
Canada, Australia and New Zealand. Known as the “Five Eyes”
agreement, the
treaty was such a closely-guarded secret that Australia’s
Prime Minister was
kept in the dark until 1973! ...
Under terms of UKUSA, intelligence
“products” are defined as “01.
Collection of traffic. 02. Acquisition of
communications documents and
equipment. 03. Traffic analysis. 04.
Cryptanalysis. 05. Decryption and
translation. 06. Acquisition of
information regarding communications
organizations, procedures, practices
and equipment.”
“Such exchange,” NSA informed us, “will be unrestricted
on all work
undertaken except when specifically excluded from the agreement
at the
request of either party and with the agreement of the
other.”
“It is the intention of each party,” we’re told, “to limit such
exceptions to the absolute minimum and to exercise no restrictions other
than those reported and mutually agreed upon.”
This certainly leaves
wide latitude for mischief as we learned with the
Snowden
disclosures.
Amid serious charges that “Five Eyes” were illegally seizing
industrial
and trade secrets from “3rd party” European partners such as
France and
Germany, detailed in the European Parliament’s 2001 ECHELON
report, it
should be clear by now that since its launch in 1968 when
satellite
communications became a practical reality, ECHELON has evolved
into a
global surveillance complex under US control.
The Global
Surveillance System Today
The echoes of those earlier secret programs
reverberate in today’s
headlines.
Last month, The Guardian reported
that the “collection of traffic” cited
in UKUSA has been expanded to GCHQ’s
“ability to tap into and store huge
volumes of data drawn from fibre-optic
cables for up to 30 days so that
it can be sifted and analysed. That
operation, codenamed Tempora, has
been running for some 18
months.”
Then on July 6, The Washington Post disclosed that NSA has
tapped
directly into those fiber optic cables, as AT&T whistleblower
Mark Klein
described to Wired Magazine in 2006, and now scoops-up petabyte
scale
communications flowing through the US internet backbone. The agency
was
able to accomplish this due to the existence of “an internal corporate
cell of American citizens with government clearances.”
“Among their
jobs documents show, was ensuring that surveillance
requests got fulfilled
quickly and confidentially.”
Following up on July 10, the Post published
a new PRISM slide from the
41-slide deck provided to the paper by Edward
Snowden.
The slide revealed that “two types of collection” now occur. One
is the
PRISM program that collects information from technology firms such as
Google, Apple and Microsoft. The second source is “a separate category
labeled ‘Upstream,’ described as accessing ‘communications on fiber
cables and infrastructure as data flows past’.” ...
(5) Rand Paul:
Government spied on Americans 'gazillions' of times
http://rt.com/usa/rand-paul-gazillion-napolitano-289/
Rand
Paul: Government spied on Americans 'gazillions' of times
Published time:
August 09, 2012 18:24
Edited time: August 09, 2012 22:24
Does the
government really peer into the personal business of everyone
in America?
According to Judge Andrew Napolitano, Senator Rand Paul
(R-Kentucky) has put
the number of instances that the feds have spied on
Americans in the
“gazillions.”
In a column published this week by the frequent cable news
commentator,
Judge Napolitano explains that members of Congress are barred
from
quoting certain statistics disclosed during secret security briefing,
so
Sen. Paul — the son of GOP congressman and presidential candidate Rep.
Ron Paul (R-Texas) — has reportedly relayed the actual information as
accurately as he can without providing a real number.
Gazillion,
suggests Napolitano, is close enough.
“[W]hen asked what he learned at
these secret briefings and aware that
he could be prosecuted for telling the
truth, [Sen. Paul] chose a
fictitious word to describe the vast number of
violations of privacy at
the hands of federal agents: gazillions,” writes
Naolitano in an op-ed
he has titled “What Rand Paul Learned From Secret
Security Hearings.” ...
(6) Rand Paul takes on drone
surveillance
http://rt.com/usa/rand-paul-surveillance-law-733/
Published
time: June 13, 2012 17:13
Edited time: June 13, 2012 21:13
The
Federal Aviation Administration is expected to soon start approving
licenses
that will allow unmanned aerial vehicles to patrol America’s
sky, but
Senator Rand Paul (R-KY) wants to make sure that civil
liberties aren’t lost
along the way.
Sen. Paul, the son of Republican presidential candidate
Congressman Ron
Paul (R-TX) introduced legislation before Congress on
Tuesday that aims
to ensure that Americans aren’t unlawfully spied on by
unmanned drone
aircraft.
In explaining his reasoning behind the
creation of the bill, the
Preserving Freedom from Unwarranted Surveillance
Act of 2012, the
senator says that he isn’t adamantly opposed to drones
themselves, but
instead is concerned over how the government may use the
unmanned
vehicles to conduct clandestine surveillance of law-abiding
citizens.
"Like other tools used to collect information in law
enforcement, in
order to use drones a warrant needs to be issued. Americans
going about
their everyday lives should not be treated like criminals or
terrorists
and have their rights infringed upon by military tactics," Sen.
Paul
writes in a statement published on his official
website.
Offering further explanation this week to CNN, Sen. Paul says,
“I’m not
against technology per se,” but rather, “What I am for are the
constitutional processes that protect our civil liberties. So, you know,
it’s not like I’m against the police using cars or against them using
airplanes or helicopters or robots. But I am for personal privacy for
saying that no policeman will ever do this without asking a judge for
permission.”
Particularly, the legislation calls for a law that
“prohibits the use of
drones by the government except when a warrant is
issued for its use in
accordance with the requirements of the Fourth
Amendment.” ...
(7) Spy drone could have almost brought down a plane in
Colorado
http://rt.com/usa/drone-plane-colorado-pilot-529/
Published
time: May 17, 2012 19:28
Edited time: May 17, 2012 23:28
An
airline pilot came close to crashing his plane near Denver, Colorado
this
week after encountering a mysterious object in the sky thought to
be an
unmanned drone aircraft.
A tape recording made available this week
confirms that the pilot of a
Cessna Citation 525 CJ1 radioed air traffic
controllers outside of
Denver on Monday after nearly colliding with an
unidentified flying
object. Several factors have suggested that the aircraft
was most likely
a robotic drone aircraft.
According to the record,
the pilot came close to hitting what he
described as “a large
remote-controlled aircraft.”
The Cessna’s pilot says that the craft was
encountered at around 8,000
feet above sea level, or 2,800 feet above the
ground in near the highly
elevated city of Denver. ...
(8) Police
drones to be equipped with non-lethal weapons?
http://rt.com/usa/drone-surveillance-montgomery-weapon-507/
Published
time: March 13, 2012 21:31
Edited time: March 14, 2012 01:31
Law
enforcement near Houston, Texas will soon have a $300,000 robotic
surveillance drone in their arsenal, and if Montgomery County’s chief
deputy has his say, it’s only a matter of time before that aircraft will
be equipped to fire from above.
Discussing a new deal that will give
the Montgomery County Sheriff’s
Office near Houston, Texas an unmanned,
robotic spy drone, Chief Deputy
Randy McDaniel tells The Daily that he
hasn’t rule out adding weaponry
to the lightweight aircraft. The deputy says
that while the department
doesn’t have any plans at the moment to acquire an
army of drones
equipped with weapons, he opines that it could be
advantageous for some
endeavors.
On the topic of tacking a tear gas
dispenser or a firearm that shoots
non-lethal rubber bullets, McDaniel says
it could eventually be an idea
the department decides to go with.
...
(9) Obama signs anti-protest Trespass Bill
http://rt.com/usa/trespass-bill-obama-secret-227/
Published
time: March 09, 2012 20:52
Edited time: March 10, 2012 00:52
Only
days after clearing Congress, US President Barack Obama signed his
name to
H.R. 347 on Thursday, officially making it a federal offense to
cause a
disturbance at certain political events — essentially
criminalizing protest
in the States.
RT broke the news last month that H.R. 347, the Federal
Restricted
Buildings and Grounds Improvement Act of 2011, had overwhelmingly
passed
the US House of Representatives after only three lawmakers voted
against
it. On Thursday this week, President Obama inked his name to the
legislation and authorized the government to start enforcing a law that
has many Americans concerned over how the bill could bury the rights to
assemble and protest as guaranteed in the US Constitution.
Under H.R.
347, which has more commonly been labeled the Trespass Bill
by Congress,
knowingly entering a restricted area that is under the
jurisdiction of
Secret Service protection can garner an arrest. The law
is actually only a
slight change to earlier legislation that made it an
offense to knowingly
and willfully commit such a crime. Under the
Trespass Bill’s latest language
chance, however, someone could end up in
law enforcement custody for
entering an area that they don’t realize is
Secret Service protected and
“engages in disorderly or disruptive
conduct” or “impede[s] or disrupt[s]
the orderly conduct of Government
business or official functions.”
...
(10) Huawei spying for China: former CIA head
http://www.asiadailywire.com/2013/07/huawei-spying-for-china-former-cia-head/
China
Featured World — 19 July 2013
The former head of the US Central
Intelligence Agency and National
Security Agency said Chinese
telecommunications giant Huawei has spied
for Beijing.
Michael Hayden
accused Huawei of supplying the Chinese government with
“intimate and
extensive knowledge of the foreign telecommunications
systems it is involved
in,” The Australian Financial Review reports.
He said it was his
“professional judgement” that Huawei is a significant
threat to Australia
and the US, and that intelligence agencies have
evidence of its clandestine
activities.
The remarks could damage Huawei, the world’s largest telecoms
infrastructure supplier, which has constantly run into obstacles in
expanding its businesses in the US, the UK, Australia, and
elsewhere.
Huawei embarked on an extensive lobbying campaign in Australia
to bid
for work in building its National Broadband Network. The federal
government banned Huawei from the project in 2011.
John Suffolk,
Huawei’s global security officer, rebuked Hayden’s
comments as “tired,
unsubstantiated, and defamatory,” and said critics
should present evidence
publicly.
Security analysts have long feared that the company’s links to
the
Chinese government would make nations which embedded Huawei’s equipment
in its telecoms infrastructure vulnerable to cyber espionage by Beijing,
reports the Financial Times.
(11) China is world's most
malware-ridden nation
http://www.theregister.co.uk/2013/02/07/panda_china_most_infected_pcs/
By
Phil Muncaster
7th February 2013 05:54 GMT
Some 55 per cent of
Chinese computers are infected with malware, the
highest of any country
worldwide, according to the latest Annual
Security Report from Panda
Security.
The Spanish security vendor’s Panda Labs research team reported
27
million new strains of malware in 2012, bringing the total in its
database to 125m.
It said around one third of the PCs it scanned
globally were infected,
with Trojans accounting for three-quarters of new
threats.
After China (54.89 per cent), the next-worst countries were
South Korea
(54.15 per cent) and Taiwan (42.14 per cent).
The stats
may lend some credence to the Chinese government’s oft-heard
refrain that it
is a victim, not a perpetrator, of cyber crime.
In fact, some believe
that Chinese hackers are disproportionately blamed
for many of the world’s
cyber attacks, because the real perpetrators
disguise their true origin by
using compromised PCs in the People’s
Republic.
At the last count, in
January 2013, the government-affiliated China
Internet Network Information
Center (CNNIC) said there were 564 million
internet users in the country. No
figures were given for the number of
desktop PC users, but six month
previously they stood at a whopping 380
million.
China certainly has
a problem with malware. Last September, Microsoft’s
Operation b70 team even
discovered corrupt resellers were flogging
computers pre-loaded with the
stuff. ...
(12) Pentagon: The Chinese stole our newest weapons
http://rt.com/usa/us-chinese-report-defense-888/
Published
time: May 28, 2013 15:31
Reuters / Carlos Barria
The designs for
more than two dozen major weapons systems used by the
United States military
have fallen into the hands of the Chinese, US
Department of Defense
officials say.
Blueprints for the Pentagon’s most advanced weaponry,
including the
Black Hawk helicopter and the brand new Littoral Combat Ship
used by the
Navy, have all been compromised, the Defense Science Board
claims in a
new confidential report.
The Washington Post acknowledged
late Monday that they have seen a copy
of the report and confirmed that the
Chinese now have the know-how to
emulate some of the Pentagon’s most
sophisticated programs.
“This is billions of dollars of combat advantage
for China,” a senior
military official not authorized to speak on the record
told Post
reporters. “They’ve just saved themselves 25 years of research and
development.”
“It’s nuts,” the source said of the
report.
The Defense Science Board, a civilian advisory committee within
the
Pentagon, fell short of accusing the Chinese of stealing the designs.
However, the Post’s report comes on the heels of formal condemnation
courtesy of the DoD issued only earlier this month.
“In 2012,
numerous computer systems around the world, including those
owned by the US
government, continued to be targeted for intrusions,
some of which appear to
be attributable directly to the Chinese
government and military,” the
Defense Department alleged in a previous
report.
Ellen Nakashima, the
Post reporter who detailed the DSB analysis this
week, wrote that the
computer systems at the Pentagon may not have
necessarily been breached.
Instead, rather, she suggested that the
defense contractors who built these
weapons programs have likely been
subjected to a security breach. US
officials speaking on condition of
anonymity, she reported, said that a
closed door meeting last year ended
with evidence being presented of major
defense contractors suffering
from intrusions. When reached for comment, the
largest defense
contractors — Boeing, Lockheed Martin, Raytheon and Northrop
Grumman —
all refused to weigh in.
Chinese hackers have previously
been accused of waging cyberattacks on a
number of US entities, including
billion-dollar corporations and
governmental departments. In 2007 it was
reported that China accumulated
the blueprints for the Pentagon’s F-35
fighter jets, the most expensive
weapons program ever created, but the
latest news from the DSB decries
that much more has been
compromised.
According to the Post, the plans for the advanced Patriot
missile
system, an Army anti-ballistic program and a number of aircraft have
all
ended up in the hands of the Chinese. The result could mean the People’s
Republic is working towards recreating the hallmarks of America’s
military might for their own offensive purposes, while also putting
China in a position where even the most advanced weaponry in the world
won’t be able to withstand complex defensive capabilities once those
projects are reverse engineered.
“If they got into the combat
systems, it enables them to understand it
to be able to jam it or otherwise
disable it,” Winslow T. Wheeler,
director of the Straus Military Reform
Project at the Project on
Government Oversight, told the Post. “If they’ve
got into the basic
algorithms for the missile and how they behave, somebody
better get out
a clean piece of paper and start to design all over
again.”
Mandiant, a US security firm located outside of Washington,
reported
earlier this year that the China has enlisted an elite squadron of
cyber
warrior to attack American computer systems and conduct espionage on
behalf of the People’s Liberation Army. When the report was released in
February, Mandiant said the PLA’s elusive Unit 61398 has successfully
compromised the networks of more than 141 companies across 20 major
industries, including Coca-Cola and a Canadian utility company. Those
hacks reportedly subsided after Mandiant went public with their claims,
but earlier this month the firm said those attacks have since been
renewed.
“They dialed it back for a little while, though other groups
that also
wear uniforms didn’t even bother to do that,” CEO Kevin Mandia
told the
New York Times recently. “I think you have to view this as the new
normal.”
On their part, China has adamantly denied all claims that
they’ve waged
attacks on US networks. Following Mandiant’s initial report, a
spokesperson for China’s foreign ministry said the claims were
“irresponsible and unprofessional.”
“Hacking attacks are
transnational and anonymous,” Hong Lei said.
“Determining their origins are
extremely difficult. We don't know how
the evidence in this so-called report
can be tenable.”
(13) China blamed after ASIO blueprints stolen in major
cyber attack on
Canberra HQ
http://www.abc.net.au/news/2013-05-27/asio-blueprints-stolen-in-major-hacking-operation/4715960
Updated
Tue May 28, 2013 7:51am AEST
Classified blueprints of the new ASIO
headquarters in Canberra have been
stolen in a cyber hit believed to have
been mounted by hackers in China.
The ABC's Four Corners program has
discovered the plans were taken in an
operation targeting a contractor
involved with building the site.
The stolen blueprints included the
building's security and
communications systems, its floor plan, and its
server locations.
Experts say the theft exposes the spy agency to being
spied upon and may
be a reason why construction costs have blown out
enormously.
Four Corners said the attack came from a server in China,
which appears
to be the main suspect behind the operation.
Four
Corners also found the departments of Defence, Prime Minister and
Cabinet,
and Foreign Affairs and Trade had all been breached in
sustained hacking
operations.
The Reserve Bank and the Bureau of Statistics both confirmed
recently
that they had been the targets of hacking attacks, which they said
were
unsuccessful.
Federal Attorney-General Mark Dreyfus has declined
to say if the breach
took place. ...
Professor Des Ball from the
Australian National University's Strategic
and Defence Studies Centre has
told the program the theft of the ASIO
building's blueprints is particularly
significant.
"Once you get those building plans you can start
constructing your own
wiring diagrams, where the linkages are through
telephone connections,
through wi-fi connections, which rooms are likely to
be the ones that
are used for sensitive conversations, how to
surreptitiously put devices
into the walls of those rooms," he
said.
(14) Chinese hackers steal ASIO blueprints, Defence docs
http://www.itnews.com.au/News/344767,chinese-hackers-steal-asio-blueprints-defence-docs.aspx
By
Darren Pauli on May 28, 2013 10:51 AM (21 hours ago)
Chinese hackers have
stolen the blueprints for the new $630 million ASIO
building in Canberra and
siphoned reams of emails from the Department of
Defence.
The ABC's
Four Corners program revealed the compromised blueprints
included details on
the building's security systems, communications
networks and server room
locations.
It said the plans were stolen from a contractor working on the
site.
ASIO now faces a decision to either gut and redesign the building,
or
continue at a heightened state of caution, according to the
program.
The attack was cited as a reason for the delay to the building's
completion.
In another attack, troves of unclassified Department of
Defence emails
and reports were stolen, also allegedly by Chinese
hackers.
A Four Corners source said the documents stolen over years from
the
military-wide Defence Restricted network amounted to ten times the total
size of the database.
A highly classified document was also stolen
from Defence after it was
sent off the corporate network to an officer's
home computer.
Malware, previously installed on the officer's machine via
a
spear-phishing attack, grabbed the document and sent it to China where
it was later discovered by a US intelligence agency that tipped off
Defence.
Chinese attackers were also reportedly behind the theft of a
highly
sensitive document from the Australian Secret Intelligence Service
(ASIS). The document, rated higher than confidential, detailed a project
that a Four Corners source said would give China a “significant
advantage when dealing with Australia.”
The Department of Prime
Minister and Cabinet was also breached after
hackers, again reportedly
linked to China, broke into a vulnerable
Department of Tourism portal and
traversed from there into the core
network. ...
(15) Jimmy Carter
backs Snowden - ‘America has no functioning democracy’
http://rt.com/usa/carter-comment-nsa-snowden-261/
‘America
has no functioning democracy’ – Jimmy Carter on NSA
July 18, 2013
12:15
Former US President Jimmy Carter lambasted US intelligence methods
as
undemocratic and described Edward Snowden’s NSA leak as “beneficial” for
the country.
Carter lashed out at the US political system when the
issue of the
previously top-secret NSA surveillance program was touched upon
at the
Atlantic Bridge meeting on Tuesday in Atlanta,
Georgia.
"America has no functioning democracy at this moment," Carter
said,
according to Der Spiegel.
He also believes the spying-scandal
is undermining democracy around the
world, as people become increasingly
suspicious of US internet
platforms, such as Google and Facebook. While such
mediums have normally
been associated with freedom of speech and have
recently become a major
driving force behind emerging democratic movements,
fallout from the NSA
spying scandal has dented their
credibility.
It’s not the first time Carter has criticized US
intelligence policies.
In a previous interview with CNN, he said the NSA
leaks signified that
“the invasion of human rights and American privacy has
gone too far." He
added that although Snowden violated US law, he may have
ultimately done
good for the country.
"I think that the secrecy that
has been surrounding this invasion of
privacy has been excessive, so I think
that the bringing of it to the
public notice has probably been, in the long
term, beneficial."
Jimmy Carter was President of the United States from
1977 to 1981. After
leaving office, he founded the Carter Center, an NGO
advocating human
rights. The ex-president’s human rights credentials won him
Nobel Peace
Prize in 2002.
Carter has frequently criticized his
successors in the White House. Last
year, he condemned the Obama
administration for the use of drone attacks
in his article "A Cruel and
Unusual Record" published in the New York Times.
(16) Judge refuses to
drop charge of aiding the enemy against Manning
http://rt.com/usa/manning-judge-aiding-enemy-denied-266/
Published
time: July 18, 2013 14:10
July 18, 2013 16:30
Army Private first
class Bradley Manning will continue to be tried for
aiding the enemy, a
military judge ruled Thursday morning, leaving open
the possibility of life
in prison for the admitted source of a major
intelligence
leak.
Despite an attempt from the defense to have the most serious of
charges
against Pfc. Manning dropped, Col. Denise Lind ruled from a Ft.
Meade,
Maryland courtroom early Thursday that the former Army intelligence
analyst will continue to be tried for aiding the enemy.
Government
prosecutors say Manning, 25, indirectly aided al-Qaeda in the
Arabian
Peninsula by sharing hundreds of thousands of classified
documents with the
anti-secrecy website WikiLeaks in late 2009 and early
2010. In February of
this year, Manning admitted to what’s been called
the largest intelligence
leak in US history and pleaded guilty to 10
lesser-included offenses in
hopes of receiving a lighter sentencing when
his military court-martial
concludes later this summer. ...
Julian Assange, the Australian founder
of WikiLeaks, said in a
conference call to RT last month that “The broad
case establishes a
precedent that publishing national security related
information about
the United States is espionage.”
Journalist Alexa
O’Brien tweeted from Ft. Meade on Thursday that, if
convicted on all counts,
Pfc. Manning could receive a sentence of 154
years-to-life. The
lesser-or-included charges he pleaded guilty to
earlier this year would
carry a maximum of only 20.
(17) US government using license plates to
track movements of millions
http://www.wsws.org/en/articles/2013/07/18/aclu-j18.html
By
Eric London
18 July 2013
A report issued by the American Civil
Liberties Union (ACLU) on
Wednesday [ http://www.aclu.org/alpr ] details an
immense operation
through which nearly 1 billion license plate records of
hundreds of
millions of drivers are tracked and huge databases are amassed,
providing the American government with access to the history and recent
whereabouts of the majority of the US population.
For years, a
network of federal security agencies, local police
departments and private
companies have been using automatic license
plate readers on police
cruisers, in parking lots, at traffic
intersections—even through smartphone
apps—to photograph cars and their
drivers and to record license plate
numbers with the matching time, date
and location.
“More and more
cameras, longer retention periods, and widespread sharing
allow law
enforcement agents to assemble the individual puzzle pieces of
where we have
been over time into a single, high-resolution image of our
lives,” the
report says. ...
The depth of the involvement of the national security
apparatus is
evidenced by the “billions of dollars in grants” that the
Department of
Homeland Security (DHS) has provided through the DHS Security
Grant
Program and the Infrastructure Protection Program. Remarkably, license
plate tracker manufacturers claim that the DHS is outdone by the Justice
Department, which is the “lead Federal funding agency” for the
license-tracking program. ...
(18) 'You are being tracked': Police
use License Plate Readers for mass
surveillance
http://rt.com/usa/aclu-license-plate-surveillance-216/
'You
are being tracked': ACLU reveals docs of mass license plate reader
surveillance
Published time: July 17, 2013 14:30
Edited time:
July 18, 2013 13:51
The American Civil Liberties Union has released
documents confirming
that police license plate readers capture vast amounts
of data on
innocent people, and in many instances this intelligence is kept
forever.
According to documents obtained through a number of Freedom of
Information Act requests filed by ACLU offices across the United States,
law enforcement agencies are tracking the whereabouts of innocent
persons en masse by utilizing a still up-and-coming
technology.
License place readers are among the latest items being
regularly added
to the arsenal of law enforcement gizmos and gadgets, but
documents
obtained through the FOIA requests have prompted the ACLU to
acknowledge
that safeguards that would properly protect the privacy of
Americans are
largely absent.
When a police department deploys
license plate readers on top of patrol
cars or at fixed locations, it lets
officers see a snapshot of every
vehicle that passes by a particular point.
From there, that information
can be matched against a database that contains
automobiles involved in
criminal investigations or cars whose owners may
already be in trouble
with the law. According to the ACLU, though, the data
that’s collected
and routinely stored reveal much more than the location of
suspected
scofflaws.
“At first the captured plate data was used just
to check against lists
of cars law enforcement hoped to locate for various
reasons,” ACLU staff
attorney Catherine Crump wrote on the non-profit
group’s website
Wednesday morning. “But increasingly, all of this data is
being fed into
massive databases that contain the location information of
many millions
of innocent Americans stretching back for months or even
years,”she wrote.
Crump and company filed FOIA requests to agencies in 38
states and
Washington, DC compelling police departments there to provide
them with
information detailing their use of license plate readers. In
response,
the ACLU received 26,000 pages of information that it has analyzed
and
now made public.
Additionally, the ACLU has released “You Are
Being Tracked,” a 37-page
report that offers the background on a technology
that’s being regularly
used notwithstanding objections from civil
libertarians and others.
Those objections, noted Crump, come amid two other
large issues: the
government’s increasing use of significantly telling
surveillance
devices and the public’s mass ignorance about the
issue.
“As it becomes increasingly clear that ours is an era of mass
surveillance facilitated by ever cheaper and more powerful computing
technology, it is critical we learn how this technology is being used,”
Crump wrote. “License plate readers are just one example of a disturbing
phenomenon: the government is increasingly using new technology to
collect information about all of us, all the time and to store it
forever – providing a complete record of our lives for it to access at
will.”
And while telephony metadata, Internet inbox intelligence and
IP records
can reveal an awful lot, scanning city streets and logging the
locations
of cars can provide the police with more than just a lot of
useless
data. License plate readers do occasionally prove effect with
regards to
locating criminal suspects or cars involved in crimes, but they
are also
allowing police to slowly build profiles painting a picture of the
daily, weekly or annual driving habits of anyone, anywhere.
“A person
who knows all of another’s travels can deduce whether he is a
weekly church
goer, a heavy drinker, a regular at the gym, an unfaithful
husband, an
outpatient receiving medical treatment, an associate of
particular
individuals or political groups — and not just one such fact
about a person,
but all such facts,” the US Court of Appeals for the DC
Circuit ruled in
2010.
According to “You Are Being Tracked,” license plate readers are
configured to store not just snap shots of nearby autos, but also the
license plate number, the date, time and location. All of this data is
then placed into a local database that can in many instances by shared
with other regional systems across the country.
“As a result,” reads
the report, “these data are retained permanently
and shared widely with few
or no restrictions on how they can be used.” ...
(19) Electronic License
Plates spark concerns about Big Brother
http://www.edmunds.com/car-news/electronic-license-plates-spark-concerns-about-big-brother.html
Published:
06/18/2013 - by Peter Gareffa, Correspondent
June 18,
2013
COLUMBIA, South Carolina — Electronic license plates, which could
broadcast sensitive information about the driver, are raising concerns
about privacy and the intrusion of Big Brother into the lives of
consumers.
The South Carolina legislature is considering a proposal to
switch to
electronic license plates, which can be changed wirelessly to
display a
vehicle's current registration status, insurance compliance, or
other
messages.
What was once just a piece of tin stuck on the back
of a car might
become the next high-tech automotive gadget, thanks to
Compliance
Innovations, a South Carolina company that has the electronic
plates
under development.
They look like ordinary license plates
until they're activated, after
which they light up, or even flash, with
selected messages. According to
the company's Web site, those messages could
read "Uninsured,"
"Expired," "Suspended," "Stolen," or even "Amber Alert."
...
As of now, the electronic plates are estimated to cost state
governments
about $100 each, compared to $3-$7 for a metal plate. But the
company
says South Carolina could save up to $150 million per year by
eliminating vehicles with no insurance or with expired plates.
The
proposal being considered by the South Carolina legislature is in
its early
stages, and Compliance Innovations still needs to work out a
few bugs, like
reducing the per-unit cost and reducing the size of their
plates so they fit
into the standard license-tag space on most cars. But
if adopted, a pilot
program would be put in place to test out the
concept on state-owned
vehicles before rolling it out more widely.
Edmunds says: Expect other
states to follow South Carolina in
considering this high-tech alternative to
tracking drivers.
(20) California May Issue Digital License Plates,
Privacy Groups Concerned
http://sanfrancisco.cbslocal.com/2013/07/18/california-may-issue-digital-license-plates-privacy-groups-concerned/
CBS
Local
July 18, 2013
State Senate Bill 806 would create a
three-year pilot program to test up
to 160,000 cars with electronic license
plates produced by San Francisco
startup smart plate. ...
(21)
Invasion Of Privacy: Electronic License Plates That Track Your
Every
Move
http://the420times.com/2013/07/invasion-of-privacy-electronic-license-plates-that-track-your-every-move/
Erik
| Jul 05, 2013
A company in South Carolina wants Americans to be required
to have
electronic license plates on their vehicles, which would allow our
beloved, spy-hungry government to track tax-paying citizen’s vehicles 24
hours a day, 7 days a week, wherever they may decide to travel.
Said
electronic license plates would permit law enforcement and the
Department of
Motor Vehicles to program messages like “stolen” or
“uninsured” on the
plates in order to alert other drivers and police
officers.
That
doesn’t sound that bad, does it? Well, how about the fact that the
plates
would give the government and law enforcement the capability to
track every
move you made in your car without necessitating a warrant to
do so? As if
traffic light cameras aren’t bad enough!
Yeah, Big Brother seems to be
getting a little too big for his
proverbial britches. So, how far is too far
regarding the government’s
obsession with invading our personal privacy? Is
making the claim that
these levels of intrusion are in the best interest of
our nation’s
safety an acceptable justification?
Review the enclosed
video clip and help us continue the conversation by
sharing your thoughts
with us in the comment section below. Thanks for
your ongoing dedication to
The 420 Times!
(22) Privacy Coalition Sues NSA to Halt Dragnet
Surveillance
http://truth-out.org/news/item/17623-privacy-coalition-sues-nsa-to-halt-dragnet-surveillance
Wednesday,
17 July 2013 11:29
By Candice Bernd, Truthout | Report
A broad and
seemingly unlikely coalition of 19 organizations including
church leaders
alongside environmental and gun advocacy groups
represented by the
Electronic Frontier Foundation (EFF) filed a lawsuit
against the National
Security Agency (NSA) in a San Francisco federal
court Tuesday in a case
that could determine the constitutionality of an
admitted dragnet
surveillance program on the telephone records of
millions of
Americans.
The lawsuit, First Unitarian Church of Los Angeles v. NSA
seeks an
injunction against the NSA, FBI and the Justice Department,
alleging
that the government violated the plaintiffs’ First and Fourth
Amendment
rights by collecting information about their phone calls. The
lawsuit
focuses on an NSA surveillance program called the “Associational
Tracking Program,” which collects metadata on telephone calls from the
top U.S. telecommunications companies. The program is part of a vast
operation of NSA spying programs revealed by NSA whistleblower Edward
Snowden.
“For people who have engaged in grass-roots organizing, who
are
committed to challenging the national security state in order to
preserve the promise of the Bill of Rights … the history of government
suppression of grass-roots movements is all too clear,” said Shahid
Buttar, executive director of the Bill of Rights Defense Committee,
during a news teleconference Tuesday. “[The history of the Occupy
movement] does a pretty good job of exemplifying what it looks like if
you do engage in grass-roots action to challenge the power
establishment.”
The lawsuit argues that dragnet surveillance tracking
associational ties
creates a chilling effect whereby individuals are
dissuaded from taking
part in the activity of advocacy organizations for
fear of disclosure.
The case follows on the precedent-setting NAACP v.
Alabama, in which the
Supreme Court ruled in 1958 that membership lists of
organizations were
protected under the First Amendment. The EFF hopes to
apply that right
of association in the digital age. “Many potential
supporters of our
work would find themselves intimidated from raising their
voices,
knowing that the state is tracking who they talk to,” Buttar said.
...
Copyright, Truthout. May not be reprinted without
permission.
(23) EFF Sues NSA to Stop 'Dragnet' Surveillance
http://www.pcmag.com/article2/0,2817,2421845,00.asp
By
Chloe Albanesius
July 16, 2013 03:50pm EST
A group of 19 consumer
and privacy groups today sued the National
Security Agency (NSA), arguing
that the agency's data collection
processes violate the law and the
Constitution.
The coalition is being led by the Electronic Frontier
Foundation (EFF),
which is no stranger to tangling with the NSA. In 2008, it
sued the
agency, President Bush, Vice President Dick Cheney, and several
other
administration officials on behalf of AT&T customers in an effort
to
stop the government's warrantless wiretapping program - a case that is
still ongoing.
Today's filing - which also targets the FBI and
Justice Department - is
a companion to the 2008 case, EFF's legal director,
Cindy Cohn, said
during a Tuesday conference call with reporters. But it
focuses on the
more recent revelations about the NSA's data collection
procedures,
which were revealed in documents leaked by Edward Snowden to The
Guardian and The Washington Post.
The first document published
revealed that Verizon was ordered by the
secret Foreign Intelligence
Surveillance Court (FISC) to hand over all
telephone records for its
customers over a three-month period. That, in
conjunction with the admission
from James Clapper, director of national
intelligence, that Section 215 of
the Patriot Act allows for metadata
collection on millions of Americans, is
troubling, Cohn said.
Metadata collection "allows the government to learn
and track the
associations of ... organizations and their members," Cohn
said,
referring to the groups that have joined the lawsuit, like the First
Unitarian Church of Los Angeles, Calguns Foundation, and the Bill of
Rights Defense Committee. ...
The EFF is particularly concerned about
the scope of the data
collection. There have been two metadata-related cases
in the past, but
they were in the 1970s and they dealt with individual data
collection,
not a widespread "dragnet," Cohn said.
Cohn likened the
NSA's program to the writs of assistance used by the
British during the
colonial era. The Brits "didn't have to specify whose
information was
collected; [they got] a general warrant that let them
collect everything,"
Cohn said. The NSA's efforts are "the digital
equivalent of writs of
assistance. They were wrong in the colonial era
and they're wrong
now."
Given that the EFF is still fighting its 2008 case, Cohn was asked
what
chance this particular challenge has of making any headway. "The
government has now admitted the telephone records program," Cohn said,
pointing to Clapper's statement, so they can't hide behind the secrecy
point, though they will likely try. But she acknowledged that there are
"lots of immunities in the law that we're going to have to navigate."
Constitutional cases are "always difficult."
(24) Surveillance
cameras can now zoom in on individual faces in a crowd
of
thousands
Forwarded from http://groups.yahoo.com/group/shamireaders/message/2232
From
Robert Leverant {to Israel Shamir}
Israel,
This is tangential but
relevant:
THIS IS HOW THE POLICE CAN NOW IDENTIFY RIOTERS & TROUBLE
MAKERS USING
HIGH DEFINITION ADVANCED TECHNOLOGY.
DON'T THINK OF
HIDING YOURSELF AMONGST THOUSANDS.............
YOU CAN BE VERY EASILY
DETECTED & IDENTIFIED. Using the same technology
as Google Earth to
track you, be warned it will be most difficult to
lose yourself in any
crowd. This is the crowd before the riots in
Vancouver:
http://www.gigapixel.com/image/gigapan-canucks-g7.html
Put
your cursor anywhere in the crowd and double-click a couple of
times. To
further help with image, use the scroll button in the centre
of your mouse.
Zero in on any one specific single face.. The clarity is
incredible.. You
can see perfectly the faces of every single individual
- and there were
thousands. Just think what the police and the military
have at their
disposal.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.