‘When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept.
We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”’
- Police Act Furious About Encrypted Phones But Still Love Them. Here’s Why
- FBI director attacks tech companies for embracing new modes of encryption
- Leaked Files: German Spy Company Helped Bahrain Hack Arab Spring Protesters
- You Can Get Hacked Just By Watching This Cat Video on YouTube
- Pakistani Man Indicted for Selling ‘StealthGenie’ Spyware App
- Italian spyware firm relies on U.S. Internet servers
- Hacking Team’s Government Surveillance Malware
- Mapping Hacking Team’s “Untraceable” Spyware
- FBI software cracks encryption wall
- Homeland Security Trade Show Deserted Even As Industry
- How Government-Grade Spy Tech Used A Fake Scandal To Dupe Journalists
- Phony WikiLeaks Tricks Activist Into Downloading Government-Grade Spyware
‘When the FBI applied for warrants this summer to raid three $25,000-per-night villas at Caesar’s Palace Hotel and Casino, it omitted some key investigatory details that eventually resulted in the arrest of eight individuals, including an alleged leader of a well-known Chinese crime syndicate, defense lawyers maintained in Las Vegas federal court documents late Tuesday.
The authorities built, in part, a case for a search warrant (PDF) by turning off Internet access in three villas shared by the eight individuals arrested. At various points, an agent of the FBI and a Nevada gaming official posed as the cable guy, secretly filming while gathering evidence of what they allege was a bookmaking ring where “hundreds of millions of dollars in illegal bets” on World Cup soccer were taking place.’
‘Even as the FBI warns US citizens that their personal data is increasingly likely to be hacked by criminals, the agency – without any public debate – is quietly ramping up its own abilities to hack anyone in the world. And, as we found out this week, their underhanded tactics are even ensnaring news organizations.
[...] In the six years since the FBI impersonated the Seattle Times and AP to hack a suspect, it’s only ramped up its exploits. Since at least 2007, the FBI has had what it calls a “Secure Technologies Exploitation Group” – which is a more polite way of saying they have a team that hacks computers.
In an extraordinary report published in August, Wired’s Kevin Poulsen detailed how the FBI has been setting up honeypots on certain websites to ensare all sorts of suspects. The websites deliver malware to every visitor of the website and will tell the FBI who has been visiting it – even if the Internet users are using anonymity tools like the Tor Browser. It’s one thing if this is being done for child porn websites – where even visiting the site is a crime – but this is yet another tactic that the FBI uses without telling us how often or against whom it’s aimed.’
- FBI demands new powers to hack into computers and carry out surveillance
- FBI created fake Seattle Times Web page to nab bomb-threat suspect
- FBI Director: If Apple and Google Won’t Decrypt Phones, We’ll Force Them To
- Justice Department Proposal Would Massively Expand FBI Extraterritorial Surveillance
- Visit the Wrong Website, and the FBI Could End Up in Your Computer
- Barkley: ‘Unintelligent’ blacks ‘brainwashed’ to choose street cred over success
- Charles Barkley and the Plague of ‘Unintelligent’ Blacks
- Charles Barkley Is Right on ‘Acting White’
- What Charles Barkley Gets Wrong About Race
- Russell Wilson is black enough, can overcome the criticism
- Charles Barkley comments on race worthy of serious discussion
You Can’t Vote Out National Security Bureaucrats: And They, Not Elected Officials, Really Run The Show
‘A year ago, we noted a rather odd statement from President Obama, concerning some of the Snowden leaks. He more or less admitted that with each new report in the press, he then had togo ask the NSA what it was up to. That seemed somewhat concerning to us — suggesting that the administration wasn’t actually aware of what the NSA was up to until after it leaked to the press. Combine that with our more recent story of how James Clapper is basically ignoring the substance of President Obama’s called for surveillance reforms, and you might begin to wonder who really runs the show when it comes to surveillance. And, indeed, according to a guy who knows quite well, the national security bureaucracy basically calls the shots, and the President has little to no power. That’s the basic summary of an interview with Michael Glennon under the title Vote all you want. The secret government won’t change in the Boston Globe.
Glennon is the author of a new book called National Security and Double Government, as summarized by the Boston Globe.’
‘[...] As great as Edward Snowden’s leaks were for shedding light on the abuses of power within the NSA – and for actually getting them into the damn media for months at a time! – the problem of intelligence and federal law enforcement agencies doing whatever the hell they want dates back to the dawn of law enforcement and intelligence agencies.
This week, Techdirt pointed to a shiny new book by Michael Glennon which details the extent to which unelected bureaucrats are more in charge than the officials we elect every four or six years. The book is called National Security and Double Government, which is not an encouraging title at all. Glennon, who has plenty of non-tinfoil-hat-chops, is echoing comments by folks like John Kerry who say some of these spy apparatuses are “on autopilot.” Obama, too, may be purely Captain Renault shocked – shocked! – about the gambling going on, but a more frightening proposition than that is if the NSA really is handling its own accountability without even presidential oversight.’
- You Can’t Vote Out National Security Bureaucrats: And They, Not Elected Officials, Really Run The Show
- U.S. directs agents to cover up program used to investigate Americans
- FBI’s counterterrorism sting operations are counterproductive
- The F.B.I. Deemed Agents Faultless in 150 Shootings
- ICREACH: How the NSA Built Its Own Secret Google
- In Cold War, U.S. Spy Agencies Used 1,000 Nazis
- Five myths about J. Edgar Hoover
‘Eric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks. In mid-May 2011 I was under house arrest in rural Norfolk, England, about three hours’ drive northeast of London. The crackdown against our work was in full swing and every wasted moment seemed like an eternity. It was hard to get my attention.
But when my colleague Joseph Farrell told me the executive chairman of Google wanted to make an appointment with me, I was listening.
In some ways the higher echelons of Google seemed more distant and obscure to me than the halls of Washington. We had been locking horns with senior U.S. officials for years by that point. The mystique had worn off. But the power centers growing up in Silicon Valley were still opaque and I was suddenly conscious of an opportunity to understand and influence what was becoming the most influential company on earth. Schmidt had taken over as CEO of Google in 2001 and built it into an empire.
I was intrigued that the mountain would come to Muhammad. But it was not until well after Schmidt and his companions had been and gone that I came to understand who had really visited me.’
‘The problem of special interests or lobbies was one of the foremost concerns of the Founding Fathers of the United States. In their day they were called factions. James Madison, who is considered the architect of the U.S. Constitution, devoted the entire tenth Federalist Paper (1787) to the problem. He defined a faction as “a number of citizens, whether amounting to a majority or a minority … actuated by some common … interest, adverse to … the aggregate interests of the community,” and believed that within the context of liberal republicanism, they could never be eliminated. However, he did feel they could be controlled. To this end he sought to create representative bodies with high numbers of delegates and a wide diversity of interests in the hope that they would counterbalance each other.
When George Washington delivered his famous Farewell Address in 1796, he too noted the problem. Washington warned of “combinations and associations” which attempt to “direct, control, counteract and awe the regular deliberation and action of the constituted authorities” and thereby substitute their own desires for the “delegated will of the nation.” As Washington’s continued concern implied, James Madison’s approach to controlling special interests or factions never proved adequate.’
- Gar Alperovitz: Nuclear Attack on Japan was Opposed by American Military Leadership
- If Hiroshima was unnecessary, how to justify Nagasaki?
- Photos: Hiroshima Atomic Bomb Anniversary
- “War Makes Everyone Crazy”: Hiroshima Survivor Reflects on 69th Anniversary of U.S. Atomic Bombing
- Japanese Newsreel Footage on Effects of A-Bomb Seized by U.S. 68 Years Ago
- Chomsky: From Hiroshima to Fukushima, Vietnam to Fallujah, State Power Ignores Its Massive Harm
- U.S. Ramping Up Major Renewal in Nuclear Arms
- John Oliver on America not taking very good care of its 4,800 nuclear weapons
- U.S. Says it Needs Nukes to Defend Against Asteroids
- The five biggest threats to human existence
‘Indonesia’s new president, Joko Widodo, has held his first Cabinet meeting amidst criticism from human rights activists for picking a new defense minister who once defended military killings of civilians. In July, the former Jakarta governor known as “Jokowi” defeated the U.S.-trained former army general Prabowo Subianto, who had been accused of mass killings when he headed the Indonesian special forces in the 1990s. While human rights groups hailed the defeat of Prabowo in July’s election, the new president is facing opposition for picking former Army Chief of Staff Ryamizard Ryacudu to be Indonesia’s new defense minister. Over the past decade, Ryamizard has defended the military’s actions in West Papua and Aceh and publicly claimed that civilians become legitimate army targets if they “dislike” army policy or have “the same voice” as anti-government rebels. We are joined from Indonesia by veteran investigative journalist Allan Nairn, whose dispatches shook up the presidential race when he reported on human rights abuses committed by Prabowo and the U.S.-trained general’s statement that Indonesia needs “a benign authoritarian regime” because the country was “not ready for democracy.” Nairn also discusses his latest major report, revealing that a top adviser to Indonesia’s new president has admitted “command responsibility” in the 2004 assassination of the country’s leading human rights activist, Munir Thalib.’ (Democracy Now!)
- West Papua: A no-go zone for foreign journalists
- Inside Indonesia’s Elections: The Burden of Brutal Global Neoliberalism
- Journalist Allan Nairn Threatened For Exposing Indonesian Presidential Candidate’s Role in Mass Killings
- Human Rights group calls on World Bank to acknowledge role in the mass killing of one million Indonesians
- William Blum: Getting your history from Hollywood
- East Timor: a lesson in why the poorest threaten the powerful
- General Suharto: Our model dictator
- Secret war against defenceless West Papua
- East Timor: the coup the world missed
- Death of a Nation: The Timor Conspiracy (Documentary)
‘The Federal Bureau of Investigation decided in 2007 that it didn’t need to be the Federal Bureau of Investigation to trick a teenager online. Instead, it acted as a local newspaper.
At the time, the FBI wanted to identify the owner of an anonymous MySpace account connected to bomb threats against a high school in Lacey, Washington. So the bureau created a fake news story about the bomb threats and ginned up an email appearing to come from the Seattle Times, which it sent to the MySpace account, according to documents obtained by the Electronic Frontier Foundation. Included in the email were links that appeared to point at the Times‘ website but which, in fact, linked to servers controlled by the FBI. Those servers, in turn, installed spyware on the target’s computer. The ruse worked: The owner of the account clicked on the links, compromising his identity as a 15-year-old student. He was subsequently arrested and convicted.’
Editor’s Note: Pierre Omidyar confirmed on Tuesday night that Matt Taibbi has now left First Look Media. And on Thursday an article was put out by The Intercept in an attempt to explain the situation further.
‘Matt Taibbi, the star magazine writerhired earlier this year to start a satirical website for billionaire Pierre Omidyar’s First Look Media, is on a leave of absence from the company after disagreements with higher-ups inside Omidyar’s organization, a source close to First Look confirmed today.
Taibbi’s abrupt disappearance from the company’s Fifth Avenue headquarters has cast doubt on the fate of his highly anticipated digital publication, reportedly to be called Racket, which First Look executives had previously said would launch sometime this autumn.’
‘Citing “law enforcement and intelligence sources who have been briefed on the case,” Michael Isikoff reports that the government has identified “the second leaker” — a source of information on drone targeting and terrorist watchlisting for The Intercept.
[...] Because it raises questions about whether the Administration has the “appetite” to prosecute another source for journalists, the article seems designed to generate pressure to do just that — to get Congress (among others) to demand that the Justice Department prosecute this source.
[...] While Isikoff outlines the content of The Intercept’s watchlist story, he leaves out several details that may make DOJ less interested in prosecuting this leak.’
- Feds have identified, searched suspected “second” intelligence leaker
- Feds identify suspected ‘second leaker’ for Snowden reporters
- The NSA’s Secret Role in the U.S. Assassination Program
- Barack Obama’s Secret Terrorist-Tracking System, by the Numbers
- Victory: No Fly List Process Ruled Unconstitutional
- In First, Government Officially Tells ACLU Clients Their No Fly List Status
- Frequent Flyer ‘Terrorist’ Who Blogs About TSA Troubles Was Watchlisted For Animal Activism
‘The White House has announced today that a long-standing plan to roll out a federal “Internet ID” authentication scheme that would be used to log in to all websites across the Internet will move forward, and the service will launch in six to twelve months.
“We simply have to kill off the password,” insisted White House Cybersecurity Coordinator Michael Daniel. The initiative began in 2011, with an eye toward public-private plans, but seems now to be centering on wearable authentication bracelets that Americans would apparently get instead of passwords.’
‘The billboard’s launch — asking “the $600 million question: What’s the CIA Doing on Amazon’s Cloud?” — marks the escalation of a campaign by the online activist organizations RootsAction.org and ExposeFacts.org. The groups are calling for accountability from Amazon in an effort to inform the public of serious privacy implications of the Amazon-CIA collaboration. (ExposeFacts.org is a project of the Institute for Public Accuracy.)
The positioning of the 48-foot-wide billboard on Amazon’s doorstep at Fairview Avenue and Valley Street in Seattle follows a RootsAction petition calling for Amazon founder and CEO Jeff Bezos to make a legally binding commitment to Amazon’s commercial customers that it will not provide customer data to the CIA.
Amazon is the world’s largest online retailer. “The same company that stores vast quantities of customer records and even provides cloud storage services also stores the CIA’s surveillance data — yet the actual terms of the Amazon-CIA agreement are secret,” said Norman Solomon, executive director of the Institute for Public Accuracy and a co-founder of RootsAction.org.’
- CIA’s Amazon cloud goes live – firewalled and private
- The Details About the CIA’s Deal With Amazon
- How the CIA Partnered With Amazon and Changed Intelligence
- Why Amazon’s Collaboration With the CIA Is So Ominous — and Vulnerable
- What Jeff Bezos has to say about Amazon’s pursuit of CIA contracts
- The CIA and Jeff Bezos Bet on Quantum Computing
- WikiLeaks website pulled by Amazon after US political pressure
- The Black Budget
‘In a rare public accounting of its mass surveillance program, the United States Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations.
The number of requests, contained in a 2014 audit of the surveillance program by the Postal Service’s inspector general, shows that the surveillance program is more extensive than previously disclosed and that oversight protecting Americans from potential abuses is lax.’
‘The notion that history tends to favor the hegemonies that would write it is nothing new. This is especially the case for the United States today. Take US-Latin American international relations, for example: they are indelibly stippled with gunboat diplomacy and seditious coups; even the many perverse trade agreements and subsequent growing poverty belie the neoliberal overtures that America continually makes. Yet, in spite of a most basic realpolitik approach to assessing America’s litany of hegemonic aggression, history is still quick to cite the anarchic nature of international relationships in general, and in doing so, it excuses fratricidal US ‘diplomacy’ throughout Latin America by simply referencing a manifest ‘self-help’ system amongst states.
America, in other words, is not to blame; rather, the anarchy of inter-state relationships is to be understood as a given, and its inherent culpability, understood.
This road, of course, is too easily taken. Though it may explain the what, it does not explain the why apropos general US meddling in Latin America. And while polemical inter-state issues between the US and its closest neighbors are well documented and investigated with some frequency, an “empire for empire’s sake” argument does not suffice as a believable impetus for such aggressive behavior in Latin America—at least, not any more than a phenomenon like self-interest can or does. No. To truly understand these international affairs, one must look beyond hackneyed tautologies. One must weigh the interest that runs the state, the lifeblood of the state’s moneyed organs, the whip that drives the imperial mule. Then, the raison d’être for America’s imposition and coercion in Latin America becomes clear.’
‘Wrestling with the huge steering wheel, a CIA agent carefully backed the large flatbed truck through an entrance in the 10-foot wooden fence surrounding a salvage yard. As the truck rumbled to a stop, he and other covert intelligence operatives moved quickly under cover of night, pushing the gate closed, barely clearing the front bumper. They then all rushed to the back of the truck, hopped inside and delicately pried open the giant wooden crate it carried, being careful to leave no marks.
And with that, the first stage of their until now secret mission was complete: American intelligence had stolen—or, more accurately, borrowed—one of the Soviet Union’s most important technologies, a Lunik space vehicle, which was a key component in its race with the United States to be the first to reach the moon.
The “kidnapping” of that missile, done without the Soviets ever knowing about it, is one of many wild and sometimes weird secret operations and schemes exposed for the first time in a series of recently declassified government documents concerning the so-called Space Race, which was feared to be important for military reasons but known to be propaganda that could swell national pride.’
- The Bureau’s ‘Naming the Dead’ project (@)
- The Next Generation of Drone Pilots: Interview with DRONE director Tonje Hessen Schei
- How American Drone Strikes Are Devastating Yemen
- Ex-Air Force Pilot Brandon Bryant on His Trauma From Remote Killing
- US has killed far more civilians with drones than it admits, says UN
- ‘Double Tap’ Drone Strikes On First Responders Still In Use Overseas
- Leaked report shows high civilian death toll from CIA drone strikes
- Stanford/NYU study documents the civilian terror from Obama’s drones
- American drones ‘killing 49 people for every known terrorist in Pakistan’
‘[...] Why did the face in the Oval Office change but the policies remain the same? Critics tend to focus on Obama himself, a leader who perhaps has shifted with politics to take a harder line. But Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldn’t have changed policies much even if he tried.
Though it’s a bedrock American principle that citizens can steer their own government by electing new officials, Glennon suggests that in practice, much of our government no longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defense and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”: There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy.’
‘A federal jury has returned guilty verdicts against four Blackwater operatives involved in the 2007 massacre at Baghdad’s Nisoor Square. On Wednesday, the jury found one guard, Nicholas Slatten, guilty of first-degree murder, while three other guards were convicted of voluntary manslaughter: Paul Slough, Evan Liberty and Dustin Heard. The jury is still deliberating on additional charges against the operatives, who faced a combined 33 counts. The operatives were tried for the deaths of 14 of the 17 Iraqi civilians who died when their Blackwater unit opened fire. We speak to Jeremy Scahill, author of the best-selling book “Blackwater: The Rise of the World’s Most Powerful Mercenary Army.” His most recent article published by The Intercept is “Blackwater Founder Remains Free & Rich While His Former Employees Go Down on Murder Charges.”’ (Democracy Now!)
- Blackwater Founder Remains Free and Rich While His Former Employees Go Down on Murder Charges
- The Blackwater trial: A shameful case exposes a murky world
- Iraqis react to Blackwater verdict: ‘I’m surprised they were convicted at all’
- 30 Minute documentary on the Nisour Square massacre
- Blackwater Founder Wants to Fight Ebola, ISIS, and for the GOP to ‘Get Off Their Ass’
- Blackwater Threatened To Kill State Deptartment Investigator
- Former CEO reveals Blackwater worked as ‘virtual extension of the CIA’
- Erik Prince Is Making A Huge Bet On China’s Thirst For African Commodities
- Blackwater: The Rise of the World’s Most Powerful Mercenary Army
‘Verizon Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between these customers and the websites they visit.
The company—one the country’s largest wireless carriers, providing cell phone service for about 123 million subscribers—calls this a Unique Identifier Header, or UIDH. It’s a kind of short-term serial number that advertisers can use to identify you on the web, and it’s the lynchpin of the company’s internet advertising program. But critics say that it’s also a reckless misuse of Verizon’s power as an internet service provider—something that could be used as a trump card to obviate established privacy tools such as private browsing sessions or “do not track” features.’
‘The FBI has identified an employee of a federal contracting firm suspected of being the so-called second leaker who turned over sensitive documents about the U.S. government’s terrorist watch list to a journalist closely associated with ex-NSA contractor Edward Snowden, according to law enforcement and intelligence sources who have been briefed on the case.
The FBI recently executed a search of the suspect’s home, and federal prosecutors in Northern Virginia have opened up a criminal investigation into the matter, the sources said.
But the case has also generated concerns among some within the U.S. intelligence community that top Justice Department officials — stung by criticism that they have been overzealous in pursuing leak cases — may now be more reluctant to bring criminal charges involving unauthorized disclosures to the news media, the sources said. One source, who asked not to be identified because of the sensitivity of the matter, said there was concern “there is no longer an appetite at Justice for these cases.”‘
- On Leak Prosecutions, Obama Takes it to 11. (Or Should We Say 526?)
- Second leaker in US intelligence, says Glenn Greenwald
- U.S. Officials Say There’s a Second Snowden Leaking Security Documents
- Barack Obama’s Secret Terrorist-Tracking System, by the Numbers
- Eric Holder meets with media over new guidelines
- Charting Obama’s Crackdown on National Security Leaks
‘In the decades after World War II, the C.I.A. and other United States agencies employed at least a thousand Nazis as Cold War spies and informants and, as recently as the 1990s, concealed the government’s ties to some still living in America, newly disclosed records and interviews show.
At the height of the Cold War in the 1950s, law enforcement and intelligence leaders like J. Edgar Hoover at the F.B.I. and Allen Dulles at the C.I.A. aggressively recruited one-time Nazis of all ranks as secret, anti-Soviet “assets,” declassified records show. They believed the ex-Nazis’ intelligence value against the Russians outweighed what one official called “moral lapses” in their service to the Third Reich.’
The Descent of Libya: From Africa’s Richest State Under Gaddafi to Failed State After NATO Intervention
‘This week marks the three-year anniversary of the Western-backed assassination of Libya’s former president, Muammar Gaddafi, and the fall of one of Africa’s greatest nations.
In 1967 Colonel Gaddafi inherited one of the poorest nations in Africa; however, by the time he was assassinated, Gaddafi had turned Libya into Africa’s wealthiest nation. Libya had the highest GDP per capita and life expectancy on the continent. Less people lived below the poverty line than in the Netherlands.
After NATO’s intervention in 2011, Libya is now a failed state and its economy is in shambles. As the government’s control slips through their fingers and into to the militia fighters’ hands, oil production has all but stopped.
The militias variously local, tribal, regional, Islamist or criminal, that have plagued Libya since NATO’s intervention, have recently lined up into two warring factions. Libya now has two governments, both with their own Prime Minister, parliament and army.’