FRINGE INTELLIGENCE * A biweekly journal focusing on not yet established & next to mainstream intel news * * Editor: Roger Vleugels - roger.vleugels@planet.nl * * Donations are very welcome, see colophon * * Year 13- No. 284 February 1 2014 *
General content
02 Reporting in the Post-Snowden Era 03 Al Qaeda: A NSA Surveillance Target 05 Snow Job 07 Failures of Intelligence 08 British Spies Snooped on Facebook 10 Angry Birds, NSA and GCHQ 13 Turkish Intel Trucks Reveal Secrets 14 UK Loses its Liberties 15 Assad Accused of Boosting al-Qaeda 16 Google Calls for new NSA Reforms 18 Germany Eyes SIGINT Airframes 18 Out of Blackwater and Into China 20 The Facts about the Metadata 'Menace' 21 The CIAs Black Prison in Poland 23 Russia's Surveillance State 28 Intel Can't Deal with Nuclear Tasks 29 The US Surrounded Iran with Drones 30 The Escalating Obama Drone Campaign 32 NSAs Spying on Phone Calls Illegal 33 Claims Obama Made on NSA Surveillance 35 Israel Busts Jihad Terror Cell 36 US withholding Fisa Court Orders ... NSA 37 FBI Emphasizes Law Enforcement's Role 37 Israel, Urenco and Stuxnet 41 A 'lost Decade' since 9/11 42 NSA Provided 1,000 Terror Tips to FBI 43 Karegeya Murder Case at sensitive Stage 43 Die Ermordung von Karegeya 45 UK Deports Taiwanese Intel Agent 46 Beyond Snowden: A NSA Reality Check 50 Canadian Eavesdropping Review 51 Top Secret NSA Slides and SMS 52 Social Network Analysis in Intelligence 58 NSA Reforms Are PR Only 59 NSA Spying Fallout Hits French ... Deal 60 NSA Collects Millions of Text Messages 62 Some Restraints on US Surveillance 64 Surveillance Threatens US Business 65 Philippines: ISAFP to Be Expanded 66 Report on Benghazi Terrorist Attacks 66 German Double Agent Killed in Pakistan 67 US Anti-Drug Center in Bahrain 68 Drone Control: CIA or Pentagon 70 Breaking the India-US diplomatic Ice 70 Obama from Spy Critic to Overseer
Content on NARINT: Natural Resources Intel
72 US Spied on 2009 Climate Summit 74 Enhanced Geothermal Energy Systems
Content on Intelligence 2.0: The IT Wild West
75 Mark Zuckerberg Runs a ... Spy Machine
Content on The Netherlands
77 Philips werkte samen met NSA - 2 77 Philips werkte samen met NSA - 1 78 Steden runnen eigen inlichtingendienst 79 AIVD informeert burgemeesters over AFA
Content in the Fringe 81 The Remote Stopping of Cars
82 Fringe Colophon
FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 2 REPORTING IN THE POST-SNOWDEN ERA A panel at Columbia discussed challenges and triumphs http://www.cjr.org/behind_the_news/snowden_abramson_bell_columbia.php?page=all Columbia journalism Review / by Lauren Kirchner Jan 31 2014 Jan 31. In an auditorium so large that Columbia's Journalism School typically only uses it for its graduation ceremonies, hundreds attended the panel discussion Journalism After Snow- den on Thursday evening. The topic was as vast as it is timely encompassing the rising tensions between media organizations and their governments, the practical process of protecting sensitive information (digitally) and oneself (legally), and the delicate dance between privacy and power. Emily Bell, director of the Tow Center at the journalism school, moderated the panel, and she started it off by asking Guardian US Editor in Chief Janine Gibson to give a behind-the-scenes account of the very beginning of the Summer of Snowden. Gibson described how Glenn Greenwald called her in New York shortly after making contact with his then-nameless source, saying something like I think I have the biggest intelligence leak in a generation, if not ever. Gibson was skeptical, but listening; however, she also knew that Greenwald was calling her from Rio over a Skype line. She knew from her previous work on the paper's WikiLeaks coverage that Skype was relatively untrustworthy technology, and she all but hung up on him. But Greenwald soon flew to New York to meet with her and a few trusted staff members. There, he showed them the tiny sample of stuff he had gotten from his source starting with the PRISM PowerPoint slides on a new, air-gapped laptop hastily bought from Best Buy for the occasion. You very quickly realize that this is an incredibly huge, sensitive, difficult story or it's the Hitler Diaries, it's a great big hoax, said Gibson. Then came the story of the now-familiar trip to Hong Kong, and their meeting with an oddly young contractor and his Rubik's Cube, and the cache of documents of a size that no one has yet been able to quantify. Verifying that Snowden's account was legit was one challenge reporting the story out was an entirely different one. They started with the Foreign Intelligence Surveillance Court order for Verizon metadata. We were trying to edit, write, report, understand, and verify a document that no one has ever seen, said Gibson. You can't Google secret FISA Court order to see if it looks like one that's in front of you. The audience laughed at this. No, that's not funny, that's a genuine problem, she countered, drily. The conversation shifted to the Guardian's collaboration with The New York Times as the documents from Snowden kept coming over the following months. Jill Abramson's first response to Bell's question about the Times getting involved was an honest memory of her disappointment that her paper hadn't been first with the scoop. We did not break the story the Guardian and The Washington Post did and that caused me, you know, severe indigestion, said Abramson. But both Gibson and Abramson agreed that the partnership between the two papers during this process was invaluable. Tech-savvy reporters and editors at the Guardian educated their peers at the Times about best digital-security practices for communicating, searching, viewing, and storing the classified documents. Then, the Times was able to protect the files when the British government aggressively pursued (and forced editors to destroy) the Guardian's hard drives in the UK. The Guardian's outside counsel, David Schulz, was on the panel as well. He had previously worked with the Times during their WikiLeaks coverage. When asked about the legal challenges to news or- ganizations dealing with such sensitive material, he started with the word conundrum. A news organi- zation possessing and then publishing classified documents is still a legal gray area, said Schulz. Later in the evening, Barton Gellman, who leads NSA coverage at The Washington Post, spoke to this same issue. Speaking from the audience, Gellman asked the panelists to try to parse the Director of National Intelligence's statement this week that Edward Snowden and his accomplices should return the documents he stole in order to protect US security from being further compromised. Are we to understand that James Clapper was referring to the press with that term, accomplices, Gellman asked, or was this just a rhetorical flourish of his agency's frustration? Either way, he said, it is getting harder to report on national security issues. Almost everything you want to write about, if you are writing about diplomacy or intelligence or defen- se, is classified; everything but the press release and the news conference is classified, Gellman said. That's just the way the US government works. There may be more classified information now than there is open-source information on the planet. In a larger sense, though, what information is or is not classified, and what legal protections reporters may or may not have, are beside the point as these NSA stories have revealed. Schulz responded to Gellman's concerns with this frightening truth: The technology that we have today, you don't need to subpoena a reporter anymore. There's an ability to find out who gave out any information, said Schulz. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 3 And we should all be very concerned about that, because we all need whistleblowers. If we don't have a mechanism that allows for whistleblowers, our whole society is going to suffer. That was a persistent and important theme that the panel kept returning to that, besides journalists legal protections, equivalent protections should be extended to the people who risk their livelihoods, and lives, to bring this information to light in the first place. Gibson said Snowden had an eerie prescience, and described his sense of urgency in getting as many NSA stories published before the government, and his critics, tried to make the story about him and his traitorous intentions. Bell agreed: Where oversight has failed, a whistleblower and journalism has succeeded, she said. And yet the system is still wanting to punish, if you like, the one thing which has led to transparency and clarity. But that should be completely unsurprising, Abramson jumped in, citing the fact that the current ad- ministration has investigated seven criminal leaks, more than twice the number of such investigations, based on a law passed in 1917, pursued before President Obama took office. That such legal battles were still being fought by James Rosen, of Fox News, and James Risen, of the Times, were mention- ed several times throughout the evening. Gibson also highlighted the new and alarming ways in which the Snowden story has caused certain threats from the establishment to escalate. Instead of the position that journalists find themselves in where they're being threatened with prosecu- tion over identifying their sources, we are now being put in the position of something even more chilling of being co-conspirators, said Gibson. The accusation is now You're part of a conspiracy, possibly involving the KGB, or maybe China. Because the ordinary way of chilling journalism won't work in this case. And I think this should be profoundly worrying, because that's not going to stop. That is a Journalism After Snowden problem. At one point, Bell asked the panel, I think we can all agree that Edward Snowden has done us a favor. Do we have general agreement on that? I have no comment on that, answered Cass Sunstein, the fourth panelist, who participated in the Pre- sident's outside review group that recently released a report proposing changes to the NSA surveillan- ce program. We have a 300-page report, and the word Snowden doesn't appear. Later, Sunstein also said that he did not think that the members of the review group would refer to Snowden as a whistle- blower at all. (So what is he, then?) After a substantial question-and-answer period from the audience, Bell ended the night by asking the panelists for their magic-wand wish for what journalism would ideally look like in this post-Snowden age. Sunstein named internet freedom, and Schultz imagined an internationally agreed-upon standard for individual privacy rights. The two editors had more profession-specific requests. More great stories, said Abramson. No prosecution for journalists, said Gibson. This was met by spontaneous applause.
AL QAEDA: A NSA SURVEILLANCE TARGET More Snowden leaks - and this time Al Qaeda is the surveillance target Unredacted NSA power point slides, leaked by Snowden, reveal a program to track terrorists via their mobile phones. www.csmonitor.com/World/Security-Watch/Backchannels/2014/0130/More-Snowden-leaks-and-this-time-Al-Qaeda-is-the-surveillance-target Christian Science Monitor / by Dan Murphy Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 31 2014 Jan 31. Earlier this week The New York Times and other newspapers, relying on power point slides stolen from the National Security Agency by Edward Snowden, reported that the US and Britain have been trying to develop better means to spy on the massive amounts of data filtering through smart phones and into the world's telecommunications networks. A particular target has been smartphone apps everything from the popular game Angry Birds to photo uploading tools. As the Times wrote: According to dozens of previously undisclosed classified documents, among the most valuable of those unintended intelligence tools are so-called leaky apps that spew everything from the smartphone identification codes of users to where they have been that day. The NSA. and Britains Government Communications Headquarters were working together on how to collect and store data from dozens of smartphone apps by 2007, according to the documents, provided by Edward J. Snowden, the former NSA. contractor. Since then, the agencies have traded recipes for grabbing location and planning data when a target uses Google Maps, and for vacuuming FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 4 up address books, buddy lists, telephone logs and the geographic data embedded in photographs when someone sends a post to the mobile versions of Facebook, Flickr, LinkedIn, Twitter and other Internet services. The paper also uploaded some of the slides, but with one problem: Amateurish redaction of some details, designed to hide the identity of an NSA employee and make it harder for terrorist groups to make good use of the information, that was no redaction at all. The paper quickly rectified the error but not before the original uploads were snatched by the anti-secrecy website Cryptome, at least accord- ing to a Twitter account linked to the website. (The person who controls the account has since deleted this claim, as well as an assertion that he'd do any redactions himself when "hell freezes over.") This error highlights the risks of the tens of thousands of Snowden documents that are now floating around among at least a dozen journalists: Promises that all documents will be handled carefully and be fully vetted by responsible reporters are just that. The more documents and different organizations involved, the greater chances for error and there is little point in closing the barn door after the horses have bolted. But what caught my eye in one of the unredacted slides was the mention of Al Qaeda in Iraq being a particular target of the NSA's efforts. The slide reads: "Visual Communicator Free application that combines Instant Messaging, Photo-Messaging, and Push2Talk capabilities on a mobile platform. VC used on GPRS or 3G networks." The next five words were what the Times tried and failed to redact: "heavily used in AQI Mosul Network." The aim as described in the documents is to target mobile phone apps that can give away a target's physical location. The utility of this in tracking terrorists hardly needs to be stated. The document describes a program focusing on clear security interests Al Qaeda in Iraq, now calling itself Al Qaeda in Iraq and the Levant (ISIS) killed thousands in Iraq during the US-led war there and continues to carry out suicide bombings and attacks on civilians there on a weekly basis. ISIS is also deeply involved in the civil war in Syria, and the groups ties to Al Qaeda make it an obvious security concern for the US. Snowden has often insisted that he isn't interested in exposing intelligence programs that have legitimate security concerns behind them and has gone so far as to say that almost none of the NSA's efforts have anything to do with terrorism. Glenn Greenwald, who's worked with Snowden on releasing NSA documents since at least February of last year, has also made that second claim. In December Snowden wrote an open letter to "the people of Brazil" (he's been hoping to get asylum there) and in it he claimed: There is a huge difference between legal programs, legitimate spying, legitimate law enforcement where individuals are targeted based on a reasonable, individualized suspicion and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever. These programs were never about terrorism: theyre about economic spying, social control, and diplomatic manipulation. Theyre about power. Mr. Greenwald said the following in an interview with CNN's Christian Amanpour last October, after being asked if leaders like British Prime Minister David Cameron were correct in saying the world has become a more dangerous place because "bad guys know how we're listening to them and we're not able to do as much intercepting and stopping of these potentially damaging plots as we could in the past": Let's just use our common sense analyzing the claims of political officials when they say that. Ever since 9/11 British and American officials have screamed terrorism over and over and over every time they get caught doing bad doing things they shouldn't do -- from lying to the public about invading Iraq to setting up a worldwide torture regime to kidnapping people and taking them around the world to be tortured. They just want to put the population in fear by saying that terrorists will get you if you don't want to submit to whatever authority it is that we want to do and that's all they're doing here. It's the same tactic they always use. Let's just use common sense. Every terrorist who's capable of tying their own shoes has long known that the US government and the UK government are trying to monitor their communications in every way that they can. That isn't new. We didn't reveal anything to the terrorists that they didn't already know. What we revealed is that the spying system is largely devoted not to terrorists but is directed at innocent people around the world. That is what was not previously known and that is why American and British officials are so angry because they wanted to hide what the true purpose of the spying system is from the people at whom it's directed. And that is the only thing that's new in what we reported. Amanpour then plays a short clip of Rep. Mike Rogers saying that if French people understood the uses and intent of NSA telecommunications in that country, which he says is focused on terrorism and security, they'd "be popping champagne corks." Greenwald responds: FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 5 Well first of all a lot of people like to ask why is there so much anti-American sentiment around the world all you have to do is listen to that tape of Mike Rogers to understand it he's basically going around telling the world that they ought to be grateful that without their knowledge we're stealing all of their communications data and invading their privacy. None of this has anything to do with terrorism. Is Angela Merkel a terrorist? Are 60 or 70 million French citizens terrorists?... This is is clearly about political power and economic espionage and the claim that this is all about terrorism is seen around the world as what it is. Which is -- pure deceit. The above two quotes contain a lot of hogwash, not to mention Greenwald's extremely binary thinking on this issue. Is all American spying about terrorism? No. And no one in the government ever claimed that. The US Congress has directed the NSA and other intelligence agencies to collect intelligence on foreign governments, just as they collect intelligence on the US. Is it reasonable to claim that the US and other governments have overplayed the threat of terrorism as justification for acts that erode civil liberties? In my view, absolutely. But his claim that "none of this has anything to do with terrorism" is not reasonable. That's pure nonsense -- as is his attempt to suggest that any revelations of eavesdropping techniques can't do any harm because terrorists already know all about it. Terrorists may know that the US is trying to spy on them as best it can (just as Germany and France know that). But knowing the precise methods is another thing altogether. That fact is that while intelligence tools created to spy on terrorists could end up being used and misused for other purposes, it's an enormous logical leap to then claim that "this is is clearly about political power and economic espionage and the claim that this is all about terrorism is seen around the world as what it is. Which is -- pure deceit." That's a claim refuted by a careful reading of the documents Greenwald say help prove his position.
SNOW JOB It's time to blow the whistle on Edward Snowden. www.politico.com/magazine/story/2014/01/edward-snowden-nsa-snow-job-102740.html#ixzz2rtIjvsby Politico / by Edward Lucas [Senior editor at the Economist. His newest book: Tthe Snowden Operation] Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 30 2014 Jan 28. Anyone who has seen the Bourne Identity, or scores of similar Hollywood films, finds Edward Snowden a familiar character. The fugitive insider is the star. The rogue agency is the villain in pursuit. By the closing credits, the hero will be vindicated, thanks to media coverage and belated congressional scrutiny. He gets the girl. Generals James Clapper and Keith Alexanderor their screen counterpartstake a perp walk. It is easy to go along with that narrative, particularly if you are a journalist. Our trade instinctively sides with David, not Goliath. We thrill to the idea of disclosing secrets. We flinch at any constraint on press freedom. The thought of British spooks attacking a Guardian computer with an angle-grinder in the name of safeguarding secrets that have already been copied and stashed elsewhere seems as grotesque as it is pointless. But I disagree. The theft and publication of secret documents, as my new book, The Snowden Operation, argues, is not a heroic campaign but reckless self-indulgence, with disastrous consequences. Snowden and his accomplices deserve censure, not applause. Snowden claims the moral high ground. In a recent softball interview with German television, he claimed that the National Security Agency was involved in scandalous industrial espionage. In a live Q&A on his supporters website, he decried unaccountable senior officials authorizing these unconstitutional programs. His revelations continue, most recently via NBC and the Guardian, claiming among other things that the NSA uses the Angry Birds video game to track its targets (though closer scrutiny of the material suggested a different story). The furor is misleading, though. In judging the action of whistle-blowers, three criteria apply. They must have clear and convincing evidence of abuse. Publishing the information must not pose a disproportionate threat to public safety. And the leak must be as limited in scope and scale as possible. Snowden failed all three of these tests. The documents published thus far do not depict a rogue agency. They indicatewith partial, out-of- date and ambiguous evidence, mostly consisting of out-of-context presentation slidesthat the NSA has plenty of flaws. How could it not? Like other government agencies and bureaucracies, it pushes the limits of its regulatory, political and judicial constraints. That is not surprising. Like people FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 6 everywhere, NSA officials brag. They make mistakes (and get disciplined for them). Again, not too surprising. To justify even a limited breach of secrecy, Snowden would need to prove something far more: evidence of systematic, gross wrongdoing, based on wilful contempt for judicial, legislative and political oversight. In such circumstances, the actions of a Daniel Ellsberg can be justified. But nothing published by Snowden shows that. The NSA revealed in these documents looks nothing like J. Edgar Hoovers FBI. And Barack Obama, for all his faults, is not Richard Nixon, using the power of the state to go after his domestic enemies. On the contrary: The United States has put the most elusive and lawless part of governmentintelligenceinto the strongest system of legislative and judicial control anywhere in the world. Some want it still stronger (I think its too cumbersome and intrusive). But such questions are for the political process to settle. They do not justify catastrophic and destructive leaking. The Snowdenistas second line of defense is that they have at least sparked a debate. But a public discussion, and limited reforms, on issues such as the use of National Security Letters (secret FBI orders to force people and businesses to cooperate with law enforcement), the privacy risks of warehousing metadata and whether zero-day exploits (vulnerabilities in computer hardware and software) should be instantly patched or exploited for espionageare limited benefits, not overwhelming ones. They do not justify catastrophic damage either. The question of whether we house telephone metadata at the NSA or house it at tech companies is not exactly the difference between tyranny and freedom. Nor does impact alone justify the actions of the Snowdenistas media accomplices. Journalism operates in a moral framework. Every potential story has a source and an effect. A responsible editor considers bothand not just the sizzle of the material itself. Simply arguing that a story will interest the public betrays the medias claim to be taken seriously. The defense that there is no point turning down a scoop because another outlet will publish it is even more unconvincing. The Snowdenistas have not only failed to prove that the NSA is out of control, or that it intrudes on Americans personal privacy. They have also published material that has nothing to do with these issues. Why is it in the public interest to reveal how honest, law-governed countries spy on corrupt, authoritarian ones? The Snowden revelations about Norwegian and Swedish intelligence cooperation with the NSA against Russia, published by the Dagbladet newspaper in Oslo and Swedish television, respectively, are the most glaring example of the thoughtlessness of the Snowden approach. These countries have every reason to be worried about Russia. Their agencies operate under democratic control and with strong public support. But for the Snowdenistas, the only thing that matters is that they cooperate with the NSA, the Great Satan of the intelligence world. It is worth noting that America is at the heart of the worlds only successful no-spy agreements, with its close allies notably Britain, Canada, Australia and New Zealand. A list of countries that would trust Germany or France not to spy on them would be rather shorter. Other disclosures are similarly hard to justify. Why is it in the public interest to reveal how the NSA intercepts e-mails, phone calls and radio transmissions of Taliban fighters in Pakistan, as the Washington Post did, or to show that the agency is intensifying scrutiny on the security of that countrys nuclear weapons? Snowden even revealed details of how the NSA hacks into computers and mobile phones in China and Hong Konghardly whistleblowing stuff. It is fatuous for Snowdens allies to say that they are keeping the stolen material safe from hostile intelligence agencies. Few outsiders would suggest they have the skills or knowledge necessary to do so. With equal fatuity, they assert that they redact the published material so as not to breach security. How can they possibly know what will be damaging and what may be harmless? In any case, their technical ability seems not to extend even to deleting an agents name from an Adobe Acrobat file. Snowdens leaks have weakened Western security relationships, corroded public trust, undermined the Wests standing in the eyes of the rest of the world and paralyzed our intelligence agencies. The Snowdenistas seem oblivious to this. Like the anti-nuclear campaigners of the 1980s, or the anti- capitalist protestors of more recent years, they see Western faults with blinding clarity, but forget that we have enemies and competitors. When we stumbleor are trippedthey advance. All this neatly and suspiciously fits the interests of one country, Russiawhich just happens to be where Snowden arrived in such curious circumstances, and now lives in such strange secrecy. Based on 30 years of experience dealing with friendly and hostile intelligence in the Cold War and afterwards, I am stunned that colleagues who are so extraordinarily paranoid about the actions of their own governments are so trusting when it comes to the aims and capabilities of the Russian authorities. (Scanty clues, which I detail in the book, suggest that Snowden lives either in or near the Russian foreign intelligence headquarters in Yasenevo in southern Moscow.) The political agendas of the most ardent Snowdenistaspeople such as the bombastic Brazil-based FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 7 blogger Glenn Greenwald, the hysterical hacktivist Jacob Appelbaum and the WikiLeaks founder Julian Assangecloak extreme and muddled beliefs in the language of privacy rights, civil liberties and digital freedomsa naive and one-sided attitude exemplified by the Norwegian Socialist Left Party's nomination of Snowden for the Nobel Peace prize. To expose and attack the security and intelligence services of democracies, while sheltering in the capital of a country that habitually menaces its neighbours, is an odd way of promoting world peace. A political party based on these quasi-anarchist, nihilist ideas would get nowhere. Yet they are bringing about the greatest peacetime defeat in the history of the West. My argument does not rest on whispers from the shadows: It is based on publicly available facts, plain for everyone to see. Snowden and the Snowdenistas are not on a noble crusade; they are at best useful idiots, at worst engaged in sabotage and treason. Someone should make a Hollywood film about it.
FAILURES OF INTELLIGENCE http://krepon.armscontrolwonk.com/archive/4028/failures-of-intelligence Arms Control Wonk / by Michael Krepon Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 29 2014 Jan 26. US intelligence agencies have been guilty of four general types of error or more, depending on counting rules. The most costly type of error is a failure to recognize and pull together actionable intelligence in time to foil bad surprises. Type I errors are typically abetted by compartmentalization within the intelligence community. The failure to connect the dots prior to 9/11 wasnt new; it used to be characterized as failing to detect signals in noise, as particularized in Roberta Wohlstetters masterful book, Pearl Harbor: Warning and Decision. A subset of this type of error is being unable to detect well-established, covert nuclear weapon programs, like Saddam Husseins prior to the first Gulf war. Type II errors are the reluctance or inability to predict the possibility of pleasant surprises, which become possible when leaders change, when they realize dead-end policies, or when they mess up. Its hard to predict good news. Leaders open to changing course remain surrounded by those who have survived by not taking risks or by engaging in bad behavior. Besides, strategic culture doesnt change on a dime, so risk-takers have to send mixed messages, signaling new possibilities while protecting their flanks. A subset of this type of error is assessing the existence of a well-established covert nuclear weapon program when it may have been halted by decision, incompetence, or dysfunction. Examples include Saddam Husseins Iraq prior to the second Gulf War and Muammar Qaddafis Libya. Predicting more of the same is always a safer course than predicting the possibility of diplomatic breakthroughs especially since the latter can brand the intelligence analyst as being hopelessly nave. Did the US intelligence community see the course-correction in Burma coming, or was it as wrong as the Kremlinologists who misread Gorbachev? As noted earlier in this space, US Iran watchers and proliferation cynics may have gotten Rouhani wrong, as well well see. Type III errors occur with the zealous collection of data that does far more harm to US diplomacy and international standing than might be gained from preventing bad surprises. This error is now a daily occurrence, enabled by new information-retrieval technologies and the lingering effects of suffering massive attacks on the US homeland over a decade ago. One measure of how much 9/11 remains with us is the reluctance of a President steeped in Constitutional Law to pare back the National Security Agencys appetite for collecting and storing metadata on American citizens. Type IV errors relate to discounting the possibility of paranoid behavior by bunkered adversaries. The presumption at work here, sometimes tested by those seeking to burnish their hardline credentials, is that bad actors wont over-act, even when the US jerks their chains. This type of error was most egregiously on display in 1983, when some in the Reagan Administration were oblivious to the possible consequences of pursuing initiatives to keep the Kremlin off-balance. The US intelligence community, which found it difficult to distinguish between paranoid and aggressive Soviet behavior, failed to raise cautionary flags. For those interested in the particulars of this Year of Living Dangerously, check out the National Security Archives treasure trove of files about Able Archer. The Obama Administration, chastened by ill-conceived, costly, and poorly executed wars in Afghanistan and Iraq the surge in Iraq being successful only on a timescale irrelevant to larger consequences is unlikely to engage in Type IV errors anytime soon, whether or not the intelligence community speaks up. The commingling of Type IV and Type II errors makes it hard to explore whether the potential for FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 8 positive developments exists below layers of paranoia and pathology. Making overtures to reduce nuclear dangers in such cases requires heroic efforts to establish footholds for those not locked into enemy images, to relax the grip of those who are, and to assure allies and friends dubious of risky diplomacy. This would be as hard to do for North Korea in the future as it is now for Iran. Leaders who accept this challenge can expect very little help from intelligence agencies.
BRITISH SPIES SNOOPED ON YOUTUBE AND FACEBOOK http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies- snooped-on-youtube-and-facebook?lite NBC News / by Richard Esposito, Matthew Cole, Mark Schone and Glenn Greenwald Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 28 2014 Jan 27. The British government can tap into the cables carrying the worlds web traffic at will and spy on what people are doing on some of the worlds most popular social media sites, including YouTube, all without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out Broad real-time monitoring of online activity of YouTube videos, URLs liked on Facebook, and Blogspot/Blogger visits. The monitoring program is called Squeaky Dolphin. Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the worlds web traffic or able to use a third party to gain physical access to the massive stream of data, and would be able to extract some key data about specific users as well. Representatives of Facebook and Google, which owns YouTube, said they hadnt given the British government permission to access data and were unaware the collection had occurred. A source close to Google who asked not to be identified when discussing company policy said the company was shocked to learn the U.K. could have been grabbing its data. In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here. The documents are being published with minimal redactions. One of the people who helped prepare the demonstration was an official from the British signals intelligence agency Government Communications Headquarters (GCHQ) who worked for a division of the agency called GTE, or Global Telecoms Exploitation. GTE has already been shown in other documents released by Snowden to be tapping fiber optic cables around the world. In 2013, the Guardian reported that Snowden documents showed GCHQ was able to tap fiber optic cables and store huge amounts of data for 30 days, and that the government was placing intercept probes on transatlantic cables when they landed on British territory. Germanys Sueddeutsche Zeitung reported that another Snowden document indicated major telecom firms, including BT, Verizon and Vodafone, were cooperating. The British cyber spies sometimes share their intercepted raw data and their analyses with their American counterparts. In October, the Washington Post revealed that a Snowden document dated Jan. 9, 2013, described a joint NSA/GCHQ program called MUSCULAR, in which the U.S. and British agencies shared intercepted data from fiber optic cables and copied entire data flows from Yahoo and Google. According to a source knowledgeable about the agencys operations, the NSA does analysis of social media similar to that in the GCHQ demonstration. National security experts say that both the U.S. and British operations are within the scope of their respective national laws. When the Washington Post reported on the MUSCULAR program, the NSA said in a statement that it is focused on discovering and developing intelligence about valid foreign intelligence targets only and that it uses Attorney General-approved processes to protect the privacy of U.S. persons. But privacy experts and former government officials say the lack of disclosure by the intelligence agencies inspires public fear that rights of privacy, free speech and dissent have been infringed. Governments have no business knowing which YouTube videos everyone in the world is watching, said Chris Soghoian, chief technologist for the ACLU. Its one thing to spy on a particular person who has done something to warrant a government investigation but governments have no business FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 9 monitoring the Facebook likes or YouTube views of hundreds of millions of people. It might also have a chilling effect on companies like Google. Jason Healey, former White House cyber czar under George W. Bush, says U.S. and British intelligence encroachment on the internet is a threat to everyone, including social media companies. We want our security services to be out there and keeping us safe," said Healey, "but we can also look for balance, we can look for limits, especially if were putting at risk this most transformative technology since Gutenberg. According to the documents obtained by NBC News, intelligence officers from GCHQ gave a demonstration in August 2012 that spelled out to their U.S. colleagues how the agencys Squeaky Dolphin program could collect, analyze and utilize YouTube, Facebook and Blogger data in specific situations in real time. The demonstration showed that by using tools including a version of commercially available analytic software called Splunk, GCHQ could extract information from the torrent of electronic data that moves across fiber optic cable and display it graphically on a computer dashboard. The presentation showed that analysts could determine which videos were popular among residents of specific cities, but did not provide information on individual social media users. The presenters gave an example of their real-time monitoring capability, showing the Americans how they pulled trend information from YouTube, Facebook and blog posts on Feb. 13, 2012, in advance of an anti-government protest in Bahrain the following day. More than a year prior to the demonstration, in a 2012 annual report, members of Parliament had complained that the U.K.s intelligence agencies had missed the warning signs of the uprisings that became the Arab Spring of 2011, and had expressed the wish to improve global intelligence collection. During the presentation, according to a note on the documents, the presenters noted for their audience that Squeaky Dolphin was not intended for spying on specific people and their internet behavior. The note reads, Not interested in individuals just broad trends! But cyber-security experts told NBC News that once the information has been collected, intelligence agencies have the ability to extract some user information as well. In 2010, according to other Snowden documents obtained by NBC News, GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda. The experts also said that the only way that GCHQ would be able to do real-time analysis of trends would be to tap the cables directly and store the data or use a third party, like a private company, to extract and collect the raw data. As much as 11 percent of global internet bandwidth travels through U.K. internet exchanges, according to Bill Woodcock, president of PCH, a non-profit internet organization that tracks and measures and documents fiber infrastructure around the world. In the case of the YouTube video information, the surveillance of the unencrypted material was done not only without the knowledge of the public but without the knowledge or permission of Google, the U.S. company that owns the video sharing service. "We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, said a Google spokesperson. We do not provide any government, including the UK government, with access to our systems. These allegations underscore the urgent need for reform of government surveillance practices." A source close to Google added that Google was shocked because the company had pushed back against British legislation that would have required Google to store its metadata and other information for U.K. government use. The legislation, introduced by Home Secretary Theresa May in 2012, was publicly repudiated by Deputy Prime Minister Nick Clegg in 2013 and has never become law. May hopes to reintroduce a modified version this spring. Its extremely surprising, said the source, that while they were pushing for the data via the law, they might have simultaneously been using their capability to grab it anyway. Encryption would prevent simple collection of the data by an outside entity like the government. Google has not yet encrypted YouTube or Blogger. Facebook and Twitter have now fully encrypted all their data. Facebook confirmed to NBC News that while its like data was unencrypted, the company never gave it to the U.K. government and was unaware that GCHQ might have been siphoning the data. The company assumes the data was taken somewhere outside its networks and data centers. Network security is an important part of the way we protect user information, said Facebook spokesman Jay Nancarrow, which is why we finished moving our site traffic to HTTPS by default last year, implemented Perfect Forward Secrecy, and continue to strengthen all aspects of our network. GCHQ would not confirm or deny the existence of the Squeaky Dolphin program or anything else FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 10 connected with this report. The agency declined to answer questions about the scope of its data collection or how it accessed the datastream. In a statement, a GCHQ spokesperson emphasized that that the agency operated within the law. All of GCHQ's work is carried out in accordance with a strict legal and policy framework, said the statement, which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position. A spokesperson for the NSA said in a statement that the U.S. agency is not interested in the communications of people who are not valid foreign intelligence targets. Any implication that NSA's foreign intelligence collection is focused on the social media communications of everyday Americans is not true, said the statement. We collect only those communications that we are authorized by law to collect for valid foreign intelligence and counterintelligence purposes regardless of the technical means used by the targets. Because some data of U.S. persons may at times be incidentally collected in NSAs lawful foreign intelligence mission, privacy protections for U.S. persons exist across the entire process concerning the use, handling, retention, and dissemination of data. The spokesperson also said that working with foreign intelligence services strengthens the national security of both nations, but that NSA cant use those relationships to circumvent U.S. legal restrictions. Both U.S. and British officials assert that while their passive collection of electronic communications might have great breadth, the actual use of the data collected is very targeted, and is dictated by specific missions. Sources familiar with GCHQ operations state firmly that this is the case in each of the agencys operations. Journalist Glenn Greenwald was formerly a columnist at Salon and the Guardian. In late 2012 he was contacted by NSA contractor Edward Snowden, who later provided him with thousands of sensitive documents, and he was the first to report on Snowdens documents in June 2013 while on the staff of the Guardian. Greenwald has since reported on the documents with multiple media outlets around the world, and has won several journalism awards for his NSA reporting both in the U.S. and abroad. He is now helping launch, and will write for, a new, non-profit media outlet known as First Look Media that will encourage, support and empower independent, adversarial journalists.
ANGRY BIRDS, NSA AND GCHQ Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data US and UK spy agencies piggyback on commercial data Details can include age, location and sexual orientation Documents also reveal targeted tools against individual phones www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data?CMP=twt_gu The Guardian / by James Ball Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 28 2014 Jan 28. GCHQ documents use Angry Birds reportedly downloaded more than 1.7bn times as a case study for app data collection. The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents. The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger. Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect. Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes. Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools such as cable taps, or FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 11 from international mobile networks rather than solely from hacking into individual mobile handsets. Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts. The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts. One slide from a May 2010 NSA presentation on getting data from smartphones breathlessly titled "Golden Nugget!" sets out the agency's "perfect scenario": "Target uploading photo to a social media site taken with a mobile device. What can we get?" The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a "possible image", email selector, phone, buddy lists, and "a host of other social working data as well as location". In practice, most major social media sites, such as Facebook and Twitter, strip photos of identifying location metadata (known as EXIF data) before publication. However, depending on when this is done during upload, such data may still, briefly, be available for collection by the agencies as it travels across the networks. Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, marital status options included "single", "married", "divorced", "swinger" and more income, ethnicity, sexual orientation, education level, and number of children. The agencies also made use of their mobile interception capabilities to collect location information in bulk, from Google and other mapping apps. One basic effort by GCHQ and the NSA was to build a database geolocating every mobile phone mast in the world meaning that just by taking tower ID from a handset, location information could be gleaned. A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartpho- nes, and using them to collect large volumes of location information. So successful was this effort that one 2008 document noted that "[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system." The information generated by each app is chosen by its developers, or by the company that delivers an app's adverts. The documents do not detail whether the agencies actually collect the potentially sensitive details some apps are capable of storing or transmitting, but any such information would likely qualify as content, rather than metadata. Data collected from smartphone apps is subject to the same laws and minimisation procedures as all other NSA activity procedures that the US president, Barack Obama, suggested may be subject to reform in a speech 10 days ago. But the president focused largely on the NSA's collection of the metadata from US phone calls and made no mention in his address of the large amounts of data the agency collects from smartphone apps. The latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans. A January poll for the Washington Post showed 69% of US adults were already concerned about how tech companies such as Google used and stored their information. The documents do not make it clear how much of the information that can be taken from apps is routinely collected, stored or searched, nor how many users may be affected. The NSA says it does not target Americans and its capabilities are deployed only against "valid foreign intelligence targets". The documents do set out in great detail exactly how much information can be collected from widely popular apps. One document held on GCHQ's internal Wikipedia-style guide for staff details what can be collected from different apps. Though it uses Android apps for most of its examples, it suggests much of the same data could be taken from equivalent apps on iPhone or other platforms. The GCHQ documents set out examples of what information can be extracted from different ad platforms, using perhaps the most popular mobile phone game of all time, Angry Birds which has reportedly been downloaded more than 1.7bn times as a case study. From some app platforms, relatively limited, but identifying, information such as exact handset model, the unique ID of the handset, software version, and similar details are all that are transmitted. Other apps choose to transmit much more data, meaning the agency could potentially net far more. One mobile ad platform, Millennial Media, appeared to offer particularly rich information. Millennial Media's website states it has partnered with Rovio on a special edition of Angry Birds; with Farmville maker Zynga; with Call of Duty developer Activision, and many other major franchises. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 12 Rovio, the maker of Angry Birds, said it had no knowledge of any NSA or GCHQ programs looking to extract data from its apps users. "Rovio doesn't have any previous knowledge of this matter, and have not been aware of such activity in 3rd party advertising networks," said Saara Bergstrm, Rovio's VP of marketing and communications. "Nor do we have any involvement with the organizations you mentioned [NSA and GCHQ]." Millennial Media did not respond to a request for comment. In December, the Washington Post reported on how the NSA could make use of advertising tracking files generated through normal internet browsing known as cookies from Google and others to get information on potential targets. However, the richer personal data available to many apps, coupled with real-time geolocation, and the uniquely identifying handset information many apps transmit give the agencies a far richer data source than conventional web-tracking cookies. Almost every major website uses cookies to serve targeted advertising and content, as well as streamline the experience for the user, for example by managing logins. One GCHQ document from 2010 notes that cookie data which generally qualifies as metadata has become just as important to the spies. In fact, the agencies were sweeping it up in such high volumes that their were struggling to store it. "They are gathered in bulk, and are currently our single largest type of events," the document stated. The ability to obtain targeted intelligence by hacking individual handsets has been well documented, both through several years of hacker conferences and previous NSA disclosures in Der Spiegel, and both the NSA and GCHQ have extensive tools ready to deploy against iPhone, Android and other phone platforms. GCHQ's targeted tools against individual smartphones are named after characters in the TV series The Smurfs. An ability to make the phone's microphone 'hot', to listen in to conversations, is named "Nosey Smurf". High-precision geolocation is called "Tracker Smurf", power management an ability to stealthily activate an a phone that is apparently turned off is "Dreamy Smurf", while the spyware's self-hiding capabilities are codenamed "Paranoid Smurf". Those capability names are set out in a much broader 2010 presentation that sheds light on spy agencies' aspirations for mobile phone interception, and that less-documented mass-collection abilities. The cover sheet of the document sets out the team's aspirations: mobile theme 1 The cover slide for a May 2010 GCHQ presentation on mobile phone data interception. Another slide details weak spots in where data flows from mobile phone network providers to the wider internet, where the agency attempts to intercept communications. These are locations either within a particular network, or international roaming exchanges (known as GRXs), where data from travellers roaming outside their home country is routed. mobile briefing 2 While GCHQ uses Android apps for most of its examples, it suggests much of the same data could be taken from iPhone apps. mobile briefing 3 GCHQ's targeted tools against individual smartphones are named after characters in the TV series The Smurfs. These are particularly useful to the agency as data is often only weakly encrypted on such networks, and includes extra information such as handset ID or mobile number much stronger target identifiers than usual IP addresses or similar information left behind when PCs and laptops browse the internet. The NSA said its phone interception techniques are only used against valid targets, and are subject to stringent legal safeguards. "The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency," said a spokeswoman in a statement. "Any implication that NSA's foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true. Moreover, NSA does not profile everyday Americans as it carries out its foreign intelligence mission. We collect only those communications that we are authorized by law to collect for valid foreign intelligence and counterintelligence purposes regardless of the technical means used by the targets. "Because some data of US persons may at times be incidentally collected in NSA's lawful foreign intelligence mission, privacy protections for US persons exist across the entire process concerning the use, handling, retention, and dissemination of data. In addition, NSA actively works to remove extraneous data, to include that of innocent foreign citizens, as early as possible in the process. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 13 "Continuous and selective publication of specific techniques and tools lawfully used by NSA to pursue legitimate foreign intelligence targets is detrimental to the security of the United States and our allies and places at risk those we are sworn to protect." The NSA declined to respond to a series of queries on how routinely capabilities against apps were deployed, or on the specific minimisation procedures used to prevent US citizens' information being stored through such measures. GCHQ declined to comment on any of its specific programs, but stressed all of its activities were proportional and complied with UK law. "It is a longstanding policy that we do not comment on intelligence matters," said a spokesman. "Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework that ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position." A separate disclosure on Wednesday, published by Glenn Greenwald and NBC News, gave examples of how GCHQ was making use of its cable-tapping capabilities to monitor YouTube and social media traffic in real-time. GCHQs cable-tapping and internet buffering capabilities , codenamed Tempora, were disclosed by the Guardian in June, but the new documents published by NBC from a GCHQ presentation titled Psychology: A New Kind of SIGDEV" set out a program codenamed Squeaky Dolphin which gave the British spies broad real-time monitoring of YouTube Video Views, URLs Liked on Facebook and Blogspot/Blogger Visits. A further slide noted that passive a term for large-scale surveillance through cable intercepts give the agency scalability. The means of interception mean GCHQ and NSA could obtain data without any knowledge or co- operation from the technology companies. Spokespeople for the NSA and GCHQ told NBC all programs were carried out in accordance with US and UK law.
TURKISH INTELLIGENCE SERVICE TRUCKS REVEAL SECRETS www.al-monitor.com/pulse/originals/2014/01/turkish-intelligence-trucks-smuggle-syria.html?ut- m_source=Al-Monitor+Newsletter+%5BEnglish%5D&utm_campaign=eeea8d1097-January_27_20- 141_26_2014&utm_medium=email&utm_term=0_28264b27a0-eeea8d1097-93067721 Al-Monitor / by Fehim Tatekin Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 28 2014 Jan 20. Turkeys National Intelligence Organization (MIT), which has bloomed as a parallel Foreign Ministry under Justice and Development Party (AKP) rule after years of keeping a low public profile, was again caught transporting weapons to Syrian opposition forces. After saving a suspicious truck from the prosecutors and gendarmerie on Jan. 1, when the government called it a state secret, MIT this time hit the headlines with seven semis reported to be laden with weapons. Security forces were able to search some of the trucks in an operation on Jan. 19 that was launched after a tip was received and the government was slow in intervening. Nevertheless, the local governor did not allow a detailed search on state secret grounds and the trucks were released. According to information Al-Monitor obtained from security sources, on Jan. 19 at 7:15 a.m., the prosecutor of Adana Anti-Terror Court instructed the Adana Provincial Gendarmerie Command to stop and search three semis. Around noon, a security detail of 200 personnel stopped the semis with plates 06 DY 0393, 06 EY 2115 and 06 FC 9193 and an Audi A3 car accompanying them at Adana Sirkeli Motorway entry point. Eight drivers and other personnel in the trucks were detained. It was also discovered that there were two MIT officials in the Audi escort vehicle. After explosives-detecting dogs gave appropriate signals, the prosecutor allowed steel containers in the trucks to be opened. In six metal crates, concealed among medical supplies, were mortar shells, rockets and various other ammunition. While the trucks were being moved to nearby Seyhan Town Gendarmerie Command for a detailed search, the trucks were blocked by MIT personnel from their Adana regional office. At that point, the governor, Adana Huseyin Avni Cos, the provincial police chief and the MIT regional director arrived at the scene accompanied by 200 policemen. Cos tried for one hour to persuade the prosecutor not to go ahead with the search but couldnt. Then Cos wrote to the Ceyhan district governor and the Adana Provincial Gendarmerie Command, warning that the MIT was attached directly to the prime minister and searching MIT vehicles without the permission of the prime FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 14 ministers office would be an offense. The vehicles then were released under the governors instructions and continued on their way toward Syria. Routine duty According to information provided to Al-Monitor when the first three suspicious trucks were stopped, MIT personnel tried to save the other four trucks from searches but they, too, were stopped by the gendarmerie. While the trucks once again were disappearing, the head prosecutor of the Anti-Terror Court said they could not give a list of items found because the investigation was confidential. At the end of the day, the governors office of Adana issued the following statement: It was understood that in the three vehicles moving in the Adana-Ceyhan direction, there were MIT personnel doing their routine duties. After appropriate checks, these personnel left the location to continue with their routine duties. The term routine duties used by the governors office only added to accusations that the MIT has been involved in field operations since the beginning of the Syrian crisis. Immunity for MIT The new truck incident rekindled the debate on immunity of the MIT. Huseyin Celik, the deputy chairman of Erdogan's AKP, issued a public reprimand, saying, This is a truck of the MIT. What is inside it doesnt concern anyone. Who are these prosecutors working for? Stopping MIT trucks means not knowing your limits. The prosecutors who make such mistakes will be held accountable. Celik, like Cos, said no MIT activity can be questioned without the prime ministers permission. According to legal experts, the rule that the prime ministers approval is needed to investigate the MIT doesnt accord the organization a blanket immunity. Experts say that a suspicious vehicle can be searched if there is likelihood of a crime, to collect the evidence and then a request for permission to investigate the MIT personnel is made. If this is not done, then the MIT is given liberty to commit crimes. On Nov. 7, also in Adana, a truck owned by a private company was found to contain 933 rocket warheads after a tip was received about narcotics smuggling.
UK LOSES ITS LIBERTIES The police get the tools they want, Britain loses the liberties it holds dear Crime rates are down, yet the police create a fantasy world of chaos demanding ever greater control over a free people http://www.theguardian.com/commentisfree/2014/jan/24/police-tools-liberties-britain-crime-rates The Guardian / by Henry Porter Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 28 2914 Jan 24. There are two striking images of modern Britain in this week's news. The first is the story that crime in Britain is at a 32-year low, which confirms evidence in statistical trends that, like most western countries, we are becoming a more orderly and law-abiding society. The second is provided by the police, which, while suffering a thoroughly deserved collapse in their own reputation, seeks to draw a picture of chaos and misrule that demands ever harsher and more invasive policing techniques. Five years after the financial crash, the police are making the case for deploying water cannon to deal with expected "austerity riots", when it is blindingly obvious that Britain has passed through a very difficult period without widespread disorder (the riots that began in Tottenham two years ago were mostly a failure of policing, not a response to economic conditions) and, moreover, the economy and employment have both picked up. But the far more worrying development is the unscrutinised rollout of the police automated numberplate recognition system (ANPR) for tracking vehicles, which, according to Nick Hopkins' report, currently stores 17bn images in its archive and is set to increase its capacity by 2018 to read and store 50-75 million separate vehicle sightings a day. This is a very powerful surveillance system and the important thing to remember is that the decision to cover Britain's motorways and town centres with cameras that track the movements of innocent citizens is that it was never debated by parliament. The system was cooked up between "twinned" committees from the Home Office and the Association of Chief Police Officers, which, incidentally, was a private company and immune from FOI requests, then deployed with constabularies footing the maintenance bill. Not one minute of parliamentary debate preceded the installation of the system; politicians of all parties went along with the police assertion that this was a necessary and proportionate tool of modern policing. And like all new tools given to the police, it has been abused, with officers using the system to track partners, to conduct minute-by-minute surveillance on the movement of legitimate protestors and to FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 15 meet targets and raise revenue from minor motoring offences. There are urgent questions about links to other databases and which bodies have access to this enormous store of information, but a much greater worry exists about the state's vast surveillance dragnet, which we know now has access to the movement, communications and personal details of everyone in Britain. Julian Blazeby, the assistant chief constable for Staffordshire and lead on ANPR for the Association of Chief Police Officers (Acpo), attempts to soothe worries about abuse and transparency by saying: "It is always a challenge for us, balancing the rights of individuals with preventing and detecting crime, however we want to be as transparent as possible, and perhaps in the past we have not been as open as we could have been." But it doesn't appear that neither Blazeby, nor any other member of Acpo, gives the slightest consideration to the liberty of innocent citizens in an increasingly law-abiding country. The actual trends evident in British society of course have no influence on the sponsors of the great surveillance project, for this is simply a matter of the state and its agencies gaining greater degrees of unfettered control over a free people. It is possible to exaggerate the threat, but we can now legitimately claim that through our communications and movements each one of us has been virtually tagged by the state. A handful of politicians have raised concerns over the years, but the truth is that while taxpayers continue to fork out tens of millions for systems that are utterly out of proportion to the problems the police and intelligence agencies face, the issues about liberty and oversight find no mainstream political expression. The police get what they want, whether it's water cannon, Taser guns or the extended ANPR system, and that is because we do not remind them that they are our servants, not our masters. We can be sure of one thing this system will be abused and, in times of political upheaval, we can expect it to be used to defend the state against legitimate political dissent. Imagine its use during the miners' strike; consider how it is currently used to track climate-change protesters. But the main point is surely the contrast between the increasing orderliness of society and the examples of endemic corruption, destruction of evidence, misuse of firearms, punitive attitudes to innocent members of the public, racism, excessive force, the misuse of undercover policing operations and deaths in custody that litter the record of British police. While we become more law-abiding, police standards decline. Instead of addressing their own problems they create a fantasy world of chaos and lawlessness that requires more and more control and surveillance. Where are the politicians who will guard our liberties and ensure the police meet our standards of lawfulness?
ASSAD ACCUSED OF BOOSTING AL-QAEDA WITH SECRET OIL DEALS Western intelligence suggests Bashar al-Assad collaborating with jihadists to persuade West the uprising is terrorist-led www.telegraph.co.uk/news/worldnews/middleeast/syria/10585391/Syrias-Assad-accused-of-boosting-al-Qaeda-with-secret-oil-deals.html The Telegraph / by Ruth Sherlock and Richard Spencer Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 28 2014 Jan 20. The Syrian regime of President Bashar al-Assad has funded and co-operated with al-Qaeda in a complex double game even as the terrorists fight Damascus, according to new allegations by Western intelligence agencies, rebels and al-Qaeda defectors. Jabhat al-Nusra, and the even more extreme Islamic State of Iraq and al-Shams (ISIS), the two al- Qaeda affiliates operating in Syria, have both been financed by selling oil and gas from wells under their control to and through the regime, intelligence sources have told The Daily Telegraph. Rebels and defectors say the regime also deliberately released militant prisoners to strengthen jihadist ranks at the expense of moderate rebel forces. The aim was to persuade the West that the uprising was sponsored by Islamist militants including al-Qaeda as a way of stopping Western support for it. The allegations by Western intelligence sources, who spoke on condition of anonymity, are in part a public response to demands by Assad that the focus of peace talks due to begin in Switzerland tomorrow be switched from replacing his government to co-operating against al-Qaeda in the war on terrorism. Assads vow to strike terrorism with an iron fist is nothing more than bare-faced hypocrisy, an intelligence source said. At the same time as peddling a triumphant narrative about the fight against terrorism, his regime has made deals to serve its own interests and ensure its survival. Intelligence gathered by Western secret services suggested the regime began collaborating actively with these groups again in the spring of 2013. When Jabhat al-Nusra seized control of Syrias most FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 16 lucrative oil fields in the eastern province of Deir al-Zour, it began funding its operations in Syria by selling crude oil, with sums raised in the millions of dollars. The regime is paying al-Nusra to protect oil and gas pipelines under al-Nusras control in the north and east of the country, and is also allowing the transport of oil to regime-held areas, the source said. We are also now starting to see evidence of oil and gas facilities under ISIS control. The source accepted that the regime and the al-Qaeda affiliates were still hostile to each other and the relationship was opportunistic, but added that the deals confirmed that despite Assads finger- pointing his regime was to blame for the rise of al-Qaeda in Syria. Western diplomats were furious at recent claims that delegations of officials led by a retired MI6 officer had visited Damascus to re-open contact with the Assad regime. There is no doubt that the West is alarmed at the rise of al-Qaeda within the rebel ranks, which played a major role in decisions by Washington and London to back off from sending arms to the opposition. But the fury is also an indication that they suspect they have been outmanoeuvred by Assad, who has during his rule alternated between waging war on Islamist militants and working with them. After September 11, he co-operated with the United States rendition programme for militant suspects; after the invasion of Iraq, he helped al-Qaeda to establish itself in Western Iraq as part of an axis of resistance to the West; then when the group turned violently against the Iraqi Shias who were backed by Assads key ally, Iran, he began to arrest them again. As the uprising against his rule began, Assad switched again, releasing al-Qaeda prisoners. It happened as part of an amnesty, said one Syrian activist who was released from Sednaya prison near Damascus at the same time. There was no explanation for the release of the jihadis, the activist, called Mazen, said. I saw some of them being paraded on Syrian state television, accused of being Jabhat al-Nusra and planting car bombs. This was impossible, as they had been in prison with me at the time the regime said the bombs were planted. He was using them to promote his argument that the revolution was made of extremists. Other activists and former Sednaya inmates corroborated his account, and analysts have identified a number of former prisoners now at the head of militant groups, including Jabhat al-Nusra, ISIS and a third group, Ahrar al-Sham, which fought alongside Jabhat al-Nusra but has now turned against ISIS. One former inmate said he had been in prison with Abu Ali who is now the head of the ISIS Sharia court in the north-eastern al-Qaeda-run city of Raqqa. Another said he knew leaders in Raqqa and Aleppo who were prisoners in Sednaya until early 2012. These men then spearheaded the gradual takeover of the revolution from secular activists, defected army officers and more moderate Islamist rebels. Syrian intelligence has historically had close connections with extremist groups. In an interview with The Daily Telegraph after he defected, Nawaf al-Fares, a Syrian security chief, told how he was part of an operation to smuggle jihadist volunteers into Iraq from Syria after the 2003 invasion. Aron Lund, editor of a website, Syria in Crisis, used by the Carnegie Endowment to monitor the war, said: The regime has done a good job in trying to turn the revolution Islamist. The releases from Sednaya prison are a good example of this. The regime claims that it released the prisoners because Assad had shortened their sentences as part of a general amnesty. But it seems to have gone beyond that. There are no random acts of kindness from this regime. Rebels both inside and outside ISIS also say they believe the regime targeted its attacks on non- militant groups, leaving ISIS alone. We were confident that the regime would not bomb us, an ISIS defector, who called himself Murad, said. We always slept soundly in our bases.
GOOGLE CALLS FOR NEW NSA REFORMS http://www.bbc.co.uk/news/technology-25910694?print=true BBC News / by Adam Blenford Source: Infowarrior / https://attrition.org/mailman/listinfo/infowarrior Jan 27 2014 Jan 27. Moves by US President Barack Obama to rein in spies at the National Security Agency do not go far enough, a senior figure at Google has told the BBC. David Drummond, the tech giant's chief legal officer, said the US needed to change its approach to intelligence to restore trust in the internet. His comments are some of the first by a senior tech figure since a speech by the US president earlier this month. They come as ex-NSA contractor Edward Snowden gave his first TV interview. Mr Snowden, who has been in exile in Russia since leaking the information that lifted the lid on the FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 17 scale of US and UK intelligence programmes, told Germany's public broadcaster ARD that the NSA practised "industrial espionage". He said the agency would spy on big German companies that competed with US firms. Mr Snowden, 30, also said he believed that US officials wanted to kill him. Innovation concern Google's Mr Drummond described Mr Obama's high-profile speech on intelligence, delivered on 17 January at the Department of Justice in Washington, as a "positive step". But he said the president's proposals - which mainly focused on limiting the mass collection of phone call information, or metadata - were not enough. "Let me be clear about it, in general they fall short of where any of the speech and the proposal and the speech fell short of where we'd like to see this go," Mr Drummond said. "But I think it was a first step for the administration, it's not the final word on where this will go, hopefully, we intend to be very engaged in that debate." Almost eight months of leaks by Mr Snowden have focused attention on the large-scale collection of phone call, SMS and internet data by the NSA and by GCHQ in the UK. The leaks have worried tech companies such as Google, Facebook and Microsoft, who are concerned that public trust in their services has been undermined by the US government. "People really need to trust the internet and to trust internet companies and that really underpins a lot of the innovation," Mr Drummond said. "We've been concerned about the long-term user trust in the internet and what that means for acceptance for new innovations," he added. "If you build something great but people are worried or won't try it because they're afraid, then it's not going to work." Separately, the politician responsible for piloting a new European data protection law described Mr Snowden's leaks as a "wake-up call" to the world that had undermined trust between Europe and the US. But EU Justice Commissioner Viviane Reding told the BBC that after two years of negotiations with the US over European efforts to update legal safeguards for EU citizens and companies exchanging data with the US, politicians in Washington were now starting to hear her message. "I have been speaking with the Attorney General, Eric Holder, and we are working to see what regulations in the United States can be changed so there is reciprocity and we can finalise this much- needed regulation on both sides of the Atlantic for exchanging data," Ms Reding said. She said Mr Obama would meet European Commission head Jose Manuel Barroso on 26 March, adding that she expected concrete achievements by then. "Our American partners always told us that data protection was something dear to the heart of the Europeans but nobody cares in the United States. I think that recently people in the US also care - members of Congress, senators as well." Snowden: 'I sleep well' Mr Snowden's interview with German broadcaster ARD was his first on-camera interview since revealing himself last June as the source of the NSA leaks. Since being offered temporary asylum in Russia, Mr Snowden has given just one major interview, to the Washington Post shortly before Christmas. He has also answered email questions submitted to him by some journalists. Last week he answered questions on a website called Free Snowden. ARD said they had carried out a six-hour interview that was filmed in a Moscow hotel suite, airing 40 minutes of the footage. He suggested the NSA spied on companies of interest to US national interests, as well as its stated core mission of national security. "If there's information at Siemens that's beneficial to US national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Mr Snowden said. He also discussed reports of threats to his life, describing them as "significant" but saying: "I sleep very well." "These people, and they are government officials, have said they would love to put a bullet in my head or poison me when I come out of the supermarket and then watch me die in the shower," he said, referring to anonymous quotes on US website BuzzFeed. "I'm still alive and don't lose sleep for what I did because it was the right thing to do." Mr Snowden's leaks caused outrage in Germany when it came to light that Chancellor Angela Merkel's phone had been bugged. After the news broke last year, Mrs Merkel accused the US of an unacceptable breach of trust. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 18 Last week President Obama indicated to Germany's ZDF TV that US bugging of Mrs Merkel's mobile phone had been a mistake and would not happen again. The US has charged Mr Snowden with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence. Each of the charges carries a maximum 10-year prison sentence. Earlier this week he said he had "no chance" of a fair trial in the US and had no plans to return there.
GERMANY EYES SIGINT AIRFRAMES http://defensenews.va.newsmemory.com Defense News Stringer: Martin Broek / Investigative Journalism / Amsterdam / http://broekstukken.blogspot.com Jan 27 2014 Jan 27. The German military is considering four variants for a new signals intelligence (SIGINT) aircraft to replace the scrapped Eurohawk UAV project. The Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support has come up with manned and unmanned solutions. These options include an unmanned version in the MALE [medium- altitude, long-endurance] UAV class; a carrier the size of a business jet; a short-range passenger aircraft to carry the ISIS [Integrated Signal Intelligence System]; and an existing complete solution without the ISIS system, a Defense Ministry spokesman said. The chief of staff will decide by the end of the quarter which option comes into question. The new ISIS SIGINT system had been developed by Airbus, formerly EADS, for the Eurohawk UAV.
OUT OF BLACKWATER AND INTO CHINA Erik Prince: The former CIA asset on his latest venture: After being 'blowtorched' by U.S. politics, he says, this time he's working for Beijing. http://online.wsj.com/news/articles/SB10001424052702303465004579324650302912522 Wall Street Journal / by David Feith Stringer: Frank Slijper / Campaign Against Arms Trade / Groningen NL / frank.slijper@hetnet.nl Jan 26 2014 Jan 24. Erik Prince ex-Navy SEAL, ex-CIA spy, ex-CEO of private-security firm Blackwater calls himself an "accidental tourist" whose modest business boomed after 9/11, expanded into Iraq and Afghanistan, and then was "blowtorched by politics." To critics and conspiracy theorists, he is a mercenary war-profiteer. To admirers, he's a patriot who has repeatedly answered America's call with bravery and creativity. Now, sitting in a boardroom above Hong Kong's Victoria Harbour, he explains his newest title, acquired this month: chairman of Frontier Services Group, an Africa-focused security and logistics company with intimate ties to China's largest state-owned conglomerate, Citic Group. Beijing has titanic ambitions to tap Africa's resourcesincluding $1 trillion in planned spending on roads, railways and airports by 2025and Mr. Prince wants in. With a public listing in Hong Kong, and with Citic as its second-largest shareholder (a 15% stake) and Citic executives sitting on its board, Frontier Services Group is a long way from Blackwater's CIA ties and $2 billion in U.S. government contracts. For that, Mr. Prince is relieved. "I would rather deal with the vagaries of investing in Africa than in figuring out what the hell else Washington is going to do to the entrepreneur next," says the crew-cut 44-year-old. Having launched Blackwater in 1997 as a rural North Carolina training facility for U.S. soldiers and police, Mr. Prince says he "kept saying 'yes' as the demand curve calledColumbine, the USS Cole and then 9/11." In 100,000 missions in Iraq and Afghanistan, he says, Blackwater contractors never lost a U.S. official under their protection. But the company gained a trigger-happy reputation, especially after a September 2007 shootout that left 17 civilians dead in Baghdad's Nisour Square. At that point, charges Mr. Prince, Blackwater was "completely thrown under the bus by a fickle customer"the U.S. government, and especially the State Department. He says Washington opted to "churn up the entire federal bureaucracy" and sic it on Blackwater "like a bunch of rabid dogs." According to Mr. Prince, IRS auditors told his colleagues that they had "never been under so much pressure to get someone as to get Erik Prince," and congressional staffers promised, "We're going to ride you till you're out of business." Amid several federal prosecutions involving Blackwater employees, most of which fizzled, Mr. Prince resigned as CEO in 2009 and now feels "absolutely total regret in every way, shape and form for ever FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 19 saying 'yes' " to a State Department contract. Which brings him to Hong Kong and his new firm. "This is not a patriotic endeavor of ourswe're here to build a great business and make some money doing it," he says. Asia, and especially China, "has the appetite to take frontier risk, that expeditionary risk of going to those less-certain, less-normal markets and figuring out how to make it happen." Mr. Prince says "critics can throw stones all they want" but he is quick to point out that he has "a lot of experience in dealing in uncertainties in difficult places," and says "this is a very rational decisionmade, I guess, emotionless." Mr. Prince aims to provide "end-to-end" services to companies in the "big extractive, big infrastructure and big energy" industries. Initially focused on building a Pan-African fleet of aircraft, his firm will expand into barging, trucking and shipping, along with "remote-area construction" as needed for reliable transport. A companyChinese, Russian, American or otherwisemay have "an extremely rich hydrocarbon or mining asset," he explains, "but it's worth nothing unless you can get it to where someone will pay you for it." His investor prospectus notes that with today's transportation infrastructure, "it costs more to ship a ton of wheat from Mombasa, Kenya to Kampala, Uganda than from Chicago to Mombasa." Such high costs also reflect the dangers of piracy and civil conflict, but Mr. Prince plays down his firm's plans in the security realm. "We are not there to provide military training. We are not there to provide security per se. Most of that security"say, if an oil pipeline or mining camp needs protection"would be done by whatever local services are there," including police and private firms. "We don't envision setting up a whole bunch of local guard services around the continent." So the former Blackwater chief won't employ guys with guns? Well, he says, "that would be the exception, certainly not the rule." He says his attention is on "expeditionary logistics" and "asset management." If a company needs to build a dam, he muses by way of example, "how do you deliver an extremely high-dollar turbine into a very remote part of the world? . . . Do you sling it with a helicopter? There's all sorts of interesting challenges like that that we'll be endeavoring to face." Mr. Prince won't share any revenue projections, but his prospectus notes that "China is Africa's largest trading partner," with annual flows of $125 billion. Most estimates put that figure closer to $200 billion, a meteoric increase from $10 billion in 2000 and $1 billion in 1980. The U.S., which was Africa's top trade partner until 2009, registered $100 billion in annual African exchange at last count. China-Africa trade could reach $385 billion by 2015, according to Standard Chartered Bank. "The U.S. has been fixated on terrorism the last 10 or 15 years," says Mr. Prince, "and American companies by and large haven't had the appetite for Africa." In 2010 the African Development Bank found that Chinese firms signed 20 contracts in Africa for every one signed by an American firm. But does post-9/11 distraction really explain this discrepancy? A better explanation would begin with China's state-directed investment strategy, which funds opaque state-owned firms to operate across Africa with little regard for trifles such as financial transparency, environmental degradation or human rights. When a tyrant like Sudan's Omar al- Bashir can't get Western financing for a mega-dam across the Nile River, China arrives with an easy loan, some state- owned firms to build the dam and some others to claim oil or mineral concessions elsewhere in the country. Beijing's approach has helped boost African economic growthprojected at 6% this year by the International Monetary Fundbut it has also helped entrench some of the world's most oppressive governments. Mr. Prince prefers to look on the bright side. "Developing good investments in Africa is by and large the best for the people of Africa that have a job, that have electricity, that might have clean water, that might have those things that we in the West take horribly for granted." It's Capitalism 101, he argues. "When someone needs copper, or wood or an ag product, and they invest capital somewhere to make that happen, and people get jobs from that, and that good gets introduced to the world stage and it gets traded and moved, the whole world benefits." As for Chinese patronage of presidents-for-life like Sudan's Bashir, Mr. Prince's CEO, Gregg Smith a former U.S. Marine and Deloitte executiveoffers this observation: "There's thousands of tribal conflicts in Africa every decade that have nothing to do with anyone from the outside. It has everything to do with tribal conflicts that have been going on for centuries, and the fact that the economies cause folks not to have jobs," says Mr. Smith. "It's not about who backs Omar al-Bashir." Nor, adds Mr. Prince, does China's expanding commercial empire come at the expense of American interests. "The United States and China are among each other's largest trading partners," he notes, "and I think countries that trade goods together tend not to trade lead," meaning to shoot at each other. This historically questionable reassurance notwithstanding, Mr. Prince certainly isn't complacent about America's global standing. U.S. policy in Africa, he says, "is just nonexistent. It's about as coherent as FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 20 U.S. Middle East policyincoherent." Americans, he says, "are at a competitive disadvantage because of their government. . . . It's amazing how many countries run their embassies as commercial outposts to promote businessmen from their country. I think the U.S. has forgotten about that one." At this point in the interview, Mr. Prince begins speaking more sharply, even bitterly, not simply as a critic of Washington policy but as a man betrayed. Which he was, in 2009, when he was outed publicly as a CIA asset. For years while running Blackwater, it turns out, Mr. Prince was also using his personal wealth and expertise to recruit and deploy a world-wide network of spies tracking al Qaeda operatives in "hard target" locations where even the CIA couldn't reliably operate. This work remained secret until June 2009, when then-CIA Director Leon Panetta mentioned it in classified testimony to Congress. Within weeks, leaks hit the front pages. "The one job I loved more than any other was ripped away from me thanks to gross acts of professional negligence at the CIA," Mr. Prince wrote in his memoir, "Civilian Warriors," published in November. This background comes to mind as Mr. Prince makes the surprising claim that "there's very little advantage to being an American citizen anymore. They tax you anywhere in the world you are, they regulate you, and they certainly don't help you, at all." His advice for Washington: "Stop committing suicide." Lawmakers should "get out of their heads this idea that they can recklessly spend money that they don't have," he says. "The United States government is too big in all areas. . . . It's time to make the entire thing a lot smaller." That would include doing everything from allowing Americans to buy incandescent light bulbs to reining in domestic surveillance by the National Security Agency. At no point does Mr. Prince address the irony of making these arguments days after going into business with a state-owned firm founded as part of Communist China's Ministry of State Security. "Look," he says, grasping to end our talk on an optimistic note, "America can pull its head out at any time. That happens at the ballot box. Ballot boxes have consequences still in America." He continues: "But the American electorate has to actually pay attention, has to turn off the Xbox long enough to pay attention. Otherwise they're going to continue to elect the government they deserve."
THE FACTS ABOUT THE METADATA 'MENACE' The NSA program sounds ominous, until you understand what's being collected and how. www.latimes.com/opinion/commentary/la-oe-riley-nsa-metadata-20140126,0,5561469.story#axzz2rPqniKXe Los Angeles Times / by Jack Riley [Vice president of the nonpartisan, nonprofit Rand Corp. and director of the Rand National Security Research Division] Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 25 2014 Jan 26 [!]. President Obama has announced several significant changes to U.S. counter-terrorism intelligence-collection programs, including an overhaul of the way the National Security Agency stores and accesses telephone metadata. But what has sometimes been overlooked in the firestorm created by Edward Snowden's leaks about the program is a clear definition of what metadata is, and what it is not. On the eve of the president's announcement, I took part in a daylong session of briefings, discussion and debate at the NSA. The session, arranged by Carnegie Mellon University professor Kiron Skinner and Emily Goldman of the Pentagon's Cyber Command, involved a small group of computer scientists and other researchers and the top leadership of the NSA. The meetings were spectacular for their clarity and candor. Much of what Snowden leaked has proved controversial, but probably nothing more so than the metadata program authorized by the Patriot Act. This program permits the collection and under limited circumstances analysis of metadata on American phone numbers and thus American citizens for counter-terrorism purposes. Metadata from a phone call include information such as the direction (who called whom), length, date and time. The program does not record the location or the name associated with a call. No one is listening to the call and no content is recorded. And the metadata are segregated and stored separately from all the other signals data the NSA collects. Here's a typical way the metadata are used: An intelligence community client, say the FBI, will send the NSA an official request for investigation of a certain phone number that it believes might be associated with suspected terrorists. In order to examine the metadata associated with a phone number, the NSA has to "make RAS" that is, to show "reasonably articulable suspicion." FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 21 For a phone number that meets the RAS standard, the NSA can examine metadata two hops, or two call generations, away from the original number. Think of a phone bill that displays calls made and received. It can look at metadata for every phone number on the original bill, plus the phone numbers on the bills for the numbers that show up on the bill of the original number. That's two hops. Among the reforms unveiled by Obama was the reduction in the number of permitted hops from three to two. What prevents the NSA from relentlessly hopping from one "interesting" number to the next? There are a number of checks: Subsequent generations of metadata and phone numbers cannot be investigated without making RAS on them, which means new review and new approvals; only 22 NSA managers are authorized to approve examination of metadata; the Justice Department audits the program every 90 days; and the program has to undergo reauthorization with the Foreign Intelligence Surveillance Court every quarter. That means at least 15 different federal judges have looked at and approved the program since its inception. What is not happening with the metadata? There's no freewheeling data-mining, no Facebook-style graphing of social networks and no unrestricted exploratory data analysis. The president has proposed a number of reforms, including requiring judicial approval before the NSA can access metadata. He also proposed a transition that would shift storage of the metadata from NSA to a third party, possibly the telephone companies. Judicial review of metadata use is already occurring, albeit after the fact in quarterly court reviews. Integrating judicial review into each explicit accessing of the metadata is a prudent and reasonable step, though it has the potential to slow investigations. At first glance, shifting data-retention responsibilities to a third party might appear to keep Americans' metadata one additional step removed from prying NSA eyes. But there are potential risks associated with this move. Private retention could be technically complex and could slow investigations. Even with the NSA providing storage standards and guidance, the data may be less secure simply because they are spread across more organizations and locations. The reforms sought by the administration may or may not ease the privacy concerns many Americans have about the metadata collection program. Understanding what metadata is, and isn't, might.
THE CIAS BLACK PRISON IN POLAND Washington Post / by Adam Goldman http://www.matthewaid.com/post/74318970270/the-secret-history-of-the-cias-black-prison-in Matthew Aid Jan 24 2014 Jan 24. On a cold day in early 2003, two senior CIA officers arrived at the US Embas- sy in Warsaw to pick up a pair of large cardboard boxes. Inside were bundles of cash totaling $15 million that had been flown from Germany via diplomatic pouch. The men put the boxes in a van and weaved through the Polish capital until coming to the head- quarters of Polish intelligence. They were met by Col. Andrzej Derlatka, deputy chief of the intelligence service, and two of his associates. A villa in the lake district was arguably one of the most important of the black sites created in the wake of Sept. 11. The Americans and Poles formalized an agreement that over the previous weeks had allowed the CIA the use of a secret prison a remote villa in the Polish lake district to interrogate al-Qaeda suspects. The Polish intelligence service had some more funds, and the agency had a solid location for its newest covert operation, according to former CIA officials who spoke on the condition of anonymity to discuss the interrogation program, including previously unreported details about the creation of the agencys black sites. The CIA prison in Poland was arguably the most important of all the black sites created by the agency in the wake of the Sept. 11, 2001, attacks. It was the first of a trio in Europe that housed the initial wave of accused Sept. 11 conspirators, and it was where Khalid Sheik Mohammed, the self-declared mastermind of the attacks, was waterboarded 183 times after his capture. Much about the creation and operation of the CIAs prison at a base in one of the young democracies of Central Europe remains cloaked in mystery, matters that are classified as state secrets by the U.S. government. But what happened in Poland more than a decade ago continues to reverberate, and the bitter debate about the CIAs interrogation program is about to be revisited. The U.S. Senate Select Committee on Intelligence is preparing to release at least portions of an exhaustive 6,00o-page report on the CIA interrogation program, its value in eliciting critical intelligence, and whether Congress was misled about aspects of what the agency was doing. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 22 The treatment of detainees also continues to be a legal issue in the military trials of Mohammed and others at Guantanamo Bay in Cuba. And in December, the European Court of Human Rights heard arguments that Poland violated international law and participated in torture by accommodating its American ally; a decision is expected this year. In the face of Polish and United States efforts to draw a veil over these abuses, the European Court of Human Rights now has an opportunity to break this conspiracy of silence and uphold the rule of law, said Amrit Singh, a lawyer with the Open Society Justice Initiative that petitioned the court on behalf of a detainee who was held there. Wanted: A better location The story of a Polish villa that became the site one of the most infamous prisons in American history began in the Pakistani city of Faisalabad with the capture of Zayn al-Abidin Muhammed Hussein, better known as Abu Zubaida, in March 2002. The CIA needed a place to stash its first high-value detainee, a man who was thought to be closely tied to the al-Qaeda leadership and might know of follow-on plots. Cambodia and Thailand offered to help the CIA. Cambodia turned out to be the less desirable of the two. Agency officers told superiors that a proposed site was infested with snakes. So the agency flew Abu Zubaida to Thailand, housing him at a remote location at least an hours drive from Bangkok. The CIA declined to comment, as did Polish authorities through Polands embassy in Washington. Derlatka, the Polish intelligence officer, did not return messages seeking comment. Several months after the detention of Abu Zubaida, the CIA caught Abd al-Rahim al-Nashiri, another wanted operative who had been tied to an al-Qaeda attack on a U.S. warship in Yemen. He, too, was taken to the Thai site. With the prospect of holding more and more captives, the CIA required a better location. It was just a chicken coop we remodeled, a former senior CIA official said of the facility in Thailand. The agency reached out to its liaison partners. The CIA station chief in Warsaw reported back with good news. The Polish intelligence service, known as Agencja Wywiadu, had a training base with a villa that the CIA could use in Stare Kiejkuty, a three-hour drive north of Warsaw. Polish officials asked whether the CIA could make some improvements to the facility. The CIA obliged, paying nearly $300,000 to outfit it with security cameras. The accommodations were not spacious. The two-story villa could hold only up to a handful of detainees. A large shed behind the house was also converted into a cell. It was pretty spartan, the agency official recalled. There was also a room where detainees, if they cooperated, could ride a stationary bike or use a treadmill. On Dec. 5, 2002, Nashiri and Abu Zubaida were flown to Poland and taken to the site, which was code-named Quartz. Five days later, an e-mail went out to agency employees that the interrogation program was up and running, and under the supervision of the Special Missions Department of the Counterterrorism Center (CTC). Officials then began shutting down the prison in Thailand, eliminating all traces that the CIA had been there. Harsh interrogations Agency executives tapped Mike Sealy, a senior intelligence officer, to run the Polish black site, according to former CIA officials. He was called a program manager and was briefed on an escalating series of enhanced interrogation techniques that were formulated at the CIA and approved by Justice Department lawyers. These included slapping, sleep deprivation and waterboarding, a technique that involved pouring water over the shrouded face of the detainee and creating the sensation of drowning. I do believe that it is torture, President Obama said of waterboarding in 2009. In Poland, Sealy oversaw about a half-dozen or so special protective officers the CIA had sent to provide security. The number of analysts and officers varied. Polish officials could visit a common area where lunch was served, but they didnt have access to the detainees. There would soon be problems in implementation of the interrogation protocols. Agency officers clashed over the importance of Nashiris role in the bombing of the USS Cole in Yemen in 2000; the attack killed 17 U.S. servicemen. He was an idiot, said the former CIA official, who supported the program. He couldnt read or comprehend a comic book. Other Counterterrorism Center officials believed that Nashiri was a key al-Qaeda figure and was withholding information. After a tense meeting in December 2002, top CIA officials decided they FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 23 needed to get tougher with him, two former U.S. intelligence officials recounted. A decision was also made to dispatch a CIA linguist who had once worked for the FBI in New York. Albert El Gamil was of Egyptian descent and spoke Arabic fluently, but he was not a trained interrogator. El Gamil flew to Poland, where he subjected Nashiri to a mock execution and put a drill to the head of the blindfolded man, according to several former CIA officials. The CIA inspector general also reported on those events. Top CIA officials learned about the incidents in January 2003 after a security guard at the facility sounded the alarm. Sealy and El Gamil were pulled out of Poland and dismissed from the program, according to several former agency officials. They left the CIA a short time later. Both Sealy and El Gamil declined to comment. Dramatic positive results In March 2003, Khalid Sheik Mohammed was captured in the Pakistani city of Rawalpindi and brought to Poland. He proved difficult to break, even when waterboarded, according to several former CIA officials. Mohammed would count off the seconds, between 20 and 40, knowing the simulated drowning always ended within a certain period. An agency official said that one time, Mohammed fell asleep on the waterboard between sessions. But agency officials have said he finally crumbled after extended sleep deprivation. CIA officials assert that while in Poland, Mohammed, who had a sizable ego, began talking. He liked to lecture the CIA officers, who would then steer the conversations in ways that benefited them. He also liked to joust with his inquisitors. Once a female officer, who was later killed in Afghanistan, questioned Mohammed in Poland. She told him that she knew everything about him and that he shouldnt lie to her, two CIA former officials said. Mohammed leaned back in his chair and said, Then why are you here? Abu Zubaida also provided important information to his interrogators, officials said. He identified people in photographs and provided what one official called hundreds of data points. Officials said Abu Zubaida was even willing to help get new detainees to talk. Allah knows I am only human and knows that I will be forgiven, a former official recalled him saying. Former agency officials directly involved in the program, such as the CIAs former deputy director of operations, Jose Rodriguez, have said the harsh techniques produced dramatic positive results. The Senate Select Committee on Intelligence intends to challenge such assertions when its report is made public. Sen. Dianne Feinstein (D-Calif.), the committee chairman, said her investigation will provide a detailed, factual description of how interrogation techniques were used, the conditions under which detainees were held, and the intelligence that was, or wasnt, gained from the program. Eventually, the CIA had to leave Poland, fearing that maintaining one location for too long risked exposure. In September 2003, the Polish site was emptied. The CIA scattered detainees to Romania, Morocco and, later, Lithuania. Looking for a long-term solution, the CIA paid the Moroccans $20 million to build a prison it never used that was code-named Bombay. In 2005, The Washington Post reported that the CIA had operated secret prisons in Eastern Europe. Locations in Poland and Romania were soon identified by Human Rights Watch, and their presence has since been confirmed by multiple European officials and news accounts. Before Porter J. Goss stepped down as CIA director in May 2006, the facilities in Romania and Lithua- nia were closed. Some of the detainees were sent to a Moroccan jail that been previously used and others to a new CIA prison in Kabul called Fernando, which had replaced one known as the Salt Pit From those locations, 14 high-value detainees were shipped to the Guantanamo Bay military detention center in September 2006. Obama ended the interrogation program in 2009. The previous year, Polish prosecutors opened a criminal investigation into what happened at the training base. They also quietly issued arrest warrants for CIA officials who had visited the black site. It is not clear whether the warrants are still in effect.
RUSSIA'S SURVEILLANCE STATE http://www.worldpolicy.org/journal/fall2013/Russia-surveillance World Policy Journal 'Secrecy & Security / by Andrei Soldatov and Irina Borogan [Both are Russian investigative journalists who cover the operations of Russian security services. They are co-founders of the website Agentura, which chronicles the services activities. They also co-authored The New Nobility: The Restoration of Russias Security State and the Enduring Legacy of the KGB (Public Affairs, 2011).] Jan 24 2014 Fall 2013. In March 2013, the Bureau of Diplomatic Security at the U.S. State Depart- ment issued a warning for Americans wanting to come to the Winter Olympics in Sochi, Russia next FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 24 February: Beware of SORM. The System of Operative-Investigative Measures, or SORM, is Russias national system of lawful interception of all electronic utterancesan Orwellian network that jeopardi- zes privacy and the ability to use telecommunications to oppose the government. The U.S. warning ends with a list of Travel Cyber Security Best Practices, which, apart from the new technology, re- sembles the briefing instructions for a Cold War-era spy: Consider traveling with clean electronic devicesif you do not need the device, do not take it. Other- wise, essential devices should have all personal identifying information and sensitive files removed or sanitized. Devices with wireless connection capabilities should have the Wi-Fi turned off at all times. Do not check business or personal electronic devices with your luggage at the airport. Do not connect to local ISPs at cafes, coffee shops, hotels, airports, or other local venues. Change all your passwords before and after your trip. Be sure to remove the battery from your Smartphone when not in use. Technology is commercially available that can geo-track your location and activate the microphone on your phone. Assume any electronic device you take can be exploited. If you must utilize a phone during travel consider using a burn phone that uses a SIM card purchased locally with cash. Sanitize sensitive conversations as necessary. The list of recommendations ends with the advice to discard the users phone and SIM card before returning. The instruction might seem like overreaction, but far from it. Anyone who wants to attend the Olympics needs a Spectator pass, which requires registering on the official Sochi 2014 site, a procedure that includes taking a photo. What is curious is that when clicking to take a photo, a MacBook immediately warns the user that the site is requesting access to your camera and microphone. If you click Allow, you may be recorded. But the Russian surveillance effort is not limited to the Sochi area, nor confined to foreigners. For years, Russian secret services have been busy tightening their hold over Internet users in their country, and now theyre helping their counterparts in the rest of the former Soviet Union do the same. In the future, Russia may even succeed in splintering the web, breaking off from the global Internet a Russian intranet thats easier for it to control. INTERCEPT TELECOM Over the last two years, the Kremlin has transformed Russia into a surveillance stateat a level that would have made the Soviet KGB (Committe for State Security) envious. Seven Russian investigative and security agencies have been granted the legal right to intercept phone calls and emails. But its the Federal Security Service (FSB), the successor to the KGB, that defines interception procedures, and theyve done that in a very peculiar way. In most Western nations, law enforcement or intelligence agencies must receive a court order before wiretapping. That warrant is sent to phone operators and Internet providers, which are then required by law to intercept the requested information and forward it to the respective government agencies. In Russia, FSB officers are also required to obtain a court order to eavesdrop, but once they have it, they are not required to present it to anybody except their superiors in the FSB. Telecom providers have no right to demand that the FSB show them the warrant. The providers are required to pay for the SORM equipment and its installation, but they are denied access to the surveillance boxes. The FSB has control centers connected directly to operators computer servers. To monitor particular phone conversations or Internet communications, an FSB agent only has to enter a command into the control center located in the local FSB headquarters. This system is replicated across the country. In every Russian town, there are protected underground cables, which connect the local FSB bureau with all Internet Service Providers (ISPs) and telecom providers in the region. That system, or SORM, is a holdover from the countrys Soviet past and was developed by a KGB research institute in the mid-1980s. Recent technological advances have only updated the system. Now, the SORM-1 system captures telephone and mobile phone communications, SORM-2 intercepts Internet traffic, and SORM-3 collects information from all forms of communication, providing long-term storage of all information and data on subscribers, including actual recordings and locations. Over the last six years, Russias use of SORM has skyrocketed. According to Russias Supreme Court, the number of intercepted telephone conversations and email messages has doubled in six years, from 265,937 in 2007 to 539,864 in 2012. These statistics do not include counterintelligence eavesdropping on Russian citizens and foreigners. At the same time, Moscow is cracking down on ISPs that dont adhere to their SORM obligations. We discovered Roskomnadzor (the Agency for the Supervision of Information Technology, Communications, and Mass Media) statistics covering the number of warnings issued to ISPs and telecoms providers. In 2010, there were 16 such warnings, and there were another 13 in 2011. The next year, that number jumped to 30 warnings. In most cases, when the local FSB or prosecutors office identified shortcomings, they sent the information to Roskomnadzor, which warned the ISP. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 25 Penalties for failure to meet their obligations are swift and sure. First, the ISP is fined, then if violations persist, its license may be revoked. TARGETING WHOM? In 2011-2012, while protesters flooded Moscows streets, the phones of a number of Russian opposi- tion leaders and members of the State Duma were hacked. Recordings of their private telephone conversations were even published online. On December 19, 2011, audio-files of nine tapped phone calls of Boris Nemtsov, a former deputy prime minister and now a prominent opposition leader, were posted on the pro-government site lifenews.ru. Nemtsov requested an official investigation. As yet, none of the leakers have been found or prosecuted, and the official investigation has not identified a single culprit. Such victims have no doubt they were bugged and filmed by security services, but only in the fall of 2012 did the first clear indication emerge that SORM was used to wiretap opponents of President Vladimir Putin. On November 12, 2012, Russias Supreme Court upheld the right of authorities to eavesdrop on the opposition. The court ruled that spying on Maxim Petlin, a regional opposition leader in Yekaterinburg, was lawful since he had taken part in rallies that included calls against extending the powers of Russias security services. The court decided that these were demands for extremist actions and approved surveillance and telephone interception. FACEBOOK THREAT After securing the legal ability to snoop on mobile phones and emails, the Russian secret services targeted social networks next. Immediately after the Arab Spring, they were tasked with finding a response to the threat of political stability ostensibly posed by social networks. In August 2011, at an informal summit of the Collective Security Treaty Organization (CSTO), a regional military alliance led by Moscow, in Astana, Kazakhstan, the main topics of discussion were the revolutions in the Middle East and the role played by social networks. The summit, which was attended by then Russian president Dmitry Medvedev, adopted a confidential document recognizing the potential danger of social media in the organization of protests in Russia. But nobody in the Kremlin and security services seemed to have any strategies in place in December 2011, when mass protests broke out in Moscow prompted by Putins campaign to return to the presidency. All the FSB could muster was a fax, signed by the chief of the St. Petersburg FSB department, to Pavel Durov, a founder of the Russian social network VKontakte, requiring him to neutralize the websites of protest groups. Durov refused. On March 27, 2012, this failure to find the means to deal with protesters activities on social networks was admitted by the first deputy director of the FSB, Sergei Smirnov. At a meeting of the regional anti- terrorist group operating within the Shanghai Cooperation Organizationa broad group of nations that includes most CSTO states as well as ChinaSmirnov referred directly to the challenge posed by the Arab Spring. New technologies [are being] used by Western special services to create and maintain a level of continual tension in society with serious intentions extending even to regime change. Our elections, especially the presidential election and the situation in the preceding period, revealed the potential of the blogosphere. Smirnov stated that it was essential to develop ways to react to such technologies and confessed that this has not yet happened. The Kremlins goal was to use any available type of regional security alliance to build a system of regional cybersecuritya plausible pretext to help Central Asian states protect themselves and Russia from the fallout of Arab Spring movements. The Russian secret services launched several programs to control whats published on the Internet. The FSB, the Interior Ministry, the Foreign Intelligence SVR, and the Investigative Committee (the Russian analog of the FBI) have new software systems to monitor social networks and identify participants in online debates. But apparently its the FSBs Center for Information Security that has taken the lead in policing what Russians are allowed to read and write. A gloomy, monumental building on the corner of Lubyanka Square and Myasnitskaya Street houses the FSBs counterintelligence department. This looming fortress, built in the 1980s as the KGBs IT Center, forms a part of a row of buildings, known as the Lubyanka, where thousands of dissidents were imprisoned and interrogated back in the days of the feared Lavrentiy Beria, Stalins hated spymaster. Initially the Center was responsible for protecting computer networks and tracking down hackers, but in the late 2000s, it was tasked with monitoring social networks and the Internet as a whole. The Commonwealth of Independent States (CIS), a regional organization made up of nine former Soviet states, uses special analytical search systems developed by Russian programmers. Called Semantic Archive, the system is produced by the Russian firm Analytic Business Solutions. On the first floor of the Stalin-era yellow brick building, more than 20 programmers headed by 37-year old Denis Shatrov are busy updating Semantic Archive. Not long after the release of the first version in FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 26 2004, it was installed in the Russian Security Council and Ministry of Defense headquarters, as well as the FSB and the Interior Ministry. From the beginning we aimed our systems at the security services, says Denis Shatrov, a trained programmer who founded the company in 2004. We thought that if we worked with them, then we would also attract business from our intelligence services and those of our competitors too. Shatrov told us that he began developing analytic systems in the mid-90s with his father, the director of a factory that produced automated steering systems for spacecraft. Then they began to produce simulation systemsfor electoral and economic applications. Their success came in 1999 when they sold their product to the Ukrainian President Kuchmas situation room for use in his successful campaign for a second term. In the mid-2000s father and son separated, the elder Shatrov specializing in economic modeling, Denis in media analysis. The idea of its most popular product, Semantic Archive, is to monitor any sorts of open datamedia archives, online sources, blogs, and social networksfor key words and then to produce analyses, most famously, by building charts of connections. As it boasts on the companys own website, the system uses this raw information to extract objects of interest (certain persons, organizations, corporate brands, regions, etc.), their actions and relationships. Semantic Archive is not the only product used by the Russian security services to monitor social networks, but all of them seem to share the same fundamental flaw. These systems were developed for searching structured computer files, or databases, and only afterwards adapted, some more successfully than others, for semantic analysis of the Internet. Most of these systems were designed to work with open sources and are incapable of monitoring closed accounts such as Facebook. The FSB discovered early on that the only way to deal with the problem was to turn to SORM. The licenses require businesses that rent out site space on servers to give the security services access to these servers via SORM, without informing site owners. With this provision, the FSB has had few problems monitoring closed groups and accounts on Russian social networks Vkontakte and Odnoklassniki. But Facebook and Twitter are not hosted in Russia and that has posed a real challenge for surveillance. FILTERING In November 2012, Russia acquired a nationwide system of Internet-filtering. The principle of Internet censorship wasnt new to Russian authorities. Since 2007, regional prosecutors have implemented court decisions requiring Internet providers to block access to banned sites accused of extremism. But this had not been done systematically. Sites blocked in one region remained accessible in others. The Single Register, officially introduced on November 1, 2012, aimed to solve this problem. Three government agenciesthe Roskomnadzor, the Federal Anti-Drug Agency, and the Federal Service for the Supervision of Consumer Rights and Public Welfaresubmit data for the governments black list of sites. Service providers are then required to block access to each such site within 24 hours. Since last November, hundreds of websites have been banned from the Russian Internet. The list ranges from the lighthearted Australian viral YouTube hit Dumb Ways to Die to Absurdopedia (the Russian version of Uncyclopedia). Even the parody web site Gospoisk (gossearch.ru) was blocked. The site was a fake search engine, ostensibly created with government support, structured so that when a visitor types a query in the search box, he is asked to enter his first and last name, patronymic, passport details, address, and the reason for the request. Since it was a parody, this data evaporated into the ether. The new Internet monitoring law has had some substantial offline consequences as well. Institutions providing public access to the Internetschools, libraries, Internet cafs, and even post officeshave been targeted for law enforcement inspections to check for computers containing software that might allow access to banned websites. This problem took on a new urgency, especially in the Muslim- dominated region of the North Caucasus after the appearance of a YouTube video in September 2012 called The Real Life of Muhammad that was viewed as a direct insult to the Prophet Muhammad. Russian authorities promptly blocked the entire website in some regions. That made global Internet service providers much more cooperative with Russian requests. Google removed the video from YouTube on December 26. Then Twitter blocked an account that promoted drugs on March 15 and on March 29. Facebook took down a page called Club Suicide rather than see the entire network blacklisted by the Russians. The apparent readiness of global services to cooperate with the Russian government seems to provoke the authorities to push increasingly in the Chinese direction, especially in dealing with social networks. Moscow is attempting to force international social networking companies into Russias national jurisdiction. Then, right on time, Edward Snowden appeared on the world stage. The NSA scandal made a perfect excuse for the Russian authorities to launch a campaign to bring global web platforms such as Gmail and Facebook under Russian laweither requiring them to be accessible in Russia by the domain FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 27 extension .ru, or obliging them to be hosted on Russian territory. Under Russian control, these companies and their Russian users could protect their data from U.S. government surveillance and, most importantly, be completely transparent for Russian secret services. Russia wants to shift supervision and control of the Internet from global companies to local or national authorities, allowing the FSB more authority and latitude to thwart penetration from outside. At Decembers International Telecommunications Union (ITU) conference in Dubai, Moscow tried to win over other countries to its plan for a new system of control. The key to the project is to hand off the functions of managing distribution of domain names/IP-addresses from the U.S.-based organization ICANN to an international organization such as the ITU, where Russia can play a central role. Russia also proposed limiting the right of access to the Internet in such cases where telecommunication services are used for the purpose of interfering in the internal affairs or undermining the sovereignty, national security, territorial integrity, and public safety of other states, or to divulge information of a sensitive nature. Some 89 countries voted for the Russian proposals, but not the United States, United Kingdom, Western Europe, Australia, or Canada. The result is a stalemate. Web services would be required to build backdoors for the Russian secret services to access whats stored there. Prominent Russian MP Sergei Zheleznyak, a member of the ruling United Russia party, has called on Russia to reclaim its digital sovereignty and wean its citizens off foreign websites. He said he would introduce legislation this fall to create a national server, which analysts say would require foreign websites to register on Russian territory, thus giving the Kremlins own security services the access they have long been seeking. Of course, building such a national system would defeat the global value of the Internet. BEYOND RUSSIAN BORDERS Fearing Arab Spring-style uprisings, former Soviet republics have looked to Moscow for guidance on dealing with free speech in cyberspace. On June 15, 2011 Nursultan Nazarbayev, president of Kazakhstan, proposed the idea of an alliance-wide cyber police force at the opening of the Shanghai Cooperation Organization summit in Astana. He added that it was time to include the concept of electronic borders and e-sovereignty in international law. Ten months later, at a second SCO summit, member states agreed on joint measures to be taken by their secret services to prevent and disrupt the usage of the Internet for terrorist, separatist, and extremist purposes. In turn, the Collective Security Treaty Organization of the CIS countries established a working group on information security and launched a series of joint operations by secret services of member-states. The operation was called PROKSI, and Nikolai Bordyuzha, secretary general of the CSTO, reported that it has led to the shutdown of 216 websites in Russia alone. But the leaders of these countries clearly understand that censorship and Internet-filtering should be combined with surveillance. After all, they share the same Soviet legacy. When the Soviet Union collapsed, the KGBs regional branches became the security services of the newly independent states. But they retained the KGBs operational DNA, which is apparent in the CIS states continued use of Soviet and Russian terminology for surveillance operations. The term ORM, or Operative-Investigative Measures, was kept by all CIS countries. At the same time, the Russian approach to lawful interception has been adopted in Belarus, Ukraine, Uzbekistan, Kyrgyzstan, and Kazakhstan. And over the last three years Belarus, Ukraine, and Kyrgyzstan have all updated their national interception systems, modeled after the Russian SORM. In March 2010, Belarusian president Alexander Lukashenko introduced SORM into his country. Two years later, the national telecom operator Beltelecom installed SORM on its data network. In late 2010, Ukraine updated its national requirements for SORM equipment. And in August 2012, Kyrgyzstan updated its network to make it virtually identical to the Russian interception systemin all, bringing tens of millions of new individuals under potential surveillance by security services. Meanwhile, the export of Russian surveillance procedures and equipment in many cases also means exporting Russian technology, giving homegrown manufacturers natural advantages over their Western counterparts. This, in turn, has led to the growing presence of Russian advisers. SORM is also not the only surveillance technology imported from Russia to the other CIS countries. The Semantic Archive, the favorite technology of monitoring social networks, was installed in Ukraine, Belarus, and Kazakhstanmuch to the delight, and profit, of Denis Shatrov. The further localization of the Internet is likely. Soon, we will end up with a Balkanization of what was once a global internet, replaced by a collection of national or regional internets. Local security services will sell their various surveillance technologies and strategies. Governments will be delighted to extract more controls, with the global Internet services themselves being driven in the same direction of increased fragmentation by the very logic of the advertising business which requires ever finer targeting and accountability of their audience. Russian customers are led to google.ru, not because its established by the Kremlin or the FSB, but because Google can target ads with more precision. In the FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 28 future, however, it could be the FSB directing your Internet travels. Today, global Internet platforms are rightly considered public services, and for the benefit of the public or its institutions. To keep web services and products, not to mention the information they carry, both transparent and global, companies and countries need to resist pressure to fragment the Internet. The World Wide Web must keep its first W. It is in the interest of all those trying to spread the ideas of democracy around the world.
INTEL CAN'T DEAL WITH NUCLEAR TASKS Pentagon Study Finds Agencies Ill Equipped to Detect Foreign Nuclear Efforts www.nytimes.com/2014/01/24/us/politics/us-efforts-to-detect-nuclear-programs-are-inadequate- pentagon-study-finds.html?nl=todaysheadlines&emc=edit_th_20140124&_r=0 NY Times / David E Sanger and William J Broad Stringer: Frank Slijper / Campaign Against Arms Trade / Groningen NL / frank.slijper@hetnet.nl Jan 24 2014 Jan 23. A three-year study by the Pentagon has concluded that American intelligence agencies are not yet organized or fully equipped to detect when foreign powers are developing nu- clear weapons or ramping up their existing arsenals, and calls for using some of the same techniques that the National Security Agency has developed against terrorists. The study, a 100-page report by the Defense Science Board, contends that the detection abilities needed in cases like Iran including finding undeclared facilities and/or covert operations are either inadequate, or more often, do not exist. The report is circulating just two months before President Obama will attend his third nuclear security summit meeting, set for March in The Hague, an effort he began in order to lock down loose nuclear materials and, eventually, reduce the number of countries that could build nuclear weapons. Mr. Obamas efforts to sweep up the materials have largely been considered a success. But the report concluded that potential new nuclear states are emerging in numbers not seen since the early days of the Cold War, and that monitoring for proliferation should be a top national security objective but one for which the nation is not yet organized or fully equipped to address. The report confirmed what many outside experts have learned anecdotally: While the most famous intelligence failure in the past decade involving nuclear weapons occurred in Iraq, where the C.I.A. and others saw a program that did not exist, the bigger concern may be that major nuclear programs were entirely missed. American officials first learned of a reactor in Syria, built with North Korean assistance, when the Israelis alerted them. (Israel destroyed the facility in 2007.) North Korea, early during the Obama administration, built a uranium enrichment facility that went undetected until the North showed it off to a visiting professor from Stanford. The lesson from this history is that we found these at the last moment, if we found them at all, said Bruce Riedel, a former C.I.A. expert on terrorism and nuclear proliferation who is now at the Brookings Institution. The Defense Science Board came to a similar conclusion. It said that in the future, satellite photo- graphs and other reconnaissance will most likely be of limited use. Instead, it suggested that many of the cyber and big-data programs developed by the N.S.A. should be used to detect proliferation, a bet that the United States would be more likely to pick up evidence of scientists and engineers talking, emailing, or searching for nuclear-related technologies than it would be to see a weapons facility being built. In fact, the growing need to detect proliferation was one of the arguments Mr. Obama made last Friday in his speech explaining why many of the programs started by the N.S.A. in recent years must be preserved. A former senior intelligence official familiar with the report, which was commissioned by Ashton B. Carter, the former deputy secretary of defense who resigned late last year, said the effort was to focus the governments efforts on the global dimensions of the atomic threat. One of the highest priorities of successive administrations is countering proliferation, the official said. But theres little coherence on what agencies do to move that interest forward. The range of government departments that were interviewed by the Defense Science Board underscores how spread out the effort has become: Officials of several of the nations 16 intelligence agencies participated, along with four of the Energy Departments National Laboratories and its National Nuclear Security Administration, the Department of Homeland Security, the Defense Threat Reduction Agency and the White Houses National Security Council. The former senior official said that many signs of a nuclear program could be found by monitoring FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 29 open sources, and that clues there are frequently overlooked. Theres always evidence of it, he said of clandestine nuclear activity, speaking on the condition of anonymity. For instance, he said, how much of a countrys gross domestic product is devoted to certain industries could be a significant clue. From open sources you can put that together, he said. But no entity in the government brings coherence to all these things. The report did not name any specific countries that are under American surveillance because of their current or suspected weapons programs. But it is no secret that the United States spends enormous resources tracking Pakistans arsenal, along with those of Russia, China, India, North Korea and Israel. The report implicitly called into question whether administration officials should be so confident that they would detect if Iran ever violated the nuclear accord that began this week.
THE US SURROUNDED IRAN WITH STEALTH DRONES RQ-170 Sentinels secretly staged to the UAE https://medium.com/war-is-boring/404024f84fc0 War is Boring / by David Axe & Joe Trevithick Stringer: Frank Slijper / Campaign Against Arms Trade / Groningen NL / frank.slijper@hetnet.nl Jan 24 2014 Starting at least four years ago, the U.S. Air Force and the Central Intelligence Agency secretly and systematically surrounded Iran with Americas most high-tech, radar-evading spy drones. In December 2011, one of the 60-foot-wingspan RQ-170 Sentinel drones, probably flying from Kanda- har in southern Afghanistan, crashed on the Iran-Pakistan border and was seized by Iranian forces. The Sentinel presumably had been surveilling Iranspecifically, Tehrans suspected nuclear weapons program. The crash revealed one arc of the stealth drone cordon around Iran. The other arc, apparently an- chored south of Iran in the United Arab Emirates, has never been revealed before now. Sometime in 2010, it appears that the 30th Reconnaissance Squadrona combined Air Force and CIA unit normally based in remote Tonopah, Nevadadeployed some of its estimated 20 Sentinels to Al Dhafra, a sprawling air base in the UAE where the Pentagon stages many of its most sophisticated spy planes for patrols near Iran. According to heavily-redacted official documents obtained by War is Boring through the Freedom of Information Act, on Sept. 14, 2010, the Air Forces Air Combat Commandthe headquarters that oversees the 30th Reconnaissance Squadroncirculated an internal memo discussing the pre- deployment site survey for placing some of the satellite-controlled RQ-170s in the Emirates. The RQ-170s were built by Lockheed Martin in the early 2000s and helped spy on Iraq during the 2003 invasion. One of the distinctive, bat-shaped bots was photographed by a journalist at Kandahar airfield in 2007. In 2009, the Air Force copped to the Sentinels existence, but released no details. An RQ-170 reportedly orbited overhead as Navy SEALs raided Osama Bin Ladens compound in Pakistan in May 2011, killing the Al Qaeda leader. Another version of Air Combat Commands Sentinel survey memo circulated on Sept. 27, 2010this one specifying Al Dhafra air base as the stealth drones destination. Sentinels, like the non-stealthy Predator and Reaper spy drones also used by the Air Force and CIA, apparently deploy in groups of at least three, allowing one to be airborne over the target area around the clock, while the others are in transit or under repair. Having surveyed Al Dhafra for Sentinel basing and apparently cleared the massive facility for hosting the secretive robot planes, on Oct. 7, 2010, a U.S. Air Force delegation met with a counterpart group from the UAE Air Force, a strong ally of the American flying branch that operates U.S.-made Predators and F-16s. Based on the documents we obtained via FOIA, the topic of the meeting seemed to have been the RQ-170although its unclear exactly what the officers said about the drone. In any event, the surveys and meeting paved the way for Sentinels to fly from Al Dhafra. Lacking additional documentary evidence, we can only assume that the elusive bots actually did deploy to the desert airfield shortly thereafter. Its hard to imagine that the Air Force would go to the trouble of clearing Al Dhafra for the stealth drones unless the flying branch truly intended to send them there. While the Emirates air base is convenient to the entire Persian Gulf, the American aircraft at the facility, including high-flying U-2 photo-recon birds and four-engine E-3 radar planes, traditionally focus their attention on Iran. The Air Force and Navy also both base RQ-4 Global Hawk spy drones at Al Dhafra. In late 2013, the FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 30 Navy contracted with RQ-4-builder Northrop Grumman to nearly double the frequency of its robotic missions near Iran to 15 a month. The stealthy Sentinel solved a worsening problem for U.S. forces around Iran. In recent years, Tehrans ramshackle but increasingly aggressive air force has begun intercepting American drones near Iranian air space. In November 2012, an Iranian Su-25 attack jet fired its gun at an MQ-1 Predator but missed. In March 2013, an Iranian F-4 fighter intercepted another Predator but was chased off by a U.S. F-22 stealth fighter that slipped in underneath the 1960s-vintage F-4. The Predators and other spy planes are unable to avoid detection and sometimes need rescuing. But the Sentinels can fly independently, using their hard-to-detect shape and, presumably, radar- absorbing coating to dodge Iranian sensors. Until an RQ-170 crashed on the Afghan-Iranian border, its possible Tehran had no idea the drones were even probing its air spaceand indeed had the country surrounded.
THE ESCALATING OBAMA DRONE CAMPAIGN More than 2,400 dead as Obamas drone campaign marks five years www.thebureauinvestigates.com The Bureau of Invastigative Journalism Jan 23 2014 Five years ago, on January 23 2009, a CIA drone flattened a house in Pakistans tribal regions. It was the third day of Barack Obamas presidency, and this was the new commander-in- chiefs first covert drone strike. Initial reports said up to ten militants were killed, including foreign fighters and possibly a high-value target a successful first hit for the fledgling administration. But reports of civilian casualties began to emerge. As later reports revealed, the strike was far from a success. At least nine civilians died, most of them from one family. There was one survivor, 14-year- old Fahim Qureshi, but with horrific injuries including shrapnel wounds in his stomach, a fractured skull and a lost eye, he was as much a victim as his dead relatives. Later that day, the CIA attacked again and levelled another house. It proved another mistake, this time one that killed between five and ten people, all civilians. Obama was briefed on the civilian casualties almost immediately and was understandably disturbed, Newsweek reporter Daniel Klaidman later wrote. Three days earlier, in his inauguration address, Obama had told the world that America is a friend of each nation, and every man, woman and child who seeks a future of peace and dignity. The Pakistani government also knew civilians had been killed in the strikes. A record of the strikes made by the local political administration and published by the Bureau last year listed nine civilians among the dead. But the government said nothing about this loss of life. Yet despite this disastrous start the Obama administration markedly stepped up the use of drones. Since Obamas inauguration in 2009, the CIA has launched 330 strikes on Pakistan his predecessor, President George Bush, conducted 51 strikes in four years. And in Yemen, Obama has opened a new front in the secret drone war. Lethal strikes Across Pakistan, Yemen and Somalia, the Obama administration has launched more than 390 drone strikes in the five years since the first attack that injured Qureshi eight times as many as were launched in the entire Bush presidency. These strikes have killed more than 2,400 people, at least 273 of them reportedly civilians. Although drone strikes under Obamas presidency have killed nearly six times as many people as were killed under Bush, the casualty rate the number of people killed on average in each strike has dropped from eight to six under Obama. The civilian casualty rate has fallen too. Strikes during the Bush years killed nearly more than three civilians in each strike on average. This has halved under Obama (1.43 civilians per strike on average). In fact reported civilian casualties in Pakistan have fallen sharply since 2010, with no confirmed reports of civilian casualties in 2013. The decline in civilian casualties could be because of reported improvements in drone and missile technology, rising tensions between Pakistan and the US over the drone campaign, and greater scrutiny of the covert drone campaign both at home and abroad. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 31
Obama has sharply escalated the drone campaign in Pakistan. The apparent change in targeting is well demonstrated by comparing a strike carried out by the Bush administration in 2006 and one seven years later under Obama. On October 30 2006 at least 68 children were killed when CIA drones destroyed a madrassa a religious school in the Bajaur area of Pakistans tribal belt. The attack was reportedly targeting then-al Qaeda second-in-command Ayman al Zawahiri. He escaped. On November 21 last year, drones again targeted a madrassa, this time in Hangu, outside the tribal regions. As many as 80 students were sleeping in the building. But the strike destroyed a specific portion of the building just one or two rooms and killed between six and nine people. In Yemen, however, civilians continue to die in US drone strikes. Last year saw the highest civilian casualty rate since Obama first hit the country in 2009. Drones were not the first weapon the administration turned to when it started to attack the country. On December 17 2009 a US Navy submarine launched a cluster bomb-laden cruise missile at a suspected militant camp in al Majala, southern Yemen. The missile slammed into a hamlet hitting one of the poorest tribes in Yemen. Shrapnel and fire left at least 41 civilians dead, including at least 21 children and 12 women five of them were pregnant. A week earlier President Obama had been awarded the Nobel Peace Prize. He used his acceptance speech to defend the use of force at times as not only necessary but morally justified. He warned that negotiations cannot convince al Qaedas leaders to lay down their arms. Strikes in Pakistan are carried out by the CIA. But in Yemen the CIA and the US militarys special forces unit, Joint Special Operations Command, have used various weapons including drones and conventional jets as well as cruise missiles to target al Qaeda militants. However in recent years drones have come to dominate Obamas war in Yemen as much as in Pakistan. President Bush ordered a single drone strike in Yemen, killing six people in 2002. Under Obama, the CIA and the Pentagon have launched at least 58 drone strikes on the country killing more than 281 people, including at least 24 reported civilians. Opaque operations The escalation in the drone war has happened with almost no official transparency from the White House. It took Obama three years to publicly mention his use of drones. In January 2012 he said actually drones have not caused a huge number of civilian casualties. He added: For the most part they have been very precise, precision strikes against al Qaeda and affiliates. In this period Bureau records show drones reportedly killed at least 236 civilians including 61 children. And according to a leaked CIA record of drone strikes, seen by the McClatchy news agency, the US often did not know who it was killing. In the year after September 2010 at least 265 of up to 482 people were recorded as the documents as killed by drones were assessed as Afghan, Pakistani and unknown extremists. A letter written by Attorney General Eric Holder and leaked to NBC confirmed drones had killed four US citizens living abroad. US citizen Anwar al Awlaki died in a missile strike in Yemen on September 30 2011. His 16-year-old son Abdulrahman, who was born in Detroit, was killed in a separate strike FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 32 two weeks later. In April 2013 a leaked Department of Justice memo outlined the administrations legal justification for such killings: the US has the right to kill US citizens if they pose an imminent threat, it said. It added that determining a citizen poses an imminent threat does not require the United States to have clear evidence that a specific attack on US persons and interests will take place in the immediate future. Jameel Jaffer of the American Civil Liberties Union described the memo as a chilling document. The following month President Obama made a major policy speech in which he codified the rules his administration must follow as it selects targets for drone strikes and special forces teams. The rules are meant to constrain the use of drones. Obama said the US only carries out such attacks against individuals who pose a continuing and imminent threat to US citizens, not to punish indivi- duals. Obama acknowledged drone strikes had killed civilians, saying: For me, and those in my chain of command, those deaths will haunt us as long as we live. And he added: Before any strike is taken, there must be near-certainty that no civilians will be killed or injured the highest standard we can set. However Bureau analysis shows more people were killed in Pakistan and Yemen in the six months after the speech than the six months before. And the casualty rate also rose over the same period. In 2013, there were no confirmed civilian casualties in Pakistan the first year of the drone campaign that this was the case. But in Yemen, the year ended with mass civilian casualties. On December 12, JSOC drones attacked a convoy taking a bride to her wedding. The attack destroyed several vehicles and flying shrapnel killed up to 15 civilians. It was the biggest single loss of civilian life from a US strike for more than a year. The Yemeni government initially claimed al Qaeda militants were killed. But the Yemeni government quickly negotiated reparations with the families of the victims, sending them $140,000 and 100 rifles. The US has not commented on the strike, but in an unprecedented move Washington is carrying out an investigation.
NSAS SPYING ON PHONE CALLS ILLEGAL: US PRIVACY BOARD www.bloomberg.com/news/2014-01-23/nsa-s-spying-on-phone-calls-illegal-u-s-privacy-board.html Bloomberg News / by Margaret Talev & Chris Strohm Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 23 2014 Jan 23. The U.S. National Security Agency is illegally collecting phone call records from millions of Americans and the program should be stopped, a federal privacy board recommends in a report issued today. The five-member Privacy and Civil Liberties Oversight Board, created by Congress to protect privacy under post-Sept. 11 anti-terrorism laws, said in a 238-page report that the program has provided only minimal help to the U.S. in thwarting other terrorist attacks, according to the report. This panel has no authority to change the programs and President Barack Obama last week went ahead, without waiting for todays report, and presented his own plan that doesnt end the use of bulk phone records. Its conclusion presents a public relations challenge for a White House under pressure from phone and Internet companies, foreign governments and civil libertarians after disclosures by former government contractor Edward Snowden of electronic spying by the NSA. By questioning the programs legality, the panel may give ammunition to critics in Congress and fuel legal challenges. At the same time, the boards 3-2 split on the question of legality of collecting phone data from such carriers as Verizon Communications Inc. (VZ) and AT&T Inc. may diminish the impact of the report and highlights the complexities of balancing security and democratic freedoms. Constitutional Concerns The U.S. justification for the phone records collection under Section 215 of the Patriot Act implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value, the report said. As a result, the board recommends that the government end the program. The panels two dissenters served in President George W. Bushs administration. All the members were appointed by Obama and confirmed by the Democratic-controlled Senate. The bombshell nature of the reports central conclusion may explain why Obama, after meeting with the board on its planned recommendations weeks ago, decided to announce his proposals on Jan. 17. Obama defended U.S. electronic spying as a bulwark against terrorism. He proposed changing aspects of the phone metadata program, which may require Congress to sort out details such as whether the government, the phone companies or an unidentified third party should retain the data. Split Cited Three of the five privacy board members agreed with the legal analysis that the NSAs phone records FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 33 collection is illegal, while two other panelists said the board should limit its review to whether the program violates privacy and civil liberties. Representative Mike Rogers, a Michigan Republican and chairman of the House intelligence committee, who has been supportive of the surveillance tools, seized on that disagreement in an e- mailed statement today. In 38 times over the past seven years, 17 federal judges have examined this issue and found the telephone metadata program to be legal, concluding this program complies with both the statutory text and with the U.S. Constitution, Rogers said. I dont believe the Board should go outside its expertise to opine on the effectiveness of counterterrorism programs. The panels findings were reported earlier by the New York Times. Internet Data Internet companies such as Google Inc. (GOOG), Yahoo! Inc., and Facebook Inc., which have pushed for more transparency about government court requests for e-mail and other content from their customers, should be able to voluntarily disclose certain statistical information, the report said. In addition, the government should publicly disclose more detailed statistics to provide a more complete picture of government surveillance operations. Obama had deferred decisions regarding the NSAs Internet data collection to Congress and a new panel expected to be appointed. Members of the privacy board briefed Obama on their planned recommendations ahead of his Jan. 17 announcement. The recommendations from the bipartisan, independent agency housed in the executive branch also follows a December report by a separate, independent review panel appointed by the president. The privacy panel, created by Congress in 2007 but only operational last year, is led by David Medine, a former Federal Trade Commission official in former President Bill Clintons administration. Medine agreed with the findings along with retired appeals court Judge Patricia M. Wald, and James X. Dempsey, a civil liberties advocate who specializes in technology issues. Judicial Review The two members who disagreed with the legal analysis are Washington attorneys Rachel Brand and Elisebeth Collins Cook. Obama said he would require judicial review of requests to query phone call databases and ordered the Justice Department and intelligence officials to devise a way to take storage of that data out of the governments hands. He left other steps to limit surveillance up to a divided Congress, meaning that other changes may be months away if they are adopted at all. Obama gave Attorney General Eric Holder and intelligence officials 60 days to develop a plan for storing bulk telephone records outside of government custody, one of the most contentious issues arising from Snowdens disclosures. New Panel Phone companies, such as Verizon and AT&T, have resisted being required to retain telephone metadata for the government because of the potential cost and legal exposure. An entity to take on that role doesnt yet exist. The administration plans to deliver a proposal on data storage to Congress by the end of March. Obama called for the creation of an outside panel of advocates to weigh in on new and major privacy issues before the Foreign Intelligence Surveillance Court. The most concrete and immediate changes announced by Obama will require judicial review for queries of the metadata records. In addition, the government can no longer access records that go beyond two persons removed from the query the government makes. Under the presidents plan, the U.S. wont monitor the communications of leaders of close allies unless there is a compelling national security interest while that leaves loopholes for the U.S. government to continue its spying abroad.
CLAIMS OBAMA MADE ON NSA SURVEILLANCE In preparation for President Obama's speech on surveillance policy today, here are four of the misleading statements he has made about the NSA. http://www.propublica.org/article/four-questionable-claims-obama-has-made-on-nsa-surveillance ProPublica / by Kara Brandeisky Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 23 2014 Jan 17. Today President Obama plans to announce some reportedly limited reforms to FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 34 National Security Agency surveillance programs. Since the first disclosures based on documents provided by former NSA contractor Edward Snowden, Obama has offered his own defenses of the programs. But not all of the presidents claims have stood up to scrutiny. Here are some of the misleading assertions he has made. 1. There have been no abuses. "And I think it's important to note that in all the reviews of this program [Section 215] that have been done, in fact, there have not been actual instances where it's been alleged that the NSA in some ways acted inappropriately in the use of this data There had not been evidence and there continues not to be evidence that the particular program had been abused in how it was used." -- Dec. 20, 2013 At press conferences in June, August and December, Obama made assurances that two types of bulk surveillance had not been misused. In fact, the Foreign Intelligence Surveillance Court has reprimanded the NSA for abuses both in warrantless surveillance targeting people abroad, and in bulk domestic phone records collection. In 2011, the FISA Court found that for three years, the NSA had been collecting tens of thousands of domestic emails and other communications in violation of the Fourth Amendment. The court ordered the NSA to do more to filter out those communications. In a footnote, Judge John D. Bates also chastised the NSA for repeatedly misleading the court about the extent of its surveillance. In 2009 weeks after Obama took office the court concluded the procedures designed to protect the privacy of American phone records had been so frequently and systemically violated that it can fairly be said that this critical element of the overall regime has never functioned effectively. The NSA told the court those violations were unintentional and a result of technological limitations. But the NSAs own inspector general has also documented some willful abuses: About a dozen NSA employees have used government surveillance to spy on their lovers and exes, a practice reportedly called LOVEINT. 2. At least 50 terrorist threats have been averted. "We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved." -- June 19, 2013 The record is far less clear. Obamas own review group concluded that the sweeping phone records collection program has not prevented any terrorist attacks. At this point, the only suspect the NSA says it identified using the phone records collection program is a San Diego cab driver later convicted of sending $8,500 to a terrorist group in his homeland of Somalia. The NSAs targeting of people abroad appears to have been more effective around counter-terrorism, as even surveillance skeptics in Congress acknowledge. But its impossible to assess the role the NSA played in each case because the list of thwarted attacks is classified. And what we do know about the few cases that have become public raises even more questions: Contrary to what Obama suggested on the Charlie Rose Show in June, the AP has reported that the FBI did not need either program to identify Najibullah Zazi, later convicted of plotting to attack the New York subway system. ProPublica has reported that one case began with a tip from British intelligence, not NSA surveillance. In another case, no one has been charged related to the alleged plot. 3. The NSA does not do any domestic spying. "We put in some additional safeguards to make sure that there is federal court oversight as well as Congressional oversight that there is no spying on Americans. We don't have a domestic spying program. What we do have are some mechanisms where we can track a phone number or an e-mail address that we know is connected to some sort of terrorist threat, and that information is useful." -- Aug. 7, 2013 In fact, plenty of Americans communications get swept up. The government, of course, has the phone records of most Americans. And, as the FISA Court learned in 2011, the NSA was gathering tens of thousands of domestic emails and other communications. Additionally, the NSA's minimization procedures, which are supposed to protect American privacy, allow the agency to keep and use purely domestic communications in some circumstances. If the NSA inadvertently vacuums up American communications that are encrypted, contain evidence of a crime, or relate to cybersecurity, the NSA can retain those communications. The privacy standards suggest there is a backdoor loophole that allows the NSA to search for American communications. NSA critic Sen. Ron Wyden, D-Ore., has said, Once Americans' communications are collected, a gap in the law that I call the 'back-door searches loophole' allows the government to potentially go through these communications and conduct warrantless searches for the phone calls or emails of law-abiding Americans.Its not clear whether the NSA has actually used this backdoor. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 35 And while the NSA acknowledges that it intercepts communications between Americans and surveillance targets abroad, the agency also intercepts some domestic communications that mention information about foreigners who have been targeted. As a result, the NSA has sometimes searched communications from Americans who have not been suspected of wrongdoing though an NSA official says the agency uses very precise searches to avoid those intercepts as much as possible. 4. Snowden failed to take advantage of whistleblower protections. "I signed an executive order well before Mr. Snowden leaked this information that provided whistleblower protection to the intelligence community for the first time. So there were other avenues available for somebody whose conscience was stirred and thought that they needed to question government actions." -- Aug. 9, 2013 Obamas presidential policy directive forbids agencies from retaliating against intelligence personnel who report waste, fraud and abuse. But the measure mentions only employees, not contractors. Whistleblower advocates say that means the order does not cover intelligence contractors. I often have contractors coming to me with whistleblower-type concerns and they are the least protected of them all, attorney Mark Zaid told the Washington Post. Whats more, the directive was not yet in effect at the time Snowden came forward.Since the leaks, the Office of the Director of National Intelligence has said the Executive Branch is evaluating the scope of the protections. Former NSA employee Thomas Drake argues that even if Snowden were a government employee who went through the proper legal channels, he still wouldnt have been safe from retaliation. Drake says while he reported his concerns about a 2001 surveillance program to his NSA superiors, Congress, and the Department of Defense, he was told the program was legal. Drake was later indicted for providing information to the Baltimore Sun. After years of legal wrangling, Drake pleaded guilty to a lesser charge and got no prison time.
ISRAEL BUSTS JIHAD TERROR CELL Israel busts 'global jihad' terror cell planning attacks, including against US Embassy http://www.longwarjournal.org/archives/2014/01/israel_busts_global.php The Long War Journal / by David Barnett Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 23 2014 Jan 22. Israeli authorities today announced the arrest of three global jihadists who were allegedly preparing to carry out terror attacks after being recruited by an al-Qaeda-linked opera- tive in the Gaza Strip. The three terrorists were identified as Iyad Mahmoud Khalil Abu Sara, Rubin Abu Nagma, and Ala Yasin Mohammed Anam. The arrested Palestinians from the West Bank and Jerusalem area were recruited online and planned to carry out kidnappings and bombings at the International Convention Centre in Jerusalem as well as the US Embassy in Tel Aviv, among other attacks. Israeli authorities kept their counterparts in the "US and elsewhere" updated on their investigation, Israeli security sources said. According to the Shin Bet, the three had been recruited separately by a Gaza-based operative called Oreib al Sham. "Senior Shin Bet sources said they believed Al-Sham received his orders directly from the head of al-Qaeda's central structure, Ayman Al-Zawahri," the Jerusalem Post reported. The unconfirmed claim "is based on statements made by the suspects during questioning," Haaretz noted. According to Haaretz, al Sham told the recruits that he worked for Zawahiri. Abu Sara admitted to planning a shooting attack on a bus traveling between Jerusalem and Ma'ale Adumim. According to the Shin Bet, the plot would have seen terrorists fire at the wheels of a bus, causing it to overturn, and then opening fire on the passengers and emergency responders. Abu Sara also reportedly agreed to assist in a double suicide bombing operation against the US Embassy in Tel Aviv and the International Convention Centre in Jerusalem. Using fake Russian passports and traveling under the guise of tourists, foreign jihadists were supposed to enter Israel, where they would have been assisted by Abu Sara in carrying out the bombings, the security agency said. According to the Shin Bet, Abu Sara had agreed to go to Syria for military training, but had not yet done so. He had already received files from Gaza detailing how to manufacture explosives, however. Rubin Abu Nagma had been planning to kidnap a soldier from a Jerusalem bus stop in addition to detonating explosives at a housing complex in the area of Abu Tor, the Shin Bet statement said. Ala Yasin Mohammed Anam purportedly sought to establish a Salafi jihadist terror cell in the West Bank. News of the recent arrests comes about two months after Israel security forces killed three Salafi jihadists near Hebron. The jihadists were "only a small part" of the Salafi jihadist structure in the West FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 36 Bank, and "what was hidden was greater," the Gaza-based Mujahideen Shura Council in the Environs of Jerusalem said in a statement praising the three jihadists. A Shin Bet official said those recently arrested were not linked to those killed in November, Ynet News reported. Shin Bet officials believe that the spread of al Qaeda-linked activity in the West Bank is in its infancy and can be stopped, Reuters reported.
US WITHHOLDING FISA COURT ORDERS ON NSA BULK COLLECTION OF AMERICANS' DATA http://www.theguardian.com/world/2014/jan/21/us-withholding-fisa-court-orders-nsa-bulk-collection The Guardian by Specer Ackerman Jan 22 2014 Jan 21. The Justice Department is withholding documents related to the bulk collection of Americans data from a transparency lawsuit launched by the American Civil Liberties Union. US attorney Preet Bharara of the southern district of New York informed the ACLU in a Friday letter that the government would not turn over certain other records from a secret surveillance court, which are being withheld in full from a Freedom of Information Act suit the civil liberties group filed to shed light on bulk surveillance activities performed under the Patriot Act. The decision to keep some of the records secret, in the thick of Edward Snowden's revelations, has raised suspicions within the ACLU that the government continues to hide bulk surveillance activities from the public, despite US president Barack Obama's Friday concession that controversial National Security Agency programs have never been subject to vigorous public debate. The ACLU lawsuit, like others filed by civil liberties groups, has resulted in a trove of documents from the so-called Fisa court detailing the scope, authorizations and, in some cases, violations surrounding NSA surveillance ostensibly occurring under Section 215 of the Patriot Act. The director of national intelligence now posts the released documents to a Tumblr page, usually without revealing that the disclosures were spurred by lawsuits. The latest such disclosure happened Friday with the release of 24 documents, mostly detailing Fisa court reauthorizations of the bulk phone records collection first reported by the Guardian thanks to leaks from whistleblower Snowden. Among the information disclosed in the documents, which date back to 2006 the first year in which the program received authorization from the Fisa court at all is the footnoted stipulation that the court understands that NSA expects it will continue to provide, on average, approximately 3 telephone numbers per day to the FBI. If true the footnote only appears in pre-2009 court reauthorizations the estimate suggests the NSA has given the FBI approximately 13,203 phone numbers based on the 12-year-old domestic bulk phone data program. In his letter, written on the day Obama gave a long-awaited speech on surveillance that pledged additional transparency, Bhahara said that Friday's release will be the last disclosure under the terms of the ACLU's lawsuit. As discussed by telephone this morning, the government in fact has processed all of the remaining FISC Orders responsive to the FOIA request in this case that relate to bulk collection, regardless of whether the order contains any additions and/or adjustments to the implementation procedures, minimization procedures, and/or reporting requirements set out in other FISC orders,? the US attorney wrote. The government cannot specify the total number of documents withheld in full from this final set of responsive documents because the number itself is classified." Alexander Abdo, an ACLU attorney, noted that the government's bulk surveillance disclosures have yet to include, among other efforts, a reported CIA program to collect international money transfers in bulk, revealed in November by the Wall Street Journal and the New York Times. It appears that the government is concealing the existence of other bulk collection programs under the Patriot Act, such as the CIA's reported collection of our financial records, Abdo said. In other words, on the same day that President Obama recognized the need for a vigorous debate about bulk collection, the government appears to be hiding the ball. We can't have the public debate that President Obama wants without the facts that his agencies are hiding. Abdo said that the scope of the ACLU's disclosure lawsuit only concerned surveillance efforts under Section 215 of the Patriot Act and that surveillance authorizations containing individualized suspicion were already excluded. The NSA conducts other bulk data collection under the Foreign Intelligence Surveillance Act of 1978, FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 37 an update to that law in 2008, and under a three-decade-old executive order known as 12333, all of which are outside the terms of the ACLU's lawsuit. Bharara's office routed a request for comment back through the Justice Department, which has yet to respond.
FBI EMPHASIZES LAW ENFORCEMENT'S ROLE In Reversal, FBI Now Emphasizes Role in Law Enforcement http://thecable.foreignpolicy.com/posts/2014/01/17/in_reversal_fbi_now_emphasizes_role_in_law_enforcement Foreign Policy / by John Hudson Source: Infowarrior / https://attrition.org/mailman/listinfo/infowarrior Jan 21 2014 Jan 19. The Federal Bureau of Investigation has decided to revise a controversial fact sheet that declared its primary mission to be "national security," following criticism that the agency seemed to be moving away from its longstanding role as the nation's preeminent law enforcement agency. The change emphasizes that stopping terrorism and battling more conventional domestic criminal activity are both "primary functions" of the FBI. The lightning-fast revision should dispel any notion that large bureaucratic organizations can only operate at a snail's pace: The fact sheet was updated less than 48 hours after a report on it in Foreign Policy went viral last week. An FBI official confirmed that the change was a direct result of the article. "It's most accurate to say our primary functions are law enforcement and national security and that's probably what it should've said all along," FBI spokesman Paul Bresson told FP. "We've always been both." The changes come after FP reported Jan. 5 that that FBI fact sheets declared "the primary function of the FBI is national security." Two days later, on Jan. 7, the language changed to "the primary functions of the FBI are national security and law enforcement. "That has to be some kind of a record," said Kel McClanahan, a Washington-based attorney who alerted FP to the original fact sheet revisions. "Doing this so quickly and so obviously cover your ass-y seems beneath them." For some critics of the U.S. national security state, the FBI's creeping advance into counterterrorism since the 9/11 attacks has come at the cost of investigating other illegal activities such as mortgage fraud, financial fraud, violent crime, and bank robberies. Those critics seized on last week's report as evidence of the FBI's further drift toward counterterrorism. "If the FBI's primary mission is national security,' what's the Department of Homeland Security's mission?" asked the Government Accountability Project's Jesselyn Radack. Others accused the agency of rebranding itself in order to extract more funding from Congress. "How many terror plots are there in this country? Not that many, but that's where the big bucks are," said Cenk Uygur, host of The Young Turks webcast. The article was also picked up by the Drudge Report and the massive link-sharing site Reddit. Bresson said critics were wrongly confusing a small change on a fact sheet with a substantive change in priorities. "You're talking about a fact sheet, not a change in policy," he said. "The FBI's mission today, and throughout the course of our history, has been law enforcement and national security. This may not be the final word on the issue. The fact sheets accompany every response the agency gives to Freedom of Information Act requests. The latest change was discovered by FOIA expert Shawn Musgrave who has already filed a public records request for the internal memos related to the fact sheet revisions. We'll keep you posted.
ISRAEL, URENCO AND STUXNET The truth about Israel's secret nuclear arsenal Israel has been stealing nuclear secrets and covertly making bombs since the 1950s. And western governments, including Britain and the US, turn a blind eye. But how can we expect Iran to curb its nuclear ambitions if the Israelis won't come clean? www.theguardian.com/world/2014/jan/15/truth-israels-secret-nuclear-arsenal The Guardian / by Julian Borger Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 21 2014 Jan 15. Deep beneath desert sands, an embattled Middle Eastern state has built a FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 38 covert nuclear bomb, using technology and materials provided by friendly powers or stolen by a clandestine network of agents. It is the stuff of pulp thrillers and the sort of narrative often used to characterise the worst fears about the Iranian nuclear programme. In reality, though, neither US nor British intelligence believe Tehran has decided to build a bomb, and Iran's atomic projects are under constant international monitoring. The exotic tale of the bomb hidden in the desert is a true story, though. It's just one that applies to another country. In an extraordinary feat of subterfuge, Israel managed to assemble an entire underground nuclear arsenal now estimated at 80 warheads, on a par with India and Pakistan and even tested a bomb nearly half a century ago, with a minimum of international outcry or even much public awareness of what it was doing. Despite the fact that the Israel's nuclear programme has been an open secret since a disgruntled technician, Mordechai Vanunu, blew the whistle on it in 1986, the official Israeli position is still never to confirm or deny its existence. When the former speaker of the Knesset, Avraham Burg, broke the taboo last month, declaring Israeli possession of both nuclear and chemical weapons and describing the official non-disclosure policy as "outdated and childish" a rightwing group formally called for a police investigation for treason. Meanwhile, western governments have played along with the policy of "opacity" by avoiding all mention of the issue. In 2009, when a veteran Washington reporter, Helen Thomas, asked Barack Obama in the first month of his presidency if he knew of any country in the Middle East with nuclear weapons, he dodged the trapdoor by saying only that he did not wish to "speculate". UK governments have generally followed suit. Asked in the House of Lords in November about Israeli nuclear weapons, Baroness Warsi answered tangentially. "Israel has not declared a nuclear weapons programme. We have regular discussions with the government of Israel on a range of nuclear-related issues," the minister said. "The government of Israel is in no doubt as to our views. We encourage Israel to become a state party to the nuclear Non-Proliferation Treaty [NPT]." But through the cracks in this stone wall, more and more details continue to emerge of how Israel built its nuclear weapons from smuggled parts and pilfered technology. The tale serves as a historical counterpoint to today's drawn-out struggle over Iran's nuclear ambitions. The parallels are not exact Israel, unlike Iran, never signed up to the 1968 NPT so could not violate it. But it almost certainly broke a treaty banning nuclear tests, as well as countless national and international laws restricting the traffic in nuclear materials and technology. The list of nations that secretly sold Israel the material and expertise to make nuclear warheads, or who turned a blind eye to its theft, include today's staunchest campaigners against proliferation: the US, France, Germany, Britain and even Norway. Meanwhile, Israeli agents charged with buying fissile material and state-of-the-art technology found their way into some of the most sensitive industrial establishments in the world. This daring and remarkably successful spy ring, known as Lakam, the Hebrew acronym for the innocuous-sounding Science Liaison Bureau, included such colourful figures as Arnon Milchan, a billionaire Hollywood producer behind such hits as Pretty Woman, LA Confidential and 12 Years a Slave, who finally admitted his role last month. "Do you know what it's like to be a twentysomething-year-old kid [and] his country lets him be James Bond? Wow! The action! That was exciting," he said in an Israeli documentary. Milchan's life story is colourful, and unlikely enough to be the subject of one of the blockbusters he bankrolls. In the documentary, Robert de Niro recalls discussing Milchan's role in the illicit purchase of nuclear-warhead triggers. "At some point I was asking something about that, being friends, but not in an accusatory way. I just wanted to know," De Niro says. "And he said: yeah I did that. Israel's my country." Milchan was not shy about using Hollywood connections to help his shadowy second career. At one point, he admits in the documentary, he used the lure of a visit to actor Richard Dreyfuss's home to get a top US nuclear scientist, Arthur Biehl, to join the board of one of his companies. According to Milchan's biography, by Israeli journalists Meir Doron and Joseph Gelman, he was recruited in 1965 by Israel's current president, Shimon Peres, who he met in a Tel Aviv nightclub (called Mandy's, named after the hostess and owner's wife Mandy Rice-Davies, freshly notorious for her role in the Profumo sex scandal). Milchan, who then ran the family fertiliser company, never looked back, playing a central role in Israel's clandestine acquisition programme. He was responsible for securing vital uranium-enrichment technology, photographing centrifuge blueprints that a German executive had been bribed into temporarily "mislaying" in his kitchen. The same blueprints, belonging to the European uranium enrichment consortium, Urenco, were stolen a second time by a Pakistani employee, Abdul Qadeer Khan, who used them to found his country's enrichment programme and to set up a global nuclear smuggling business, selling the design to Libya, FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 39 North Korea and Iran. For that reason, Israel's centrifuges are near-identical to Iran's, a convergence that allowed Israeli to try out a computer worm, codenamed Stuxnet, on its own centrifuges before unleashing it on Iran in 2010. Arguably, Lakam's exploits were even more daring than Khan's. In 1968, it organised the disappea- rance of an entire freighter full of uranium ore in the middle of the Mediterranean. In what became known as the Plumbat affair, the Israelis used a web of front companies to buy a consignment of uranium oxide, known as yellowcake, in Antwerp. The yellowcake was concealed in drums labelled "plumbat", a lead derivative, and loaded onto a freighter leased by a phony Liberian company. The sale was camouflaged as a transaction between German and Italian companies with help from Ger- man officials, reportedly in return for an Israeli offer to help the Germans with centrifuge technology. When the ship, the Scheersberg A, docked in Rotterdam, the entire crew was dismissed on the pretext that the vessel had been sold and an Israeli crew took their place. The ship sailed into the Mediterranean where, under Israeli naval guard, the cargo was transferred to another vessel. US and British documents declassified last year also revealed a previously unknown Israeli purchase of about 100 tons of yellowcake from Argentina in 1963 or 1964, without the safeguards typically used in nuclear transactions to prevent the material being used in weapons. Israel had few qualms about proliferating nuclear weapons knowhow and materials, giving South Africa's apartheid regime help in developing its own bomb in the 1970s in return for 600 tons of yellowcake. Israel's nuclear reactor also required deuterium oxide, also known as heavy water, to moderate the fissile reaction. For that, Israel turned to Norway and Britain. In 1959, Israel managed to buy 20 tons of heavy water that Norway had sold to the UK but was surplus to requirements for the British nuclear programme. Both governments were suspicious that the material would be used to make weapons, but decided to look the other way. In documents seen by the BBC in 2005 British officials argued it would be "over-zealous" to impose safeguards. For its part, Norway carried out only one inspection visit, in 1961. Israel's nuclear-weapons project could never have got off the ground, though, without an enormous contribution from France. The country that took the toughest line on counter-proliferation when it came to Iran helped lay the foundations of Israel's nuclear weapons programme, driven by by a sense of guilt over letting Israel down in the 1956 Suez conflict, sympathy from French-Jewish scientists, intelligence-sharing over Algeria and a drive to sell French expertise and abroad. "There was a tendency to try to export and there was a general feeling of support for Israel," Andre Finkelstein, a former deputy commissioner at France's Atomic Energy Commissariat and deputy director general at the International Atomic Energy Agency, told Avner Cohen, an Israeli-American nuclear historian. France's first reactor went critical as early as 1948 but the decision to build nuclear weapons seems to have been taken in 1954, after Pierre Mends France made his first trip to Washington as president of the council of ministers of the chaotic Fourth Republic. On the way back he told an aide: "It's exactly like a meeting of gangsters. Everyone is putting his gun on the table, if you have no gun you are nobody. So we must have a nuclear programme." Mends France gave the order to start building bombs in December 1954. And as it built its arsenal, Paris solds material assistance to other aspiring weapons states, not just Israel. "[T]his went on for many, many years until we did some stupid exports, including Iraq and the reprocessing plant in Pakistan, which was crazy," Finkelstein recalled in an interview that can now be read in a collection of Cohen's papers at the Wilson Centre thinktank in Washington. "We have been the most irresponsible country on nonproliferation." In Dimona, French engineers poured in to help build Israel a nuclear reactor and a far more secret reprocessing plant capable of separating plutonium from spent reactor fuel. This was the real giveaway that Israel's nuclear programme was aimed at producing weapons. By the end of the 50s, there were 2,500 French citizens living in Dimona, transforming it from a village to a cosmopolitan town, complete with French lyces and streets full of Renaults, and yet the whole endeavour was conducted under a thick veil of secrecy. The American investigative journalist Seymour Hersh wrote in his book The Samson Option: "French workers at Dimona were forbidden to write directly to relatives and friends in France and elsewhere, but sent mail to a phony post-office box in Latin America." The British were kept out of the loop, being told at different times that the huge construction site was a desert grasslands research institute and a manganese processing plant. The Americans, also kept in the dark by both Israel and France, flew U2 spy planes over Dimona in an attempt to find out what they were up to. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 40 The Israelis admitted to having a reactor but insisted it was for entirely peaceful purposes. The spent fuel was sent to France for reprocessing, they claimed, even providing film footage of it being supposedly being loaded onto French freighters. Throughout the 60s it flatly denied the existence of the underground reprocessing plant in Dimona that was churning out plutonium for bombs. Israel refused to countenance visits by the International Atomic Energy Agency (IAEA), so in the early 1960s President Kennedy demanded they accept American inspectors. US physicists were dispatched to Dimona but were given the run-around from the start. Visits were never twice-yearly as had been agreed with Kennedy and were subject to repeated postponements. The US physicists sent to Dimona were not allowed to bring their own equipment or collect samples. The lead American inspector, Floyd Culler, an expert on plutonium extraction, noted in his reports that there were newly plastered and painted walls in one of the buildings. It turned out that before each American visit, the Israelis had built false walls around the row of lifts that descended six levels to the subterranean reprocessing plant. As more and more evidence of Israel's weapons programme emerged, the US role progressed from unwitting dupe to reluctant accomplice. In 1968 the CIA director Richard Helms told President Johnson that Israel had indeed managed to build nuclear weapons and that its air force had conducted sorties to practise dropping them. The timing could not have been worse. The NPT, intended to prevent too many nuclear genies from escaping from their bottles, had just been drawn up and if news broke that one of the supposedly non- nuclear-weapons states had secretly made its own bomb, it would have become a dead letter that many countries, especially Arab states, would refuse to sign. The Johnson White House decided to say nothing, and the decision was formalised at a 1969 meeting between Richard Nixon and Golda Meir, at which the US president agreed to not to pressure Israel in- to signing the NPT, while the Israeli prime minister agreed her country would not be the first to "intro- duce" nuclear weapons into the Middle East and not do anything to make their existence public. In fact, US involvement went deeper than mere silence. At a meeting in 1976 that has only recently become public knowledge, the CIA deputy director Carl Duckett informed a dozen officials from the US Nuclear Regulatory Commission that the agency suspected some of the fissile fuel in Israel's bombs was weapons-grade uranium stolen under America's nose from a processing plant in Pennsylvania. Not only was an alarming amount of fissile material going missing at the company, Nuclear Materials and Equipment Corporation (Numec), but it had been visited by a veritable who's-who of Israeli intelligence, including Rafael Eitan, described by the firm as an Israeli defence ministry "chemist", but, in fact, a top Mossad operative who went on to head Lakam. "It was a shock. Everyody was open-mouthed," recalls Victor Gilinsky, who was one of the American nuclear officials briefed by Duckett. "It was one of the most glaring cases of diverted nuclear material but the consequences appeared so awful for the people involved and for the US than nobody really wanted to find out what was going on." The investigation was shelved and no charges were made. A few years later, on 22 September 1979, a US satellite, Vela 6911, detected the double-flash typical of a nuclear weapon test off the coast of South Africa. Leonard Weiss, a mathematician and an expert on nuclear proliferation, was working as a Senate advisor at the time and after being briefed on the incident by US intelligence agencies and the country's nuclear weapons laboratories, he became convinced a nuclear test, in contravention to the Limited Test Ban Treaty, had taken place. It was only after both the Carter and then the Reagan administrations attempted to gag him on the incident and tried to whitewash it with an unconvincing panel of enquiry, that it dawned on Weiss that it was the Israelis, rather than the South Africans, who had carried out the detonation. "I was told it would create a very serious foreign policy issue for the US, if I said it was a test. Someone had let something off that US didn't want anyone to know about," says Weiss. Israeli sources told Hersh the flash picked up by the Vela satellite was actually the third of a series of Indian Ocean nuclear tests that Israel conducted in cooperation with South Africa. "It was a fuck-up," one source told him. "There was a storm and we figured it would block Vela, but there was a gap in the weather a window and Vela got blinded by the flash." The US policy of silence continues to this day, even though Israel appears to be continuing to trade on the nuclear black market, albeit at much reduced volumes. In a paper on the illegal trade in nuclear material and technology published in October, the Washington-based Institute for Science and International Security (ISIS) noted: "Under US pressure in the 1980s and early 1990s, Israel decided to largely stop its illicit procurement for its nuclear weapons programme. Today, there is evidence that Israel may still make occasional illicit procurements US sting operations and legal cases show this." Avner Cohen, the author of two books on Israel's bomb, said that policy of opacity in both Israel and in Washington is kept in place now largely by inertia. "At the political level, no one wants to deal with it FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 41 for fear of opening a Pandora's box. It has in many ways become a burden for the US, but people in Washington, all the way up to Obama will not touch it, because of the fear it could compromise the very basis of the Israeli-US understanding." In the Arab world and beyond, there is growing impatience with the skewed nuclear status quo. Egypt in particular has threatened to walk out of the NPT unless there is progress towards creating a nuclear-free zone in the Middle East. The western powers promised to stage a conference on the proposal in 2012 but it was called off, largely at America's behest, to reduce the pressure on Israel to attend and declare its nuclear arsenal. "Somehow the kabuki goes on," Weiss says. "If it is admitted Israel has nuclear weapons at least you can have an honest discussion. It seems to me it's very difficult to get a resolution of the Iran issue without being honest about that."
A 'LOST DECADE' SINCE 9/11 Cyberexperts: a 'lost decade' since 9/11 to address infrastructure threats Top critical infrastructure cybersecurity experts, who met in Miami this week, cite a surprising number of control systems that are still exposed to hackers. http://m.csmonitor.com/USA/2014/0117/Cyberexperts-a-lost-decade-since-9-11-to-address-infrastructure-threats Christian Science Monitor / by Mark Clayton Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 20 2014 Jan 17. Cyberexperts now are calling the years since 9/11 a lost decade in which little was done to protect the vulnerable computer-controlled machines that operate critical US infrastructure like the power grid and transportation and financial sectors against malicious software, hackers, and nation-states. Its now become a serious game of catch-up. Threats to the vital digital networks that run substations and transmission lines, chemical plant processes, and air traffic control are growing dramatically, leaving the United States at greater risk than at any time since 9/11, these industrial control system experts say. Yet the vulnerabilities in these industrial cybersystems have never been more widely acknowledged or as well understood in their intricacy, say top critical infrastructure cybersecurity experts, who met in Miami this week. Despite some gains, however, a surprising number of control systems for critical infrastructure are still visible on the Internet and exposed to hackers, lacking even rudimentary digital security. Whats amazing is that, 13 years after 9/11, theres been almost no progress on the devices and equipment that send commands or do the monitoring on these networks, says Dale Peterson, founder of Digital Bond and organizer of the S4 conference. While there's been some limited progress in shoring up security on servers and workstations that store information for these industrial networks, the same can't be said of the huge mass of industrial computerized controllers, switches, valves, instruments, and older legacy gear that were created insecure by design, he adds. "Theyre terribly insecure at a time when threats against them are increasing rapidly." Other top experts point to the rapid development of cyberweapons by more than 30 nation-states, as well as a profusion of new software exploits that make it far easier for nonexperts to hack control systems. For example, Jason Larsen, a researcher at Idaho National Laboratory in Idaho Falls, Idaho, demonstrated a futuristic technique in which attackers could take over control of vital sensors in a power plant without being detected. Such demonstrations show that the development of offensive capabilities is moving ahead rapidly, says Ralph Langner, the German industrial control system expert who was first to identify Stuxnet as a cyberweapon targeting Irans nuclear fuel facilities in 2010. "But we don't see nearly as much investment in defensive systems." The idea of a lost decade is not fiction. Its a fact, he adds. "The worst thing is that this lost decade is expanding." Researchers at the Miami meeting also revealed new means that hackers would probably use in the future to try to wrest control from legitimate operators. Major vulnerabilities continue to be found in areas ranging from critical communications protocols used by the industrial control systems that monitor and regulate digital switches across the power grid to the valves and motors across the water purification sector. Chris Sistrunk, a cybersecurity expert with Entergy, the big New Orleans-based electric utility, teamed FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 42 up with Adam Crain, an industrial control system security expert at the company Automatak, to explain how specialized detection fuzzer software that they had created enabled them to spot previously invisible vulnerabilities in a key communications protocol. That protocol, called DNP3, is widely used by utilities to manage the power grid and water sectors in the US and Australia. Rather than being robust, as previously thought, DNP3 was shown to be rife with vulnerabilities. Any one of those weaknesses could be used by an attacker to gain control of a utilitys master controller, which might oversee hundreds or thousands of devices, and wreak havoc across a utilitys industrial network and the section of the grid it controlled, the researchers said. But the utility industry and control-system and equipment vendors are at least starting to take such vulnerabilities seriously, Mr. Sistrunk says. In fact, the majority of industrial control system companies, when confronted with evidence that the protocol being used in their systems was like Swiss cheese, moved swiftly to patch the vulnerabilities an unusual level of responsiveness from an industry that has sometimes stonily resisted fixing its products, he and other experts say. A lot of similar things were done as far back as 10 years ago, but there was no traction within the industry, Sistrunk says. But we are starting to see, just now in the last few years since Stuxnet some companies have started to decide, hey, we need to make changes. Other glimmers of a shift can also be seen in the increasing number of large control system vendors creating equipment that, for the first time, has serious security features. Moreover, several big industrial control system manufacturers like Siemens and General Electric have created cyber-emergency response teams to fix vulnerabilities. Were serious about developing products that have good cybersecurity in them, says an official with a company that makes digital controllers, who asked to remain anonymous because he was not permitted to speak to the press. Were seeing demand for these devices increase. But one researcher, who also asked for anonymity for the same reason, says that careful analysis of the software code produced by industrial control system vendors shows any perceived gains so far to be tenuous. You would think that the vendor equipment would keep getting better after doing several rounds of testing, but the new software code inside them isnt significantly better than the old code in terms of vulnerabilities, the researcher says. The bug rate has fallen, but quite a number of the vendors are producing bad code like it was 10 years ago. For these and other reasons, Mr. Peterson, Mr. Langner and other thought leaders in the industry are leery of touting the recent evidence of progress. While he rails against government inaction on mandating that companies secure their critical infrastructure, Langner concedes that Obama administration directives have had some limited positive impact, even though he considers them to be far too weak for example, a presidential directive to have the National Institute of Standards and Technology define critical infrastructures standards that could be followed voluntarily by industry. Theres been some movement, but its small compared to the offensive capabilities now being developed, he says. Government-mandated standards developed in recent years by the North American Electric Reliability Corp., an electric utility industry watchdog, have also convinced utilities that they must make some progress in cybersecurity, if reluctantly because of the added cost. Yet the Department of Homeland Security has yet to require that older insecure-by-design systems must be replaced in a time frame of a few years, Peterson says. Instead, government, as well as cybersecurity industry expert apologists, continue to predict that it will take decades to make the transition. You read the articles from industry organizations talking about it, he says. Obama talks about how important it is. Yet no one says we actually have to fix these things. "Its either critical infrastructure or its not. You cant have it both ways.
NSA PHONE PROGRAM PROVIDED 1,000 TERROR TIPS A YEAR TO FBI Newly Declassified Documents Were Released Late Friday http://online.wsj.com/news/articles/SB10001424052702304757004579330971503849030 Wall Street Journal / by Devlin Barrett Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 20 2014 Jan 20. The National Security Agency's phone-surveillance program generated more than 1,000 tips a year to the Federal Bureau of Investigation, according to newly declassified documents. The court documents, released late Friday by the Office of the Director of National Intelligence, are FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 43 frequently repetitive and contain a significant number of redacted sections, but also contain intriguing footnotes suggesting how frequently the NSA's phone program leads to or supplements domestic terrorism probes. U.S. President Barack Obama speaks about the NSA and intelligence agencies surveillance techni- ques in Washington, DC, on Jan. 17. Agence France-Presse/Getty Images In 2006, the phone records program generated an average of two such tips a day, according to a document from November of that year. That would mean more than 700 a year. "With respect to any information the FBI receives as a result of this order (information that is passed or "tipped" to it by NSA), the FBI shall follow minimization procedures,'' the November 2006 document states. A footnote to that statement adds the NSA "expects that it will continue to provide on average approximately two telephone numbers a day to the FBI." The documents show that the following year the estimate jumped to three a day, which would mean more than 1,100 such tips a year. The document were released was part of a pre-existing effort by the Obama administration to reveal where possible more details about how the once-secret phone program works, one part of its defense of the NSA's activities. They were made public just hours after a Friday speech by President Barack Obama that outlined a host of changes to intelligence programs in the wake of revelations from former NSA contractor Edward Snowden. The biggest change the president has called for would be to move the possession of Americans' phone records out of the government to some still-undecided entity. These kinds of details about how the program worksin particular, those that point to its usefulness or otherwise-will be central to the coming debate in Congress about how or whether to implement Mr. Obama's ideas. The documents don't describe the quality of tips provided by the NSA, or how often the FBI launched domestic criminal investigations because of the NSA's information. They do suggest the agency has been active in forwarding investigative suggestions to the FBI. A recent presidentially appointed review of the program found the NSA phone surveillance program had not been essential to preventing attacks. The program's defenders argue it has been an important counterterrorism tool. On Sunday, congressional leaders said they were skeptical of Mr. Obama's proposal to take possession of Americans' phone records out of the government's hands. That is an early indication of how difficult it may be for Mr. Obama to make the changes he has described. Sen. Dianne Feinstein (D., Calif.) told NBC's "Meet the Press" on Sunday that she wasn't sold on the idea of making changes to where the phone data is warehoused. "I think that is a very difficult thing," she said. "The whole purpose of this program is to provide instantaneous information to be able to disrupt any plot that may be taking place." Ms. Feinstein chairs the Senate intelligence committee, and her concerns were shared by her counterpart in the House, Rep. Mike Rogers, who called moving the phone record data out of government hands "a huge problem." Mr. Rogers (R., Mich.) said the president's speech left key issues unresolved. "We really did need a decision on this but what we got was lots of uncertainty,'' he said. The NSA's program is designed to find connections between terror suspects. The program doesn't track the names linked to numbers, but the FBI can find out that information when it is given a number to investigate. The "three a day'' average continued until March 2009, the last time it is referenced in the unredacted portions of the documents. The documents don't offer any clues as to why officials stopped including that estimate. The same year, a secret surveillance court ordered a major review of the program after learning there were significant differences between what it was doing and what government lawyers had previously told the court. In 2010, the court authorizations change again, dropping the previous language about the NSA tipping the FBI, and instead refer to it only as "information.'' An FBI spokesman didn't immediately comment on the documents. Currently, the NSA gathers U.S. phone records from the major phone companies and assembles it in a giant database. The president said that data should no longer be held by the government, and ordered Attorney General Eric Holder to propose a new arrangement. Like many of the ideas contained in his speech, moving the phone data could require passage of new legislation by Congress. What happens there in coming weeks will more than any executive actions determine how far-reaching the NSA revamp will be. The early reaction shows how much remains subject to the political process. The phone companies are opposed to taking responsibility for such a database, and doing so could create new technical challenges, according to intelligence officials.
FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 44 KAREGEYA MURDER CASE AT SENSITIVE STAGE www.sabc.co.za/news/a/7ffae80042970796a636fe56d5ffbd92/Karegeya-murder-case-at-sensitive-stage:-Hawks SABC Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 20 2014 Jan 17. South Africas elite crime fighting unit, Hawks, says their investigation into the murder of Rwandan ex-spy chief, Colonel Patrick Karegeya, is at a sensitive stage. Karegeyas body was found at an upmarket hotel in Sandton on New Years Day. Hawks spokesperson, Paul Ramoloko has denied reports that quoted the Mozambican police's spokesperson, Joao Machava, as saying four people suspected of involvement in the murder had been arrested. Mozambican authorities could not be reached for comment. Ramoloko says the South African police are following up all leads. Our investigation into the death of Karegeya has reached a more sensitive stage. The arrests which are being spoken about in Mozambique do not exist. We are in direct contact with our Mozambican counterparts and we have not made any arrests yet, says Ramoloko. Meanwhile, Karegeya will be laid to rest in Johannesburg on Saturday. Family spokesperson, David Batenga says they would have liked to bury Karegeya in his country of birth, however, there have been issues related to his dual citizenship. He was born in Uganda and grew up there. He later moved to Rwanda, where he was a spy chief. He has been living in South Africa as a refugee since 2008. Ideally, he wouldn't go back to Rwanda for the burial, but we had expected to bury him in Uganda. This never happened because of political issues that are connected between Uganda and Rwanda, says Batenga.
DIE ERMORDUNG VON KAREGEYA Erwrgt im Hotelzimmer Die rtselhafte Ermordung des Ruandischen Exilpolitikers Patrick Karegeya in Sdafrika schlgt Wellen. Der Verdacht richtet sich gegen Ruandas Regierung. http://www.taz.de/!131069/ Die Tageszeitung / by Francois Misser Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 20 2014 Jan 15. Die Leiche lag erwrgt auf dem Hotelbett, das dazugehrige blutverschmierte Handtuch und ein Strick lagen im Safe. Patrick Karegeya hatte offensichtlich nicht Selbstmord begangen, bevor er in der Nacht zum 2. Januar im Hotel Michelangelo Towers im sdafrikanischen Johannesburg tot aufgefunden wurde. Der gewaltsame Tod des 53-jhrigen Ruanders, ehemals ein enger Vertrauter von Ruandas Prsident Paul Kagame und zuletzt einer seiner grten Feinde, schlgt hohe Wellen. Ruandas Botschafter in Sdafrika, Vicent Karega, dementiert zwar, dass seine Regierung irgendetwas damit zu tun htte; aber in Ruandas Hauptstadt Kigali sagte Prsident Kagame am vergangenen Wochenende auf einem US-amerikanischen Prayer Breakfast, ohne Namen zu nennen: Man kann nicht Ruanda verraten und damit durchkommen. Es hat Konsequenzen, wenn man sein Land verrt. Ruandas Regierung benutzt Karegeyas Tod als Warnung an Dissidenten. Der ruandische Botschafter in London, William Nkurunziza, bezeichnete Karegeya als Staatsfeind. Er kannte alle Geheimnisse der RPF Karegeya ist in Ruandas Geschichte eine Schlsselfigur. Niemand, auer Prsident Paul Kagame selbst, kannte so viele Geheimnisse der regierenden ehemaligen Tutsi-Guerilla RPF (Ruandische Patriotische Front), die Ruanda seit Beendigung des Vlkermords an den Tutsi 1994 regiert. Mit RPF- Fhrer Kagame lebte er einst im ugandischen Exil; von 1994 bis 2004 leitete er Ruandas Auslands- geheimdienst bis zu seiner Verhaftung wegen Ungehorsam und dem Entzug seines Rangs als Oberst. Karegeya fand zunchst Zuflucht in Uganda, bevor er 2007 Asyl in Sdafrika erhielt. Zu ihm stie drei Jahre spter ein anderes in Ungnade gefallenes ehemaliges Mitglied des engsten ruandischen Machtzirkels: Exgeneralstabschef Faustin Kayumba Nyamwasa. General Kayumba fiel im Juni 2010, whrend der Fuball-WM, beinahe einem Anschlag zum Opfer und machte anschlieend Ruandas Regierung dafr verantwortlich. Ein sdafrikanischer Ermittler sagte spter aus, ein ruandischer Geschftsmann habe ihn bestechen wollen, nachdem ruchbar geworden war, dass er die sechs mutmalichen Tter bezahlt habe. Kein Wunder, dass der Mord an Karegeya nun einen hnlichen Verdacht erregt.
FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 45 Nach seinem Tod das Handy benutzt Nach Angaben seines Neffen David war Patrick Karegeya am Silvesterabend mit einem alten Freund verabredet: mit Appolo Kiririsi Gafaranga, einem Geschftsmann, den er noch aus Ruanda kannte. Als Karegeya am nchsten Tag nicht ans Telefon ging, holten Freunde seinen Neffen, und der fand die Leiche, aber nicht Karegeyas drei Handys und auch nicht das von Kiririsi. Nach einem Bericht des franzsischen RFI-Rundfunks hat jemand Karegeyas Mailbox zwei Tage nach seinem Tod geffnet. Kiririsi ist verschwunden und wird in Sdafrika als Zeuge gesucht. Ruandas Exilopposition ist nun davon berzeugt, dass Kiririsi auf Karegeya angesetzt wurde. Seit Jahren verdchtigt Ruandas Regierung Karegeya und Kayumba, aus dem sdafrikanischen Exil heraus Verbindungen zu den ruandischen Hutu-Milizionren der FDLR (Demokratische Krfte zur Be- freiung Ruandas) im Kongo zu unterhalten, um einen bewaffneten Kampf in Ruanda zu beginnen. Ihre Organisation RNC (Ruandischer Nationalkongress) ist nach eigenen Angaben mit der nicht zuge- lassenen ruandischen Oppositionspartei FDU (Vereinigte Demokratische Krfte) verbndet, deren Fhrerin Victoire Ingabire vor Kurzem in Kigali wegen Verschwrung zu 20 Jahren Haft verurteilt wur- de; mehrere Mitangeklagte hatten vor Gericht bekannt, zur FDLR zu gehren. Untergrundarmee mit UN-Geldern? Geld fr den Aufbau einer Untergrundarmee knnte Karegeya, wie vor Jahren ugandische Medien berichteten, ber einen UN-Beratervertrag im Umfang von 4 Millionen Dollar zur Anwerbung privater Sicherheitskrfte zum Schutz der bergangsregierung von Somalia erworben haben ein Auftrag, den der Ruander gemeinsam mit seinem ugandischen Geschftspartner Salim Saleh, Halbbruder des ugandischen Prsidenten, ergattert haben soll. Man kann angesichts dessen nachvollziehen, warum Ruandas Regierung weder Sdafrika noch der UNO traut und schon gar nicht der sdafrikanisch dominierten neuen UN-Eingreifbrigade im Ostkon- go, die letztes Jahr die mutmalich von Ruanda untersttzten M23-Rebellen besiegte. Alles deutet darauf hin, dass Kigali vom Mord an Karegeya zumindest profitiert. Dennoch gibt es kei- nen eindeutigen Beweis seiner Tterschaft. Es ist wahr, dass ruandische Oppositionelle im Exil hufig zu Tode kommen. Aber von Ruandas ehemaligem Oberspion wrde man erwarten, dass er alle Tricks kennt. Am Samstag wird Karegeya in Sdafrika beerdigt.
UK DEPORTS TAIWANESE INTELLIGENCE AGENT AFP www.sinodaily.com/reports/UK_deports_Taiwanese_intelligence_agent_government_999.html Sino Daily Stringer: Frank Slijper / Campaign Against Arms Trade / Groningen NL / frank.slijper@hetnet.nl Jan 20 2014 Jen 19. A young Taiwanese military intelligence officer who had been on the country's 'wanted' list after failing to return from an overseas trip has been deported by the British authorities, the government said. Yeh Mei, a lieutenant with Taiwan's Military Intelligence Agency was deported on Saturday for overstaying her visa and escorted to Taiwan by British personnel, the Taiwanese foreign ministry said in a statement. "Upon arrival, Yeh was taken to Taichung by officials from the prosecutors' office there," it said in a statement, referring to the city in central Taiwan where she had served her duty before taking an overseas sightseeing trip and going AWOL in June 2012. The ministry did not provide further details, but an investigation bureau officer familiar with the legal process told AFP that she expected Yeh to be placed in custody for questioning. Local TVBS news network showed Yeh, reported to be 33, being escorted by security officials upon her arrival at the airport. She covered her head with a jacket as she was handcuffed and taken away. Yeh had been put on a wanted list by a local court after she failed to return for duty after an overseas trip. She told the Taipei-based Apple Daily that her colleagues had been hostile to her and her repeated attempts to drop out had been rejected by her boss. She had claimed that she could be sentenced to death and sought political asylum with the British authorities, but the bid was rejected, foreign ministry officials said. When Yeh first disappeared, there was speculation in Taiwan's media that she may have joined China's spy network. But the country's Military Intelligence Agency has attributed Yeh's disappearance to 'personal factors'. China still claims Taiwan as part of its territory awaiting reunification, by force if necessary, even though the two sides have been governed separately since the end of a civil war in 1949. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 46 Ties have improved markedly since Ma Ying-jeou of Taiwan's China-friendly Kuomintang party came to power in 2008. But the former arch-rivals still spy on each other. In 2012 Taiwan's top court rejected an appeal by former army general Lo Hsien-che, who was jailed for life in the toughest punishment meted out in an espionage case in decades. He was suspected of handing over to China information relating to a project that gave the Taiwanese military some access to US intelligence systems
BEYOND SNOWDEN: A NSA REALITY CHECK http://www.worldaffairsjournal.org/article/beyond-snowden-nsa-reality-check World Affairs Journal / by Michael V. Hayden [Director of the CIA from 2006 to 2009] Stringer: Martin Rudner [ret.] / Carleton University / Ottawa / www.carleton.ca/cciss Jan 19 2014 Jan-Feb. The October 10, 2013, edition of many American papers featured a photo of fugitive NSA contractor Edward Snowden in Russia, surrounded by former NSA executive Thomas Drake, former FBI agent Coleen Rowley, and former CIA analyst Ray McGovern. The three former government officials were in Russia to present Snowden with something called the Sam Adams Award for Integrity in Intelligence. All three had previously won the award themselves, along with WikiLeaks founder Julian Assange and Katharine Gun, a translator for the British intelligence agency GCHQ who alleged NSA plans to tap the communications of UN members in the run-up to the Iraq War. A week earlier, I had been a panelist at a Washington symposium on Snowden. At that session, moderator David Ignatius pointed out that Snowden was on the short list for the European Parliaments Sakharov Prize for Freedom of Thought. I couldnt help but say, I must admit, in my darker moments over the past several months, Id also thought of nominating Mr. Snowden, but it was for a different list. While many Americans applaud Edward Snowdens leaks, many have also unwisely discounted the essential role that intelligence plays in the nations security, as well as the perils of such leaks. That comment lit up the blogosphere as supporters of Snowden accused me of wanting to put him on a kill list. That thought was far from my mind. But it showedas did the awards he has been nominated for and receivedthat Snowdens revelations have struck a very deep chord in global thought. While the new head of Britains MI-5 warns that Snowdens revelations are a gift to terrorists, for instance, ACLU Executive Director Anthony Romero believes that Edward Snowden has done this country [the US] a service. The depth of feeling was shown in a House of Representatives vote in July where nearly sixty percent of Democrats and forty percent of Republicans voted to defund the NSA metadata program that Snowden had revealed. The program survived by a mere twelve votes. Despite continuing debates over debt limits and government shutdowns, the reach of NSA surveillance has become a hot and enduring topic. And foreign leaders are weighing in on the scope of alleged NSA activities against them. Snowdens disclosures no doubt accelerated and intensified this discussion, but it had long been coming. By the late 1990s, the NSA was well aware that legitimately targetable foreign communications (like Soviet high command transmissions to ICBM units) were no longer confined to isolated adversary networks. It knew, too, that modern targets (like al-Qaedas e-mails) coexisted with innocent and even constitutionally protected messages on integrated global communication networks. The NSA knew that it would never get the power, legally or technically, to acquire the one unless it could show it had the discipline to respect and protect the other. The dilemma only got more acute with the events of 9/11, when the enemy demonstrated that he was already inside the gates, and even when not physically in the country, terrorists made use of e-mail accounts whose servers were here. The changes in technology and the appearance of new adversaries to go along with old ones, who continued to pose problems, was accompanied by cultural shifts on matters of transparency and espionage, particularly where they touched on the digital privacy of a new generation of Americans. At one point while at the CIA, I asked members of our civilian advisory board to examine whether or not they believed America would be able to conduct espionage in the future inside a broader political culture that every day seemed to demand more transparency and more public accountability from every aspect of national life. When they reported back to me a few months later, they said that they werent sure. The coming debate Edward Snowden accelerated will no doubt be consumed with talk about whether FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 47 or not the NSA should keep metadata (the call records but not the content) of American phone calls for five years or fewer or not at all. And there will be heated discussion about when and how and by whom this data should be accessed. There will be passionate calls for an ombudsman of some type for the FISA court, and there will be demands that the proceedings and decisions of that tribunal be made more public. Foreign leaders will continue to insist on explanations of American activities, and even on guarantees that they will not be repeated. All of these matters are important in their own right, and decisions on each could carry weighty consequences for both freedom and security. But it is also true that these questions are just symptoms of a much larger issue: the future of espionage and, specifically, the future of American espionage. What will US spies be expected to do? What will they be allowed to do? How will the governed give their consent in these weighty issues? In short, the stakes are even higher than some people imagine. So this debate should proceed carefully. Sweeping charges, bumper sticker explanations, score settling, demagoguery, and outright ignorance have characterized this discussion so far. The consequences of such irresponsibility, intended and otherwise, will be far-reaching. With that in mind, let me offer some thoughts about things we would be wise to keep in mind as we go forward. There is no pretense here to provide answers to the debate but it is my hope that all the stakeholders here, including the broad American public, will make sure that they are aware of all the factors bearing on the problem as the conversation we are now fated to have takes place. Context matters. Mike Rogers, chairman of the House Intelligence Committee, points out that this debate could not be coming at a worse time, given that we are in the middle of a perfect storm of public concern over government overreach. Hes right. Questions about NSA data gathering are coming fast on the heels of accusations of the IRS scandal and FBI overreach in gathering the call records of the Associated Press and labeling a Fox News reporter as a co-conspirator in a case brought under the Espionage Act. The respected editor Len Downie recently filed a scathing report for the Committee to Protect Journalists labeling the current administration as the most intrusive and controlling since the Nixon years, with a significant uptick in reporters sources fearing they will be tracked by government surveillance. President Obama has also been aggressive in using his executive authority to enact regulations rejected by Congress, to make recess appointments when Congress does not consider itself to be in recess, and to override the views of the Department of Defense in defining US war making in Libya so that it will not be considered a war under the War Powers Act. Defenders of NSA surveillance, which is now seen as just one more element in this perfect storm, will be battling uphill in this environment, especially if the public is not able to dissociate this activity from other offenses, real or imagined. Put another way, a balanced discussion is going to be hard and extraordinary effort will be required if metadata collection and programs like PRISM, XKeyscore, Boundless Informant, and others revealed by Snowden are to be judged on their merits and not merely swept away by the broader politics of the day. And for a fact-based discussion to have any chance of taking place, the administration and the intelli- gence community are going to have to be very forthcoming with facts, far more than they traditionally have been. Director of National Intelligence James Clapper and NSA Director Keith Alexander seem to know this. Data is being posted on a new website, redacted FISA court opinions are being made public, and General Alexander (in particular) has been effectively speaking to public audiences. But the intelligence community has enormous distance to make up in this effort. The Guardian of London and several American newspapers have rolled out charge after charge, catching the administration flatfooted because it chooses to respond through a cumbersome interagency vetting process that often produces answers that are tepid, tardy, or stripped bare of content. Meanwhile, media coverage of the scandal is ever escalating and always reaching for more sensational revelations. A Guardian headline in July ominously and hyperbolically described NSAs XKeyscore program as collecting nearly everything a user does on the Internet. The Los Angeles Times, USA Today, and the Washington Post all enthusiastically followed up on a September screecher by Glenn Greenwald, Laura Poitras, and Ewen MacAskill, also in the Guardian: NSA Shares Raw Intelligence Including Americans Data with Israel. Another page-one headline in the August 15th edition of the Washington Post screamed that the NSA was breaking privacy rules thousands of times per year. I parsed the data for that one in a short FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 48 piece for USA Today and pointed out that: All of the incidents were inadvertent; no one claims that any rules were intentionally violated. All of the incidents were discovered, reported, and corrected by NSA itself. Fully two-thirds of the incidents were comprised of roamers legitimately targeted foreigners who were temporarily in the US (and thus temporarily protected by the Fourth Amendment). Picture a cellphone call, not collected in the air in the US, but made by such an individual that is routed back to its home network before heading to its intended recipient. It looks every inch like a foreign call and is collected as such, until something in the calls content or the physics of the intercept suggests that its origins are herethen collection is stopped and the inadvertent collection (the privacy violation) reported. Other violations included database queries, searches of data already collected. The document the Post relied on reveals that in one quarter, there were one hundred and fifteen incidents of queries being incorrectly entered, mistakes like mistyping or using too-broad search criteria. Thats one hundred and fifteen out of sixty-one million inquiries. The backstory on the USA Today op-ed is instructive. The Post broke its story on Thursday. USA Today wanted to run its point-counterpoint editorial the following Monday. They invited the NSA to write the contrary view, an opportunity that the agency eagerly accepted. By late Saturday night, though, the agency despaired of getting interagency clearance for its response and the newspaper then turned to me. I wrote the piece on Sunday morning and had it cleared for classification that afternoon. That the NSA was prevented from doing the same thing, especially given the destructive paranoia about intelligence gathering abroad today, is beyond explanation. There are reasons to keep some things secret but, in the current climate, the sum of individually defensible classification decisions is creating a lack of public confidence in the intelligence communitys lawfulness. The community will have to show more transparency, in effect trading a measure of operational impact in return for building a national consensus in support of its activities. Another surprising aspect of the NSA debate is who is and who is not participating in it. The most vocal supporters of the NSA program are in Congress (as are, admittedly, its most vocal critics). The chairs and ranking members of the two intelligence oversight committees have been steadfast in their public explanation and defense of the agencys efforts. House Chairman Mike Rogers has been particularly active in describing and defending both the NSAs activity and his committees oversight of it. Rogers, along with his senior Democrat, Dutch Ruppersberger, and their colleagues on the committee, have come in for their own share of criticism. Justin Amash, a Republican from Michigan (like Rogers), recently bashed the committee as the enemies of Congress...covering up for the administration. The same syndrome can be seen on the Senate side, where Dianne Feinstein and Saxby Chambliss (chair and vice chair of the Senate Intelligence Committee) have been equally supportive of the NSA and equally criticized for this support. They were likely among the targets of Senator Ron Wydens recent condemnation of defenders of the status quo and the business as usual brigade, the Oregon Democrats description for intelligence officials and their supporters. That Wyden is a member of the Senate Intelligence Committee and has received secret briefings made the remark even more stinging. There are members of the executive branch who are (or should be) even more knowledgeable than Congress, and their silence has been puzzling. If Vice President Biden has made any public defense of the NSA, I must have missed it. The secretary of defense, for whom the NSA director works, has said little, and officials like the national security adviser and the secretary of state, who actually help set intelligence requirements and receive reports based on that tasking, have been silent. Where do they think this stuff comes from? The president has actually defended the NSA...to a point. Shortly after the Snowden debacle began in June, he took a single question right before meeting Chinese President Xi Jinping in California. His extemporaneous response about NSA activity was carefully crafted, technically accurate (not an easy matter), and constituted a calm but forcefully given defense of the agency and its programs. The president continued his response to query defense in interviews with CNN and with Charlie Rose, supporting NSA efforts along lines similar to those he laid out in California, although he was now admitting that the capabilities of the NSA are scary to people. By September, when he was asked a question before a foreign audience in Sweden, the presidents response was a bit more apologetic and defensive. He appeared to be willing to walk back some of the support he had given and took pains to point out repeatedly that ...what Ive said domestically and what I say to international audiences is...just because we can do something doesnt mean we should do it. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 49 On matters such as these, intelligence professionals believe that they have a social contract with their government, that when they do these lawful but politically edgy things, someone will have their back. I suspect, for instance, that when President Bush launched the metadata program in 2006, and the PRISM effort in 2008, he told General Alexander to take these authorities and defend America. Im sure he added that if they ever became politically contentious, it would be his job, not Alexanders, to defend the agency. (Im sure, because this is exactly how President Bush dealt with the programs for which I was responsible.) When President Obama embraced these efforts in 2009, he embraced that social contract as well, even though it might be more difficult for him to fulfill it because it would cut against his base more than it would have for President Bush. More difficult because such seemingly intrusive surveillance also cuts against the narrative of al-Qaeda is on the run and the tide of war is receding. Its also made more difficult by the presidents 2008 campaign, which sought to put distance between himself and the actions of the Bush administration. There is no doubt he intended to be judgmental in his first inaugural when he said, As for our common defense, we reject as false the choice between our safety and our ideals. Compare that to his June explanation of NSA activities: But I think its important for everybody to understand...that there are some trade-offs involved. ...you cant have a hundred percent security and also then have a hundred percent privacy and zero inconvenience. You know, were going to have to make some choices as a society. The later statement is certainly true and it doesnt necessarily contradict the earlier one, but overall there has been a disappointing silence from the administration, leaving General Alexander and Director Clapperwhen they are permitted to speakstrangely alone. Some of the most irritated (and irritating) responses to the Snowden revelations have come from abroad, from national leaders complaining about real or imagined intrusions by NSA collection programs. So many foreign leaders, or intelligence heads acting on behalf of foreign leaders, have come to Washington to seek explanations that there were scheduling challenges for a while. Lets be clear. Espionage is an accepted international practice and the US Constitutions Fourth Amendment protection against unreasonable search is not an international treaty. Actually, President Obama nailed it when he noted in Sweden that some of the folks who have been most greatly offended publicly we know privately engage in the same activities directed at us.... And he got to the heart of the matter when he pointed out that even though we may have the same goals, our means are significantly greater. But it is also clear that the administration is rethinking how the NSA targets global communications. In addition to the just because we can doesnt mean we should meme, the president admitted that there were questions in terms of whether were tipping over into being too intrusive with respect to theyou know, the interactions of other governments. In response to specific allegations of spying against Brazil and Mexico, President Obama was conciliatory. In a statement made from St. Petersburg during his Russia visit, he said: I understand the concerns of the Mexican and Brazilian people, and that we will work with their teams to resolve what is a source of tension. Clearly, there is necessarily at least a little theater involved here. Public allegations of specific espionage require victims to be outraged. They also require perpetrators to look into the matter. More troubling was Mexican President Pea Nietos report, based on a personal conversation, that President Obama promised to apply corresponding sanctions (apparently to the intelligence community) if the allegations proved true. Let me put this in the starkest possible terms. American signals intelligence is limited by the demands of the Fourth Amendment and defined by the demands of American security. Absent political guidance to the contrary, if you are not protected by the US Constitution, and your communications contain information that would help keep America free and safe, information that would not otherwise be made available to the US government, then game on. Your privacy is simply not the concern of the NSA director. When I was at the NSA, I received my fair share of political guidance to stand down on certain efforts, but all the parties seemed to agree that we should be careful not to overachieve here. American intelligence suffered mightily in the 1990s when human intelligence collectors were told to stand down and not talk to bad people. We would create the same effect again if we now tell signals intelligence collectors they cannot listen to good people. The president has launched a review group to assess whether American technical collection appropriately accounts for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. The group has strong leadership, but there are lingering fears within the intelligence community that its report will be used to walk back current protocols for data FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 50 collection. It may be tough for us to stand our ground. The president has undoubtedly been embarrassed by some of these revelations, and his administration at times even seems surprised by the extent of NSA activities. Publicly, both the president and his administration have taken a beating, especially in Europe. Coming on top of drones and targeted killings, the NSA story may have ended the European love affair with President Obama. An embittered contributor to Der Spiegel put it this way: If this happened during the administration of George W. Bush, we could at least think, Its just Bush....There is a better Ameri- ca. Now we know: There is only one America. I hope hes right. In the most iconic scene in one of Americas most iconic movies, High Noon, Marshal Will Kane, played by Gary Cooper, throws his badge into the dust as he prepares to abandon the ungrateful town he has defended for years. Kane had sought the support of the townsfolk as murderous Frank Miller and his gang descended on them. He got no such support; they even objected to his standing up against the gang on his own, as it might endanger them. Still Kane went into harms way, refusing to flee, finally killing Miller and his henchmen. In the last scene, the townsfolk are almost tripping over themselves to congratulate and praise Kane for his heroism. He stares them down, removes his badge, and climbs aboard a buckboard driven by his new wife (Grace Kelly) and heads out of town. The folks at Fort Meade today have to feel a little bit like Will Kane. They dont seem to be getting much help against the current threats to them. House Intelligence Chairman Mike Rogers summed it up pretty well at a recent panel, noting that the United States had the only intelligence services on the planet that are under siege from its adversaries and from its internal support system, the citizens of the United States. It should trouble all Americans when the NSA director and his deputy feel it necessary to send a letter to the families of all NSA officers to assure them that their loved ones are heroes, not criminals. There is no doubt that these are difficult issues, and the fundamental questions brought on by new technologies and new enemies remain to be resolved. But the NSA played by the rules. Its actions were anchored in statute (the 2006 renewal of the Patriot Act and the 2008 FISA Amendment Act), briefed to all members of the congressional committees, and overseen by an unprecedented level of court supervision. And yet a New York Times op-ed casually leads with the headline The Criminal NSA. Even President Obamas efforts to defend the agency have had a pointed edge at times. At an August press conference, the president praised the men and women of the intelligence community as patriots and then, understandably and correctly, characterized those who have raised their voices against various NSA programs as patriots, too. Fair enough, in some general rhetorical sense. But to the people at Fort Meade, the presidents words just equated his own workforce with those who routinely accuse that same workforce of felonies. That doesnt go down easily. Perhaps what is missing here is a personal touch. When President Obama released CIA interrogation memos in 2009, an event that David Ignatius equated to a car bomb going off in the driveway, the president visited Langley. A visit to Fort Meade today, to thank and support an embattled and routinely traduced workforce, would be almost sacramental in its character, delivering both sign and substance of the presidents commitment. It would also set a precedent. In the sixty-one-year history of the NSA, no Democratic president has ever visited the agency. There are a lot of risks involved in the controversy that Edward Snowden started. The greatest of all, perhaps, is the impact of an uninformed blizzard of accusations on the morale of our intelligence workers. The last thing the nation needs is for this community to ride out of town with the Frank Millers of today still standing.
CANADIAN EAVESDROPPING REVIEW NSA leaks prompted major Canadian eavesdropping review www.vancouversun.com/news/leaks+prompted+major+Canadian+eavesdropping+review/9400685/story.html#ixzz2s6uYPHut Vancouver Sun / by Jim Bronskill Jan 18 2014 Jan 17. The massive intelligence leak by former U.S. spy contractor Edward Snowden prompted Canada's secret eavesdropping agency to review its policies on sharing information with the FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 51 Americans and other key partners, a newly declassified memo reveals. The three-page note from Communications Security Establishment Canada chief John Forster says the unprecedented breach also sparked a CSEC examination of its practices for protecting the privacy of Canadians. The undated memo to national security adviser Stephen Rigby obtained by The Canadian Press under the Access to Information Act was prepared some time in mid-2013, after Snowden's leaks began making global headlines. The memo, originally classified top secret, says CSEC set about assessing the potential damage to Canadian signals intelligence collection capabilities, as well as asking its partners for confirmation on what data Snowden took from the U.S. National Security Agency. The highly sensitive material showed the NSA had quietly obtained access to a broad spectrum of emails, chat logs and other information from major Internet companies, as well as data about a huge volume of telephone calls. CSEC, the NSA's Canadian counterpart, monitors foreign computer, satellite, radio and telephone traffic for information of intelligence interest. With a staff of more than 2,000 including skilled mathematicians, linguists and computer specialists CSEC is a key player in the so-called Five Eyes community comprising Canada, the United States, Britain, Australia and New Zealand. "In collaboration with domestic and international partners, CSEC is undertaking an organization-wide operation to assess the impacts of these unlawful disclosures of classified information," says the memo, portions of which remain secret. "Due to the unauthorized disclosures CSEC has developed an ongoing damage assessment, initiated external and internal communications strategies and introduced preventative measures to mitigate the potential of future damage." A section on Forster's initial assessment of the damage is blacked out. In addition to liaising with its Five Eyes partners, the spy agency briefed a committee of deputy ministers on the fallout and arranged a series of bilateral meetings with the Privy Council Office (where Rigby works), Foreign Affairs, the Canadian Security Intelligence Service and the RCMP. The Ottawa-based CSEC held two briefings for staff members, along with specialized sessions, and took steps to "remind them of security protocols and provide guidance and support where appropriate," the memo says. "CSEC is also reviewing internal policies related to information sharing with the Five Eyes as well as the protection of the privacy of Canadians to ensure that they are appropriate and clear." CSEC spokeswoman Lauri Sullivan said Friday the agency "continues to review its policies, processes and procedures to ensure they are effective, and to ensure that CSE is taking the appropriate steps to protect information and the privacy of Canadians." The CSEC memo's release came as U.S. President Barack Obama announced changes Friday to NSA practices with the aim of reassuring Americans their civil liberties will not be trampled. At the time of the Forster memo, there had been no direct mention of CSEC in any of the stories spawned by Snowden's cache of documents. However, material later disclosed by the whistleblower indicated that Canada helped the United States and Britain spy on participants at the London G20 summit in 2009. Other documents suggested CSEC once monitored Brazil's department of mines and energy. Articles based on Snowden's material continue to appear in the media. Forster told Rigby the electronic spy agency so low-profile it is still unknown to many Canadians was exploring ways to better inform the public about what it does, including its efforts to prevent terrorism and cyber-attacks. CSEC has since posted new information on its website about how the agency functions. "CSEC will also keep employees informed as its damage assessment and forensic work unfold," the memo says.
TOP SECRET NSA SLIDES AND SMS http://cryptome.org/2014/01/nsa-sms-exploit.pdf Cryptome Jan 18 2014 Fringe: Use the URL
FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 52 SOCIAL NETWORK ANALYSIS IN INTELLIGENCE http://www.e-ir.info/2014/01/09/the-potential-of-social-network-analysis-in-intelligence/ E-International Relations / by Kristan J. Wheaton and Melonie K. Richey [Kristan J. Wheaton is an Associate Professor at Mercyhurst University whose research focuses on the intersection of games-based learning and intelligence analysis; he teaches the use of social network analysis and its application to traditional intelligence problems. Melonie K. Richey is a graduate student at Mercyhurst University who is currently participating in IARPAs Sirius Project. Her current research focuses on exploring the viability of tabletop games in the intelligence classroom and on modeling and simulating the Syrian refugee crisis by combining principles of social network analysis, geospatial analysis and military techniques designed to understand how terrain impacts the movements of enemy forces.] Jan 18 2014 Jan 9. The legality of the National Security Agencys (NSAs) use of US citizens metadata to identify and track foreign intelligence organizations and their operatives is currently a subject of much debate. Less well understood (and consequently routinely misreported) are the capabilities and limitations of social network analysis, the methodology often used to evaluate this metadata. One of the first causes of confusion is definitional. Social network analysis is often linked to an in- appropriate degree with social media. True, social media such as Facebook and Twitter are frequently used as rich data sources for social network analysis, but understanding the importance of networks in the affairs of states has been around at least since Machiavelli.[1] In addition, the first modern version of what would come to be called social network analysis was de- veloped not by an intelligence agency or computer scientist but by Columbia professor and psycho- sociologist, Jacob Moreno, in 1934. These sociograms, as Moreno called them were used to graph individual preferences or relations within a small group. Little did Moreno suspect that his method for understanding the relationships between people, when combined with graph theory and the processing power of computers, would allow for the detailed ana- lysis of thousands of people or organizations with hundreds of thousands of connections between them (See Fig. 2). [2]
Figure 2 Modern social network analysis uses powerful computers and graph theory to map out the relationships between thousands of nodes and hundreds of thousands of links. Shown here is the network of the over 6000 Twitter users who follow the Twitter handle of the American Nuclear Society along with their over 200,000 connections. (Image Source: Melonie Richey) Along with the undeniable power of this type of analysis comes the inevitable (and justified) concerns for privacy and constitutionality. But just how powerful is social network analysis? What can intelligence agencies actually glean from the exabytes of data they are purportedly collecting? FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 53 Social Network Analysis, as an analytic method, has inarguable applicability to the field of intelligence and is progressively reshaping the analytic landscape in terms of how analysts understand networks. For example, analysts currently use SNA to identify key people in an organization or social network, develop a strategic agent network, identify new agents and simulate information flows through a network. Beyond this, SNA can be easily combined with other analytic practices such as Geographic Information Systems (GIS), gravity model analysis or Intelligence Preparation of the Battlefield (IPB) to create robust, predictive analyses. Identifying Key People/Organizations in a Network The most obvious use of SNA is its ability to identify key actors and entities within a network. Centrality measures within a network are means for measuring a nodes relative importance within the network. [3] It is well-accepted that the ability to measure centrality in social networks has been a particularly useful development in social network analysis. What is more interesting, however, is the number of centrality measures that social network analysts use to reveal different things about how key actors interact within a network. [4] For example, a node with a high degree centrality is connected to many other nodes. In Figure 3 below, it is unsurprising that the American Nuclear Society (ANS) has the highest degree centrality in its own Twitter network. However, a node with a high betweenness centra- lity is one that connects the cliques in the network. Figure 4 shows the same ANS network, reconfi- gured and revisualized with an emphasis on betweenness, with a new node, Nuclear.com, emerging as the most important.
Figure 3 (Image Source: Melonie Richey)
FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 54
Figure 4 (Image Source: Melonie Richey)
For example, by analyzing the network in accordance with different centrality measures and establish- ing filtering criteria (and using Carnegie Mellons ORA software), [5] we were able to reduce a network representing the entire nuclear energy and non-proliferation communities on Twitter (6000+ nodes and 200,000+ links) to the 19 most influential individuals within that network (See Figure 5). These indivi- duals are the nodes that would be able to disseminate information to the majority of the network within a matter of hours. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 55
Figure 5 (Image Source: Melonie Richey) Identifying New Agents Another traditional intelligence activity that could benefit from SNA is identifying potential new agents people or organizations who might be willing or able to provide information to an intelligence agency. For example, by using Twitters list feature, which allows users to establish lists of people to follow for particular purposes and some simple cross-referencing techniques, we were able to identify 50 highly reputable individuals and organizations talking about strategic mining and minerals on Twitter [6].
Figure 6 (Image Source: Melonie Richey) FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 56 While such a use by intelligence agencies may seem Orwellian, it is similar to techniques currently used in business to identify potential customers. Likewise, a similar algorithm likely supports various friend/colleague recommendation engines such as LinkedIns People You May Know feature. Simulating Information Flows Of all the capabilities of SNA, simulations are likely one of the most useful. Carnegie Mellons ORA, for example, provides four main kinds of simulations in order to demonstrate how money, information, disease or technology would move through a network. Pathway simulations locate the most direct or indirect routes from one node to another. Still other simulations also indicate how a network would react to the removal of any particular node or set of nodes (for example, how a decentralized terrorist network such as the Taliban would function if the leaders from two key cells were killed).
Figure 7 (Image Source: Melonie Richey) As an example of this feature, Figure 7, shows the effect of providing a highly relevant piece of infor- mation to the 19 individuals identified in the Twitter network of nuclear specialists discussed above. The dots, representing individuals and organizations on Twitter, get larger and change color as the information flows throughout the system. Variables within the simulation allow researchers to alter the level of interest the network likely has to a particular piece of information (the informations virality). Combining SNA with Other Methods These simulations and other features of SNA provide idealized analyses that can then be combined with other techniques, such as GIS. Networks within ORA and many other SNA tools can be visualized geospatially if coordinates are provided for each node. Running simulations through these networks can then be represented on a map much like the simulation of Syrian refugee population movement throughout Turkey shown in Figure 8. This, in turn, allows for powerful predictive analytics. Figure 9 reflects the outcome of the simulation in Figure 8; not only does the image represent reality (the known locations of Syrian refugees according to the UN), [7] it also predicts where refugees are likely to move within the next 12 to 24 months. This analysis employed SNA as the cornerstone analytic technique in conjunction with GIS and even includes ideas from the more traditional intelligence methodology of Intelligence Preparation of the Battlefield. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 57
Figure 8 (Image Source: Melonie Richey)
Figure 9 (Image Source: Melonie Richey) Caveat Emptor Like all analytic techniques, SNA is imperfect and comes with a number of caveats for researchers new to the method. SNA, while widely applicable, is by no means universally applicable. For example, in early 2013, one of the authors sought to use SNA to locate terrorists using social media. SNA and social media seemed like a good place to start, even though it seemed unlikely that many such individuals would self identify as a radical extremist or Al-Qaeda affiliate. Ultimately though, the effort failed because there was just too much of what social network analysts like to call white noise, or extraneous information picked up through a comprehensive scraping of the Internet. Our search for radical extremists returned journalists, university students of international relations and politics, and a slew of ordinary people just keeping up with current events and Tweeting about it. Another issue with SNA has to do with the nature of relationships. In the real world, they are often messy and convoluted. Just because two people work together and do so often, does not necessarily mean that they like each other. Similarly, the best way to describe the relationship between two busi- nesses might not be the number of contracts the two have signed together. SNA works best, however, with clearly definable relationships and where one factor in the relationship correlates well with other factors important in a relationship. Modern intelligence problems, which often contain, political, economic, military, tribal, geographic, personal, and historical relationship data require the application of advanced SNA techniques and, even then, may yield little of real use to decisionmakers. Finally, SNA is fundamentally a mathematical tool but is most useful in the decisionmaking process when the networks are visualized. It is, without doubt, the visualization of these networks that tends to capture the most attention from the policymakers that intelligence units typically support. This is both a blessing and a curse. While it is easy to capture attention, explaining why the charts and graphs look the way they do is an art. All too often, the initial excited reaction to these diagrams turns to boredom and confusion as analysts bog the decisionmakers down with the arcana of SNA. In addition, creating these complex visualizations often stresses even the most powerful personal computers (the images FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 58 of the simulation in Figure 8 above took approximately 2 hours to produce using a powerful desktop PC with two high end graphics cards). Like every analytic technique, SNA has great utility for the right question. Within its limits, SNA is unmatched and can be usefully applied to identify key individuals or organizations within a network, generate new leads and simulate the flows of information or money throughout a network. SNA, however, remains just an answer, not the answer. Used inappropriately or without a full understanding of the limits of the method and analysts will only be finding new and more technically sophisticated ways to fail. That, then, is the primary job of the modern day analyst: making the judgment call of which techniques to use and when. Equally as important as knowing when to use SNA is knowing when not to use it. Notes [1] Machiavelli, N. (1515). Why the kingdom of darius, conquered by alexander, did not rebel against the successors of alexander at his death. In The Prince Retrieved from http://www.constitution.org/mac/prince00.htm [2] Rieder, B. (2012, March 19). Retrieved from http://thepoliticsofsystems.net/2012/03/ [3] Newman, M. (2009). Networks: an introduction. Oxford University Press, chap. 3. [4] Costenbader, E., & Valente, T. W. (2003). The stability of centrality measures when networks are sampled. Social networks, 25(4), 283-307. [5] ORA: Software. (2013). Available from Carnegie Mellon. Retrieved from www.casos.cs.cmu.edu/projects/ora/software.php [6] For more information on how we did this analysis (and both the strengths and weaknesses of SNA as a tool for finding agents), see The New HUMINT? [7] UNHCR Turkey Syrian refugee daily sitrep. UNHCR: The UN refugee agency, November 25, 2013. [8] UNHCR: UN refugee agency, Syrian refugee camps in Turkey. Last modified: Oct. 243, 2013. Accessed: Nov. 25, 2013. [9] Syria needs analysis project (SNAP), Regional analysis Syria Part II: Host Countries. Last modified September 26, 2013. Accessed November 25, 2013.
NSA REFORMS ARE PR ONLY Obama's NSA 'reforms' are little more than a PR attempt to mollify the public www.theguardian.com/commentisfree/2014/jan/17/obama-nsa-reforms-bulk-surveillance-remains The Guardian / by Glenn Greenwald Source: Infowarrior / https://attrition.org/mailman/listinfo/infowarrior Jan 18 2014 Jan 17. In response to political scandal and public outrage, official Washington repeat- edly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the Na- tional Security Agency in the wake of seven months of intense worldwide controversy. The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosme- tic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge. This scam has been so frequently used that it is now easily recognizable. In the mid-1970s, the Senate uncovered surveillance abuses that had been ongoing for decades, generating widespread public fury. In response, the US Congress enacted a new law (Fisa) which featured two primary "safeguards": a requirement of judicial review for any domestic surveillance, and newly created committees to ensure legal compliance by the intelligence community. But the new court was designed to ensure that all of the government's requests were approved: it met in secret, only the government's lawyers could attend, it was staffed with the most pro-government judges, and it was even housed in the executive branch. As planned, the court over the next 30 years virtually never said no to the government. Identically, the most devoted and slavish loyalists of the National Security State were repeatedly installed as the committee's heads, currently in the form of NSA cheerleaders Democrat Dianne Feinstein in the Senate and Republican Mike Rogers in the House. As the New Yorker's Ryan Lizza put it in a December 2013 article on the joke of Congressional oversight, the committees "more often treat senior intelligence officials like matinee idols". As a result, the committees, ostensibly intended to serve an overseer function, have far more often acted as the NSA's in-house PR firm. The heralded mid-1970s reforms did more to make Americans believe there was reform than actually providing any, thus shielding it from real reforms. The same thing happened after the New York Times, in 2005, revealed that the NSA under Bush had been eavesdropping on Americans for years without the warrants required by criminal law. The US political class loudly claimed that they would resolve the problems that led to that scandal. Instead, FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 59 they did the opposite: in 2008, a bipartisan Congress, with the support of then-Senator Barack Obama, enacted a new Fisa law that legalized the bulk of the once-illegal Bush program, including allowing warrantless eavesdropping on hundreds of millions of foreign nationals and large numbers of Americans as well. This was also the same tactic used in the wake of the 2008 financial crises. Politicians dutifully read from the script that blamed unregulated Wall Street excesses and angrily vowed to rein them in. They then enacted legislation that left the bankers almost entirely unscathed, and which made the "too-big- to-fail" problem that spawned the crises worse than ever. And now we have the spectacle of President Obama reciting paeans to the values of individual privacy and the pressing need for NSA safeguards. "Individual freedom is the wellspring of human progress," he gushed with an impressively straight face. "One thing I'm certain of, this debate will make us stronger," he pronounced, while still seeking to imprison for decades the whistleblower who enabled that debate. The bottom line, he said, is this: "I believe we need a new approach." But those pretty rhetorical flourishes were accompanied by a series of plainly cosmetic "reforms". By design, those proposals will do little more than maintain rigidly in place the very bulk surveillance systems that have sparked such controversy and anger. To be sure, there were several proposals from Obama that are positive steps. A public advocate in the Fisa court, a loosening of "gag orders" for national security letters, removing metadata control from the NSA, stricter standards for accessing metadata, and narrower authorizations for spying on friendly foreign leaders (but not, of course, their populations) can all have some marginal benefits. But even there, Obama's speech was so bereft of specifics ? what will the new standards be who will now control Americans' metadata that they are more like slogans than serious proposals. Ultimately, the radical essence of the NSA ? a system of suspicion-less spying aimed at hundreds of millions of people in the US and around the world ? will fully endure even if all of Obama's proposals are adopted. That's because Obama never hid the real purpose of this process. It is, he and his officials repeatedly acknowledged, "to restore public confidence" in the NSA. In other words, the goal isn't to truly reform the agency; it is deceive people into believing it has been so that they no longer fear it or are angry about it. As the ACLU's executive director Anthony Romero said after the speech: "The president should end not mend the government's collection and retention of all law-abiding Americans' data. When the government collects and stores every American's phone call data, it is engaging in a textbook example of an 'unreasonable search' that violates the constitution." That, in general, has long been Obama's primary role in our political system and his premiere, defining value to the permanent power factions that run Washington. He prettifies the ugly; he drapes the banner of change over systematic status quo perpetuation; he makes Americans feel better about policies they find repellent without the need to change any of them in meaningful ways. He's not an agent of change but the soothing branding packaging for it. As is always the case, those who want genuine changes should not look to politicians, and certainly not to Barack Obama, to wait for it to be gifted. Obama was forced to give this speech by rising public pressure, increasingly scared US tech giants, and surprisingly strong resistance from the international community to the out-of-control American surveillance state. Today's speech should be seen as the first step, not the last, on the road to restoring privacy. The causes that drove Obama to give this speech need to be, and will be, stoked and nurtured further until it becomes clear to official Washington that, this time around, cosmetic gestures are plainly inadequate.
NSA SPYING FALLOUT HITS FRENCH SATELLITE DEAL www.techdirt.com/articles/20140114/04272125862/nsa-spying-fallout-hits-french-satellite-deal.shtml Techdirt / by Glyn Moody Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 17 2014 Jan 16. Techdirt has already noted how the NSA's massive spying programs around the world are costing US companies money through lost business -- and are likely to cost them even more in the future. But it seems that the fallout is even wider, as this story from The Voice of Russia makes clear: The sale of two intelligence satellites by France to the UAE [United Arab Emirates] for nearly $1bln could go bust after the satellites were found to contain US technology designed to intercept data transmitted to the ground station. A top UAE defence source said that the satellites contain specific US-made components designed to intercept the satellites' communication with their accompanying ground station. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 60 As a result, the UAE might do a deal with the Russians instead: An unnamed UAE defence source said that it is not clear if the US equipment can be taken off the French satellites, so the incident has resulted in an increase of talks with Moscow, which, along with Beijing, has also been a frequent defence technology supplier to the Emirates. So it seems likely that not only will US companies find it hard to sell their wares directly to nations that are worried about possible surveillance, but foreign manufacturers will also be reluctant to include certain types of US technology in their own products, since that might cost them contracts. The price being paid by US businesses for the NSA's "collect it all" approach continues to rise.
NSA COLLECTS MILLIONS OF TEXT MESSAGES DAILY IN 'UNTARGETED' GLOBAL SWEEP NSA extracts location, contacts and financial transactions 'Dishfire' program sweeps up 'pretty much everything it can' GCHQ using database to search metadata from UK numbers Dishfire presentation on text message collection key extracts www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep The Guardian / by James Ball Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 17 2014 Jan 16. The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The untargeted collection and storage of SMS messages including their contacts is revealed in a joint investigation between the Guardian and the UKs Channel 4 News based on material provided by NSA whistleblower Edward Snowden. The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of untargeted and unwarranted communications belonging to people in the UK. The NSA program, codenamed Dishfire, collects pretty much everything it can, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on peoples travel plans, contact books, financial transactions and more including of individuals under no suspicion of illegal activity. An agency presentation from 2011 subtitled SMS Text Messages: A Goldmine to Exploit reveals the program collected an average of 194 million text messages a day in April of that year. In addition to storing the messages themselves, a further program known as Prefer conducted automated analysis on the untargeted communications. The Prefer program uses automated text messages such as missed call alerts or texts sent with international roaming charges to extract information, which the agency describes as content-derived metadata, and explains that such gems are not in current metadata stores and would enhance current analytics. On average, each day the NSA was able to extract: More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someones social network from who they contact and when) Details of 1.6 million border crossings a day, from network roaming alerts More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from requests by people for route info and setting up meetings. Other travel information was obtained from itinerary texts sent by travel companies, even including cancellations and delays to travel plans. Communications from US phone numbers, the documents suggest, were removed (or minimized) from the database but those of other countries, including the UK, were retained. The revelation the NSA is collecting and extracting personal information from hundreds of millions of global text messages a day is likely to intensify international pressure on US president Barack Obama, who on Friday is set to give his response to the report of his NSA review panel. While US attention has focused on whether the NSAs controversial phone metadata program will be discontinued, the panel also suggested US spy agencies should pay more consideration to the privacy FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 61 rights of foreigners, and reconsider spying efforts against allied heads of state and diplomats. In a statement to the Guardian, a spokeswoman for the NSA said any implication that the agencys collection was arbitrary and unconstrained is false. The agencys capabilities were directed only against valid foreign intelligence targets and were subject to stringent legal safeguards, she said. The ways in which the UK spy agency GCHQ has made use of the NSA Dishfire database also seems likely to raise questions on the scope of its powers. While GCHQ is not allowed to search through the content of messages without a warrant though the contents are stored rather than deleted or minimized from the database the agencys lawyers decided analysts were able to see who UK phone numbers had been texting, and search for them in the database. The GCHQ memo sets out in clear terms what the agencys access to Dishfire allows it to do, before handling how UK communications should be treated. The unique property of Dishfire, it states, is how much untargeted or unselected information it stores. In contrast to [most] GCHQ equivalents, DISHFIRE contains a large volume of unselected SMS traffic, it states (emphasis original). This makes it particularly useful for the development of new targets, since it is possible to examine the content of messages sent months or even years before the target was known to be of interest. It later explains in plain terms how useful this capability can be. Comparing Dishfire favourably to a GCHQ counterpart which only collects against phone numbers that have specifically been targeted, it states Dishfire collects pretty much everything it can, so you can see SMS from a selector which is not targeted. The document also states the database allows for broad, bulk searches of keywords which could result in a high number of hits, rather than just narrow searches against particular phone numbers: It is also possible to search against the content in bulk (e.g. for a name or home telephone number) if the targets mobile phone number is not known. Analysts are warned to be careful when searching content for terms relating to UK citizens or people currently residing in the UK, as these searches could be successful but would not be legal without a warrant or similar targeting authority. However, a note from GCHQs operational legalities team, dated May 2008, states agents can search Dishfire for events data relating to UK numbers who is contacting who, and when. You may run a search of UK numbers in DISHFIRE in order to retrieve only events data, the note states, before setting out how an analyst can prevent himself seeing the content of messages when he searches by toggling a single setting on the search tool. Once this is done, the document continues, this will now enable you to run a search without displaying the content of the SMS, especially useful for untargeted and unwarranted UK numbers. A separate document gives a sense of how large-scale each Dishfire search can be, asking analysts to restrain their searches to no more than 1,800 phone numbers at a time. The note warns analysts they must be careful to make sure they use the forms toggle before searching, as otherwise the database will return the content of the UK messages which would, without a warrant, cause the analyst to unlawfully be seeing the content of the SMS. The note also adds that the NSA automatically removes all US-related SMS from the database, so it is not available for searching. A GCHQ spokesman refused to comment on any particular matters, but said all its intelligence activities were in compliance with UK law and oversight. But Vodafone, one of the worlds largest mobile phone companies with operations in 25 countries including Britain, greeted the latest revelations with shock. Its the first weve heard about it and naturally were shocked and surprised, the groups privacy officer and head of legal for privacy, security and content standards told Channel 4 News. What youre describing sounds concerning to us because the regime that we are required to comply with is very clear and we will only disclose information to governments where we are legally compelled to do so, wont go beyond the law and comply with due process. But what youre describing is something that sounds as if thats been circumvented. And for us as a business this is anathema because our whole business is founded on protecting privacy as a fundamental imperative. He said the company would be challenging the UK government over this. From our perspective, the law is there to protect our customers and it doesnt sound as if that is what is necessarily happening. The NSAs access to, and storage of, the content of communications of UK citizens may also be contentious in the light of earlier Guardian revelations that the agency was drafting policies to facilitate spying on the citizens of its allies, including the UK and Australia, which would if enacted enable the agency to search its databases for UK citizens without informing GCHQ or UK politicians. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 62 The documents seen by the Guardian were from an internal Wikipedia-style guide to the NSA program provided for GCHQ analysts, and noted the Dishfire program was operational at the time the site was accessed, in 2012. The documents do not, however, state whether any rules were subsequently changed, or give estimates of how many UK text messages are collected or stored in the Dishfire system, or from where they are being intercepted. In the statement, the NSA spokeswoman said: As we have previously stated, the implication that NSA's collection is arbitrary and unconstrained is false. NSA's activities are focused and specifically deployed against and only against valid foreign intelligence targets in response to intelligence requirements. Dishfire is a system that processes and stores lawfully collected SMS data. Because some SMS data of US persons may at times be incidentally collected in NSAs lawful foreign intelligence mission, privacy protections for US persons exist across the entire process concerning the use, handling, retention, and dissemination of SMS data in Dishfire. In addition, NSA actively works to remove extraneous data, to include that of innocent foreign citizens, as early as possible in the process. The agency draws a distinction between the bulk collection of communications and the use of that data to monitor or find specific targets. A spokesman for GCHQ refused to respond to any specific queries regarding Dishfire, but said the agency complied with UK law and regulators. It is a longstanding policy that we do not comment on intelligence matters, he said. Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. GCHQ also directed the Guardian towards a statement made to the House of Commons in June 2013 by foreign secretary William Hague, in response to revelations of the agencys use of the Prism program. Any data obtained by us from the US involving UK nationals is subject to proper UK statutory controls and safeguards, including the relevant sections of the Intelligence Services Act, the Human Rights Act and the Regulation of Investigatory Powers Act, Hague told MPs.
SOME RESTRAINTS ON US SURVEILLANCE www.nytimes.com/2014/01/15/us/politics/judge-warns-proposed-safeguards-could-hamper-surveillance-court.html NY Times / by Peter Baker and Charlie Savage Jan 16 2014 Jan 14. President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking. Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records. The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama?s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later. The decision to provide additional privacy protections for non-American citizens or residents, for instance, largely codifies existing practices but will be followed by a 180-day study by the director of national intelligence about whether to go further. Likewise, instead of taking the storage of bulk data out of government hands, as recommended by a review panel he appointed, Mr. Obama will leave it in place for now and ask lawmakers to weigh in. The blend of decisions, to be outlined in a speech at the Justice Department and in a presidential guidelines memorandum, will be Mr. Obama's highest-profile response to the disclosures about the National Security Agency made in recent months by Edward J. Snowden, a former N.S.A. contractor who has fled to Russia. But as intelligence officials have sorted through Mr. Obama's evolving position, they have been divided about how significant his adjustments will be. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 63 Some officials complained that the changes will add layers of cumbersome procedure that will hinder the hunt for potential terrorists, while others expressed relief that Mr. Obama is not going further and confidence that they could still work within the new guidelines without sacrificing much. Is it cosmetic or is there a real thumb on the scale in a different direction asked one former govern- ment official who worked on intelligence issues. That's the question. The White House said the president's review is incomplete and would not comment further Tuesday. The developments came as the nation's judiciary waded into the highly charged debate. In a letter made public on Tuesday, a judge designated by Chief Justice John G. Roberts Jr. to express the views of the judicial branch warned that some changes under consideration would have a negative operational impact on a secret foreign intelligence court. Judge John D. Bates, a former chief judge of the Foreign Intelligence Surveillance Court, urged Mr. Obama and Congress not to alter the way the court is appointed or to create an independent public advocate to argue against the Justice Department in secret proceedings. Any such advocate, he wrote, should instead be appointed only when the court decided one was needed. Judge Bates objected to the workload of requiring that courts approve all national security letters, which are administrative subpoenas allowing the F.B.I. to obtain records about communications and financial transactions without court approval. And he raised concerns about greater public disclosure of court rulings, arguing that unclassified summaries would be likely to promote confusion and misunderstanding. The judge's letter, versions of which he sent to the leaders of several congressional committees, was released as all five members of Mr. Obama's surveillance review group testified Tuesday before the Senate Judiciary Committee, seeking support for their recommendations. Illustrating the cross-pressures on the president, the advisers argued for the appointment of the independent version of a public advocate, a recommendation the president is expected to follow, though it is not clear how he will structure the position. We admire Judge Bates and respect his views, said Cass R. Sunstein, of Harvard Law School and a former Obama White House official who served on the review panel. We respectfully disagree with that one, on the ground that the judge sometimes is not in the ideal position to know whether a particular view needs representation and that in our tradition, standardly, the judge doesn't decide whether one or another view gets a lawyer. The judge's objection to the proposal on national security letters dovetailed with that of the F.B.I. director, James B. Comey, who argued it would be inefficient to have to go to a judge each time records were sought. Mr. Obama has decided not to require court approval in every case, but might still require it in some circumstances, according to one administration official. Mr. Obama will cut back on the number of people whose phone records can be examined by the N.S.A. through its bulk data program. Currently the agency can scrutinize call records of people as far as three steps, or hops, removed from a suspect. Mr. Obama's review panel proposed limiting searches to people just two steps removed. He is also likely to cut down the number of years such data can be retained; currently it is deleted after five years. But the president will not, at least for now, back the panel's suggestion that telecommunications firms keep such data and that the government be allowed to tap into those databases only when necessary. Intelligence officials complained it would be inefficient to have to go to multiple companies, so some officials proposed creating an independent consortium to store the data instead. Mr. Obama has decided against keeping the data at the private providers because they do not want that responsibility, officials said, and no independent consortium currently exists. As a result, he will ask Congress to work with him to determine the best way to store the data. He also appears likely to reject the idea of separating code breakers and code makers. Some critics of the N.S.A. were disturbed that the agency's encryption team charged with bolstering online security systems against hackers was working with the team that tries to penetrate computer systems used by terrorists. The letter by Judge Bates was accompanied by 15 pages of often specific comments about possible surveillance reforms. It is highly unusual for judges to weigh in on public policy debates involving the other two branches of government, but Judge Bates, the director of the Administrative Office of the United States Court, said that Chief Justice Roberts had designated him to act as a liaison and that he had consulted other judges. The judge emphasized that his comments were meant to address smooth operation of the court and were not intended as expressions of support or opposition to particular introduced bills. Still, his comments went beyond workload issues. He objected to a proposal by Mr. Obama's review group to take away Chief Justice Roberts's sole power to appoint the 11 judges of the surveillance FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 64 court and have them picked instead by the chief judges of the appeals courts. Ten of the 11 current judges were appointed by Republican presidents, and critics have called for more diversity. The chief justice is uniquely positioned to select qualified judges, Judge Bates argued.
SURVEILLANCE THREATENS US BUSINESS CLIMATE, DEMOCRACY Stanford scholars say blanket mass surveillance undermines the U.S. economy by creating the global perception of an unsafe American business climate. Meanwhile, the technology behind surveillance is evolving well ahead of the law. As a result, privacy and civil liberty concerns are mounting. http://news.stanford.edu/news/2014/january/business-spying-dangers-011614.html Stanford Report / by Clifton B. Parker Source: Infowarrior / https://attrition.org/mailman/listinfo/infowarrior Jan 16 2014 Jan 16. Mass surveillance by U.S. intelligence agencies is jeopardizing America's reputation as a safe place to do business, according to a Stanford scholar. "We are no longer seen as a safe business climate," said Aleecia M. McDonald, director of privacy at Stanford's Center for Internet and Society. "It is difficult to convey the intensity of international outrage over the U.S.'s conduct," as revealed by document leaker Edward Snowden. Snowden, a former National Security Agency (NSA) contractor, released voluminous documents describing a massive U.S. surveillance effort, both domestically and abroad. As McDonald points out, the NSA tapped into German Chancellor Angela Merkel's cell phone and news reports indicate that the agency eavesdropped on more than 35 international politicians, including heads of state and senior officials in the European Union. This has economic repercussions, she said. "U.S. companies are frustrated that the NSA is also collecting the user data they collect themselves," she said. "There is no longer a clear-cut distinction between government and corporate tracking within the U.S." McDonald, whose research focuses on Internet privacy, behavioral economics and online privacy, said that the NSA's actions have hurt American interests worldwide. In particular, the Snowden affair revealed that the "breadth and depth of surveillance is far more intense than imagined," McDonald said. The NSA every day is monitoring millions of phone calls, email messages, instant messages and address books. "This puts U.S. businesses in a difficult bind," said McDonald. Despite knowing their Internet browser cookies may be used for NSA tracking, companies are not planning to make changes to their lucrative advertising networks. "The difficulty businesses face is that massive data collection about their users is the underlying business model for most Internet companies," she said. McDonald recently joined hundreds of other higher education scholars from around the world to sign a petition calling for an end to the surveillance. "This has to stop. Without privacy, people cannot freely express their opinions or seek and receive information," the petition states. Surveillance law still evolving In the courts, the issue is uncharted territory no government has ever before had the technological power or the economic ability to eavesdrop on such a massive scale. Then the question arises: How is mass surveillance threatening the rule of law and democracy? Bruce M. Owen, director of Stanford's Public Policy Program and a senior fellow at the Stanford Institute for Economic Policy Research, says that the Founding Fathers like Thomas Jefferson believed that "we, the people" were the only legitimate source of political power. "Protecting liberty required constraints on potentially tyrannical central government," Owen said. Of course, government has legitimate functions, he noted, and as a result, a tradeoff exists between the ability of the government to protect the people from crime or foreign threats while maintaining individual liberty. However, technology often evolves well ahead of the justice system. "Current laws reflect this tradeoff, but may not take account of new technologies that make it easier for the government to invade the private domain," said Owen, whose research focuses on the economic analysis of law, especially in the areas of telecommunications and mass media. It will take new civil protections to simply maintain the degree of privacy that Americans have experienced in the past, he said. International treaties can help protect the fundamental rights of people against mass surveillance by governments. "To the extent that current technology permits U.S. citizens' liberty to be invaded by foreign govern- ments, and vice versa, countervailing treaties are an appropriate remedy," he said. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 65 The U.S. government is not great at policing itself, he said. "We, the people, have to put some effort into preserving our liberties. One can see Snowden as a martyr in this cause. Of course, martyrs by definition must pay a price for their words or actions." As for Snowden's role in the release of NSA documents, Owen said, "Just because you can do some- thing doesn't automatically make the doing of it right or just." Legal process: 'slow' Jonathan Mayer, a doctoral student in computer science and Cybersecurity Fellow at the Center for International Security and Cooperation, said that the law is still evolving in our highly digital world ? and right now, it does not go far enough in safeguarding privacy. "The NSA's mass surveillance programs are not unlimited. They are bound by legal rules. But our computer science research suggests that those legal rules fail to protect Americans' privacy," Mayer said in an email during a trip to Cambodia. Mayer noted that the NSA can legally compel an American company to divulge records about foreigners, with no individualized judicial review and little transparency. "The legal process is slower and more cumbersome than technical surveillance, to be sure, but still leaves much of the globe at risk," Mayer co-wrote in a 2013 article with Edward Felten of Princeton University. "As long as companies collect and retain tracking data, there will be a risk of disclosure through legal process, and users, especially those overseas, will be wary." As for the NSA's claim last year that it was only collecting nameless phone numbers on Americans in its mass surveillance efforts, Mayer and another colleague, Patrick Mutchler, conducted an experiment of their own last year. They randomly sampled 5,000 phone numbers from a data set known as MetaPhone and attempted to match those with entries in Yelp, Google Places and Facebook. They matched 1,356 (27 percent) of the numbers. "If a few academic researchers can get this far this quickly, it's difficult to believe the NSA would have any trouble identifying the overwhelming majority of American phone numbers," Mayer wrote in a blog post. Chilling effect on speech, behavior Richard Forno, a junior affiliate scholar with the Center for Internet and Society, warns that mass surveillance can create conformity in social thought and interactions. "If a person believes they are constantly being watched, they will, over time, conform to what they think those watching them will deem as 'expected' norms of conduct and communication," he said. In a liberal Western society like the United States, that can lead to self-censorship of thought, word and behavior, he suggested. Such an effect is not conducive to democratic ideals. Even more unsettling to Forno is the fact that the NSA surveillance illustrates how "government actions are concealed by secret interpretations of otherwise public law," such as the Patriot Act legislation, he said, that was rushed through Congress without a solid understanding or vetting. Forno urged more independent-minded legislative and executive oversight of U.S. intelligence agencies: "We need critical and objectively informed overseers who do not simply take the carefully prepared statements and testimony of the intelligence community as absolute, unassailable facts when deliberating their conduct or need for certain activities." However, some in Congress are too concerned about appearing to be soft on security or lacking in patriotism, he said. And so, there is no true public accountability of the intelligence community when the hard questions cannot be asked because of all the secrets. "It's hard to watch the watcher," Forno said, "and foster meaningful transparency or accountability in a democratic system when the watchers themselves control what you see, along with how, when and where you can see it."
PHILIPPINES: ISAFP TO BE EXPANDED ISAFP to be expanded, not abolished, says chief http://www.philstar.com/headlines/2014/01/12/1277822/isafp-be-expanded-not-abolished-says-chief The Philippine Star / by Jaime Laude Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 16 2014 Jan 12. The Intelligence Service of the Armed Forces of the Philippines (ISAFP) is not up for deactivation but due for expansion, the commander of the militarys top intelligence unit said yesterday. Its not true. The defense planning guidance is to create one big intelligence organization in the future with ISAFP under a different name, serving as its backbone, ISAFP chief Brig. Gen. Eduardo Ao said. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 66 Ao made the clarification to douse talks that the fire that broke out in the ISAFPs well-guarded compound late Friday could be related to plans to abolish the military intelligence unit. Ao pointed out last Fridays fire also damaged the message center of the AFP Deputy for Intelligence (J2), whose office is located inside the ISAFP compound. He added a representative from an insurance firm would be arriving on Monday to determine the actual damage caused by the fire, which he described as very minimal. According to Ao, the ISAFP expansion plan would be patterned after the defense intelligence services of other countries. He stressed the ISAFP will remain as the intelligence unit of the AFP but this time, once the study is completed, it will be under the Department of National Defense (DND). Ao stressed that everything surrounding the upsizing of ISAFP is still on the drawing board and is not expected to happen this year.
REPORT ON BENGHAZI TERRORIST ATTACKS Senate Intelligence Committee Releases Declassified Bipartisan Report on Benghazi Attacks Full report: http://www.intelligence.senate.gov/benghazi2014/benghazi.pdf US Senate Source: Sabrina Pacifici / BeSpacific / Silver Spring US / www.bespacific.com Jan 16 2014 Jan 15. The Senate Intelligence Committee today issued a declassified report on the September 11-12, 2012, terrorist attacks against U.S. personnel at the Temporary Mission Facility and CIA Annex in Benghazi, Libya. The committee found the attacks were preventable, based on extensi- ve intelligence reporting on the terrorist activity in Libyato include prior threats and attacks against Western targetsand given the known security shortfalls at the U.S. Mission. The reportannounced by Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.)was approved by the committee in December 2013 by voice vote. The report includes 18 recommendations designed to improve security of American diplomatic and intelligence facilities abroad. In some cases, the State Department and the intelligence community (IC) have begun taking action to adopt the recommendations identified in the report.
GERMAN DOUBLE AGENT KILLED IN PAKISTAN How Did a German Man End Up Dead in a US Drone Strike? http://blog.foreignpolicy.com/posts/2014/01/15/how_did_a_german_man_end_up_dead_in_an_american_drone_strike Foreign Policy / by Elias Groll Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 16 2014 Jan 15. On Feb. 16, 2012 a missile launched from an American drone struck a pickup truck outside the city of Mir Ali in Pakistan's rugged tribal region. As many as 15 men died in the attack, which many reports claimed killed mostly "Uzbek Islamists." Now, nearly two years after the fact, it turns out a German man was among the dead that day. According to a report in the German newspaper Suddeutsche Zeitung, a man known as Patrick was killed in the attack. A convert to Islam, Patrick had at one point allegedly served as an informant for the German security services, reporting on the Islamist scene around Bonn. It's an irony that surrounds much of the initial reporting on American drone strikes in Pakistan and elsewhere. Initial reports cite the deaths of various "suspected insurgents." Only later do the actual identities of those killed in the strike emerge -- be they civilian or combatant. In the case of Patrick, the death of a former informant for the German security services raises as many questions as it answers. According to the Suddueutsche Zeitung, Patrick had been converted at the age of 16 during the winter of 2001 and had been briefly arrested in Bonn ahead of a gathering of Social Democrats there that was subject to various terror threats. Those threats turned out be empty, and Patrick disappeared shortly thereafter. His family reported him missing. It was only this week that he turned up once more -- in a jihadist propaganda video announcing his death. Patrick appears to have joined up with a group known as the Islamic Movement of Uzbekistan, a group with strong ties to the Taliban and al Qaeda. Two German brothers -- Mounir and Yassin Chouka -- run the group's propaganda outfit and produce high-quality German-language propaganda videos for consumption back home. While Patrick's alleged work for the German security services remains unconfirmed, that line on his resume raises two tantalizing questions. First, could Patrick have been sent back to Pakistan as a FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 67 German agent? Second, if Patrick wasn't a double agent, what was a fluent German speaker doing still in Pakistan? Shouldn't such a man be given a haircut, a suit, a ticket to Karachi, and an order to await further instructions? Few better candidates exist for terror missions in Western Europe. The answers to these questions -- to the extent they're answerable, anyway -- offer something of a snapshot of the current jihadist movement and the threat it poses to European countries. Guido Steinberg is an expert on jihadist groups, including the Islamic Movement of Uzbekistan, and, according to him, the likelihood that Patrick was sent to Pakistan as a double agent is extremely unlikely. "The German services have never managed to infiltrate these networks," Steinberg, who is a senior associate at the German Institute for International and Security Affairs, told Foreign Policy. "At one point they did here in Berlin for a very, very short time. I'd be surprised -- it doesn't really fit their normal activities." The idea that Germany spies would be able to launch such an operation is, in fact, somewhat laughable. "Our services are virtually helpless without the help of the Americans," Steinberg added. European security services are currently consumed with the fear that members of their growing Muslim minority will travel abroad to participate in jihadist movements only to return later and apply what they have learned on the battlefields of Syria and Pakistan in terrorist attacks at home. The intensifying conflict in Syria has only exacerbated that fear, and that country has now surpassed Afghanistan and Pakistan as the prime destination for European jihadists. "The global jihad has prioritized the Syrian conflict as its principal front," a Spanish intelligence official told Newsweek in October. So far, the fear among European security officials toward returning jihadists appears to have paid off. There have been no major attacks in recent years, and European security services have proven fairly competent at foiling such attacks. The result, Steinberg says, is that foreign terrorist groups are loath to send their fighters back to Europe when in all likelihood they'll get caught or killed anyway. Instead, Steinberg says, groups like IMU have turned toward utilizing savvy propaganda strategies to inspire attacks inside Germany, including a failed attempt to kill a right-wing politician. That's a familiar reality for American security officials. For example, Maj. Nidal Hassan, the man responsible for killing 13 people at the American military base at Ft. Hood, became radicalized in part by watching sermons online. In the digital era, old notions of double agents and moles aren't as relevant as they used to be. It's fanciful to imagine that a rogue German be sent back from the wilds of Pakistan to carry out an attack in Berlin. What's more likely is that some anonymous-looking kid carries out the deed after getting radicalized online. That's a target America's drones can't hit.
US ANTI-DRUG CENTER IN BAHRAIN With Afghan drawdown ongoing, U.S. to set up center in Bahrain to continue anti-drug efforts www.washingtonpost.com/world/national-security/with-afghan-drawdown-ongoing-us-to-set-up-center-in- bahrain-to-continue-anti-drug-efforts/2014/01/15/25dc771e-7e2d-11e3-9556-4a4bf7bcbd84_story.html The Washington Post / by Ernesto Londoo Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 16 2014 Jan 16. As the United States shrinks its civilian presence in Afghanistan, limiting its ability to combat the countrys booming drug industry, U.S. officials intend to establish an intelligence center in Bahrain to continue fighting the trade. The center in the tiny Persian Gulf nation, home to the U.S. Navys 5th Fleet, will be an integral part of the Defense Departments post-2014 strategy in Afghanistan, Erin Logan, who oversees the Pentagons counternarcotics efforts, said Wednesday afternoon. The center will help fill the gap where space for personnel on the ground in Afghanistan is no longer available, she told a Senate panel on narcotics control. Lawmakers and the inspector general overseeing reconstruction efforts in Afghanistan said they were alarmed that a problem that Washington has spent billions of dollars trying to combat is likely to worsen and further destabilize Afghanistan at a critical time. John F. Sopko, the special inspector general for Afghanistan reconstruction, said that during a recent visit to the country, Afghan and U.S. officials conveyed to him that Afghanistans drug problem is dire, with little prospect for improvement in 2014 or beyond, after the end of the U.S. combat mission. The narcotics trade is poisoning the Afghan financial sector and fueling a growing illicit economy, said Sopko, who has launched an audit of U.S. counternarcotics efforts. This, in turn, is undermining the Afghan states legitimacy by stoking corruption, nourishing criminal networks and providing FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 68 significant financial support to the Taliban and other insurgent groups. Cultivation of opium poppies, which are processed to make heroin, reached a record high of 516,450 acres last year, according to the United Nations. The statistic raised questions about the return on Washingtons $7 billion investment in efforts to root out poppy cultivation and break the link between the trade and the insurgency. Administration officials conceded that those efforts are going to become more challenging. The U.S. Drug Enforcement Administration's mission in Kabul, which included nearly 100 personnel as of the end of last year, is in the midst of its own drawdown. Although staffing plans have not been finalized, the agency intends to trim its personnel to 45 permanent slots by October and 25 to 30 by the end of the year, according to a document outlining the plans that was obtained by The Washington Post. James L. Capra, the agencys chief of operations, testified that DEA agents will soon lose the ability to travel easily across the country, particularly to provinces in the south that form the backbone of the poppy industry. Currently, the government of Afghanistan is not capable of absorbing or replicating the scale of assistance provided by the international community, he said. DEA agents hope to continue working with and supporting elite Afghan police units that have carried out drug investigations in recent years, Capra said. Sen. Dianne Feinstein (D-Calif.), chairman of the counter-narcotics panel, called Afghanistans drug trade a problem with no easy solution, adding that new approaches must be found. We ignore it at our peril, she said. Feinstein said Washington should attempt to collaborate on counternarcotics efforts with Iran, which shares a border with Afghanistan and is a leading destination and crossing point of the heroin trade. There may be many areas of disagreement, but this is one where we should agree, she said.
DRONE CONTROL: CIA OR PENTAGON Lawmakers seek to stymie plan to shift control of drone campaign from CIA to Pentagon www.washingtonpost.com/world/national-security/lawmakers-seek-to-stymie-plan-to-shift-control-of-drone- campaign-from-cia-to-pentagon/2014/01/15/c0096b18-7e0e-11e3-9556-4a4bf7bcbd84_story.html The Washington Post / by Greg Miller Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 16 2014 Jan 16. Congress has moved to block President Obamas plan to shift control of the U.S. drone campaign from the CIA to the Defense Department, inserting a secret provision in the massive government spending bill introduced this week that would preserve the spy agencys role in lethal counterterrorism operations, U.S. officials said. The measure, included in a classified annex to the $1.1 trillion federal budget plan, would restrict the use of any funding to transfer unmanned aircraft or the authority to carry out drone strikes from the CIA to the Pentagon, officials said. The provision represents an unusually direct intervention by lawmakers into the way covert operations are run, impeding an administration plan aimed at returning the CIAs focus to traditional intelligence gathering and possibly bringing more transparency to drone strikes. The move also reflects some lawmakers lingering doubts about the U.S. militarys ability to conduct strikes against al-Qaeda and its regional affiliates without hitting the wrong targets and killing civilians. Those apprehensions were amplified after a U.S. military strike in Yemen last month killed a dozen people, including as many as six civilians, in an 11-vehicle convoy that tribal leaders said was part of a wedding procession. U.S. officials said that the strike was aimed at a senior al-Qaeda operative but that reviews of the operation have raised concern that it failed to comply with White House guidelines requiring near certainty that no civilians would be harmed. On Wednesday, there were reports that another U.S. strike had killed a farmer in Yemen. The extent of the restrictions contained in the drone provision remained unclear. The measure was included by members of the House and Senate appropriations committees, said officials who spoke on the condition of anonymity because they were not authorized to comment publicly on the legislation. Other senior lawmakers and congressional officials declined to comment on the contents of the classified annex, which details funding for U.S. spy agencies. Still, senior lawmakers have been vocal in expressing concern about the prospect of the CIA ceding responsibility for drone strikes to the military. Sen. Dianne Feinstein (D-Calif.), the chairman of the Senate Intelligence Committee and a member of the Appropriations Committee, said last year that she FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 69 had seen the CIA exercise patience and discretion specifically to prevent collateral damage and that she would really have to be convinced that the military would carry it out that well. Feinstein declined to comment on the budget measure this week. But a senior aide said that the senator stands by her earlier statements and that the Intelligence Committee has recently reviewed this issue, and Senator Feinstein believes her views are widely shared on the committee. Asked about the scope of that review, the aide said the panel took stock of the program and came to a conclusion but would not elaborate. Among Feinsteins colleagues on the Intelligence Committee is Sen. Barbara A. Mikulski (D-Md.), who is chairman of the appropriations panel responsible for the budget bill. A spokesman for that committee declined to comment. There is no mention of the drone provision in the hundreds of pages of the budget blueprint released to the public. A section outlining $572 billion in Pentagon spending notes that adjustments to classified programs are addressed in the accompanying classified annex. A person familiar with the omnibus bill confirmed that the annex includes language on the drone program but would say only that the provision is more complicated than merely withholding money to prevent drone operations from being transferred to the Pentagon. Former U.S. officials familiar with the intelligence appropriations process said that aside from placing restrictions on funding, Congress could create other obstacles for example, requiring the Pentagon to certify that it has matched the CIAs capabilities and targeting methodology before it is allowed to proceed. Spokespeople for the White House, the CIA and the Pentagon declined to comment. The spending bill sets budgets for agencies across the federal government for the fiscal year that ends Sept. 30. The measure cleared the House late Wednesday. It is expected to be approved by the Senate this week and delivered to President Obama for his signature as soon as Saturday. The move by Congress carries implications for the course of the U.S. efforts against al-Qaeda at a time when its affiliates in Yemen, Somalia, Iraq and Syria have become more worrisome to American counterterrorism officials than the terrorist organizations traditional core. Also at issue is the fundamental mission of the CIA, which during the past decade has morphed into a paramilitary force. Senior officials, including CIA Director John O. Brennan, have warned that the agencys emphasis on lethal operations deviates from its traditional mission and could impair its ability to focus on gathering intelligence. The administration first signaled its intent to shift control of drone operations to the Pentagon last year, when Obama announced new guidelines for counterterrorism missions including a pledge of greater transparency during a speech at the National Defense University. At the time, administration officials briefing reporters said there would be a preference for the Department of Defense to engage in the use of force outside war zones. The remark was a reference to Pakistan, Yemen and Somalia countries beyond the war zones of Iraq and Afghanistan, where the United States has carried out drone strikes against al-Qaeda targets. Obamas policy shift was expected to mainly affect Yemen, where the CIA and the elite U.S. Joint Special Operations Command conduct overlapping drone campaigns. The overall pace of strikes has diminished significantly in Pakistan and Yemen, and Brennan has held secret meetings with Pentagon officials in recent months to work out logistical challenges and other impediments to shifting control of drone operations. But the CIA still carries out the majority of strikes, and the collateral damage that has accompanied some JSOC strikes has generated growing opposition to removing the agency from such operations anytime soon. The Pentagon has refused to release any details on the Dec. 12 strike carried out by JSOC in Radaa, a district that has become a stronghold for al-Qaeda in the Arabian Peninsula, or AQAP. Yemen initially insisted that only militants had been killed, but it later acknowledged civilian casualties. The government then delivered rifles and other compensation to victims families payments that a Yemeni official described as a deposit to encourage clan leaders to take part in tribal mediation and accept further compensation rather than seek retaliation against the Sanaa government. There was a [legitimate] target, and then something happened, a misfire, the Yemeni official said, speaking on the condition of anonymity because of the secrecy surrounding U.S. strikes. Ive never been aware of any incident before where a strike targeted such a large convoy of vehicles. AQAP is responsible for near-miss attacks on the United States, including the attempted bombing of a Detroit-bound airliner on Christmas Day in 2009. The terrorist group has been driven out of territory it had gained over the past two years but is still considered by U.S. officials to pose a serious threat to the United States. In a meeting with U.S., European and Middle Eastern diplomats last week, Yemeni President Abed FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 70 Rabbo Mansour Hadi described the security situation as unstable and warned specifically of indications that potential al-Qaeda recruits from European and other Western nations were seeking to enter the country, according to U.S. and Yemeni officials.
BREAKING THE INDIA-US DIPLOMATIC ICE Joint Intelligence Council chief meets delegation from U.S. Director of National Intelligences office for talks focussed on Afghanistan www.thehindu.com/todays-paper/tp-national/intelligence-meet-breaks-indiaus-diplomatic-ice/article5575598.ece The Hindu / by Praveen Swami Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 16 2014 Jan 14. Indian and United States intelligence services began a three-day meeting on Monday, the first high-level dialogue between the two countries since the crisis sparked off by the arrest of Indian diplomat Devyani Khobragade in December. Led by Joint Intelligence Council chief Ajit Lal, an Indian delegation met officials from the office of the Director of National Intelligence for the latest in a series of discussions on regional security and strategic issues. The latest round of the dialogue is focussed on events in Afghanistan leading up to the United States drawdown in 2014, a highly-placed Indian government source told The Hindu . The United States is extremely concerned at Afghan President Hamid Karzais delay on signing a security agreement, and hopes India will be willing to use its influence to persuade him to do so. Peter Lavoy, Assistant Secretary of Defence for Asian and Pacific Security Affairs, had visited New Delhi last month for scheduled discussions on the situation in Afghanistan, following President Karzais visit to New Delhi. However, key defence, intelligence and diplomatic officials declined to meet Dr. Lavoy following Ms. Khobragades controversial arrest in New York. Last week, two senior U.S. officials, Energy Secretary Ernest Moniz and Assistant Secretary of State Nisha Desai Biswal postponed their visits to New Delhi. External Affairs Ministry sources in New Delhi declined to comment on the JIC-DNI meeting, saying they could not comment on intelligence issues. Eleven rounds of dialogue have been held between the DNI and the JIC, with the two organisations meeting each June in Washington, D.C., and in New Delhi in January. No details were immediately available on the composition of the United States delegation. It is important for India that the intelligence dialogues continue, irrespective of problems that will from time to time crop up in the relationship with the United States, former Intelligence Bureau chief Ajit Doval told The Hindu . Both countries have vital interests which need to be discussed at the highest level. Founded in 1998, the JIC is mandated to provide the government with big-picture assessments of strategic issues. Its secretariat, which reports to the Cabinet Secretariat, produces papers and strategy documents based on analysis of information from the Research and Analysis Wing, the Intelligence Bureau, and the directorates of military, naval and air intelligence.
OBAMA FROM SPY CRITIC TO OVERSEER www.nytimes.com/2014/01/16/us/obamas-path-from-critic-to-defender-of-spying.html?nl=todaysheadlines&emc=edit_th_20140116&_r=0 NY Times / by Peter Baker Stringer: Frank Slijper / Campaign Against Arms Trade / Groningen NL / frank.slijper@hetnet.nl Jan 16 2014 Jan 15. As a young lawmaker defining himself as a presidential candidate, Barack Obama visited a center for scholars in August 2007 to give a speech on terrorism. He described a surveillance state run amok and vowed to rein it in. That means no more illegal wiretapping of American citizens, he declared. No more national security letters to spy on citizens who are not suspected of a crime. More than six years later, the onetime constitutional lawyer is now the commander in chief presiding over a surveillance state that some of his own advisers think has once again gotten out of control. On Friday, he will give another speech, this time at the Justice Department defending government spying even as he adjusts it to address a wave of public concern over civil liberties. The journey between those two speeches reflects the transition from the backbench of the United States Senate to the chair behind the Resolute Desk in the Oval Office. Like other presidents before him, the idealistic candidate skeptical of government power found that the tricky trade-offs of national security issues look different to the person charged with using that power to ensure public safety. FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 71 Aides said that even as a senator, Mr. Obama supported robust surveillance as long as it was legal and appropriate, and that as president he still shares the concerns about overreach he expressed years ago. But they said his views have been shaped to a striking degree by the reality of waking up every day in the White House responsible for heading off the myriad threats he finds in his daily intelligence briefings. When you get the package every morning, it puts steel in your spine, said David Plouffe, the presidents longtime adviser. There are people out there every day who are plotting. The notion that we would put down a tool that would protect people here in America is hard to fathom. At the same time, aides said Mr. Obama was surprised to learn after leaks by Edward J. Snowden, the former National Security Agency contractor, just how far the surveillance had gone. Things seem to have grown at the N.S.A., Mr. Plouffe said, citing specifically the tapping of foreign leaders telephones. I think it was disturbing to most people, and I think he found it disturbing. Yet it is hard to express indignation at actions of the government after five years of running it, and some involved in surveillance note that it was Mr. Obama who pushed national security agencies to be aggressive in hunting terrorists. For some, his outrage does ring a little bit hollow, said a former counterterrorism official. All of which leads to worries by critics of government surveillance that he will not go far enough on Friday. If the speech is anything like what is being reported, the president will go down in history for having retained and defended George W. Bushs surveillance programs rather than reformed them, said Anthony D. Romero, executive director of the American Civil Liberties Union. Mr. Obama first confronted the questions of national security and privacy during his 2004 campaign for Senate, taking aim at the Patriot Act for violating our fundamental notions of privacy and declaring that we dont like federal agents poking around our libraries. Once elected, Mr. Obama took an interest in curbing surveillance. He would ask me about various issues that relate to the topic of the day how do you come up with policies that make sure that security and liberty are not mutually exclusive? recalled Senator Ron Wyden, Democrat of Oregon and a leading critic of surveillance policies then and now. Mr. Obama was a sponsor of a bill in 2005 to raise the standard required for federal agents using administrative subpoenas known as national security letters to obtain business records without court order. He joined other Democrats fighting the renewal of the Patriot Act until it was amended to address civil liberties concerns, then voted for its extension in 2006 after a compromise, breaking with Mr. Wyden who voted no. Mr. Obamas 2007 speech at the Woodrow Wilson International Center for Scholars came after the revelation that President George W. Bush had authorized warrantless surveillance in terrorism cases without permission from the Foreign Intelligence Surveillance Court. A presidential candidate, Mr. Obama criticized Mr. Bushs false choice between the liberties we cherish and the security we provide. But as a former Obama aide put it recently, The rhetoric was probably sharper than his votes. By summer 2008, with the Democratic nomination secured and the White House now a real possibility, Mr. Obama voted for legislation essentially ratifying Mr. Bushs surveillance programs. Mr. Obama realized he would take my lumps from the left and said it was not an easy call for me, but he argued that putting the programs under the jurisdiction of the intelligence court restored accountability. As a result, after he won the election, surveillance issues were off his agenda; instead, he focused on banning interrogation techniques he deemed torture and trying, futilely, to close the prison at Guantnamo Bay, Cuba. There wasnt really any serious discussion of what N.S.A. was up to, said a former intelligence official, who like others did not want to be named describing internal conversations. Mr. Obama was told before his inauguration of a supposed plot by Somali extremists to attack the ceremony, what David Axelrod, his adviser, called a welcome-to-the-N.B.A. moment before the first game. Although the report proved unfounded, it reinforced to Mr. Obama the need to detect threats before they materialized. The whole Somali threat injected their team into the realities of national security in a tangible and complicated way, recalled Juan C. Zarate, the departing counterterrorism adviser to Mr. Bush who worked with the Obama team on the threat. So while instituting additional procedural changes, Mr. Obama undertook no major overhaul of the surveillance programs he inherited. Hes sitting on the other end of the pen now, said the former Obama aide. He has more information than he did then. And he trusts himself to use these powers more than he did the Bush administration. Just weeks after the inauguration, Judge Reggie B. Walton issued a secret ruling reprimanding the N.S.A. for violating its own procedures. But when Mr. Obama was briefed, the case did not stir consternation. The presidents team instructed the Justice Department to fix the problem, but this was not a central concern and he was very quick in knowing how to deal with it, said a former FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 72 administration official. The calculus had shifted enough that Mr. Obama began presiding over a record number of leak prosecutions. When civil liberties advocates visited to press him to do more to reverse Mr. Bushs policies, Mr. Obama pushed back. He reminded me that he had a different role to play, that he was commander in chief and that he needed to protect the American people, recalled Mr. Romero of the A.C.L.U. That was brought home even more starkly at Christmas in 2009 when a Nigerian man tried to detonate explosives in his underwear aboard an airliner. At a meeting at the White House afterward, an agitated Mr. Obama was extremely firm with intelligence officials, saying that he expected us to do better, recalled one who was in the room. We hadnt had a major attack in a number of years and the fact that this guy came as close as he did basically the detonator didnt work and the fact that we hadnt detected it in advance really came as a shock to them, said John E. McLaughlin, a former deputy C.I.A. director who participated in a review of the incident for the administration. Feeling little pressure to curb the security agencies, Mr. Obama largely left them alone until Mr. Snowden began disclosing secret programs last year. Mr. Obama was angry at the revelations, privately excoriating Mr. Snowden as a self-important narcissist who had not thought through the consequences of his actions. He was surprised at the uproar that ensued, advisers said, particularly that so many Americans did not trust him, much less trust the oversight provided by the intelligence court and Congress. As more secrets spilled out, though, aides said even Mr. Obama was chagrined. They said he was exercised to learn that the mobile phone of Chancellor Angela Merkel of Germany was being tapped. Mr. Obama appointed a panel to review the programs. The point we made to him was, Were not really concerned about you, Barack, but God forbid some other guys in the office five years from now and theres another 9/11, said Richard A. Clarke, a former White House counterterrorism adviser who served on the panel. He had to lay down some roadblocks in addition to what we have now so that once youre gone itll be harder to abuse spying abilities. On the other hand, Mr. Obama was acutely aware of the risks of being seen as handcuffing the security agencies. Whatever reforms he makes, you can be sure if theres another incident and the odds are there will be in our history therell be someone on CNN within seconds saying if the president hadnt hamstrung the intelligence community, this wouldnt have happened, Mr. Axelrod said. Benjamin J. Rhodes, a deputy national security adviser working on Fridays speech, said Mr. Obama saw the issue as two separate questions abuse of government power and extent of government power. With the 2008 legislation setting a new structure, the president had focused on avoiding abuse until the latest revelations. At this point, were looking more systematically at these programs to ensure that were taking into account both technological advances and also the need to inspire greater public confidence, Mr. Rhodes said. We have an ability to do essentially anything technologically. So do we have the appropriate legal and policy overlay to ensure thats focused? That will be the question Mr. Obama tries to answer in the speech.
FRINGE NARINT Interested in this topic, in debate, in contacts? Consider joining the Linked In group; NARINT
US SPIED ON 2009 CLIMATE SUMMIT Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit www.huffingtonpost.com/2014/01/29/snowden-nsa-surveillance-_n_4681362.html?1391048276 The Huffington Post Stringer: Kees Kalkman / VDAmok / Utrecht NL / kees@amok.antenna.nl Jan 31 2014 Jan 29 The National Security Agency monitored the communications of other govern- FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 73 ments ahead of and during the 2009 United Nations climate negotiations in Copenhagen, Denmark, according to the latest document from whistleblower Edward Snowden. The document, with portions marked "top secret," indicates that the NSA was monitoring the commu- nications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that "analysts here at NSA, as well as our Second Party partners, will continue to provide policymakers with unique, timely, and valuable insights into key countries' preparations and goals for the conference, as well as the deliberations within countries on climate change policies and nego- tiation strategies." "Second Party partners" refers to the intelligence agencies of the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship. "While the outcome of the Copenhagen Climate Change Conference remains uncertain, signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the 2-week event," the document says. The Huffington Post published the documents Wednesday night in coordination with the Danish daily newspaper Information, which worked with American journalist Laura Poitras. The December 2009 meeting in Copenhagen was the 15th Conference of the Parties to the United Nations Framework Convention on Climate Change, which brings together 195 countries to negotiate measures to address rising greenhouse gas emissions and their impact. The Copenhagen summit was the first big climate meeting after the election of President Barack Obama, and was widely expected to yield a significant breakthrough. Other major developed nations were already part of the 1997 Kyoto Protocol, which set emissions limits, while the United States -- the world's biggest emitter of greenhouse gases when the protocol went into effect in 2004 -- had famously declined to join. The two-week meeting was supposed to produce a successor agreement that would include the U.S., as well as China, India and other countries with rapidly increasing emissions. The document indicates that the NSA planned to gather information as the leaders and negotiating teams of other countries held private discussions throughout the Copenhagen meeting. "[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts -- details of which are of great interest to our policymakers," the document states. The information likely would be used to brief U.S. officials, such as Secretary of State Hillary Clinton and Obama, among others, according to the document. The document does not detail how the agency planned to continue gathering information during the summit, other than noting that it would be capturing signals intelligence such as calls and emails. Previous disclosures have indicated that the NSA has the ability to monitor the mobile phones of heads of state. Other documents that Snowden has released indicate that the U.K.'s intelligence service tapped into delegates' email and telephone communications at the 2009 G-20 meetings in London. Other previous Snowden disclosures documented the surveillance of the G-8 and G-20 summits in Canada in 2010, and the U.N. climate change conference in Bali in 2007. The document also refers to some intelligence gathered ahead of the meeting, including a report that "detailed China's efforts to coordinate its position with India and ensure that the two leaders of the developing world are working towards the same outcome." It refers to another report that "provided advance details of the Danish proposal and their efforts to launch a 'rescue plan' to save COP-15." The Danish proposal was a draft agreement that the country's negotiators had drawn up in the months ahead of the summit in consultation with a small number key of countries. The text was leaked to The Guardian early in the conference, causing some disarray as countries that were not consulted balked that it promoted the interests of developed nations and undermined principles laid out in previous climate negotiations. As Information reports, Danish officials wanted to keep U.S. negotiators from seeing the text in the weeks ahead of the conference, worried that it may dim their ambitions in the negotiations for proposed cuts to greenhouse gas emissions. The Danes did share the text with the U.S. and other key nations ahead of the meeting. But the NSA document noting this as "advance details" indicates that the U.S. may have already intercepted it. The paragraph referring to the Danish text is marked "SI" in the Snowden document -- which most likely means "signals intelligence," indicating that it came from electronic information intercepted by the NSA, rather than being provided to the U.S. negotiators. That could be why U.S. negotiators took the positions they did going into the conference, a Danish official told Information. "They simply sat back, just as we had feared they would if they knew about our document," the official said. "They made no constructive statements. Obviously, if they had known about our plans since the fall of 2009, it was in their interest to simply wait for our draft proposal to be brought to the table at the summit." FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 74 Members of the Danish delegation indicated in interviews with Information that they thought the American and Chinese negotiators seemed "peculiarly well-informed" about discussions that had taken place behind closed doors. "Particularly the Americans," said one official. "I was often completely taken aback by what they knew." Despite high hopes for an agreement at Copenhagen, the negotiations started slowly and there were few signs of progress. Obama and heads of state from more than 100 nations arrived late in the second week in hopes of achieving a breakthrough, but the final day wore on without an outcome. There were few promising signals until late Friday night, when Obama made a surprise announcement that he -- along with leaders from China, India, Brazil and South Africa -- had come up with the "Copenhagen Accord." The three-page document set a goal of keeping the average rise in global temperature to less than 2 degrees Celsius, but allowed countries to write their own plans for cutting emissions -- leaving out any legally binding targets or even a path to a formal treaty. Obama called the accord "an unprecedented breakthrough" in a press conference, then took off for home on Air Force One. But other countries balked, pointing out that the accord was merely a political agreement, drafted outside the U.N. process and of uncertain influence for future negotiations. The climate summits since then have advanced at a glacial pace; a legally binding treaty isn't currently expected until 2015. And the U.S. Congress, despite assurances made in Copenhagen, never passed new laws cutting planet-warming emissions. (The Environmental Protection Agency is, however, moving forward with regulations on emissions from power plants, but a new law to addressing the issue had been widely considered as preferable.) The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future. "It can't help in the sense that if people think you're trying to get an unfair advantage or manipulate the process, they're not going to have much trust in you," said Alden Meyer, director of strategy and policy for the Union of Concerned Scientists and a seasoned veteran of the U.N. climate negotiations. Meyer said he worried that the disclosure might cause the parties to "start becoming more cautious, more secretive, and less forthcoming" in the negotiations. "That's not a good dynamic in a process where you're trying to encourage collaboration, compromise, and working together, as opposed to trying to get a comparative advantage," he said. Obama has defended the NSA's work as important in fighting terrorism at home and abroad. But the latest Snowden document indicates that the agency plays a broader role in protecting U.S. interests internationally. National Security Council spokeswoman Caitlin Hayden declined to comment directly on the Snowden document in an email to The Huffington Post, but did say that "the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations." She noted that Obama's Jan. 17 speech on the NSA "laid out a series of concrete and substantial reforms the Administration will adopt or seek to codify with Congress" regarding surveillance. "In particular, he issued a new Presidential Directive that lays out new principles that govern how we conduct signals intelligence collection, and strengthen how we provide executive branch oversight of our signals intelligence activities," Hayden said. "It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of our companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by the Presidents senior national security team." Read the full document here: http://big.assets.huffingtonpost.com/unclimatechangeconference.pdf
ENHANCED GEOTHERMAL ENERGY SYSTEMS Source: Steven Aftergood / Secrecy News / FAS / Washington / www.fas.org Jan 30 2014 Jan 30. The potential for new technologies to harvest energy from the Earth's crust was considered in a new report from the elite JASON science advisory board on "Enhanced Geo- thermal Systems" (EGS). "EGS offers important opportunities for increasing the contribution of geothermal energy to U.S. power production: by a few-fold over the next few years, according to our estimation, and much more so if this initial success is appropriately leveraged over subsequent years," the report concluded. As described in the report, EGS entails drilling deep into the Earth's crust -- 1 to 5 kilometers or more - - and forcing a fluid (water or brine) through hot, permeable rock. Energy from the heated fluid can FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 75 then be extracted. Of course, the technology is not without hazards. One is the potential for pollution of potable water acquifers. Another more ominous concern is "induced seismicity" -- or artificially-generated earthquakes. "Induced seismicity is a relatively well-documented phenomenon associated with changing fluid pressures at depth," the report notes. The JASONs assert that "there is a basis for controlling the induced seismicity and therefore for minimizing this potential hazard attributable to EGS." The new JASON report is elegantly written and can be at least partially understood by non-specialist readers who may have forgotten their heat and mass transfer equations. A copy was obtained by Secrecy News. Over the past year, the JASONs completed eight classified studies containing sensitive compart- mented information (SCI) that have not been disclosed. Several other unclassified reports were also performed and their release is pending. In 2012, the Central Intelligence Agency refused to release a JASON report entitled "Metamaterials."
FRINGE INTEL 2.0 Interested in this topic, debate, contacts? Consider joining the Linked In group: Intelligence 2.0
MARK ZUCKERBERG RUNS A GIANT SPY MACHINE IN PALO ALTO http://www.businessinsider.com/deep-state-on-social-networking-privacy-2013-7#ixzz2qh2qGmgM Business Insider Source: Beowulf / Grendel Report / US / beowulf@westerndefense.net Jan 19 2014 Mark Zuckerberg runs a giant spy machine in Palo Alto, California. He wasnt the first to build one, but his was the best, and every day hundreds of thousands of people upload the most intimate details of their lives to the Internet. The real coup wasnt hoodwinking the public into revealing their thoughts, closest associates, and exact geographic coordinates at any given time. Rather, it was getting the public to volunteer that information. Then he turned off the privacy settings. [Editor's note: Facebook disputes the notion that it has "turned off" its privacy settings. We have provided a statement from the company, and a response from one of the authors, at the bottom of this post.] People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people, said Zuckerberg after moving 350 million people into a glass privacy ghetto. That social norm is just something that has evolved over time. If the state had organized such an information drive, protestors would have burned down the White House. But the state is the natural beneficiary of this new social norm. Today, that information is regularly used in court proceedings and law enforcement. There is no need for warrants or subpoenas. Judges need not be consulted. The Fourth Amendment does not come into play. Intelligence agencies don't have to worry about violating laws protecting citizenry from wiretapping and information gathering. Sharing information more openly and with more people is a step backward in civil liberties. And spies, whether foreign or domestic, are more people, too. Julian Assange, founder of WikiLeaks, knows better than anyone how to exploit holes in the secrecy apparatus to the detriment of American security. His raison d'tre is to blast down the walls protecting state secrets and annihilate the implicit bargain, yet even he is frightened by the brazenness of Facebook and other such social networking sites: Here we have the worlds most comprehensive database about people, their relationships, their names, their addresses, their locations and their communications with each other, their relatives, all sitting within the United States, all accessible to the U.S. intelligence. Facebook, Google, Yahoo all these major U.S. organizations have built-in interfaces for U.S. intelligence. Its not a matter of serving a subpoena. They have an interface that they have developed FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 76 for U.S. intelligence to use. Its all there, and the Internet never forgets. But even if the impossible happened and the Internet did somehow develop selective amnesia, in the case of microblogging service Twitter, the Library of Congress has acquired every message ever posted by its two hundred million members. As Jeffrey Rosen wrote in the New York Times: Weve known for years that the Web allows for unprecedented voyeurism, exhibitionism and inadvertent indiscretion, but we are only beginning to understand the costs of an age in which so much of what we say, and of what others say about us, goes into our permanent and public digital files. The fact that the Internet never seems to forget is threatening, at an almost existential level, our ability to control our identities; to preserve the option of reinventing ourselves and starting anew to overcome our checkered pasts. The U.S. government isn't the only institution to notice. Early in the military campaigns in Afghanistan and Iraq, soldiers of the social networking generation uploaded to their MySpace profiles pictures of camp life in the war zones. Innocuous photos of troops horsing around in front of tent cities, bunkers, outposts, motor pools, and operations centers circulated freely on what was then described as a place for friends. The U.S. military soon realized that foreign intelligence services, sympathetic to Americas enemies and savvy to the social revolution, could collect these photographs by the thousands and build detailed, full-color maps of American military bases. During the Cold War, this would have required the insertion of first-rate spies, briefcases filled with cash, and elaborate blackmail schemes. In the age of radical transparency, all it would take is a MySpace account to know exactly where to fire the mortar round to inflict maximum damage on the United States. The Marine Corps confirmed this in a 2009 directive. These Internet sites in general are a proven haven for malicious actors and content are a particularly high risk due to information exposure, user generated content and targeting by adversaries. The directive continued, The very nature of [social networking sites] creates a larger attack and exploitation window, exposes unnecessary information to adversaries and provides an easy conduit for information leakage, putting operational security, communications security, and U.S. military personnel at an elevated risk of compromise. This type of clever thinking on the part of Americas enemies is not unique to this conflict. During the run-up to the Gulf War, foreign intelligence services had a pretty good idea that the U.S. war machine was preparing for its most substantial engagement since Vietnam. The U.S. military recognized a new kind of threat one that didnt require foreign intelligence to insert an agent onto every base in the Republic. Open source information could be just as dangerous. Spikes in late-night orders from pizzerias near key military bases and an exceptionally busy parking lot at the Pentagon could tell hostile powers everything they needed to know. In determining what should remain secret and what should not, the military like each component of the American secrecy apparatus is good at overreaction. The default answer: more secrets. To counter the MySpace problem, they banned blogs and social networks. This benefitted base security but killed morale at home. No longer could parents see their young sons and daughters safe and even happy in the war zone. All that remained were breathless reports of intense combat on the cable news networks. And while the average supply clerk is probably safer in Baghdad than in Detroit, every parent and spouse saw the same thing: a son or daughter in a flag-draped casket. In 2010, the Department of Defense revised and consolidated its ad hoc policy on social media. On its official website it declared, Service members and [Department of Defense] employees are welcome and encouraged to use new media to communicate with family and friends at home stations or deployed, but warned, its important to do it safely.) From "Deep State: Inside the Government Secrecy Industry" by journalists Marc Ambinder and D.B. Grady. Reprinted with permission from D.B. Grady. *"When the book was actually written, they were still in Palo Alto." - D.B. Grady In a statement to Business Insider, Facebook notes: "In reality we spend a lot of time building privacy controls, and working to make them powerful, easy to use, and also educating our users on them. For example: - Announcing new tools in December: http://newsroom.fb.com/News/547/Better-Controls-for-Managing-Your-Content - (in the same post) In-product education about privacy that we did in December: http://newsroom.fb.com/News/547/Better-Controls-for-Managing-Your-Content - Recent flyout in the News Feed ahead of Graph Search that pointed to the new tools and highlighted how people could check their stuff: http://newsroom.fb.com/News/660/Expanding-Graph-Search-Beta"
FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 77 FRINGE NETHERLANDS Interested in this topic, in debate and in contacts? Consider joining the Linked In group: Dutch Intelligence Watch specialists
PHILIPS WERKTE SAMEN MET NSA - 2 www.trouw.nl/tr/nl/14468/Buitenland/article/detail/3585933/2014/01/29/Philips-werkte-samen-met-NSA.dhtml Volkskrant Jan 29 2014 Jan 29. Philips leverde jarenlang telefoons aan het ministerie van buitenlandse zaken telefoons die zijn ontwikkeld door de Amerikaanse veiligheidsdienst NSA. Dat blijkt uit archiefonder- zoek van de Groene Amsterdammer. Of de samenwerking tussen Philips en NSA betekent dat de veiligheidsdienst decennialang informatie heeft kunnen aftappen, is onduidelijk. De samenwerking tussen Philips en NSA startte al in 1977. Toen haalde het elektronicabedrijf zijn eigen versleutelingsprogramma voor de NAVO van de markt haalde. In plaats daarvan stapte Philips, of eigenlijk het dochterbedrijf USFA, over op een programma dat was ontwikkeld door veiligheids- dienst NSA. KG-81, zoals het versleutelingsprogramma heet, was 2,5 keer sneller dan het systeem dat uit de koker kwam van Philips. Als dank voor de overstap mocht Philips de KG-81 gaan produceren voor de Europese markt. Vanaf 1980 bouwde dochterbedrijf USFA honderden codeermachines en digitaal beveiligde telefoons met NSA-programmatuur voor de Europese markt. De opdrachten bleven toenemen en de omzet schoot omhoog. Ook het Nederlandse leger en dus ook het ministerie van buitenlandse zaken voorzag Philips onder- meer van telefoons waarbij woorden meteen werden vervormd. Pas aan het andere uiteinde werden deze woorden weer verstaanbaar gemaakt. Of de NSA misbruik kon maken van haar positie als ont- wikkelaar van het besturingsprogramma van de telefoons en codeermachines, is onduidelijk. De Groene Amsterdammer schrijft dat het nu wachten is op meer onthullingen. Maar volgens NRC Handelsblad is de kans zeer klein dat NSA Nederlandse telefoons aftapte. Om de telefoons in gebruik te nemen, moest een speciale sleutel geladen worden, zegt NRC-verslaggever Steven Derrix. Alleen door die sleutels met anderen te delen, was aftappen mogelijk. Derrix: "Nederland had eigen beveilig- de sleutels die niet zijn gedeeld. De NAVO gebruikte wel sleutels van de NSA, maar dat is niet zo vreemd als je bedenkt dat de apparatuur daar gebruikt wordt voor militaire communicatie."
PHILIPS WERKTE SAMEN MET NSA - 1 Philips werkte jarenlang intensief samen met NSA-spionnen http://www.volkskrant.nl/vk/nl/2680/Economie/article/detail/3585464/2014/01/29/Philips-werkte- jarenlang-intensief-samen-met-NSA-spionnen.dhtml Volkskrant / byMichael Persson Jan 29 2014 Jan 29. Elektronicaconcern Philips heeft jarenlang intensief samengewerkt met de Amerikaanse inlichtingendienst NSA. Philips verkocht beveiligde telefoons aan de Nederlandse overheid, waarvan de versleuteling afkomstig was van de Amerikaanse spionnen en hun Britse collega's (de GCHQ, Government Communications Headquarters). De telefoons zijn tot een paar jaar geleden door het Nederlandse leger en op ambassades gebruikt. De NSA bevond zich in het hart van het Nederlandse militaire en diplomatieke verkeer. Philips liep in zekere zin aan de leiband van de NSA, zo beschrijft onderzoeksjournalist en Philips-biograaf Marcel Metze in een artikel dat vandaag in De Groene Amsterdammer verschijnt. Uit archiefonderzoek en gesprekken met voormalige medewerkers van Philips-dochter Ultra Sonore Fabricage Afdeling (USFA), de cryptografische afdeling van het concern, blijkt dat het bedrijf wel met de Amerikanen moest samenwerken. Zonder de NSA-input maakten de Nederlanders geen kans op opdrachten van NAVO-landen. Encryptiemachines Dus nam Philips de NSA aan boord, toen het begin jaren tachtig encryptiemachines ging bouwen voor de NAVO en meedong naar een grote order (200 miljoen gulden) voor een nieuw FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 78 communicatienetwerk voor het Nederlandse leger. Philips leverde in de jaren daarna onder de codenaam Zodiac mobiele verbindingen, telefooncentrales en duizenden digitaal beveiligde telefoons aan het leger. De telefoons waren zeer vernieuwend: ze verhaspelden de woorden meteen tijdens het spreken. Ook het ministerie van Buitenlandse Zaken nam de telefoons af. De NSA leverde een met de GCHQ ontwikkeld versleutelingsprogramma voor de telefoons, Saville, dat ingebakken in drie chips in de apparaten werd ingebouwd. Er waren slechts enkele medewerkers bij Philips die het algoritme kenden. Overigens zat de NSA-code in alle apparatuur van de NAVO-landen. 'De NSA had die order gewonnen, zij waren gewoon de beste', zegt hoogleraar computerbeveiliging Bart Jacobs van de Radboud Universiteit Nijmegen. Of de Amerikanen hun kennis misbruikt hebben is niet duidelijk. Betrokken Philips-medewerkers zeggen daarvan niet op de hoogte te zijn. Als de Amerikanen opzettelijk een zwakke plek (een 'achterdeur') in de software zouden hebben ingebouwd, zou dat henzelf ook kwetsbaar hebben gemaakt zegt Jacobs. 'Want zij gebruikten de apparaten zelf ook binnen de NAVO.' Achterdeurtjes Uit documenten van Snowden is vorig jaar gebleken dat de NSA graag dergelijke achterdeurtjes inbouwt in commercile encryptiesoftware. Zo bleek vorig jaar dat de NSA ook een zwakke plek had laten maken in een algoritme van het bedrijf RSA. De commissie die president Obama adviseerde over de NSA pleitte er in december voor dat de dienst zich niet meer bemoeit met encryptiesoftware bij bedrijven. Of de NSA nog steeds apparatuur levert aan NAVO-landen is niet bekend. Jacobs: 'Ik kan me niet voorstellen van niet.' Philips wil hierop niet inhoudelijk reageren, omdat het archief van de betrokken dochter USFA in 1989 via de verkoop van Holland Signaal is beland bij het Franse Thomson. Ook noemt een woordvoerder delen van het verhaal speculatief. 'Wij zien op grond hiervan geen aanleiding om eigen onderzoek te beginnen.' Een woordvoerder van het ministerie van Defensie zegt dat het 'niet meer dan logisch is' dat bondgenoten met elkaar kunnen praten. 'Dan is het ook niet raar dat diensten voor encryptie van communicatieapparatuur met bedrijven samenwerken.'
STEDEN RUNNEN HUN EIGEN INLICHTINGENDIENST www.trouw.nl/tr/nl/4500/Politiek/article/detail/3585734/2014/01/29/Steden-runnen-hun-eigen-inlichtingendienst.dhtml Trouw / by Marten van de Wier and Perdiep Ramesar Jan 29 2014 Jan 29. Eindhoven en Tilburg gaan met eigen inlichtingenmedewerkers de strijd aan met criminelen. De gemeenten analyseren zelf politiegegevens, omdat politie en justitie daar niet altijd aan toekomen. "De opsporingscapaciteit van het OM is beperkt", zegt burgemeester Rob van Gijzel. Hij wil dat minister Opstelten het mogelijk maakt dat meer politiedata naar de gemeenten gaan. In Tilburg en Eindhoven zijn medewerkers vrijgemaakt om data over criminaliteit te analyseren. Deze intelligence-medewerkers trekken aan de bel bij opvallende ontwikkelingen, zoals een inbraakgolf. Volgens hoogleraar Algemene Rechtwetenschappen Jan Brouwer past het in de ontwikkeling dat gemeenten het werk doen dat vroeger de gemeentepolitie deed. Naast de intelligence-medewerkers achter hun bureau heb je ook de bijzonder opsporingsambtenaren (boa's) op straat. "Gemeenten zien met lede ogen dat de nationale politie weinig oog heeft voor kleine criminaliteit. De bevolking vraagt om veiligheid, en gemeenten nemen hun verantwoordelijkheid." Oppassen Brouwer, die werkt aan de Rijksuniversiteit Groningen, heeft 'gemengde gevoelens' bij die trend. De politie is aan strenge regels gebonden, maar voor gemeenteambtenaren ontbreekt dat wettelijk kader vaak. "We moeten oppassen voor een overheid die almachtig wordt." Politiegegevens zijn beschermd, en mogen niet zomaar aan een gemeente worden verstrekt vanwege de privacy van verdachten. Eindhoven krijgt nu op incidentele basis of via convenanten informatie van de politie, maar de gemeente wil structureel beschikken over bepaalde informatie. Sinds de Wet Poli- tiegegevens uit 2007 kan dat, als er een 'zwaarwegend belang' is. Opstelten zou positief tegenover het voorstel staan. Preventief Eindhoven wil de informatie onder meer gebruiken voor het jeugdbeleid. "Als wij weten dat van een gezin de oudste broer is opgepakt, kunnen we voorkomen dat in dat gezin ook jongere kinderen in de problemen komen", zegt Van Gijzel. "De politie zit op het strafrecht. Wij zijn meer preventief bezig." Andere grotere gemeenten hebben geen intelligence units. Woordvoerders van de grote steden zeg- gen dat die niet nodig zijn, omdat er al verschillende organen zijn waar informatie wordt geanalyseerd FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 79 en gedeeld. Zo is er het vaste overleg van burgemeester, korpschef en officier van justitie. Ook heeft de politie eigen informatie- en inlichtingenafdelingen, en er is het Regionaal Inlichtingen en Expertise Centrum (RIEC) waar regionaal informatie wordt gedeeld.
AIVD INFORMEERT BURGEMEESTERS OVER AFA https://www.aivd.nl/algemene-onderdelen/uitgebreid-zoeken/@2449/aivd-informeert/ AIVD Jan 19 2014 De AIVD heeft alle burgemeesters van Nederland vandaag in een brief genformeerd over de werkwijze van de Anti Fascistische Actie (AFA). De linkse AFA zoekt de confrontatie met in hun ogen rechtse partijen tijdens partijbijeenkomsten en demonstraties en probeert dit soort bijeen- komsten te voorkomen door het lokale bestuur op oneigenlijke wijze of onder valse voorwendselen te benaderen. AFA past deze werkwijze ook toe in de aanloop naar de gemeenteraadsverkiezingen. De AIVD licht de AFA-werkwijze toe zodat bestuurders in staat zijn hierop adequaat te reageren. AFA benadert regelmatig vaak onder het mom van een antidiscriminatiebureau gemeentebesturen om te voorkomen dat in hun ogen rechtse groeperingen de mogelijkheid krijgen bijeenkomsten te houden of te demonstreren. Wanneer AFA kennis heeft van een geplande demonstratie door rechts, worden gemeenten en bijvoorbeeld zaaleigenaren benaderd en gewaarschuwd voor materile schade die het gevolg kan zijn van dergelijke demonstraties. Schade is in de regel echter juist het gevolg van AFAs tegendemonstraties. Elke gemeente die op enigerlei wijze ruimte biedt aan activiteiten van deze rechtse bewegingen kan te maken krijgen met AFA. De AIVD brengt waar mogelijk altijd de lokale autoriteiten via de regionale inlichtingendiensten (RIDen) vroegtijdig op de hoogte van te verwachten ontwikkelingen Fringe De brief van de AIVD Activiteiten Antifascistische Actie in relatie tot lokaal bestuur Inleiding De AIVD constateert dat de antifascistische actie (AFA) in het verwezenlijken van haar doelstellingen gebruik maakt van valse voorwendselen en oneigenlijke middelen. AFA benadert regelmatig dikwijls in de meer neutrale hoedanigheid van een antidiscriminatiebureau het lokaal bestuur, met als doel te voorkomen dat in hun ogen fascistische groeperingen de mogelijkheid krijgen om hun doelstellin- gen en activiteiten lokaal en nationaal te verwezenlijken. De werkwijze van AFA kan zich richten op iedere gemeente die op enigerlei wijze ruimte biedt aan activiteiten van, naar inzicht van AFA, rechtse bewegingen. AFA past deze werkwijze ook toe in de aanloop naar de gemeenteraadsverkiezingen, hetgeen aanleiding is u nader te informeren over de door de AIVD geconstateerde ontwikkelingen met betrekking tot de werkwijze van AFA. Geschiedenis en ontwikkeling AFA AFA is opgericht in 1992 en heeft verschillende lokale afdelingen. De meeste van deze afdelingen worden via een landelijk secretariaat aangestuurd, sommige acteren autonoom. In de bij haar oprichting uitgebrachte persverklaring stelde AFA zich nadrukkelijk ten doel om manifestaties van fascisten te voorkomen. Hiertoe wilde zij de confrontatie aangaan en zonodig verhinderen dat dergelijke manifestaties plaatsvonden. Waar de antifascistische beweging begon als een groep puur gewelddadige actievoerders, van wie een zekere dreiging uitging (zoals grootschalige verstoring van de openbare orde), groeide zij de laatste twee decennia uit tot een meer politieke lobbygroep. Gebruik van geweld, in eerste instantie tegen de rechtse tegenstander maar daarnaast zeker ook tegen de politie, bleef echter volgens AFA geoorloofd. AFA verrichtte de laatste jaren steeds meer lobbywerk naar, onder meer, het lokaal bestuur. Daarbij wordt bijvoorbeeld gewaarschuwd voor grote schade die kan ontstaan bij manifestaties van extreemrechts. Ook slaagt AFA er frequent in te infiltreren in extreemrechtse groeperingen. Sinds 2000 tracht AFA in toenemende mate elke rechtse activiteit in willekeurig welke gemeente te verhinderen. Daarbij wordt geen onderscheid gemaakt tussen rechtsextremistische groeperingen die het gebruik van geweld niet schuwen en (extreem)rechtse partijen die zich beperken tot het gebruik van politieke middelen. Werkwijze AFA Benvloeding AFA gebruikt verschillende methoden om haar doel te realiseren. Zij doet zich in haar contacten met gemeenteambtenaren en (lokale) politici vaak voor als n van de vele antidiscriminatiebureaus. In die hoedanigheid biedt zij haar expertise aan. Met name wanneer (extreem)rechtse partijen en groeperingen een demonstratie aanmelden, komt AFA in actie en benadert zij het betreffende lokaal FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 80 bestuur, alsmede de zaaleigenaren in de (buurt)gemeenten. De AIVD constateert dat de AFA bij haar activiteiten gebruik maakt van oneigenlijke middelen. Woordvoerders van AFA treden hun gesprekspartners niet onder eigen naam tegemoet. AFA richt zich tot zaaleigenaren om hen te bewegen, onder verwijzing naar te verwachten schade, geen contract af te sluiten met (extreem)rechtse groeperingen. Ook tracht zij op oneigenlijke wijze invloed uit te oefenen op lokaal beleid; eveneens onder alias. Zo worden gemeenten aangeschreven met verwijzingen naar eventuele grote materile schade door toedoen van extreemrechts, wanneer de gemeente een demonstratie van extreemrechts toestaat. In sommige gevallen heeft dit geleid tot annulering van een demonstratie, die vervolgens met succes bij de rechter werd aangevochten door bijvoorbeeld de Nederlandse Volksunie (NVU). Wanneer de manifestaties wel doorgang vinden, wordt de materile schade doorgaans veroorzaakt door antifascisten en hun sympathisanten zelf, en niet door rechtse demonstranten. De AIVD heeft in diverse gevallen geconstateerd dat lokale bestuurders door AFA zijn benaderd om aan AFA bruikbare informatie te leveren over activiteiten van rechtse groepen en partijen. Dit gebeurde met de waarschuwing voor mogelijke ernstige verstoringen van de openbare orde door rechtse groeperingen. In n geval verschafte een door AFA benaderde, gentimideerde, persoon diverse data waaronder persoonsgegevens aan AFA. Deze, gedeeltelijk dus ook vertrouwelijke, informatie werd vervolgens door AFA breed verspreid. Dit heeft in het verleden geleid tot fysiek geweld tegen personen die volgens AFA extreemrechts zijn. Daarnaast tracht AFA in relatie tot verkiezingen zeer vroegtijdig in het bezit te komen van kandidatenlijsten en persoonsgegevens van kandidaten. Zij doen dit via contactpersonen binnen partijen. Deze data worden in sommige gevallen gebruikt in eigen onderzoek van AFA naar, deels vermeende, rechtsextremisten. Daarbij is het gebeurd dat individuen ten onrechte werden neergezet als rechtsextremist en als zodanig werden geschaad. Tegendemonstraties van AFA Acties van AFA kunnen ook een meer gewelddadige vorm aannemen. Dit is bijvoorbeeld het geval bij demonstraties tegen de in hun ogen rechtse tegenstander, zoals de extreemrechtse NVU, of de ter plaatse optredende Mobiele Eenheid. De werkwijze van AFA volgt hierbij meestal een vast patroon. Tot 2009 meldde AFA in dezelfde gemeente een eigen tegendemonstratie aan, met als doel een demonstratie van de NVU te verstoren. Sinds 2009 worden deze acties georganiseerd door een AFAwerkgroep met de naam Laat Ze Niet Lopen (LZNL). Deze tegendemonstraties worden doorgaans geaccepteerd. De NVU demonstreert en AFA roept elke linkse demonstrant op om het politiekordon te doorbreken, om zo te trachten een (gewelddadige) confrontatie met de NVU aan te gaan. Dit mislukt in de meeste gevallen, waarna het vaak tot een harde confrontatie komt tussen antifascisten en de Mobiele Eenheid. Voorbeelden waren in 2009 Maastricht (anti-Voorpost manifestatie) en in Venlo (anti-NVU betoging). In de loop van 2009 heeft AFA haar werkwijze met betrekking tot tegendemonstraties verder ontwik- keld. AFA meldt niet langer al haar tegendemonstraties aan. Bovendien speelt de AFA-activist tijdens acties nu meer een aansturende rol dan een deelnemende. Leden van de AFA werkgroep LZNL zijn door infiltratie vaak vroegtijdig op de hoogte van plaats en datum van demonstraties. LZNL zoekt vervolgens lokaal hulp en benadert groepen die te mobiliseren zijn om tegen rechts te demonstreren. Dit kunnen bijvoorbeeld de plaatselijke moskee, Marokkaanse verenigingen of voetbalhooligans met linkse sympathien zijn. Ook de werkwijze op straat is veranderd: deelnemers verschijnen nu in kleine groepjes en in nette kleding. Deze groepen trachten door middel van hit-en-run acties bij de tegen- standers te komen of door het blokkeren van de route hun demonstratie te verhinderen. Deze nieuwe werkwijze is vorig jaar uitgeprobeerd in Den Bosch, Maastricht en Venlo. WOB Via de Wet Openbaarheid van Bestuur (WOB) vragen AFA-vertegenwoordigers allerlei voor hen nuttige informatie op. Recent zijn nieuwe WOB-voorschriften opgesteld waarbij bijvoorbeeld een overschrijding van de beantwoordingstermijn financile consequenties heeft voor de aangeschrevene. Niet uitgesloten kan worden dat deze regelgeving, bijvoorbeeld als extra inkomstenbron, door AFA wordt aangegrepen om nog meer verzoeken in te dienen. Gemeenteraadsverkiezingen 2010 In 2009 is binnen AFA een werkgroep opgericht, die het doel heeft om de plannen van de PVV in kaart te brengen met het oog op de gemeenteraadsverkiezingen. Inmiddels hebben diverse manifes- taties van antifascisten en geestverwanten plaatsgevonden. De eerste hiervan was een lawaaidemon- stratie in Waddinxveen (februari 2009) waar PVV-leider Wilders zijn opwachting maakte. Begin no- vember 2009 trok een fakkeloptocht in Arnhem ongeveer tweehonderd deelnemers. Naast (veelal jonge) antifascisten namen daaraan ook oudere verontruste burgers en allochtone Nederlanders deel. De manifestatie werd door de organisatoren (AFA) als een groot succes beoordeeld en gaf aanleiding FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 81 om de samenwerking met lokale groeperingen en individuen vaker te zoeken in relatie tot de gemeen- teraadsverkiezingen. De AIVD heeft aanwijzingen dat AFA in de aanloop naar de verkiezingen meer van dit soort acties voorbereidt, waarbij zij zich naast de PVV ook richt op partijen als NVU, Trots op Nederland en de Partij Vrij Utrecht van Wim Vreeswijk. Op zich is een en ander geoorloofd. AFA beschikt echter over een harde kern die geweld niet schuwt, en het valt niet uit te sluiten dat n of meer van de bijeenkomsten van deze partijen zal ontaarden in verstoringen van de openbare orde. De intensiteit van de acties zal mogelijk toenemen met het naderbij komen van de verkiezingen. Een onberekenbare factor is de deelname van allerlei lokale actievoerders aan de AFA-manifestaties. In het verleden heeft dit escalerend gewerkt. Conclusie AFA is volgens de AIVD geen antidiscriminatie- of onderzoeksbureau, maar veeleer een actiegroep die in het realiseren van haar doelstellingen soms op oneigenlijke wijze lokale bestuurders benadert. Daarnaast wordt geweld tegen in hun ogen extreemrechts en/of ordebewaarders niet geschuwd. De AIVD zal, zoals altijd, waar mogelijk de lokale autoriteiten middels de RID vroegtijdig op de hoogte brengen van de te verwachten ontwikkelingen.
in the Fringe
THE REMOTE STOPPING OF CARS EU has secret plan for police to 'remote stop' cars The EU is developing a secret plan to give the police the power to control cars by switching the engine off remotely www.telegraph.co.uk/news/worldnews/europe/eu/10605328/EU-has-secret-plan-for-police-to-remote-stop-cars.html Telegraph Source: Steven Aftergood / Secrecy News / FAS / Washington / www.fas.org Jan 30 2014 Jan 29. The European Union is secretly developing a "remote stopping" device to be fitted to all cars that would allow the police to disable vehicles at the flick of a switch from a control room. Confidential documents from a committee of senior EU police officers, who hold their meetings in secret, have set out a plan entitled "remote stopping vehicles" as part of wider law enforcement surveillance and tracking measures. "The project will work on a technological solution that can be a 'build in standard' for all cars that enter the European market," said a restricted document. The devices, which could be in all new cars by the end of the decade, would be activated by a police officer working from a computer screen in a central headquarters. Once enabled the engine of a car used by a fugitive or other suspect would stop, the supply of fuel would be cut and the ignition switched off. The technology, scheduled for a six-year development timetable, is aimed at bringing dangerous high- speed car chases to an end and to make redundant current stopping techniques such as spiking a vehicle's tyres. The proposal was outlined as part of the "key objectives" for the "European Network of Law Enforcement Technologies", or Enlets, a secretive off-shoot of a European "working party" aimed at enhancing police cooperation across the EU. Statewatch, a watchdog monitoring police powers, state surveillance and civil liberties in the EU, have leaked the documents amid concerns the technology poses a serious threat to civil liberties "We all know about the problems surrounding police stop and searches, so why will be these cars stopped in the first place," said Tony Bunyan, director of Statewatch. "We also need to know if there is any evidence that this is a widespread problem. Let's have some evidence that this is a problem, and then let's have some guidelines on how this would be used." FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 82 The remote stopping and other surveillance plans have been signed off by the EU's Standing Committee on Operational Cooperation on Internal Security, known as Cosi, meaning that the project has the support of senior British Home Office civil servants and police officers. Cosi, which also meets in secret, was set up by the Lisbon EU Treaty in 2010 to develop and implement what has emerged as a European internal security policy without the oversight of MPs in the House of Commons. Douglas Carswell, the Conservative MP for Clacton, attacked the plan for threatening civil liberties and for bypassing the parliament. "The price we pay for surrendering our democratic sovereignty is that we are governed by an unaccountable secretive clique," he said. Nigel Farage, the leader of Ukip, described the measure as "incredible" and a "draconian imposition". "It is appalling they are even thinking of it," he said. "People must protest against this attack on their liberty and vote against an EU big Brother state during the Euro election in May." In 2012, Enlets received a ?484,000 grant from the European Commission for its declared mission to "support front line policing and the fight against serious and organised crime by gathering user requirements, scanning and raising awareness of new technology and best practices, benchmarking and giving advice". The six-year work programme for Enlets also includes improving automatic number plate recognition technology and intelligence sharing. Although the technology for police to stop a vehicle by remote control has still to be developed, Enlets argues the merits of developing such a system. "Cars on the run can be dangerous for citizens," said a document. "Criminal offenders will take risks to escape after a crime. In most cases the police are unable to chase the criminal due to a lack of efficient means to stop the vehicle safely." The introduction of stopping devices has raised questions of road safety. David Davis, the Conservative MP for Haltemprice and Howden, warned that the technology could pose a danger to all road users. "I would be fascinated to know what the state's liability will be if they put these devices in all vehicles and one went off by accident whilst a car was doing 70mph on a motorway with a truck behind it resulting in loss of life," he said. "It is time legislators stopped believing technology is a form of magic and realised that is fallible, and those failures do real harm."
Fringe Colophon
About the editor/publisher: Roger Vleugels In 1986, I started my own office and began working as a legal advisor / acting lawyer and lecturer specialized in freedom of information and intelligence. In 2001, I added the publishing of the Fringe journals to my activities. I lecture on freedom of information at journalism schools, universities and corporations. I have taught students in or from Argentina, Aruba, Belgium, Bulgaria, Denmark, Estonia, Finland, Germany, Hungary, Indonesia, Italy, Iran, Ireland, Macedonia, Mexico, Moldova, the Netherlands, Norway, Slovakia, South Africa, Sweden, Turkey and the United Kingdom. Since 1988, I have as a legal advisor / acting lawyer filed for or with my clients more than 4,500 FOIA requests. Most of these clients are journalists in the Netherlands but also special interest groups, NGOs, researchers and private persons. As an intelligence specialist, I research and lecture on this topic, with a focus on forensic and operational aspects. I comment in the press, brief members of parliament and advise journalists and lawyers.
The format of the Fringe journals The main goal of the Fringe journals is: not being a regular magazine. The journals are purely a research tool. Articles are not selected for their content but for the facts or trends within them. One of the consequences is that Fringe does not dis- criminate between information and disinformation. Other goals are trying to publish news in early stages, before the news is established with an overall focus on next to main- stream. After doing so Fringe will not cover such a topic further, unless there is again something special, and above all: Fringe hopes to be a bit wayward.
Surfing, searching, stringers and sources Articles are gathered for Fringe by a small group of Dutch and foreign stringers, some of whom work covertly. Without the work of these stringers Fringe would not be possible. Additionally I do some gathering on my own, mainly by netsurfing and maintain- ing a range of subscriptions, feeds and alerts. Some of the more specialized sources are: Access Info Europe, Article 19, Be- Spacific, Bits of Freedom, Centre for Law & Democracy, Cryptogram, CFOI, Cryptome, EDRi-gram, EFF, EPIC, FOIANet, Free- FRINGE INTELLIGENCE - year 13 - no.284 February 1 2014 - page 83 domInfo, Geheim, Infowarrior, Intelforum, Intelligence Online, Memory Hole, Mother Jones, National Security Archive, Nato- Watch, NISA, Privacy International, RCFP, Secrecy News, StateWatch, Terrorism Monitor and Wired.
Two Fringe journals Fringe Intelligence gathers intelligence news from established media and outlets beyond the mainstream. The journal offers ar- ticles covering classical intelligence and counterintelligence, criminal and private espionage and more. The main focus is on forensic and operational information, and not on bureaucracy, politics and the formal/legal aspects of intelligence. Fringe Intel- ligence does not concentrate on terrorism. Special sections highlight NARINT, or Natural Resources Intelligence [dealing with energy, rare earth, water and climate intelligence], and Intelligence 2.0 [IT sector-generated private intelligence]. These sections look beyond jihad, cyber and other previous or present threats. Fringe Spitting publishes for freedom of information [FOI] specialists, investigative journalists and other researchers, with a spe- cial focus on FOI practitioners and requesters, news on caseload, jurisprudence, litigation, tools and trends. Space is also devo- ted to recently disclosed old news on intelligence, revealed by FOI requests. Taken together, the two biweekly journals contain about 100 articles per month selected from a variety of media sources. Almost all articles are internet downloads. Over 90% are in English. Less than 10% are focused on the Netherlands.
3,100 subscribers In terms of circulation, both Fringe journals enjoy a top ranking in their sector, respectively OSINT and FOI, among the world- wide communities of independent email journals and mailing lists. Fifty-five percent of the subscribers are intelligence specialists, 30% journalists and 15% FOIA specialists. They live in 118 countries: 35% in NL, 25% in US, 5% in the UK and 35% in the rest of the world.
Pose questions directly or by LinkedIn or Twitter Please feel free to mail me directly. You can also contact me by the networks I belong to. More than 2,000 subscribers have joined one or more groups managed by me on LinkedIn: FOIA Specialists; Wob Specialists; NARINT; Dutch Intelligence Watch Specialists or Intelligence 2.0. I am also active on Twitter. Most of my tweets are in Dutch. Breaking news I tweet in English: @RogerVleugels. For privacy and usability reasons, I do not like Facebook. Therefore I am only passively present on that network.
Fringe is solely a research tool All articles [re]published in Fringe are solely meant for research by the subscribers themselves. It is forbidden to [re]publish or [re]circulate articles either in part or in their entirety. This is not a Fringe policy but a consequence of the Fair Use Notice. Because Fringe is a free-of-charge research tool, it is permitted to recirculate copyrighted material according to the Fair Use Notice. One of the conditions is: in a closed circuit; that is why there is no site. More information on this rule is available at the end of this colophon.
The meaning of the symbol At the start of an article you will find several . They identify the source and the date of the article. The source: after one or more you will find the source [the first source mentioned is the original one, the latter source is the publication or stringer from which/whom Fringe received the article]. The date: before you will see the date on which Fringe received the article; after the original publication date [if known].
Subscriptions are free of charge and include both journals Subscribers receive both journals free of charge. A voluntary contribution is very welcome, however. Producing Fringe is a time- consuming project. Each year in January I ask subscribers for a voluntary contribution. Copyright law [see the Fair Use Restriction at the bottom of this colophon] forbids to charge for journals like Fringe. Therefore, the only way to collect enough money to keep this service going is by voluntary contributions or donations. To guarantee the service in the long run 400-500 paying subscribers on a yearly basis are needed. This number is now about 150 and rising. so please consider paying the voluntary contribution every your or once in every 2, 3 or 4 years. To start a subscription e-mail 'Start Fringe' and to unsubscribe 'Stop Fringe' in the subject line, to roger.vleugels@planet.nl
Voluntary contributions or donations are very welcome My suggestion: 48.00 Euros per year for individual subscribers [this equals one Euro per issue] 24.00 Euros per year for students and others with modest means 200.00 Euros per year for news media or other organizations with multiple users/subscribers or subscribers who are well to do
Payments via the bank ING Bank: IBAN: NL79 INGB 0003 4320 10 / BIC: INGBNL2A, account holder: Roger Vleugels, Utrecht, The Netherlands Reference: Fringe contribution of Fringe donation
Payments by post or check (for larger sums, please use registered mail) Roger Vleugels / Korfoedreef 213 / 3562 SL Utrecht / The Netherlands Reference: Fringe contribution of Fringe donation
Fair Use Notice The Fringe journals contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. The material is being made available for purposes of education and research of the subscribers themselves. This constitutes a "fair use" of such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on these journals are distributed without profit to those who have expressed an interest in receiving the included information for research and educational purposes only. If a subscriber wishes to use copyrighted material from these journals for purposes that go beyond "fair use," you must obtain permission from the copyright owner. For more information: www.law.cornell.edu/uscode/17/107.html