Pentagon Rushing to Open Space-War Center To Counter China, Russia

defense-large

The Pentagon and intelligence community are developing war plans and an operations center to fend off Chinese and Russian attacks on U.S.military and government satellites

The ops center, to be opened within six months, will receive data from satellites belonging to all government agencies, Deputy Defense Secretary Robert Work said Tuesday at the GEOINT symposium, an annual intelligence conference sponsored by the United States Geospatial Intelligence Foundation.

“We want to be able to establish patterns of life from space. We want to know what the unusual looks like. If, all of a sudden, a lot of cars show up in a parking lot of an adversary’s missile plant, we want to know about it and we want to know about it quickly. If, suddenly, small boats are swarming in the Gulf or pirates are starting to congregate off Aden, we want to know.”

“[W]e are going to develop the tactics, techniques, procedures, rules of the road that would allow us … to fight the architecture and protect it while it’s under attack,” Work said. “The ugly reality that we must now all face is that if an adversary were able to take space away from us, our ability to project decisive power across transoceanic distances and overmatch adversaries in theaters once we get there … would be critically weakened.”

“If Russian soldiers are snapping pictures of themselves in war zones and posting them in social media sites, we want to know exactly where those pictures were taken.”

Work also said that Air Force Secretary Deborah James would soon be named the “principal space advisor” to Defense Secretary Ashton Carter, where she will to provide “independent advice separate from the consensus process of the department.”

Senior officials at the Pentagon and Office of the Director of National Intelligence are still finalizing details of the new center, which will back up the military’s Joint Space Operations Center at Vandenberg Air Force Base, California.

The center will help the military and government coordinate their preparations for and responses to any attack, said Lt. Cmdr. Courtney Hillson, a spokeswoman for Work. Read the rest of this entry »


OPM IT Outsourced to Foreigner Contractors, with Root Access, Working from their Home Country. In this Case, Oh Yeah, China

opm-it

Encryption ‘would not have helped’ at OPM, says DHS official: Attackers had valid user credentials and run of network, bypassing security

 reports: During testimony today in a grueling two-hour hearing before the House Oversight and Government Reform Committee, Office of Personnel Management (OPM) Director Katherine Archuleta claimed that she had recognized huge problems with the agency’s computer security when she assumed her post 18 months ago. But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractorsNON-STOP-PANIC-EX, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

But even if the systems had been encrypted, it likely wouldn’t have mattered. Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified that encryption would “not have helped in this case” because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering. And because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network.

House Oversight Chairman Jason Chaffetz (R-Utah) told Archuleta and OPM Chief Information Officer Donna Seymour, “You failed utterly and totally.” He referred to OPM’s own inspector general reports and hammered Seymour in particular for the 11 major systems out of 47 that had not been properly certified as secure—which were not contractor systems but systems operated by OPM’s own IT department. “They were in your office, which is a horrible example to be setting,” Chaffetz told Seymour. In total, 65 percent of OPM’s data was stored on those uncertified systems.

chinese hackers

Chaffetz pointed out in his opening statement that for the past eight years, according to OPM’s own Inspector General reports, “OPM’s data security posture was akin to leaving all your doors and windows unlocked and hoping nobody would walk in and take the information.”

[Read the full text here, at Ars Technica]

When Chaffetz asked Archuleta directly about the number of people who had been affected by the breach of OPM’s systems panic-manand whether it included contractor information as well as that of federal employees, Archuleta replied repeatedly, “I would be glad to discuss that in a classified setting.” That was Archuleta’s response to nearly all of the committee members’ questions over the course of the hearing this morning.

At least we found it

Archuleta told the committee that the breach was found only because she had been pushing forward with an aggressive plan to update OPM’s security, centralizing the oversight of IT security under the chief information officer and implementing “numerous tools and capabilities.” She claimed that it was during the process of updating tools that the breach was discovered. “But for the fact that OPM implemented new, more stringent security tools in its environment, we would have never known that malicious activity had previously existed on the network and would not have been able to share that information for the protection of the rest of the federal government,” she read from her prepared statement. Read the rest of this entry »


Britain Pulls Spies from Russia, China, as Moscow Cracks Snowden Files

Russ-Hack

London (AFP) – Britain has been forced to move some of its spies after Russia and China accessed the top-secret raft of documents taken by former US intelligence contractor Edward Snowden, British media reported.

“We know Russia and China have access to Snowden’s material and will be going through it for years to come, searching for clues to identify potential targets.”

— Intelligence source, to the Sunday Times

The BBC and the Sunday Times cited senior government and intelligence officials as saying agents had been pulled, with the newspaper saying the move came after Russia was able to decrypt more than one million files.

“It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information,” a Downing Street source said, according to the newspaper.

Downing-street-10_c2e90144db7cf5d0687f026174915573f40f3e36

“It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information.”

— Downing Street source

Downing Street told AFP on Sunday that they “don’t comment on intelligence matters” while the Foreign Office said: “We can neither confirm or deny these reports”.

The BBC said on its website, meanwhile, that a government source said the two countries “have information” that spurred intelligence agents being moved, but said there was “no evidence” any spies were harmed.

Report: Snowden impersonated NSA officials to access some files

Snowden fled to Russia after leaking the documents to the press in 2013 to expose the extent of US online surveillance programmes and to protect “privacy and basic liberties”.

The Sunday Times said other government sources claimed China had also accessed the documents, which reveal US and British intelligence techniques, leading to fears that their spies could be identified. Read the rest of this entry »


Congress Passes NSA Phone-Records Bill

 

Rand Paul

The final vote divided Senate Republicans, with 23 voting ‘yes’ and 30 voting ‘no,’ and senators seeking re-election in 2016 split on the issue

WASHINGTON (AP) — Congress approved sweeping changes Tuesday to surveillance laws enacted after the Sept. 11 attacks, eliminating the National Security Agency’s disputed bulk phone-records collection program and replacing it with a more restrictive measure to keep the records in phone companies’ hands.

CGhfyyAUcAIlw7b

“This is a step in the wrong direction…does not enhance the privacy protections of American citizens. And it surely undermines American security by taking one more tool form our warfighters at exactly the wrong time.”

— Senate Majority Leader Mitch McConnell

Two days after Congress let the phone-records and several other anti-terror programs expire, the Senate’s 67-32 vote sent the legislation to President Barack Obama, who said he would sign it promptly.

“This legislation will strengthen civil liberty safeguards and provide greater public confidence in these programs,” Obama said in a statement. The bill signing could happen late Tuesday or early Wednesday, but officials said it could take at least several days to restart the collection.

drudge-watching-you-nsa

The legislation will revive most of the programs the Senate had allowed to lapse in a dizzying collision of presidential politics and national security policy. But the authorization will undergo major changes, the legacy of agency contractor Edward Snowden‘s explosive revelations two years ago about domestic spying by the government.panic-betty

“I applaud the Senate for renewing our nation’s foreign intelligence capabilities, and I’m pleased this measure will now head to the president’s desk for his signature.”

— House Speaker John Boehner

In an unusual shifting of alliances, the legislation passed with the support of Obama and House Speaker John Boehner, R-Ohio, but over the strong opposition of Senate Majority Leader Mitch McConnell. McConnell failed to persuade the Senate to extend the current law unchanged, and came up short in a last-ditch effort Tuesday to amend the House version, as nearly a dozen of his own Republicans abandoned him in a series of votes.

Big-Brother

“This is a step in the wrong direction,” a frustrated McConnell said on the Senate floor ahead of the Senate’s final vote to approve the House version, dubbed the USA Freedom Act. He said the legislation “does not enhance the privacy protections of American citizens. And it surely undermines American security by taking obamaorwellone more tool form our warfighters at exactly the wrong time.”

“Power is not a means, it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship.”

— George Orwell

The legislation remakes the most controversial aspect of the USA Patriot Act — the once-secret bulk collection program that allows the National Security Agency to sweep up Americans’ phone records and comb through them for ties to international terrorists. Over six months the NSA would lose the power to collect and store those records, but the government still could gain court orders to obtain data connected to specific numbers from the phone companies, which typically store them for 18 months.

viv-light-nsa

It would also continue other post-9/11 surveillance provisions that lapsed Sunday night, and which are considered more effective than the phone-data collection program. These include the FBI’s authority to gather business records in terrorism and espionage investigations and to more easily eavesdrop on suspects who are discarding cellphones to avoid surveillance.

In order to restart collection of phone records, the Justice Department will need to obtain a new order from the Foreign Intelligence Surveillance Court. Read the rest of this entry »


THE SLIMY HAND: Zombie Patriot Act Will Keep U.S. Spying—Even if the Original Dies

zombie-nsa-db-Emil-Lendof

Forget the White House’s doomsday talk about American intelligence going blind. Thanks to backdoor provisions and alternate collection schemes, U.S. spies will keep on snooping.

Shane Harris writes: President Obama and his top national-security officials spent the past few days warning that once intelligence-gathering authorities in the Patriot Act expired just after midnight Sunday, the United States would face a greater risk of a terrorist attack.

“I don’t want us to be in a situation in which for a certain period of time those authorities go away and suddenly we’re dark, and heaven forbid we’ve got a problem where we could’ve prevented a terrorist attack or apprehended someone who was engaged in dangerous activity.”

— President Obama, to reporters on Friday

That argument is highly debatable—at least, in the short term. Not only does the U.S. government have all sorts of other ways to collect the same kind of intelligence outlined in the Patriot Act, but there’s also a little-noticed back door in the act that allows U.S. spy agencies to gather information in pretty much the same ways they did before.

Zombie-Killing

“It does seem to me at least reckless to not allow at least a temporary continuation of the bill while we have this debate. But that’s not the way it’s working, and unfortunately I think it’s part of the presidential campaign, and I think people have to judge it for themselves.”

— Sen. John Cornyn (R-TX)

In other words, there’s a zombie Patriot Act—one that lives on, though the existing version is dead.

On Sunday night, senators voted overwhelmingly to end debate on a measure passed in the House, the USA Freedom Act, which will leave most surveillance authorities in the Patriot Act intact. But some of those powers zombiehandwon’t expire at least until Tuesday and possibly Wednesday. Administration officials had warned that even a momentary interruption posed a grave risk.

“I don’t want us to be in a situation in which for a certain period of time those authorities go away and suddenly we’re dark, and heaven forbid we’ve got a problem where we could’ve prevented a terrorist attack or apprehended someone who was engaged in dangerous activity,” Obama told reporters at the White House on Friday. On Sunday, CIA Director John Brennan said on CBS’s Face the Nation that there’d “been a little too much political grandstanding and crusading for ideological causes that have skewed the debate on this issue,” an apparent reference to Sen. Rand Paul, a Republican presidential candidate, and his promise to force the law to expire, “but these tools are important to American lives.”

[Read the full text here, at The Daily Beast]

They may be. But they are far from the only tools in the counterterrorism arsenal, and though they are no longer law as of Monday, the United States still has plenty of authority to collect intelligence on jihadis and foreign spies.

For starters, there will be what’s left of the Patriot Act itself. Read the rest of this entry »


BREAKING: Deal to Save NSA Surveillance Programs Senate Deadline Panic FUBAR

no-deal-panic

Key Patriot Act provisions will expire at midnight

In addition to the bulk phone collections provision, the two lesser-known Patriot Act provisions that also lapse at midnight were one, so far unused, to helps track “lone wolf” terrorism suspects unconnected to a foreign power; the second allows the government to eavesdrop on suspects who continually discard their cellphones.

The Senate failed Sunday to strike a deal to extend the NSA’s phone surveillance program before the midnight deadline.

Members of the GOP-controlled chamber returned Sunday to Capitol Hill in a last-ditch effort to extend the National Security Agency’s authority to collect Americans’ phone records in bulk to search for terror connections and to authorize two other programs under the post-9/11 Patriot Act.

stock-footage-animated-angry-cuckoo-clock-bird

“Heaven forbid we’ve got a problem where we could have prevented a terrorist attack or apprehended someone who is engaged in dangerous activity, but we didn’t do so simply because of inaction in the Senate.”

— President Obama

The Senate attempted to either pass a House bill that would have altered the collections of the so-called phone call metadata or simply extend the program.

The 100-member chamber passed the first of two procedure hurdles, known as cloture, to proceed with the House bill. The vote was 77 to 17.

“The sky is not going to fall.”

— Anthony Romero, American Civil Liberties Union executive director

But no final action was expected before Sunday’s midnight deadline after Kentucky GOP Sen. Rand Paul served notice that he would assert his prerogatives under Senate rules to delay a final vote for several days.

“The people who argue that the world will come to an end and we will be over by jihadists (by not passing the bill) are using fear,” Paul, a 2016 presidential candidate, said on the Senate floor.

cuckoo-clock

Still, the program is all but certain to be revived in a matter of days, although it also looks certain to be completely overhauled under the House-passed legislation that Senate Majority Leader Mitch McConnell reluctantly blessed in an about-face Sunday evening.

With most senators opposed to extending current law unchanged, even for a short time, McConnell said the House bill was the only option left other than letting the program die off entirely. The Kentucky Republican preferred extending the current law. Read the rest of this entry »


BREAKING: Senate Blocks House Bill on NSA Surveillance, 2-Month Extension

NSA headquarters. Image: Wikimedia Commons

BREAKING NEWS –  The Republican-led Senate blocked a House bill early Saturday that would have ended the National Security Agency’s bulk of collection on domestic phone records.

The vote was 57-42, short of the 60-vote threshold to move ahead. It leaves the fate of the key provisions in the Patriot Act in doubt with a June 1 deadline less than two weeks away.

Francisco Seco/AP - In this October 2013 file photo, a man looks at his cellphone as he walks on the street in downtown Madrid. The NSA’s ability to crack cellphone encryption used by the majority of cellphones in the world offers it wide-ranging powers to listen in on private conversations.

The Senate also failed to advance a two-month extension of NSA programs as well. The vote also needed 60 votes to get to the Senate floor. The vote was defeated 54-45…(read more)

developing…

Fox News

 

 


ANTI-SNOOPER Rand Paul Filibusters Against Patriot Act, Data Collection, NSA Surveillance

rand-paul-vax
Stephen Dinan reports: Sen. Rand Paul announced Wednesday afternoon he’s attempting to filibuster the extension of the Patriot Act, vowing to use all his letape-recordinggislative powers to try to end the snooping law.

The Kentucky Republican’s speech, which began at 1:18 p.m., is not technically holding up any legislation because the Senate is actually currently debating a trade bill, but Mr. Paul said his move was a filibuster nonetheless, as he vowed to hold the floor until he couldn’t go any longer.

“It’s time to end the NSA spying,” his official Twitter account said in a post at 1:36 p.m., as he was on the floor.

drudge-rand
Mr. Paul is waging a lonely fight, demanding that the government stop snooping without probable cause or a warrant. That’s a step beyond even some of his other erstwhile civil libertarian allies who want to curtail the Patriot Act’s bulk collection, but would still allow government agents to go after the records of individuals without first seeking a warrant…(read more)
Washington Times

DECLASSIFIED: U.S. Releases Motherlode of Books, Letters Seized in Bin Laden Raid

 bin-Ladin-zuma-WSJ

WASHINGTON — Damian Paletta reports: The Obama administration on Wednesday released details on more than 400 letters, books, news articles, research reports and even software manuals it seized during the 2011 raid that killed Osama bin Laden at his secret compound in Pakistan, offering a fresh view into the interests and correspondence of the former head of al Qaeda.

The intelligence agency declassified the names of 39 English-language books seized at bin Laden’s compound. These included books about the Central Intelligence Agency; Christianity and Islam in Spain from 756 until 1031; and Bob Woodward’s 2010 book, ‘Obama’s Wars.'”

The declassified material, which the Office of the Director of National Intelligence labeled “Bin Laden’s Bookshelf,” shows a number of interests—ranging from a Noam Chomsky book on “thought control” to things that could be seen, such as how-to books on terrorist attacks.

“It included, for example, a 2001 document from the U.S. military on ‘instruction on aircraft piracy and destruction of derelict airborne objects’ and numerous records about how to obtain a U.S. passport.”

It included, for example, a 2001 document from the U.S. military on “instruction on aircraft piracy and destruction of derelict airborne objects” and numerous records about how to obtain a U.S. passport. The compound also contained numerous world maps.

The house where Osama bin Laden was finally hunted down. SAEED SHAH — MCT Read more here: http://www.mcclatchydc.com/2013/12/20/212378/zero-dark-thirty-leak-investigators.html#storylink=cpy

The house where Osama bin Laden was finally hunted down. SAEED SHAH — MCT

“These are gigantic events that will eventually engulf most of the Muslim world, will free the Muslim land from American hegemony, and is troubling America whose secretary of state declared that they are worried about the armed Muslims controlling the Muslim region.”

Rep. Devin Nunes (R., Calif.), chairman of the House Permanent Select Committee on Intelligence, said “it is in the interest of the American public for citizens, academics, journalists, and historians to have the opportunity to read and understand bin Laden’s documents.”

“All of this indicates that the Western countries are weak and their international role is regressing.”

— Osama bin Laden, in a letter recovered in the raid

The Office of the Director of National Intelligence, which released the records, said analysts were still reviewing more information seized during the raid and that “hundreds more” records could be declassified in the future.

[Read the full text here, at WSJ]

The intelligence agency declassified the names of 39 English-language books seized at bin Laden’s compound. These included books about the Central Intelligence Agency; Christianity and Islam in Spain from 756 until 1031; and Bob Woodward’s 2010 book, “Obama’s Wars.”

In addition to the books, the documents seized at bin Laden’s compound included 35 items published by other extremist groups, most of which came from Khalifah Publications. Read the rest of this entry »


U.S. Court of Appeals for the Second Circuit Declares NSA’s Telephone Dragnet Unlawful

tumblr_inline_no00ufUBZY1ssu7wz_540

In a ruling certain to profoundly shape the ongoing debate over surveillance reform in Congress, the U.S. Court of Appeals for the Second Circuit has ruled that the National Security Agency’s indiscriminate collection of Americans’ telephone calling records exceeds the legal authority granted by the Patriot Act’s controversial section 215, which is set to expire at the end of this month.

Comments Cato scholar Julian Sanchez, “While the court didn’t reach the crucial question of whether the program violates the Fourth Amendment, the ruling gives civil libertarians good reason to hope that a massive and egregious violation of every American’s privacy will finally come to an end.”

[CATO]


Shooting at NSA Headquarters

NSA-shootout

Dana HedgpethSari Horwitz and Ellen Nakashima report: One person was killed and at least one other was injured Monday when shots were fired after two people in a vehicle tried to ram a gate at Fort Meade, a military installation in Anne Arundel County that houses the National Security Agency, according to officials with knowledge of the investigation.

“The shooting scene is contained, and we do not believe it is related to terrorism.”

— Amy J. Thoreson, a spokeswoman for the FBI

Authorities did not release any details of exactly what happened, but law enforcement officials said police officers with the National Security Agency shot at the two people in the vehicle. One of them was killed, the officials said. There were no details immediately available on the condition of the second person.

Two U.S. officials said the men in the vehicle were dressed as women, but they both cautioned that the information is preliminary.

Just before 11 a.m., NSA officials said they had no further information.

In a statement, issued around 11:30 a.m., the FBI Baltimore office said it was investigating a shooting at a gate at Fort Meade.

edia members gather in the parking lot at the National Cryptologic Museum at Fort Meade near the scene of a fatal shooting on Monday. (Michael S. Williamson/The Washington Post)

Media members gather in the parking lot at the National Cryptologic Museum at Fort Meade near the scene of a fatal shooting on Monday. (Michael S. Williamson/The Washington Post)

“The shooting scene is contained, and we do not believe it is related to terrorism,” said Amy J. Thoreson, a spokeswoman for the FBI. She said the incident is being investigated by the FBI with NSA Police and other law enforcement agencies.

FBI crews from its evidence response team are processing the scene and agents are interviewing witnesses, she said. Deputy White House press secretary Eric Schultz said President Obama has been briefed on the incident. Read the rest of this entry »


[VIDEO] The Conservatarian Manifesto: Should Libertarians and Conservatives Unite?

“I think the ‘conservatarian’ term is not a linguistic trick, it is a substantive attempt to describe a certain coterie on the right,” explains Charles C. W. Cooke, a writer for National Review and author of The Conservatarian Manifesto: Libertarians, Conservatives, and the Fight for the Right’s Future. “These are the people who say when they are around libertarians they feel conservative, and when they are around conservatarianconservatives they feel libertarian…(read more)

[Check out Charles C. W. Cooke‘s new book: “The Conservatarian Manifesto: Libertarians, Conservatives, and the Fight for the Right’s Futureat Amazon.com]

Reason TV‘s Nick Gillespie sat down with Cooke to discuss his book…(read more)

Reason.com


THE PANTSUIT REPORT: State Dept: ‘We have reviewed Secretary Clinton’s official personnel file and administrative files and do not have any record of her signing…’

psaki-redacted-oh-crap

This agonizing pretense finally ended on Tuesday, as State Department spokeswoman Jen Psaki finally admitted there seems to be no record of Clinton following the OF-109 requirements

John Hayward reports: Another piece of the puzzle fell into place in Hillary Clinton’s ever-deepening email scandal, as the State Department – following days of absolutely absurd foot-dragging – finally admitted it can’t seem to find any record of her signed Form OF-109.PANTSUIT-REPORT

 “It’s not clear that this form is used as a part of a standard part of checkout across the federal government or even at the State Department…”

This is a crucial document signed by departing State Department employees, testifying that all official records have been turned over, including – but not limited to – classified materials and emails. Since it is manifestly obvious that Hillary Clinton didn’t turn over all such materials, her signature on the OF-109 would have constituted perjury.

:…We’re looking into how standard this is across the federal government and certainly at the State Department… I don’t want to characterize how common practice it is.”

Ever since lawyers familiar with this document began describing it, the State Department has been asked to produce the exit paperwork for Clinton (and her top aides Cheryl Mills, Huma Abedin, and Philippe Reines, who also had accounts on Clinton’s secret email server.) The Republican National Committee filed a Freedom of Information Act request for the documents. Even Clinton-friendly reporters have been asking about it.

brietbart-state-form

Somehow our titanic $3.5 trillion mega government – the same government that just took over the Internet, the brilliant bureaucratic machine that understands health care better than any doctor and investment better than any capitalist – couldn’t seem to find that important piece of paper. Excuses that the government wouldn’t accept from the smallest private enterprise in America were proffered for State’s golly-gee-whiz-aw-shucks inability to produce a crucial form. The same people who love to bury citizens beneath towering piles of paperwork, demanding requests in triplicate for permission to do virtually anything, claimed they had no idea what happened to the Secretary of State’s termination papers. Read the rest of this entry »


[VIDEO] Meet the Department of the Internet! We’ll be Handling the Internet You Love, but at the Speed of Government


Massive Utah Cyberattacks — Up to 300 Million Per Day — May Be Aimed at NSA Facility

dt.common.streams.StreamServer.cls

Since the facility was built, Utah government has had up to 300 million attempted attacks a day

Five years ago, Utah government computer systems faced 25,000 to 30,000 attempted cyberattacks every day.

At the time, Utah Public Safety Commissioner Keith Squires thought that was massive. “But this last year we have had spikes of over 300 million attacks against the state databases” each day: a 10,000-fold increase.

Why? Squires says it is probably because Utah is home to the new, secretive National Security Agency computer center, and hackers believe they can somehow get to it through state computer systems. Read the rest of this entry »


Anti-Ship Missile Detection: Navy to Integrate F-35 With Beyond-the-Horizon Technology

F-35

The Navy and Lockheed Martin are planning to demonstrate a beyond-the-horizon anti-ship missile detection and defense technology using an F-35 Joint Strike Fighter.

The system, referred to as Naval Integrated Fire Control-Counter Air, or NIFC-CA, uses Aegis radar, and airborne sensor and SM-6 missile to find, track and destroy approaching threats such as cruise missiles at ranges well beyond the typical radar horizon, Navy officials said.

Alongside Aegis radar and an SM-6 missile, NIFC-CA uses an E-2D Hawkeye aircraft as an airborne sensor to help relay threat information to the ship from beyond its normal radar range.

Lockheed is working closely with Naval Sea Systems Command, or NAVSEA, to plan a NIFC-CA demonstration at White Sands Missile Range, N.M., sometime this year or next year, a Lockheed executive said.

“We are looking at alternative airborne sensors,” the executive said.

The idea with a demonstration, sources indicate, would be to use the F-35 as an airborne relay node or sensor in place of the E-2D Hawkeye. This could allow NIFC-CA to operate against an increasingly complex set of targets such as stealthy targets, the Lockheed executive explained. Read the rest of this entry »


Ann Compton on Obama: He Launches Profanity-Laced Tirades Against Press

2014-10-30-CSPAN-Compton2
Scott Whitlock reports: According to retired ABC News journalist Ann Compton, Barack Obama launches into “profanity-laced” tirades against the press in off-the-record meetings with reporters. In a C-SPAN interview, Compton also derided the President for leading “the most opaque” administration of “any I have covered.”

“We cover what we are allowed to cover. And when policy decisions and presidents are inaccessible and don’t take questions from the press on a regular basis, I think they reap what they sow.”

The journalist, who retired in August after a 40-year career, revealed to C-SPAN’s Brian Lamb: “I have seen in the last year Barack Obama really angry twice. Both were off-the-record times. One, profanity-laced where he thought the press was making too much of scandals that he did not think were scandals.” [MP3 audio here.]

She explained, “And I don’t find him apologetic. But I find him willing to stand up to the press and look them in the eye, even though it was off the record and just give us hell.”

“Before I walked out the door on September 10, I was a strong voice for complaining that this particular administration has been more opaque than any I have covered about what the President does in the Oval Office everyday…”

After Lamb wondered if the President had a point, she chided, “We cover what we are allowed to cover. And when policy decisions and presidents are inaccessible and don’t take questions from the press on a regular basis, I think they reap what they sow.”

2014-10-30-CSPAN-Compton1_0

Despite Obama’s apparent rage against the press, he hasn’t had much to complain about. The Media Research Center documented how journalists covered-up his failures and scandals.

Earlier in the hour-long C-SPAN interview, which aired on Sunday night, but was recorded in October, Compton slammed the “opaque” administration:

ANN COMPTON: Before I walked out the door on September 10, I was a strong voice for complaining that this particular administration has been more opaque than any I have covered about what the President does in the Oval Office everyday. He is far less accessible on photo-ops with meetings. Even some meetings on the record, meeting in the Roosevelt room with financial leaders from, from Wall Street or on issues with environmental groups, or with issues with environmental groups, with public opinion leaders, I think most presidents have been far more forthcoming than the second Obama term, in terms of what the President is doing every day and we almost never get photo-ops.

She added that it’s fine for the White House to take its own photographs, but “those same elements should not be blocked from the White House press corps.”

Interestingly, on Compton’s last day in August, the President called on her for a final question. She chose to ask about the police shooting in Ferguson, not the concerns she expressed to C-SPAN. Read the rest of this entry »


Spies in the Skies: Americans’ Cellphones Targeted in Secret U.S. Spy Program

dirtbox-spy-plane-img

Fake Cellphone Towers on Planes Used to Target Criminals, but Also Sift Through Thousands of Other Phones

WASHINGTON—Devlin Barrett reports: The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

“The program cuts out phone companies as an intermediary in searching for suspects. Rather than asking a company for cell-tower information to help locate a suspect, which law enforcement has criticized as slow and inaccurate, the government can now get that information itself.”

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

big-brother-poster

“Similar devices are used by U.S. military and intelligence officials operating in other countries, including in war zones, where they are sometimes used to locate terrorist suspects, according to people familiar with the work. In the U.S., these people said, the technology has been effective in catching suspected drug dealers and killers. They wouldn’t say which suspects were caught through this method.”

Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information. Read the rest of this entry »


Surveillance-Proof

viv-light-nsa

First Apple and then Google announced that they would use encryption on new phones that wouldn’t permit them to help police execute warrants to examine data on a cell phone or other device.

For City Journal, Judith Miller writes: Law enforcement officials in New York and Washington criticized technology superpowers Google and Apple this week for selling cell phones and other devices that cannot be accessed by the government, warning that such technology jeopardizes public safety.

judith-miller-city-journal

Judith Miller is a contributing editor of City Journal, and an adjunct fellow at the Manhattan Institute

In his first major policy address, FBI director James B. Comey called on Congress and the Obama administration to counter the expanding use of such devices, which he and other law enforcement officials assert endanger efforts to prevent terrorism and fight crime. Without lawful government access to cell phones and Internet devices, Comey warned, “homicide cases could be stalled, suspects could walk free, and child exploitation victims might not be identified or recovered.”

“Law enforcement officials many legitimate ways to obtain the data stored on our devices. Weakening the security of smartphones and trusted communications infrastructure should not be one of them.”

— Nuala O’Connor, president of the Center for Democracy and Technology

Comey, who became FBI director last year, said that he understood Americans’ “justifiable surprise” at former National Security Agency contractor Edward Snowden’s revelations about U.S. government surveillance practices. Read the rest of this entry »


Apple will No Longer Unlock User’s Mobile Devices for Police, Even with Search Warrants

Obama Big brother

The Washington Post reports: Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

big-brother-halfThe move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”

As the new operating system becomes widely deployed over the next several weeks, the number of iPhones and iPads that Apple is capable of breaking into for police will steadily dwindle to the point where only devices several years old — and incapable of running iOS 8 — can be unlocked by Apple.

Apple will still have the ability — and the legal responsibility — to turn over user data stored elsewhere, such as in its iCloud service, which typically includes backups of photos, videos, e-mail communications, music collections and more. Users who want to prevent all forms of police access to their information will have to adjust settings in a way that blocks data from flowing to iCloud. Read the rest of this entry »


In NSA-Intercepted Data, Those Not targeted Far Outnumber the Foreigners Who Are

FISAdocs_promo

This is one of those big WaPo investigations that few traditional newspapers have the resources to do anymore. I recommend it, read the whole thing here.

For The Washington PostBarton GellmanJulie Tate, and Ashkan Soltani report:

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.

[Also see: History lesson: The crucial differences between Bush and Obama’s NSA phone surveillance programs]

Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.

The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.

Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.

The material spans President Obama’s first term, from 2009 to 2012, a period of exponential growth for the NSA’s domestic collection.

The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address.

Among the most valuable contents — which The Post will not describe in detail, to avoid interfering with ongoing operations — are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks. Read the rest of this entry »


The ‘Weather App’ Agent: Germany Demands Full Explanation from U.S. on Arrested Spy

germany-horiz

Investigators found an encrypted communication application hidden on his computer

BERLIN – For the TelegraphJustin Huggler reports: A suspected double agent under arrest in Germany has been spying for the CIA for two years, German intelligence officials investigating the case now believe.

“All the evidence suggests that he was working for the Americans,” an unnamed senior security official has told Frankfurter Allgemeine Zeitung newspaper.

The country’s top security official has demanded a full American response to German investigations. “I expect everyone now to assist quickly in clearing up the accusations – and quick and clear statements, from the USA too,” Thomas de Maiziere, the Interior minister said.

Germany’s Foreign Ministry summoned the America ambassador on Friday but German authorities have confirmed only that a 31-year-old man is under arrest.

The first indications that investigators believe a confession by the arrested man is true. If the suspicions against him are confirmed, the case could cause grave damage to US-German relations.

Read the rest of this entry »


Follow

Get every new post delivered to your Inbox.

Join 6,270 other followers