Haitian newspapers printed names that corresponded to social media profiles of U.S. citizens claiming military backgrounds.
Please use the sharing tools found via the share button at the top or side of articles. Copying articles to share with others is a breach of FT.com T&Cs and Copyright Policy. Email firstname.lastname@example.org to buy additional rights. Subscribers may share up to 10 or 20 articles per month using the gift article service. More information can be found at https://www.ft.com/tour.
“Some say that because these countries are using Huawei equipment, it makes it harder for US agencies to obtain these countries’ data,” he added.
Mr Xu also revealed that Huawei would spend more than $2bn to restructure the code used in its telecoms services worldwide after a series of “confrontational” meetings with Britain’s cyber security agency over the issue.
(7.1.2019) William Xu, director of the board and chief strategy marketing officer of Huawei, noted that Huawei had worked extensively with Intel. But he said a diversity of applications and data is driving varied computing requirements. “Huawei has long partnered with Intel to make great achievements,” said Xu in a statement. “Together we have contributed to the development of the ICT industry. Huawei and Intel will continue our long-term strategic partnerships and continue to innovate together.”
During his testimony, FBI Director Chris Wray said the government was “deeply concerned about the risks of allowing any company or entity that is beholden to foreign governments that don’t share our values to gain positions of power inside our telecommunications networks.” He added that this would provide “the capacity to maliciously modify or steal information. And it provides the capacity to conduct undetected espionage.”
(1985) In February, 1985, we carried out an eavesdropping experiment in London, in cooperation with the British Broadcasting Corporation. Part of the results were shown in the programme „Tomorrow’s World.“ A small van was equipped with a 10 metre high pump mast to which a VHF band III antenna was clamped (10 dB gain). The received signal was fed through an antenna, amplified (18 dB) and displayed on a television screen inside the van.
For obvious reasons we cannot give information on the data picked up during the experiment. The results can be
summarized as follows:
• It is possible to eavesdrop on the video display units or terminals in buildings from a large distance, using a car fitted up for the purpose.
• Although the experiment was carried out in broad daylight and many people watched us, nobody asked what we were doing.
(April 2015) Q1: What information is leaked by the electromagnetic emanations from computers?
This depends on the specific computer hardware. We have tested numerous laptop computers, and found the following:
In almost all machines, it is possible to tell, with sub-millisecond precision, whether the computer is idle or performing operations.
On many machines, it is moreover possible to distinguish different patterns of CPU operations and different programs.
Using GnuPG as our study case, we can, on some machines:
distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and fully extract decryption keys, by measuring the laptop’s electromagnetic emanations during decryption of a chosen ciphertext.
The high logical complexity of the out-of-order technique is the reason that it did not reach mainstream machines until the mid-1990s. Many low-end processors meant for cost-sensitive markets still do not use this paradigm due to the large silicon area required for its implementation. Low power usage is another design goal that is harder to achieve with an out-of-order execution (OoOE) design.
A vulnerability in some microprocessor manufacturers‘ implementations of the out-of-order execution mechanism was reported to the manufacturers on June 1, 2017, but which was not publicized until January 2018, …
(2.3.2018) The so-called SgxPectre side-channel attack affects programs with sensitive components protected by Intel’s SGX or Software Guard Extensions enclaves.
SGX is available in newer Intel Core chips and allows developers to selectively isolate sensitive application code and data to run in their own execution environment.
(8.2.2019) Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel’s threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat model is realistic. In particular, it is unclear to what extent enclave malware could harm a system. In this work, we practically demonstrate the first enclave malware which fully and stealthily impersonates its host application. Together with poorly-deployed application isolation on personal computers, such malware can not only steal or encrypt documents for extortion, but also act on the user’s behalf, e.g., sending phishing emails or mounting denial-of-service attacks.
Every tap, button push and keyboard entry is recorded — effectively screenshotted — and sent back to the app developers.
Or, as Glassbox said in a recent tweet: “Imagine if your website or mobile app could see exactly what your customers do in real time, and why they did it?”
Bezos’s accusation last night that National Enquirer owner American Media Inc. is trying to blackmail him had everything: Extortion, murder, politics, a billionaire’s private parts. It inspired both HuffPost and the elder Post to write the mathematically perfect tabloid headline, which I will not reprint in this wholesome family newsletter. More seriously, this is the latest and weirdest front in a clash of titans pitting the President of the United States against the World’s Richest Man.
(8.6.2017) Since 2009, regular meetings are held in the Netherlands, in which also officials from the FBI participate. The aim is to cooperate in tracking down and eventually arresting cyber criminals. The Volkskrant’s front page report is accompanied by an extensive background story, which contains some more worrying details, but is only available in Dutch.
The cooperation with the Russians dates back to September 2007, when the head of THTC attended a conference in the Russian city of Khabarovsk, at which CIA, FBI, Mossad, BND and other agencies were present. The head of THTC was able to create a connection to the FSB and their deputy head of the department for cyber crime, Sergei Mikhailov, became the liaison for the Dutch police and would regularly visit the Netherlands.
The group is recommending that cyber penalties focus on individuals and entities. It said the door should also be left open to making cyber-crimes also subject to “sectoral measures.”
The EU has been mulling such a cyber sanctions regime since 2015 and the group of countries is pressing the bloc’s 28 nations to formally agree on the matter at a gathering of EU leaders in Brussels next week.
(1.2.2019) An investigation by Mediapart sheds dramatic new light on the affair involving Alexandre Benalla, who was a security aide to President Emmanuel Macron until he was sacked when video footage emerged showing that he had used violence against protestors at a demonstration. In particular recordings of Benalla talking to the former head of security for the ruling LREM party, Vincent Crase, who also lost his job over the scandal, reveal details about a secret meeting that breached a judicial control order, about a security contract with a Russian oligarch close to Vladimir Putin, and Benalla’s ongoing communications with President Macron. Fabrice Arfi, Antton Rouget and Marine Turchi report.
In Tokyo today, German Chancellor Angela Merkel will conclude a statement of principles on intelligence service cooperation with Japan more closely linking Germany to espionage structures directed against China.
NBC News published a predictably viral story Friday, claiming that “experts who track websites and social media linked to Russia have seen stirrings of a possible campaign of support for Hawaii Democrat Tulsi Gabbard.”
But the whole story was a sham: the only “experts” cited by NBC in support of its key claim was the firm, New Knowledge, that just got caught by the New York Times fabricating Russian troll accounts on behalf of the Democratic Party in the Alabama Senate race to manufacture false accusations that the Kremlin was interfering in that election.
The country’s 450 active cybersecurity companies raised a total of $1.19 billion last year, constituting a 47% increase since 2017 and a fourth consecutive record-breaking year of investments. Since 2014, the sector has witnessed a five-fold increase in investments.
A longtime associate of President Trump is maintaining his innocence. Roger Stone insists he is not guilty of charges outlined in a federal indictment and he’s blasting an early-morning FBI raid on his Florida home. Stone spoke to CBS News justice and homeland security correspondent Jeff Pegues.
The government shutdown has ended… for now. Trump advisor Roger Stone’s home was raided and he was promptly arrested by furloughed FBI agents.
Prosecutors cite text messages and emails he exchanged with the people about what Assange had, and one sent a photo of himself standing outside the Ecaudorian embassy in London, where Assange has stayed for years.
The men passed on much of the information after WikiLeaks began speaking publicly about stolen documents it had but before all had been released.
According to previous reporting, those people included radio host Randy Credico and Jerome Corsi. They are unnamed in the indictment and have not been charged with crimes.
The American Civil Liberties Union (ACLU) on Thursday filed a lawsuit against seven federal agencies, intending to obtain information on how the government surveils social media. The suit seeks to compel the agencies to turn over documents related to communications with social media platforms and the guidelines they use.
Dahinter steht der Verdacht, dass es im Elysée-Palast einen Sicherheitsdienst mit illegalen Befugnissen gab.
IAI, Israel’s leading aviation manufacturer, will provide its fully-automated BirdEye 650D UAV systems and analyze collected data. Santos Lab will operate the UAVs, equipped with a hyper-spectral wide-coverage imager especially developed to pursue the precision agriculture market.
(6.11.2018) In Jordan, state intelligence officials said they had worked closely with the C.I.A. to thwart more than a dozen terrorist plots in the past several months in the Middle East and Europe.
A classified American military program in Jordan, called Operation Gallant Phoenix, is scooping up data collected in commando raids in Syria and Iraq and funneling it to law enforcement agencies in Europe and Southeast Asia, according to United States military and intelligence officials who described details of the initiative on condition of anonymity because of its secretive nature.
(28.2.2018) Israeli military’s intelligence branch, known as “Unit 8200,” told the Australian authorities about a hidden explosive device destined for an Etihad Airways flight leaving Sydney for Abu Dhabi last July.
Earlier this month, the German weekly Der Spiegel reported on Israel’s role in helping Germany and European countries in combating Islamist terror. It revealed that Israel is part of a covert multinational counter-terrorism operation named “Gallant Phoenix” that gathers intelligence on Islamic State war criminals returning from the Middle East to Europe.
(5.2.2018) Israel is part of a secret counter- terrorism coalition that gathers intelligence on Islamic State combatants returning from the Syrian war to Europe, according to a Sunday report in Der Spiegel magazine.
The intelligence collection and anti-terror campaign is named “Gallant Phoenix” and includes a total of 21 states. Germany, the US and Jordan are part of the coalition that is based in Jordan at the US Joint Special Operations Command.
Unlike NSO, Candiru is more conservative in its choice of customers. Most of them are in Western Europe and none of them are from Africa. In fact, the company reportedly doesn’t sell equipment to Israel, although that is for business – not political – reasons, they say.
“For example, if Germany needs offensive cyber equipment for some national security matter, it will develop it in-house without question,” explained one source, who asked not to be identified. “But if it needs to contend with human trafficking from Turkey, for instance, it will buy cyber gear from an outside source where the issue is less sensitive.”
(12.9.2014) I assumed a role in which people are called “targets”, and those people who really interest us are in no sense terrorists, but rather generally normative people – who interest us because of their roles, so that we can obtain more intelligence and achieve greater access. We take advantage of the capabilities that we have over these people in order to put ourselves at ease. We take advantage of the impact that we have on their lives. Sometimes it involves truly harming a person’s life, or their soul. I mean extortion whereby they must hide things from people around them. It can really screw up their lives. It made me feel omnipotent.
Candiru, named after an Amazon fish known to parasitize the human urethra, recruits heavily from 8200 intelligence unit and sells offensive tools for hacking computer systems
(30. März 2015) Also in Jordan is a U.S.-led multinational effort named Operation Gallant Phoenix, aimed at tracking the foreign fighter flow into Iraq and Syria. Begun as an initiative under Joint Special Operations Command (JSOC), which controls the military’s most elite special operations units, and JSOC’s higher administrative headquarters, U.S. Special Operations Command, it has expanded to include participation by U.S. Central Command and U.S. European Command, said the senior special operations officer. Although sometimes referred to as the “foreign fighter task force,” Gallant Phoenix doesn’t have troops of its own to send out on raids or direct assaults and instead passes on the information it receives to allied countries.
(7. Januar 2014) As Special Operations Command chief Admiral William McRaven put it in SOCOM 2020, his blueprint for the future, it has ambitious aspirations to create “a Global SOF network of like-minded interagency allies and partners.” In other words, in that future now only six years off, it wants to be everywhere.
While Congressional pushback has thus far thwarted Admiral McRaven’s efforts to create a SOCOM satellite headquarters for the more than 300 special operators working in Washington, D.C. (at the cost of $10 million annually), the command has nonetheless stationed support teams and liaisons all over the capital in a bid to embed itself ever more deeply inside the Beltway. “I have folks in every agency here in Washington, D.C. — from the CIA, to the FBI, to the National Security Agency, to the National Geospatial Agency, to the Defense Intelligence Agency,” McRaven said during a panel discussion at Washington’s Wilson Center in 2013. Referring to the acronyms of the many agencies with which SOCOM has forged ties, McRaven continued: “If there are three letters, and in some cases four, I have a person there.“
(25. Mai 2010) Gen. Stanley McChrystal, at the time the director of operations for the Joint Chiefs of Staff, advised President Obama to allow combatant commanders more latitude to combat terrorism using task forces. Coming from McChrystal, it was a surprising endorsement of a policy that would shift responsibility for unconventional warfare from JSOC, which he had commanded, to the combatant commanders.
(24. Mai 2010) The order, which an official said was drafted in close coordination with Adm. Eric T. Olson, the officer in charge of the United States Special Operations Command, calls for clandestine activities that “cannot or will not be accomplished” by conventional military operations or “interagency activities,” a reference to American spy agencies.
While the C.I.A. and the Pentagon have often been at odds over expansion of clandestine military activity, most recently over intelligence gathering by Pentagon contractors in Pakistan and Afghanistan, there does not appear to have been a significant dispute over the September order.
A spokesman for the C.I.A. declined to confirm the existence of General Petraeus’s order, but said that the spy agency and the Pentagon had a “close relationship” and generally coordinate operations in the field.
A US indictment unsealed on Thursday in unison with a series of British statements accused Chinese hackers of obtaining unauthorised access to the computers of at least 45 entities, including commercial and defence technology companies and US government agencies such as Nasa and the US navy.
The remit of the US Federal Bureau of Investigation (FBI) includes monitoring figures who potentially threaten national security. And the FBI has long included famous writers on that list.
To them, writers pose a double menace: not only do they pose a potential threat themselves, they might also inspire large groups of people to undermine the status quo, which the FBI is charged with protecting.
COMMITTEE ON THE JUDICIARY,
JOINT WITH THE
COMMITTEE ON GOVERNMENT REFORM AND OVERSIGHT,
U.S. HOUSE OF REPRESENTATIVES,
INTERVIEW OF: JAMES COMEY
Friday, December 7, 2018
The interview in the above matter was held in Room 2141, Rayburn House Office Building, commencing at 10:12 a.m.
(29.11.2018) British intelligence agency MI6 is secretly pressuring President Donald Trump to avoid publishing classified information related to the Russia investigation and a surveillance warrant for his former campaign foreign policy adviser Carter Page, according to reports.
He didn’t seem to know that his own FBI was using No. 4 Justice Department official Bruce Ohr as a conduit to keep collecting intelligence from Christopher Steele after the British intel operative was fired by the bureau for leaking and lying. In fact, Comey didn’t seem to remember knowing that Steele had been terminated, according to sources in the room.
“His memory was so bad I feared he might not remember how to get out of the room after the interview,” one lawmaker quipped.
On Wednesday, attorneys for the American Civil Liberties Union and the Electronic Frontier Foundation filed a motion to unseal a secret court ruling in a case involving the Department of Justice and Facebook, stemming from a California case in which the FBI wanted to force the social network to wiretap phone calls on Messenger.
Foreign and defence ministers meeting in Brussels have agreed to launch a European spy school as part of a push to strengthen Europe’s defences.
Other projects signed off include a European armoured vehicle, cyber response teams and a high-atmosphere airship for intelligence gathering and reconnaissance.
There will be 17 new projects in addition to the initial 17 projects agreed on 11 December 2017 and formally adopted on 6 March 2018.
The projects cover areas such as training, capability development and operational readiness on land, at sea and in the air, as well as cyber-defence.
Some companies may misrepresent things, or try to play down stories, but outright fabrication is not at all common (and the consequences of a company doing it would be severe). And here, both Amazon and Apple’s denials were so clear, so specific and so adamant that it raised serious questions about the reporting.
The UK government is still polishing its porn filtering law. The latest updates to the law show there’s been some effort put forth to make the law less stupid, but even these additions don’t make the law (or its implementation) much better.
It’s no secret that the Vietnamese government is no fan of the open internet. All the way back in 2002 we wrote about the government requiring people to register just to create a website. That same year we were writing about people being arrested for posting criticism of the government. In 2008, we wrote about the Vietnamese government banning „subversive“ blogs as well. With the rise of social media, Vietnam has shifted its focus there. In 2013, it banned news reporting on social media, saying it should be for personal use only. In 2014, we wrote about how the government was abusing Facebook’s own reporting tools to shut down dissenters from using the site. And at the beginning of this year, we wrote about how the government now employed around 10,000 people whose only job was to monitor the internet for dissent.
And now it’s going to get even worse — to a degree that might even lead some of the big internet companies to leave Vietnam entirely. And we have the NSA (partially) to blame.
(14. November 2002) Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.“
To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you — passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance — and you have the supersnoop’s dream: a “Total Information Awareness“ about every U.S. citizen.
(29.5.2018) The William Safire column, „You Are a Suspect,” was published in the Times in 2002—two years before Facebook was created. And Safire isn’t talking about social networks or digital advertising—he’s discussing Total Information Awareness, a US Defense Advanced Research Projects Agency (Darpa) program that proposed mining vast amounts of Americans’ data to identify potential national security threats. The virtual grand database was to belong to the Department of Defense, which would use it to identify behavior patterns that would help to predict emerging terrorist threats.
(8.10.2018) Developed by Israeli cyber company NSO Group, Pegasus sends „exploit links“ to operators‘ targets, who can then access virtually all the phone’s data and can even use the phone’s camera to spy on conversations.
(2.10.201) Agents apparently linked to the Saudi regime used spy technology from Israeli firm NSO Group Technologies to eavesdrop on a Saudi dissident in Canada, according to a report on Monday.
The Citizen Lab research group said it had “high confidence” that NSO’s Pegasus software had been used this summer to eavesdrop on a 27-year-old Saudi exile, Omar Abdulaziz.
The campaign official, Rick Gates, was ultimately not interested in the company’s work, a person with knowledge of the discussions told the Times.
Special counsel Robert Mueller and his team, who are investigating Russian interference and possible coordination with the Trump campaign in the 2016 presidential election, have obtained copies of the proposals and questioned Psy-Group employees, according to people familiar with those interviews, the Times reports.
According to the report, Special Counsel Robert Mueller, who is investigating foreign interference in the 2016 election, is closely examining these contacts. His office, the report said, has interviewed workers from Psy-Group and collected documents from the company’s headquarters in Israel.
A third proposal by the company, Psy-Group, which is staffed by former Israeli intelligence operatives, sketched out a monthslong plan to help Mr. Trump by using social media to help expose or amplify division among rival campaigns and factions. The proposals, part of what Psy-Group called “Project Rome,” used code names to identify the players — Mr. Trump was “Lion” and Mrs. Clinton was “Forest.” Mr. Cruz, who Trump campaign officials feared might lead a revolt over the Republican presidential nomination, was “Bear.”
Psy-Group has also alleged to have been involved in Israel’s efforts against the Boycott, Divestment and Sanctions (BDS) movement. The Times of Israel reported that these revelations, which came to light in a separate investigation, showed that Psy-Group registered the website outlawbds.com. The site was believed to contain a “blacklist” with photos and email addresses of individuals believed to support BDS, but outlawbds.com has since disappeared from the internet.
The Republican Chairman of the Judiciary Committee Bob Goodlatte asked Rod Rosenstein for a meeting to discuss a report that the deputy attorney general said he was willing to secretly record President Donald Trump.
The report The New York Times published on September 21 cited sources who said Rosenstein wanted to expose the chaos in the White House and potentially build a case for invoking the 25th Amendment to remove Trump from office.
Rob Rosenstein, the Deputy Attorney General whose job hangs in the balance, had been expected to learn his fate Monday, but NBC News reports the meeting with President Trump has been postponed until Thursday when the President returns to Washington, D.C..
CNN’s Wolf Blitzer discusses the statement released by Deputy Attorney General Rod Rosenstein after the New York Times reported that he discussed secretly recording President Trump in 2017 and discussed plans to use the 25th Amendment to remove the president from office.
The deputy attorney general, Rod J. Rosenstein, suggested last year that he secretly record President Trump in the White House to expose the chaos consuming the administration, and he discussed recruiting cabinet members to invoke the 25th Amendment to remove Mr. Trump from office for being unfit.
(1.9.2018) The timeline sketched out by Mr. Ohr shows contacts stretching back to when Mr. Ohr first met Mr. Steele in 2007. It also shows what officials said was the first date on which the two discussed cultivating Mr. Deripaska: a meeting in Washington on Nov. 21, 2014, roughly seven months before Mr. Trump announced that he was running for president. (…)
Mr. Steele served as an intermediary between the Americans and the Russian oligarchs they were seeking to cultivate. He had first met Mr. Ohr years earlier while still serving at MI6, Britain’s foreign spy agency, where he oversaw Russia operations.
(30.8.2018) To believe most media descriptions of Justice Department lawyer Bruce Ohr, he is a nonentity, unworthy of the attention President Trump has given him. This is remarkable, given that Mr. Ohr spent Tuesday confirming for Congress its worst suspicions about the Federal Bureau of Investigation’s abuse of its surveillance and sourcing rules.
(12.8.2018) The communications raise further questions about Steele’s objectivity as an intelligence source, and about Ohr’s motives for maintaining contact with a foreign ex-spy about a Russian billionaire, despite being assigned to a wholly unrelated line of work at the DOJ. Congressional investigators expect Ohr to appear for a closed-door interview on Aug. 28.
(8.8.2018) Emails in 2016 between former British spy Christopher Steele and Justice Department official Bruce Ohr suggest Steele was deeply concerned about the legal status of a Putin-linked Russian oligarch, and at times seemed to be advocating on the oligarch’s behalf, in the same time period Steele worked on collecting the Russia-related allegations against Donald Trump that came to be known as the Trump dossier. The emails show Steele and Ohr were in frequent contact, that they intermingled talk about Steele’s research and the oligarch’s affairs, and that Glenn Simpson, head of the dirt-digging group Fusion GPS that hired Steele to compile the dossier, was also part of the ongoing conversation.
(1.9.2018) Bruce Ohr, a Department of Justice official who has become a frequent target of Trump’s ire at the ongoing investigation into his links to Russia and whether they helped influence the election, and Christopher Steele, a former British intelligence operative who compiled a dossier of reporting on Russian influence on Trump, were both involved in the effort, the New York Times reported.
(30.8.2018) The sources said Ohr’s outreach about the dossier – as well as its author, ex-British spy Christopher Steele; the opposition research firm behind it, Glenn Simpson’s Fusion GPS; and his wife Nellie Ohr’s work for Fusion – occurred before and after the FBI fired Steele as a source over his media contacts. Ohr’s network of contacts on the dossier included: former FBI agent Peter Strzok; former FBI lawyer Lisa Page; former deputy director Andrew McCabe; Weissmann and at least one other DOJ official; and a current FBI agent who worked with Strzok on the Russia case.
– FBI and the United States Justice reportedly tried to flip Russian oligarch, Oleg V. Deripaska but he told them they had their story wrong
– Sources say in September 2016 Deripaska labeled investigators‘ claims about Paul Manafort’s links to Russian government as ‚preposterous‘
– However the New York Times reports the investigation involving Deripaska began before Donald Trump announced he was going for the presidency
– Justice Department official, Bruce G. Ohr worked with former British spy Christopher Steele to get six rich Russians to talk
– Trump has used leaked documents as evidence they were plotting against him to form a dossier in the Robert Mueller-led investigation and called Ohr ‚a joke‘
Technological developments are obliging espionage agencies to adopt diverse methods of operation: not only to dispatch agents to enemy countries and to recruit local sources for intelligence, but also to dupe people into serving as agents without their knowledge, to use mercenaries and to rely on new capabilities, such as cyberattacks. To avoid biometric identification, as well as to evade security cameras, espionage organizations are being compelled to make increasing use of unwitting local agents.
If you missed the OpenSSL update released in May, go back and get it: a Georgia Tech team recovered a 2048-bit RSA key from OpenSSL using smartphone processor radio emissions, in a single pass.
The proposal from Raffi Krikorian, the Democratic National Committee’s chief technology officer and a former Uber executive, would allow Democrats and Republicans alike to combat misinformation by serving those people accurate information.
The data was exposed via rsync, a common file transfer protocol used to mirror or backup large data sets. The rsync server was not restricted by IP or user, and the data set was downloadable to any rsync client that connected to the rsync port.
He’s a rarity in the industry: a security sleuth who doesn’t hack. Instead, he searches communication ports and the internet’s hive of connected devices to find information inadvertently made public. His discoveries have included medical records, airport security files, hotel bookings, a terrorist screening database and 87 million Mexican voter registration records. Once the sensitive information has been secured, he publicly discloses that the data had been revealed.
Mr. Vickery found Level One’s data through an exposed backup server.
The impression one gets is that anyone who thinks differently from Netanyahu, and not just on security issues, is immediately suspected of sabotaging him, and in the prime minister’s view, all means of acting against such people are legitimate. After all, Netanyahu also frequently and irresponsibly throws out hints of “coups” and accusations that he’s being undermined by the police, the police commissioner and the judicial system.
Yoram Cohen says he never got ’specific‘ instructions from Netanyahu to listen in on Tamir Pardo and Benny Gantz, though the explosive report mentioned a general request to tap a series of confidants
The Prime Minister’s Office told Uvda: “The claim that the prime minister asked the head of the Shin Bet to listen in on the chief of staff and the head of the Mossad is completely unfounded. This is a total distortion of systemic efforts that are made from time to time to maintain information security regarding sensitive matters of paramound importance to Israel’s security. The decision of what means to use and against who is in the hands of the authorized officials.”
(31.5.2018) “I do not want to believe that in Israel, which is a democratic state, the prime minister is asking the Shin Bet to tap the chief of staff or me,” Pardo said in an interview. He added: „Wiretapping is the greatest possible [sign of] lack of trust. I never asked to wiretap any of my employees in the Mossad. Never. It never even crossed my mind. In my view, that’s outside the rules of the game.”
(12.September 2014) We take advantage of the capabilities that we have over these people in order to put ourselves at ease. We take advantage of the impact that we have on their lives. Sometimes it involves truly harming a person’s life, or their soul. I mean extortion whereby they must hide things from people around them. It can really screw up their lives. It made me feel omnipotent.
(05.03.18 3:02 PM ET) “Us lawyers have talked about it, we don’t believe it’s true,” Giuliani told The Daily Beast. “We think it’s going to turn out to be untrue because it would be totally illegal.“
Deputy Attorney General Rod Rosenstein’s reaction to reports of possible impeachment for failing to respond to congressional subpoenas was to proclaim that the Justice Department “will not be extorted.”
I suppose he meant to say, “Only we here at the Justice Department do the extorting, with special counsels, daylight raids of people’s attorneys, bankrupting people with legal fees, threats to prosecute family members, and questionable wiretapping of Americans.”
The men, according to Anadolu, were nabbed in 2015 in an army operation in the city of Ghardaia, 600 kilometers south of Algiers. They were arrested in possession of documents and communications equipment related to espionage for Israel.