Senators voted 84-10 to confirm Haines, who appears to be the only Cabinet official Biden will get confirmed on the first day of his administration.
(June 5, 2020)
The public deserves answers about the UK’s new opposition leader and his relationship with the British national security establishment, including the MI5 and the Times newspaper, his former role in the Julian Assange case and his membership in the intelligence-linked Trilateral Commission.
On the one hand, nothing’s really changed about Palantir’s business except that one market participant (albeit a very influential one) expressed a change in opinion on the stock.
With just eight days left in office for President Donald Trump, Pompeo alleged that Iran has given safe haven to Al-Qaida leaders and support for the group, despite some skepticism within the intelligence community and Congress.
On Monday, Pompeo was seen meeting with Mossad Chief Yossi Cohen, according to Politico’s White House Correspondant Meredith McGraw.
The briefing follows an FBI bulletin warning of “armed protests” being planned at all 50 state capitols and in Washington, DC, and provides the latest sense of a heightened state of alarm among lawmakers and law enforcement officials following last week’s deadly siege at the US Capitol.
(17. AUgust 2020)
At the time of this writing [June 3, 2020], Latin America has become the new epicenter of the pandemic with growing number of reported cases of infections and deaths. Various governments in Latin America (Peru, Argentina, Bolivia, Chile, Ecuador, Mexico, Colombia and Brazil) and the Inter-American Development Bank have deployed digital technologies to control the transmission of the virus and to support testing and tracing. They have collaborated with private companies and universities in setting up mobile applications for geolocalizing and contact-tracing possibly infected people. Expectedly, these actions have raised concerns about the negative impact of massive surveillance.
However, while we recognize the legitimacy of these concerns, the problem in Latin America takes different dimensions than in Europe, North America, and East Asia. For the moment, the governments in the region have significant problems to launch and maintain massive digital surveillance apparatuses.
Palantir was co-founded in 2004 by Paypal owner and billionaire Peter Thiel. What the blog doesn’t reveal is that Palantir’s client list has included amomgst others, the CIA, the FBI, the NSA, the Centre for Disease Control, the Marine Corps, the Air Force, Special Operations Command, West Point and the IRS.
Furthermore, in 2016, it was revealed Palantir had a $34.6m contract with US Immigration and Customs Enforcement (ICE) and helped the Customs and Border Protection Agency create the Analytical Framework for Intelligence (AFI) system to track immigrants.
Nor does the blog mention that Palantir worked for UK intelligence and was awarded contracts to handle vast data sets on UK citizens for British spy agency GCHQ.
UK government has published the contracts it holds with private tech firms and the NHS for the creation of a COVID-19 data store, just days after campaigners fired legal shots over a lack of transparency.
Available on the openDemocracy website, the contracts describe how the arrangements between the NHS and Amazon, Microsoft, Google, and AI firms Faculty and Palantir (which subcontracts to AWS) will operate.
Palantir said it is not involved in the harvesting or storage of health data but is working with the CDC and HHS to provide its Foundry suite of tools to analyze the agencies’ COVID-19 data. The set of data tools has the power to “clean” and “harmonize” the information flowing in from local hospitals, states and other sources related to the virus, according to a source with knowledge of the arrangement between the company and the government.
Last month, the Department of Health and Human Services (HHS) awarded the contract for this platform to Palantir Technologies, a secretive data-mining firm known for its work with the Pentagon, intelligence agencies and law enforcement during the so-called global war on terrorism. The HHS Protect Now platform will aggregate data from at least 187 different sources, including the federal government, state and local governments, hospitals, and the private sector.
As Palantir’s executives were preparing over the summer to release shares publicly for the first time, they faced a challenge: how do you convince investors to buy into a 17-year-old company that has never turned a profit?
The researchers determined that 35% of open resolvers are open to the attack, as well as four of six home routers made by well-known brands.
They also found that 12 of 14 popular public resolvers (now 11—Cloudflare says they’ve corrected their systems) are susceptible. Even a patched DNS server could be made vulnerable by an unpatched or misconfigured NAT gateway.
Their 19-page paper on the exploit includes lists of devices and services tested. They have since set up a SAD DNS website featuring a Q&A and a tool that anyone can use to determine whether their DNS is vulnerable.
The flaw is being tracked as CVE-2020-25705, and affects Linux 3.18 – 5.10, Windows Server 2019 version 1809 and newer, macOS 10.15 and newer, and FreeBSD 12.1.0 and newer. The researchers did not test earlier versions of the listed operating system.
In one of the most brazenly political sections in her December 4 legal judgment, Westminster district judge Vanessa Baraitser cited a suspect report by CNN that accused Assange of conspiring with Russians to turn Ecuador’s embassy in London, where he was trapped in refuge for roughly seven years, “into a command post for election meddling.”
Baraitser twice pointed to this dubious CNN article in order to justify a 24/7 CIA spying operation that targeted not only Assange, but Ecuador’s embassy and its sovereign operations and internal affairs as well.
What the British judge failed to mention is that the CNN story she relied on was itself based entirely on untrustworthy intelligence reports drafted by a Spanish security firm called UC Global, which secretly worked with the CIA to spy on the WikiLeaks publisher and Ecuadorian embassy staff.
The Spanish High Court’s investigation is currently stalled. Six months after Judge De la Mata requested judicial cooperation from US authorities, asking them for identifying information about the IPs that accessed UC Global’s servers, the US justice system has yet to respond. US prosecutors demanded to know the judge’s sources, and De la Mata sent additional information, but no reply has been forthcoming.
Meanwhile, the United Kingdom has also failed to comply with De la Mata’s request to take statements from the lawyers who were spied on while working with Assange.
Clare Gardiner, head of cyber resilience and strategy at the UK National Cyber Security Centre — a branch of signals intelligence agency GCHQ — will become the centre’s first director-general, responsible for advising ministers on the “alert level” for the virus; which is similar to assessing the terror threat.
Ms Gardiner’s role at the NCSC involves advising businesses and public organisations on how to improve their cyber defences, and she will return to this post after her secondment at the centre. But her research background in epidemiology and medical statistics make her well-suited to the role, according to one person familiar with her appointment.
She will report to Dido Harding, who is in charge of the NHS test and trace service.
The decision to put a security official in charge is likely to cause consternation among public health experts, who have questioned whether the template of a terror analysis centre is appropriate for managing a viral pandemic,
Though every country has some form of a CERT, the Israeli model, the directorate claims, is unique because not only does it offer help to private firms facing cyberattacks, it has units for different sectors – finance, energy, public security and government.
It also operates what it calls a “proactive” research center that seeks out vulnerabilities before they’re exploited and even has a hotline where anyone can call in to report a cyberattack.
Aliada, according to the suit, is a group of cyberweapon companies whose products are branded under the name Intellexa. In May 2019, it added, the group recruited Eran Beck, a former head of the Military Intelligence’s cyber department, as its director of development.
The FBI must be more transparent about its ability to break into people’s mobile devices, the American Civil Liberties Union says, and the group is suing for information about what the feds have in their toolkit.
The ACLU says the bureau should come clean about what its Electronic Device Analysis Unit (EDAU) is using “to unlock and decrypt information that is otherwise securely stored on cell phones.”
Until now, the Bartonville, Texas, company Hawk Analytics and its product CellHawk have largely escaped public scrutiny. CellHawk has been in wide use by law enforcement, helping police departments, the FBI, and private investigators around the United States convert information collected by cellular providers into maps of people’s locations, movements, and relationships. Police records obtained by The Intercept reveal a troublingly powerful surveillance tool operated in obscurity, with scant oversight.
Imagine if I really was claiming that the Chinese government is arming Antifa ninja warriors to kill patriotic Americans in the coming Biden Wars. How crazy would you have to be to believe what I was saying without my providing hard, verifiable evidence for my claims?
Now imagine further that this is something I’ve made false claims about many times in the past. If every few years I make a new claim about some naughty government arming Antifa super soldiers in a great communist uprising, which turns out later to have been bogus.
(Feb. 16, 2020)
The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm. Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.
(Dec. 16, 2020)
After the caucus, the IDP hired a pair of Democratic lawyers: Nick Klinefeldt, who was a federal attorney appointed by President Barack Obama, and former Iowa Attorney General Bonnie Campbell. They were tasked with identifying and determining the cause of problems that occurred during the 2020 Iowa Caucuses, with the results of their investigation being released to the public on Saturday morning.
The audit states the conversion tool had coding errors that spit out inaccurate numbers and caused confusion about the accuracy of the results, eventually leading to delays in reporting. But the state party’s app never malfunctioned nor was hacked, the report concludes.
The DNC’s meddling, which included a last-minute demand that developers of the Shadow app create a special software that would allow the DNC real-time access to the raw numbers before they went public, didn’t sit well with Zogby.
“Why would [the DNC] need to see that?” Zogby said about the DNC’s insistence on access to the raw caucus results before they went public. “Why wouldn’t you trust the state party to make the determination?”
In the transcript from the closed-session meeting held by the state party, members suggested that the DNC’s goal was to strip Iowa of its prestigious first-in-the-nation status.
Morell has no place in a Biden-Harris administration. His nomination would send a chilling message to torture survivors and other victims of grave injustice that the United States government, including the Biden administration, does not uphold its own stated principles. Senator Ron Wyden (D-OR) from the Senate Intelligence Committee has said about Morell: “No torture apologist can be confirmed as CIA director. It’s a nonstarter.” We agree and urge the President-elect not to nominate Morell.
We also oppose Avril Haines, another toture apologist, as Director of National Intelligence. Since she has already been nominated, we ask Senators to oppose her confirmation.
It was painful enough to live through the U.S invasion of Iraq that caused untold devastation and human misery for no justifiable reason.
Now we are again reminded of the grim Bush legacy with President-elect Biden’s nomination of Avril Haines for Director of National Intelligence.
(Dec. 10, 2014)
Most of the possible presidential candidates have not plunged into Washington’s debate over the Senate Intelligence Committee’s withering report on the Central Intelligence Agency’s brutal interrogation tactics — and some are ducking questions entirely, illustrating the delicate politics of national security. (…)
For Mrs. Clinton, the challenge is different: She must balance her desire to be seen as tough on national security against pressure from her party’s liberal wing to not only condemn the gruesome tactics but punish those involved.
The Committee makes the following findings and conclusions:
#1: The CIA’s use of its enhanced interrogation techniques was not an effective means of acquiring intelligence or gaining cooperation from detainees.
#2: The CIA’s justification for the use of its enhanced interrogation techniques rested on inaccurate claims of their effectiveness.
#3: The interrogations of CIA detainees were brutal and far worse than the CIA represented to policymakers and others. (…)
At least five CIA detainees were subjected to „rectal rehydration“ or rectal feeding without documented medical necessity. The CIA placed detainees in ice water „baths.“ The CIA led several detainees to believe they would never be allowed to leave CIA custody alive, suggesting to one detainee that he would only leave in a coffin-shaped box. One interrogator told another detainee that he would never go to court, because „we can never let the world know what I have done to you.“ CIA officers also threatened at least three detainees with harm to their families— to include threats to harm the children of a detainee, threats to sexually abuse the mother of a detainee, and a threat to „cut [a detainee’s] mother’s throat.“
#4: The conditions of confinement for CIA detainees were harsher than the CIA had represented to policymakers and others.
Conditions at CIA detention sites were poor, and were especially bleak early in the program. CIA detainees at the COBALT detention facility were kept in complete darkness and constantly shackled in isolated cells with loud noise or music and only a bucket to use for human waste.10 Lack of heat at the facility likely contributed to the death of a detainee. The chief of interrogations described COBALT as a „dungeon.“11 Another senior CIA officer stated that COBALT was itself an enhanced interrogation technique.“ At times, the detainees at COBALT were walked around naked or were shackled with their hands above their heads for extended periods of time. Other times, the detainees at COBALT were subjected to what was described as a „rough takedown,“ in which approximately five CIA officers would scream at a detainee, drag him outside of his cell, cut his clothes off, and secure him with Mylar tape. The detainee would then be hooded and dragged up and down a long corridor while being slapped and punched.
(Dec 09, 2014)
The drilldown from Bloomberg:
– CIA provided inaccurate information about effectiveness and scope of interrogations of suspected terrorists, and mismanaged a program that was far more brutal than represented, according to 6-year investigation by Democrats on Senate Intelligence Cmte.
– Interrogation techniques weren’t effective, didn’t produce key information that led to killing of Osama bin Laden and were significantly different from procedures authorized by Justice Dept, report says
– CIA provided inaccurate information to White House, Congress, DOJ, CIA Inspector General, media and the public
– “This document examines the CIA’s secret overseas detention of at least 119 individuals and the use of coercive interrogation techniques – in some cases amounting to torture,” Senate Intelligence Cmte Chairman Dianne Feinstein says in statement
Haines is expected to withstand scrutiny during the Senate confirmation process for her role in the drone program, as well as her approval of a CIA review board decision in 2015 not to discipline agency personnel for intruding in computers used by the Senate Intelligence Committee when it was investigating the CIA’s enhanced interrogation program. Haines was also part of the team that redacted the committee’s report on the program.
Trump’s threat to veto the National Defense Authorization Act (NDAA) could scramble Congress’s year-end schedule; lawmakers had been hoping to leave town once they pass a forthcoming deal to fund the government and provide year-end coronavirus relief.
But leaders are warning that if Trump vetoes the bill they are prepared to return to Washington to vote on trying to override.
Trump’s comments in the form of Twitter posts on Saturday went against comments his secretary of state made less than 24 hours earlier.
SolarWinds, the company at the center of the attack, has not yet blamed any one country.
Sen. Angus King (I-Maine) said the breach makes a clear case for the work of the Cyberspace Solarium Commission and the cyber provisions that made it into the annual defense policy bill passed by the House and Senate.
“This is the most important bill on cyber ever passed by Congress, and that’s why I’m really hoping that the president will either sign the bill or let it become law without a signature, because there is so much critically important material in the bill,” King said during an annual summit hosted by Defense One.
The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to „develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.“ The finished report was presented to the public on March 11, 2020.
The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:
– Reform the U.S. Government’s Structure and Organization for Cyberspace.
– Strengthen Norms and Non-Military Tools.
– Promote National Resilience.
– Reshape the Cyber Ecosystem.
– Operationalize Cybersecurity Collaboration with the Private Sector.
– Preserve and Employ the Military Instrument of National Power.
The massive defense bill that President Donald Trump is threatening to veto contains provisions for increased cybersecurity, which has taken on significantly more importance in the wake of a massive cyberattack on federal agencies at the hands of suspected Russian hackers.
The National Defense Authorization Act includes pay raises for America’s soldiers, modernizations for equipment and provisions to require more scrutiny before troops are withdrawn from Germany or Afghanistan.
„As I said in a news briefing, Election Day was ‘just another Tuesday on the Internet,’“ he wrote. „Normal sorts of scanning and probing were happening, but we did not see any successful attacks or damaging disruptions.“
Yet hackers were arms deep in a slew of federal agencies. The infiltration, believed to have been conducted by the Russians, appears to have compromised the Departments of Energy, State, Defense, Homeland Security, Treasury and Commerce. His name did not appear in CNN’s story about CISA and the hack published Thursday.
In the end, this all reminds us how much power Microsoft has at its disposal. Between its control of the Windows operating system, its robust legal team, and its position in the industry, it has the power to change the world nearly overnight if it wants to. And when it chooses to train that power on an adversary, it really is the equivalent of the Death Star: able to completely destroy a planet in a single blast.
A sinkhole redirects or blocks traffic meant for a destination. They are used by the security community to stop botnet traffic, phishing and other bad activity.
There are many ways to create a sinkhole. An ISP can simply divert traffic from the IP address nameserver you see in Whois to another. A company (or the government) can also go through the courts to get control of a domain name and then change its nameservers.
The compromise of multiple US federal networks following the SolarWinds breach was officially confirmed for the first time in a joint statement released earlier today by the FBI, DHS-CISA, and the Office of the Director of National Intelligence (ODNI).
„Over the course of the past several days, the FBI, CISA, and ODNI have become aware of a significant and ongoing cybersecurity campaign,“ the US intelligence agencies said …
Though it’s not clear whether it uses the Orion tool, the DHS’s own Cybersecurity and Infrastructure Security Agency (CISA) is a SolarWinds customer too, buying $45,000-worth of licenses in 2019. The U.S. Cyber Command also spent over $12,000 on SolarWinds tools in the same year.
SolarWinds, a publicly-listed Austin, Texas-based company with a value of over $6 billion, has its own customer list, though it doesn’t break down which products clients use. That list includes more than 425 of the Fortune 500, all major US telecoms providers, the top five U.S. accounting firms, hundreds of global universities, the NSA and the White House.
In this case, it appears that the code was intended to be used in a targeted way as its exploitation requires manual intervention. We’ve been advised that the nature of this attack indicates that it may have been conducted by an outside nation state, but SolarWinds has not verified the identity of the attacker.
Hackers believed to be part of a nation state have had access to federal networks since March after exploiting a vulnerability in updates to IT group SolarWinds’s Orion software. The hack has compromised the Treasury, State and Homeland Security departments and branches of the Pentagon, though it is expected to get worse. SolarWinds counts many more federal agencies as customers, along with the majority of U.S. Fortune 500 companies.
Invoices seen by the Guardian and the Bureau of Investigative Journalism suggest Rayzone, a corporate spy agency that provides its government clients with “geolocation tools”, used an intermediary in 2018 to lease an access point into the telecoms network via Sure Guernsey, a mobile operator in the Channel Islands.
Such access points, known in the telecoms industry as “global titles”, provide a route into a decades-old global messaging system known as SS7, which allows mobile operators to connect users around the world. It is not uncommon for mobile companies to lease out such access.
The investigation has found that private intelligence companies are able to rent access from mobile phone operators and this can then be exploited to allow the tracking of the physical location of users across the world. They are also potentially able to intercept calls and other private data, including bank accounts and emails.
These intrusions, which are very widely exploited, rely on commands designed to help phone operators track their customers’ whereabouts. Such commands, known as “signals”, are sent via a kind of global switchboard for the telecoms industry called SS7.
(September 12, 2009)
‚I took some flesh home and called it my son.‘ The Guardian interviews 11 villagers
(September 6, 2009)
McChrystal’s advisers allowed a Washington Post reporter to travel with a NATO fact-finding team and attend its otherwise closed-door meetings with German troops and Afghan officials. Portions of this account are based on those discussions.
“This system allows authorities to follow everything someone does online, and even permits them to manipulate the website these users visit,” said ethical hacker Noam Rotem, from the CyberCyber podcast. “This system allows tracking of each and every citizen or resident of Israel. But it’s not just that; the system is built in such a way that it can also follow intentions or motivations, and not just specific people. For example, it can track everyone who visited the website of the protest movement against Prime Minister Benjamin Netanyahu, and can even block the real website and change what people are seeing,” Rotem said.
Zam is a controversial figure who, according to some sources, was manipulated on several occasions by the Iranian intelligence services into publishing false information. But his wife, Mahsa Razani, insists that he would not have returned to Iran of his own free will. She said he set off for Baghdad on the evening of 11 October on a Royal Jordanian flight and arrived the following morning after a stopover in Amman.
Also ridiculing „rigged elections“ and „fake news“ — two other weapons used on him — the Vermont Senator’s relationship to the Democratic Party descends from loyal support to abject subservience.
Israeli technologies in particular have a good reputation with Mexican officials. „In Mexico, it’s typical for the security and intelligence community to think that Israel has the most advanced technologies and the best techniques for civilian and military training,“ said Paloma Mendoza Cortés, analyst and consultant on national security issues.
The CIA never revealed who spirited the documents out of Iran or how. However, former senior German Foreign Office official Karsten Voigt explained to this reporter in 2013 that the German intelligence agency, the BND, had been furnished with the collection by an occasional source whom the intel chiefs considered less than credible.
And who was this source? According to Voigt, he belonged to the Mujahedeen e-Khalq (MEK), the exile Iranian cult which had fought for Saddam’s Iraqi forces against Iran during the eight-year war and by the early 1990s was passing information and propaganda that Mossad did not want to have attributed to itself.
Think of 32 kHz as the station’s frequency. When the 25 kHz tone interferes with the transmission, audible sound at 7 kHz results. The researchers also built a proof of concept device to simulate covert eavesdropping by playing a song instead of the 180 Hz tone over the 32 kHz ultrasonic carrier.
Ultrasound emitters are all around us. They can take the form of room occupancy sensors in energy-efficient buildings, rodent repelling devices, burglar alarms, security cameras, and HVAC system vibrations.
“The committee felt that many of the distinctive and acute signs, symptoms and observations reported by [government] employees are consistent with the effects of directed, pulsed radio frequency (RF) energy,” the report says. “Studies published in the open literature more than a half-century ago and over the subsequent decades by Western and Soviet sources provide circumstantial support for this possible mechanism.”
Officials said that advisers to the incoming Biden administration are scheduled to meet with officials at the National Security Agency, the Defense Intelligence Agency and other spy services at their headquarters.
The report consisted of interviews with three people with knowledge of the Mossad — journalist Ronen Bergman and agency veterans Victor Ostrovsky and Ram Ben-Barak. Channel 12 noted the report was approved by Israel’s military censor.
Spy chief widely seen behind killing of Iran’s nuclear weapons chief is a trusted Netanyahu loyalist, and his preferred choice to steer Israel through the coming regional chaos
France issued a Europol request to locate Halabi in 2017, and 2018, Austrian police raided Halabi’s apartment but did not find him. Since then his whereabouts have not been publicly known.
Somebody had decided to impersonate me. It would be two and a half years before I would learn that my identity had been stolen for a very sinister purpose, most likely by a Russian military intelligence officer and cyber criminal called Anatoliy Sergeyevich Kovalev (but we’ll get to him later).
Cyabra, an Israeli cybersecurity firm, said it was highly probable that an orchestrated campaign had promoted Zhao’s tweet.
Cyabra said it had found 57.5% of accounts that engaged with Zhao’s tweet were fake, and “evidence of a largely orchestrated disinformation campaign” to amplify its message. The firm did not give any details about who was behind the campaign.
Cyabra said it analysed 1,344 profiles and found a large number were created in November and used once, to retweet Zhao’s tweet.
By early 2014 he had made it to France with the help of French agents who may have believed the senior official could be a useful asset in the event of President Assad’s downfall, the senior French judicial source told The Telegraph.
“This was also just a few months before the 2015 terror attacks in Paris and the DGSE was desperate to get their hands on any leads about the Islamic State, which they knew was actively planning strikes,” said the source, who asked their name be withheld.
One measure in the House version of the NDAA would amend Section 127e of the U.S. Code — Support of Special Operations to Combat Terrorism — to include reporting on the entities with which foreign forces receiving U.S. support are in hostilities, whether those entities are covered under an existing authorization for the use of military force (AUMF), and steps taken to ensure that such support is consistent with U.S. objectives. It would also require a description of the steps taken to ensure that recipients of this support have not engaged in human rights violations or violations of the Geneva Conventions.
The gunmen with the hit squad opened fire on the cars, and an intense gunfight ensued, according to Sepah Cybery, a social media channel affiliated with the Islamic Revolutionary Guards Corps.
Ahwaze tweeted: ‚According to Iranian leaks, the leader of the assassination team took Fakhrizadeh out of his car and shot him and made sure he was killed.‘
The hit squad then vanished, having sustained no losses to their team, Ahwaze reported.
DNS data for a domain is called a zone. Some organizations operate their own name servers to publish their zones, but usually organizations outsource this function to third parties. There are different types of organizations that host DNS zones on behalf of others, including registrars, registries, web hosting companies, network server providers, just to name a few.
DNS by itself is not secure
DNS was designed in the 1980s when the Internet was much smaller, and security was not a primary consideration in its design. As a result, when a recursive resolver sends a query to an authoritative name server, the resolver has no way to verify the authenticity of the response.
The response to DoH’s anointment as a major privacy-preserving solution has been downright acid, in some cases. Critics have taken a jab at the protocol on different plains, which we’ll try to organize and categorize below:
– DoH doesn’t actually prevent ISPs user tracking
– DoH creates havoc in the enterprise sector
– DoH weakens cyber-security
– DoH helps criminals
– DoH shouldn’t be recommended to dissidents
– DoH centralizes DNS traffic at a few DoH resolvers
Circa 2015, engineers at Cloudflare and Mozilla joined forces to create DNS-over-HTTPS, as a way to hide DNS queries using encryption.
Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.
Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained
Download valid nameservers as CSV | Plaintext
WebRTC leaks your actual IP addresses from behind your VPN, by default.
To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.
To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.
This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.
Finally, an efficient wide-spectrum content blocker. Easy on CPU and memory.
Type about:config into the address bar and then hit the Enter key. The page loads with a warning about the impacts of changing these preferences and the effect it can have on Firefox. Click the “Accept the risk and continue” button.
In the search bar, type each of the following preferences and then set them to the value provided to the right:
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.updatePing.enabled = false
browser.newtabpage.activity-stream.feeds.telemetry = false
browser.newtabpage.activity-stream.telemetry = false
browser.ping-centre.telemetry = false
toolkit.telemetry.bhrPing.enabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.firstShutdownPing.enabled = false
toolkit.telemetry.hybridContent.enabled = false
toolkit.telemetry.newProfilePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.shutdownPingSender.enabled = false
toolkit.telemetry.unified = false
toolkit.telemetry.updatePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.unified = false
toolkit.telemetry.archive.enabled = false
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.bhrPing.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
Sometimes federal agents are criticized for „creating“ a crime instead of investigating one. Sting operations are examples of crimes that are a consequence of law enforcement actions. Agents create a fictional crime to trick a suspect into attempting to join that crime, thereby creating the crime.
Similarly, Flynn’s crime of lying to government agents was the consequence of the government agents‘ investigation of Flynn. If there was no crime before Flynn’s interview, then there’s little reason to interview Flynn as part of a criminal investigation, unless the agents were looking to create a crime.
President Donald Trump announced in a tweet Wednesday that he has granted his first national security adviser, Michael Flynn, a „full pardon,“ wiping away the guilty plea of the intelligence official, lobbyist and conservative fringe darling for lying to the FBI.
Other groups on the left were thinking about joining the call for Feinstein to step down but held off after Schumer’s office put out word that the Democratic leader was working on the situation, according to sources familiar with the haggling over Feinstein’s future.
The public spat between the Democratic and Republican sides of the so-called Gang of Eight, less than 100 days before Americans go to the polls, is highly unusual for the group, whose obligations normally rise above the political fray and rarely descend publicly into the partisan squabbles that define Capitol Hill.
California Sen. Dianne Feinstein announced on Monday that she would step down from the top Democratic spot on the Senate Judiciary Committee next year, following sharp criticism from liberal activists over her handling of the hearings for Supreme Court nominee Amy Coney Barrett.
Feinstein, 87, said she would „increase“ her „attention“ on the wildfire and drought crisis in California …
Sen. Schumer went on to say “he’s being really dumb to do this,” to which Maddow replied “what do you think the intelligence community will do”, Schumer says “I don’t know, but from what I am told that they are very upset by how he has treated them and talked about them.”
So in Schumer’s words, the intelligence community will get back at you if they do not like what you have said about them and they have the power to do it.
The Agency knew that their best asset for selling their wars was Barack Obama — the same reason so many in the security state were eager to get rid of Donald Trump.
Prime Minister Benjamin Netanyahu flew to Saudi Arabia and met Crown Prince Mohammed bin Salman and U.S. Secretary of State Mike Pompeo, Israeli sources said Monday.
Mossad chief Yossi Cohen also attended the meeting, which took place in the city of Neom, according to the sources.
A glance at the Biden-Harris agency review teams should provide a rude awakening to anyone who believed a Biden administration could be “pushed to the left.”
Fourteen members of INCLO express grave concerns regarding recent moves by various groups to breakencryption. We note with alarm calls from the Council of the European Union, the EuropeanCommission, and the Department of Justice in the US, with support from Australia, Canada, New Zealand, India, Japan and the UK, to allow police authorities intercept encrypted communications.
We will also examine with interest the Commission’s announced proposal to designate hate speech and hate crime and incitement as criminal offences that are provided for and regulated under European Union law.
In the same vein, the Council must consider the matter of data encryption so that digital evidence can be lawfully collected and used by the competent authorities while maintaining the trustworthiness of the products and services based on encryption technology.
According to the Danish broadcaster, the NSA and Danish military service FE signed an agreement in 2008, which stated that the Americans would help Denmark tap internet cables in the European country. In return, the NSA gained access to internet cables to Eastern Europe. Together they processed the data in a data center near Copenhagen Airport, which was built for that purpose.
But the United States also used that internet access to spy on Denmark itself, and surrounding countries including the Netherlands, Germany and Sweden, the whistleblower, a former employee of the FE, said to DR.
The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following revelations from a whistleblower. The officials, including the head of the agency, Lars Finden, have been “relieved of duty for the time being” following the release of a trove of documents. The documents detailed that the FE has been illegally spying on Danish citizens in the last six years and were released by an unnamed whistleblower to the independent regulator of Danish security services which is known as Tilsynet med Efterretningstjenesterne (TET).
It may be hard to believe, but the NSA intercepts and stores every electronic communication. All Trump has to do is to have newly appointed acting Pentagon chief Miller order Gen. Nakasone to release materials spelling out chapter and verse on the Russiagate operations orchestrated by Brennan, Comey, and ex-National Intelligence Director James Clapper. Nakasone reports to the secretary of defense.
Don’t be misled; virtually all of it can be released with ZERO danger to intelligence “sources and methods.” But release won’t happen if Trump continues to just whine to Fox News, or he “authorizes” release without follow-up (he’s already done that — to no effect).
UCPI Evidence Hearings: Tranche 1 (Phase 1) | Day 11 (Mon 16 Nov):
10:00 AM: HN 336
2:00 PM: HN 340
4:55 PM: Summary of evidence of HN 333
UCPI Evidence Hearings: Tranche 1 (Phase 1) | Day 12 (Tues 17 Nov):
UCPI Evidence Hearings: Tranche 1 (Phase 1) | Day 13 (Wed 18 Nov):
12:00 Noon: Summary of evidence of HN 45
2:00 PM: HN 348
4:50 PM: Summary of evidence of HN 339
4:55 PM: Summary of evidence of HN 349
UCPI Evidence Hearings: Tranche 1 (Phase 1) | Day 14 (Thurs 19 Nov):
11:30 AM: HN 345
2:00 PM: HN 345
3:25 PM: Summary of evidence of HN 343
The UCPI was established in early 2015 in response to a series of allegations that May said amounted to evidence of “historical failings” by undercover policing units. Among these allegations were that the parents of murdered black teenager Stephen Lawrence had been spied on while campaigning for justice – claims that the police admitted were true.
After finally getting under way in London last week, the jury-led inquiry is looking at how at least “139 undercover officers spied on more than 1,000 political groups” over a period spanning back to 1968, writes investigative reporter Rob Evans, author of Undercover: The True Story of Britain’s Secret Police.
The collaboration marked the start of a secret police operation that escalated over more than 40 years, involving at least 139 undercover officers spying on more than 1,000 political groups.
The top-secret collaboration between M15 and Scotland Yard was disclosed on the opening day of public evidence sessions that are being held by a judge-led public inquiry into the undercover policing scandal.
‚It has emerged that for decades undercover police officers infiltrated a significant number of political and other activist groups, in deployments which typically lasted for years.
‚The information reported by these undercover police officers was extensive. It covered the activities of the groups in question, and their members. It also extended to the groups and individuals with whom they came into contact, including elected representatives.
A damning report published on Tuesday said the Covert Human Intelligence Sources (Criminal Conduct) Bill should not be introduced in its current form.
Parliament’s Joint Committee on Human Rights said the proposed law “raises the abhorrent possibility of serious crimes such as rape, murder or torture being carried out under an authorisation”.
– Regional Dialogues, 15 to 24 September 2020
– Webinar Sessions, 6 October to 24 November 2020
– Training Sessions, 13 October to 19 November 2020
– Scenario Based Exercises, 27 October to 5 November 2020
The top justice officials of the United States, Britain, Australia, Canada and New Zealand said in a statement that the growth of end-to-end encrypted apps that make official oversight impossible – like Signal, Telegram, FaceBook Messenger and WhatsApp – “pose significant challenges to public safety.”
“There is increasing consensus across governments and international institutions that action must be taken,” they said.
We urge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content. We call on technology companies to work with governments to take the following steps, focused on reasonable, technically feasible solutions:
– Embed the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety, and facilitating the investigation and prosecution of offences and safeguarding the vulnerable;
– Enable law enforcement access to content in a readable and usable format where an authorisation is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight; and
– Engage in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions.
The last few months have seen a steady stream of proposals, encouraged by the advocacy of the FBI and Department of Justice, to provide “lawful access” to end-to-end encrypted services in the United States. Now lobbying has moved from the U.S., where Congress has been largely paralyzed by the nation’s polarization problems, to the European Union—where advocates for anti-encryption laws hope to have a smoother ride. A series of leaked documents from the EU’s highest institutions show a blueprint for how they intend to make that happen, with the apparent intention of presenting anti-encryption law to the European Parliament within the next year.
The EU is set to declare war on encryption with plans to allow law enforcement officials “targeted lawful access” to protected communications, according to a European Commission internal note seen by the Financial Times.
The note outlines the commission’s aim to “stimulate a discussion” among EU member states “on the issues posed by end-to-end encryption” for the purpose of tackling child abuse and other organised crime networks.
The “Five Eyes” intelligence network of nations is preparing a legal challenge to Facebook’s plan for end-to-end encryption amid fears the platform will become a haven for terrorists and paedophiles.
Ministers from the UK, US, Canada, Australia and New Zealand are due to meet next week to consider legal measures to hold Facebook and other social media platforms liable for messages that could lead to serious criminality.
Aside from the ministers, the meeting was attended by professionals from numerous agencies, including the Shin Bet, the Health Ministry, the Privacy Protection Authority, the treasury, the Justice Ministry, the National Security Council, the Prime Minister’s Office, the Public Security Ministry, the Economy Ministry and the army’s Home Front Command.
“Rabin’s murder was a perfect murder that paid off,” the late Prof. Moshe Negbi once wrote. This is a serious charge, but an accurate one. Netanyahu owes his political existence to this murder. The roots of his rule are planted in the blood of the slain prime minister. Fanning the violence and then looking away is a strategy that served him both before the murder and after it.
Austrian Interior Minister Karl Nehammer said at a Tuesday press conference that the suspect was shot dead by police about nine minutes after the first emergency call reached authorities.
(June 5, 2020)
The public deserves answers about the UK’s new opposition leader and his relationship with the British national security establishment, including the MI5 and the Times newspaper, his former role in the Julian Assange case and his membership in the intelligence-linked Trilateral Commission.
The Biden campaign’s decision to lean into accusations of Russian involvement in the episode, despite lacking specific proof, risks eroding public trust in U.S. allegations of foreign election interference if the suspicions in this case turn out to be unfounded, according to intelligence and foreign policy experts. Trump already has undermined such trust by casting doubt on proved Russian interference on his behalf during the 2016 campaign and denigrating U.S. intelligence officials.
But two officials said their calls for declassification have been met with opposition from within the intelligence agencies, with some objecting that such a release would be too close to Election Day.
Mr. Ratcliffe, like Maj. Gen. Willoughby before him, seems to think his job is to serve only his boss, who requires that everyone agree with him at all times. As General MacArthur is often quoted: if you control intelligence, you control decision-making.
Director of National Intelligence John Ratcliffe said late Wednesday that voter registration information had been obtained by Iran and Russia in an attempt to undermine confidence in the 2020 election.
Any decision to remove Feinstein from serving as chairwoman or ranking minority member in the 117th Congress, which convenes in January, would have to be approved by a vote of the entire Senate Democratic Caucus. And the support for such a move does not appear to be there.
The 291 new signatures announced Tuesday join 489 national security leaders who previously endorsed former Vice President Biden as having “the character, principles, wisdom and leadership necessary to address a world on fire.”
Trump has ramped up his criticism of Barr in recent days as he seeks to make the origins of the Russia probe a major election issue. The president has long cast the Russia investigation as a political hoax meant to undermine him and has called for the indictment of his political enemies, including former President Barack Obama and former vice president and Democratic presidential nominee Joe Biden.
„She said she had 33,000 e-mails,“ Trump told Fox News on Thursday. „They’re in the State Department, but Mike Pompeo is unable to get them out, which is very sad actually. I’m — I’m not happy about him for that, that reason. He was unable to get — I don’t know why. You’re running the State Department and you get them out. But they’re in the State Department.“
White House chief of staff Mark Meadows on Monday said Trump had „tasked me with getting some declassification rolling“ as the president was recovering from COVID-19 at the Walter Reed National Military Medical Center. Officials began releasing documents on Tuesday.
– Recent declassifications by DNI John Ratcliffe: „I thought it was a outrageous, appalling and blatant act of politicization that he released, very selectively, some intelligence that was provided then to the Senate Judiciary Committee, which is right now engaged in, I think, a very partisan effort to try to debunk the necessary investigative efforts of the FBI that looked into Russian interference in the 2016 election.“
Director of National Intelligence John Ratcliffe declassified unverified Russian intelligence despite concerns being raised by the CIA and National Security Agency, according to people briefed on the matter.
Career officials in the intelligence agencies were concerned about declassifying the information because it was unverified and they believed it could reveal sources and methods. Ratcliffe overrode those concerns and sent the document to Senate Judiciary Chairman Lindsey Graham on Tuesday, the people sa
Graham pointed to the documents declassified Tuesday by Director of National Intelligence John Ratcliffe — which summarized unverified Russian intelligence that Clinton’s 2016 presidential campaign was trying to „stir up a scandal“ by tying Trump to Russia — arguing they showed the FBI’s double standard in not investigating Clinton and Russia.
One Republicans senator even asked Comey about the Democratic allegations he had swung the 2016 election to Trump by releasing information about the FBI’s investigation into Clinton’s emails.
“According to his handwritten notes, former Central Intelligence Agency Director Brennan subsequently briefed President Obama and other senior national security officials on the intelligence, including the ‘alleged approval by Hillary Clinton on July 26, 2016 of a proposal from one of her foreign policy advisors to vilify Donald Trump by stirring up a scandal claiming interference by Russian security services.’”
„On 07 September 2016, U.S. intelligence officials forwarded an investigative referral to FBI Director James Comey and Deputy Assistant Director of Counterintelligence Peter Strzok regarding ‘U.S. Presidential candidate Hillary Clinton’s approval of a plan concerning U.S. Presidential candidate Donald Trump and Russian hackers hampering U.S. elections as a means of distracting the public from her use of a private mail server,’” the letter continues.
Of course, it is a given that every high-tech company employs analysts, and plenty of high-tech staffers come from the Arab community. Why, then, didn’t the Home Front Command turn to them as well, preferring instead to use former members of the Shin Bet exclusively? Only the IDF knows the answer to that.
„Unfortunately those releases and declassifications according to multiple sources I’ve talked to are being blocked by CIA director Gina Haspel who herself was the main link between Washington and London,“ Davis said. „As the London station chief from John Brennan’s CIA during the 2016 election. Recall, it was London where Christopher Steele was doing all this work. And I’m told that it was Gina Haspel personally who is blocking a continued declassification of these documents that will show the American people the truth of what actually happened.“
The judge’s interest in Nagel indicates that the Spanish investigation is now probing the suspected role of US intelligence as the guiding hand behind UC Global’s criminal spying operation.
Before he was hired as Adelson’s director of global security, Nagel serving as the top cyber-crime investigator for the US Secret Service – a role which earned him a medal of commendation from the CIA. Together with Lahav, he was likely to have played a central role in coordinating between Sands, UC Global, and US intelligence.
Morales traveled to the US once or twice a month allegedly to hand over the material to “the Americans.” A microphone was installed on the PVC plastic base of a fire extinguisher near the meeting room where Assange met with his lawyers. The cyberactivist had placed a device that created white noise in this room, and activated it when he thought he was being spied on. He placed another device in the women’s bathroom, where he sometimes met with his lawyers.
UC Global S. L. was hired by Ecuador’s Senain secret service to provide security services to the embassy when Ecuadorian president Rafael Correa was in power. But according to the three witnesses, Morales ordered the Australian to be spied on and created remote-operated computer servers that collected the illegally obtained information, which could be accessed from the United States.
Anonymity was granted to two former employees of UC Global after a hearing at the Old Bailey in London was told they feared that its director and owner, David Morales, or others connected to him in the US, could seek to harm them.
Judge Vanessa Baraitser said she would permit their identities to remain anonymous out of respect for a Spanish court that had done the same as part of a case in which they are involved.
The day concluded with a foretaste of excitement to come, as Judge Baraitser agreed to grant witness anonymity to the two UC Global whistleblowers who are to give evidence on UC Global’s spying on Assange in the Ecuadorean Embassy. In making application, Summers gave notice that among the topics to be discussed was the instruction from UC Global’s American clients to consider poisoning or kidnapping Assange. The hidden firearm with filed-off serial numbers discovered in the home of UC Global’s chief executive David Morales, and his relationship to the Head of Security at the Las Vegas Sands complex, were also briefly mooted.
Turkey has strongly condemned and reacted to Armenia’s military offensive against civilian targets on Azerbaijani territories, pledging full support with all its means to its regional ally in using its right to self-defense.
President Recep Tayyip Erdoğan expressed Ankara’s full support to Baku in a phone conversation with Azeri President İlham Aliyev.
He presented evidence supporting his statement, notably that simultaneously with the operations the Azerbaijani news media have started publishing misinformation claiming Armenian side has carried our provocation and they are responding.
“Our experts and partners have presented numerous facts that days earlier there were various materials in the Azerbaijani news media about planned operations. Another evidence on this being pre-planned are the reports on the air communication between Turkey and Azerbaijan. Today in the morning, just minutes after the attacks began the Azerbaijani and Turkish news media were intensively working right at the combat operations scene, and then the Azerbaijani official news release was made falsely claiming that they are starting a large-sale counterattack. This proves that the adversary had pre-planned these operations in detail,” he said.
The Grayzone has learned that several correspondents from a major US newspaper rebuffed appeals by Wikileaks to report on the illegal spying campaign by UC Global, privately justifying the contractor’s actions on national security grounds.
A Motherboard investigation found that US state police agencies had collectively spent millions of dollars on Cellebrite products. US federal agencies, such as the FBI and Secret Service, are also Cellebrite customers.
Carmil resents a comparison with the NSO Group. “I know the people at NSO and appreciate their know-how, but Cellebrite works in the legitimate world of the police force, whose abilities are closely controlled, unlike the world of NSO customers and others who engage in illegal and concealed activity. Cellebrite is totally on the good side, where court orders are used. We do not make tools for breaking into private entities or espionage organizations.”
The Army’s very strange webpage on „Voice-to-Skull“ weapons has been removed. It was strange it was there, and it’s even stranger it’s gone.
Nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports.
The main objectives of this CyberDrill are as follows:
– Provide situational awareness to key public and private sector participants who lead their firms, organizations, or jurisdictions during a cyber disruption;- Bring the CERT/CIRT/CSIRT community together in a unified exercise to build global response and recovery capabilities;
– Test operational resiliency key concepts across CSIRT/CIRT/CERT community;
– Identify, exercise, and foster the improvement of processes, procedures, interactions and information sharing mechanisms that exist or should exist among CERTs/CSIRTs, SOCs, agencies, public bodies, and across regional organizations responsible for crisis management and regulatory bodies;
– Exercise coordination mechanisms, information sharing efforts, the development of shared situation awareness, and decision-making procedures of the cybersecurity community during cyber events; and,
– Raise awareness of other cyber exercise initiatives.
The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
Report: Saleh bin Khalfan Al RahbiThe Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
Egypt, represented by the Egyptian Computer Emergency Response Team (EG-CERT), is participating in the “CyberDrill 2020 – Arab Region Regional Dialogue: CIRTs and lessons learned from COVID-19 crisis,” organized by the International Telecommunication Union (ITU), online, on September 22.
The Global CyberDrill is a capacity building event which aims to enhance the communication and incident response capabilities of participating teams and promote collective efforts by national Computer Incident Response Teams (CIRTs) and Computer Security Incident Response Teams (CSIRTs).
The think tank warned in its report that this practice increases the danger to actual civilian aircraft in the region, risking misidentification. The SCSPI said the US has a record of changing transponder numbers when it flies reconnaissance in places like Iran and Venezuela.
“He was captured with heavy weapons, specialty weapons. He was captured with a great amount of cash in dollars and with other elements which we have sent directly to the public ministry, the prosecutor’s office.”
Existing Information Sharing Efforts
(…) We also found a great deal of information sharing already underway. Trade associations, consortia, and other groups exchange information among their members and, in some cases, directly with government. Many federal, state and local government agencies have existing relationships with infrastructure owners and operators. Within all the infrastructure sectors, at least some portions are subject to regulatory control by government agencies, and information is shared, albeit sometimes within carefully defined constraints. Several federal agencies provide information to infrastructure owners and operators. The FBI’s Awareness of National Security Issues and Response (ANSIR) program gives over 25,000 industry members information that provides threat and vulnerability insights. More narrowly focused programs are the Department of Transportation’s terrorist threat notification to the civil aviation industry and the National Security Agency’s INFOSEC Vulnerability Assessment Program, which provides information systems-related data to private sector partners. The Comptroller of the Currency operates another system providing advisories on information integrity and security risks to financial institutions.
The third and least predictable threat to the infrastructure comes from deliberate attack. Depending on their objectives, attackers may seek to steal, modify, or destroy data stored in information systems or moving over networks, or to degrade the operation of the systems and net-works themselves, denying service to their users. Attackers include national intelligence organizations, information warriors, terrorists, criminals, industrial competitors, hackers, and aggrieved or disloyal insiders. While insiders constitute the single largest known security threat to information and information systems, controlled testing indicates that large numbers of computer based attacks go undetected, and that the unknown component of the threat may exceed the known component by orders of magnitude.
The air traffic control system of the FAA is based on decades old technology. The replacement system, while doubtless more efficient, will be more vulnerable unless special security measures are incorporated.
The Commission recommends the Secretary of Transportation:
1) Fully evaluate actual and potential sources of interference to, and vulnerabilities of, GPS before a final decision is reached to eliminate all other radiovnavigation and aircraft landing guidance systems.
2) Sponsor a risk assessment for GPS-based systems used by the civilian sector, projected from now through the year 2010.
3) Base decisions regarding the proper federal navigation systems mix and the final architecture of the NAS on the results of that assessment. The DOT and FAA must develop a better understanding of interference and other vulnerabilities of GPS before a final decision is reached concerning the status of all other radionavigation and landing guidance systems. A federally sponsored thorough, integrated risk assessment would lay a sound foundation for decisions on future courses of action.
The National Airspace System
The Commission recommends the FAA act immediately to develop, establish, fund, and implement a comprehensive National Airspace System Security Program to protect the modernized NAS from information-based and other disruptions, intrusions and attack. Program implementation should be guided by the recommendations found in the Vulnerability Assessment of the NAS Architecture, prepared for the Commission. The Vulnerability Assessment included the following recommendations: (…)
3) The FAA should consider the implementation of full “trusted” hardware and software security capabilities for only the FAA’s most vulnerable future subsystems, since the software cost for embedded applications, together with full audit, tracking, and monitoring, may be too great if applied to all subsystems. Relaxation of the full capabilities, such as less rapid revalidation (e.g., a slower fifteen minutes down time) and less constant vigilance of data integrity, should be considered on a case-by-case basis for less critical subsystems, particularly in situations where existing air traffic control recovery procedures exist.
4) The FAA should conduct a comprehensive investment analysis of NAS INFOSEC in order to determine the degree of security protection that is needed
Transportation: A critical infrastructure characterized by the physical distribution system critical to supporting the national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and airports; roads and highways,trucking and personal vehicles; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and long haul passenger rail; and delivery services.
In short, every major spy service around the globe is trying to find out what everyone else is up to.
NSO’s specialty is hacking smartphones. Up till now, little was known about Candiru. TheMarker has revealed that the firm offers hacking tools used to break into computers and servers, and now, for the first time, has confirmed it also has technology for breaking into mobile devices.
According to a document signed by an unnamed vice president for Candiru, they also offer a “high-end cyber intelligence platform dedicated to infiltrate PC computers, networks, mobile handsets, by using explosions and disseminations operations.“
Ned Price, a former CIA analyst who served as a senior director on the Obama administration’s National Security Council staff and is not involved in the Biden campaign, offered another explanation. In an interview with RCP, Price said the most recent assessment claiming that China wants Biden to win isn’t convincing because it relies on open-source public comments from Chinese officials, not more penetrating intelligence.
An official in Ratcliffe’s office, speaking on the condition of anonymity, said on Saturday the office was “concerned about unauthorized disclosures of sensitive information following recent briefings”.
The move drew a heated rejoinder from House Democrats, who have focused on foreign efforts to sway the presidential election in 2016 and again this year.
„I believe this approach helps ensure, to the maximum extent possible, that the information ODNI provides the Congress in support of your oversight responsibilities on elections security, foreign malign influence, and election interference is not misunderstood nor politicized,“ Director of National Intelligence John Ratcliffe wrote in a letter to congressional committee heads.
In a joint statement released Saturday, House Speaker Nancy Pelosi and Adam Schiff, the chairman of the House Intelligence Committee, said Congress had been set for briefings on election security in mid-September. But briefings for members of Congress, including the House and Senate intelligence committees, by Ratcliffe’s office have now been called off, they said.
„This is a shocking abdication of its lawful responsibility to keep the Congress currently informed, and a betrayal of the public’s right to know how foreign powers are trying to subvert our democracy,“ Pelosi and Schiff said in the statement.
The Office of the Director of National Intelligence (ODNI) has informed the House Intelligence Committee and Senate Intelligence Committee that it will no longer be briefing on election security issues. Instead, it will provide written „finished intelligence products.“
Rep. Anna Eshoo (D-Calif.), a senior member of the House Energy and Commerce Committee, asked two intelligence agencies on Friday if surveillance has been conducted on members of Congress in the last decade.
In a letter to the heads of the National Security Agency (NSA) and Office of the Director of National Intelligence (ODNI), Eshoo raised alarm over allegations in a book published earlier this year by journalist Barton Gellman.
Domestically, the potential targeting of American citizens as foreign actors or agents was moved forward by Bill Barr’s Justice Department in June, in response to the Minneapolis riots, Barr released a statement naming “Antifa and other similar groups” as possible targets of its 56 regional FBI Joint Terrorism Task Forces (JTTF) offices. In the same statement the top prosecutor invoked the National Guard, which would be “deployed on the streets to reestablish law and order” if necessary.
Even assuming that most of their jobs are pointless, it’s a lot of damn people keeping our rebellious impulses in check. Then there’s Fort Belvoir, Andrews Airforce Base, Quantico, Anacostia-Bolling. US Defense Services. Navy Intelligence. Department of Homeland Security. The National Reconnaissance Office. The Bureau of Intelligence and Research. The Office of Intelligence and Analysis. The NSA, FBI, CIA. Booz Allen Hamilton. Boeing. Humana. Raytheon. BAE Systems. General Dynamics. Northrup Grumman. Lockheed Martin.
A truly high maintenance group, the ruling class.
In an age of ubiquitous technology and strong encryption, such “lawful hacking” has emerged as a powerful tool for public safety when law enforcement needs access to data. NSO insists that the vast majority of its customers are European democracies, although since it doesn’t release client lists and the countries themselves remain silent, that has never been verified.
The Israeli company has signed contracts with Bahrain, Oman and Saudi Arabia.
Max Blumenthal and Ben Norton speak with Aaron Maté about the virtual Democratic National Convention (DNC), and how the Democratic Party welcomes neoconservative war criminals and right-wing Republicans while attacking the left.
We also talk about Joe Biden choosing hawkish neoliberal „top cop“ Kamala Harris as his VP candidate. Then Aaron picks apart the new Senate Intelligence Committee report on Russia, and explains why the Russiagate conspiracy still won’t go away, even after it has been debunked.
(Jun 11, 1995)
* The CIA was instrumental in training and equipping Battalion 316. Members were flown to a secret location in the United States for training in surveillance and interrogation, and later were given CIA training at Honduran bases.
* Starting in 1981, the United States secretly provided funds for Argentine counterinsurgency experts to train anti-Communist forces in Honduras. By that time, Argentina was notorious for its own „Dirty War,“ which had left at least 10,000 dead or „disappeared“ in the 1970s. Argentine and CIA instructors worked side by side training Battalion 316 members at a camp in Lepaterique, a town about 16 miles west of Tegucigalpa.
* Gen. Gustavo Alvarez Martinez, who as chief of the Honduran armed forces personally directed Battalion 316, received strong U.S. support – even after he told a U.S. ambassador that he intended to use the Argentine method of eliminating subversives.
* By 1983, when Alvarez’s oppressive methods were well known to the U.S. Embassy, the Reagan administration awarded him the Legion of Merit for „encouraging the success of democratic processes in Honduras.“ His friendship with Donald Winters, the CIA station chief in Honduras, was so close that when Winters adopted a child, he asked Alvarez to be the girl’s godfather.
John Negroponte, who served as director of national intelligence under former President George W. Bush, endorsed former Vice President Joe Biden in his race against President Trump on Thursday in an interview with the Daily Beast.
“All roads lead to Trump in a way,” Negroponte told the website. “I’m just not sure the country can withstand another four years of the presidency with a man who has shown such disregard to the office.”
Babel Street is a shadowy organization that offers a product called Locate X that is reportedly used to gather anonymized location data from a host of popular apps that users have unwittingly installed on their phones. When we say “unwittingly,” we mean that not everyone is aware that random innocuous apps are often bundling and anonymizing their data to be sold off to the highest bidder.
A nationalist and champion of secular democracy, Mossadegh (also spelled Mosaddegh and Mosaddeq) gained prominence in Iranian politics by focusing on two key issues: devolving more power from the monarchy to parliament, based on Iran’s 1906 constitution; and wresting back control of Iran’s oil industry, which had been dominated by the British.
In 1949, Mossadegh formed the National Front Party and spearheaded protests against Iran’s reigning monarch, Shah Mohammad Reza Pahlavi, and the ongoing involvement of the British Empire.
By early 1951, the Shah was overwhelmed by widespread public demonstrations.
What I showed those journalists was proof, in the form of the government’s own classified documents, that the self-described “Five Eyes”—the state security organs of the United States, United Kingdom, Australia, New Zealand, and Canada—had together conspired to weaken their laws. They had forced clandestine access to the networks of their largest telecommunications and internet titans (some of whom hadn’t needed much in the way of arm-twisting) in pursuit of a single goal: the transformation of the free and fragmented internet into history’s first centralized means of global mass surveillance.
In the interview, Trump justified talk of a pardon by again complaining about an FBI investigation into links between his campaign and Russians who sought to interfere in the 2016 presidential election. He said it was unfair that people like ex-FBI Director James Comey are free while Snowden is in legal limbo.
Just a few moments ago, I hosted a very special call with two friends — Prime Minister Benjamin Netanyahu of Israel and Crown Prince Mohammed bin Zayed of the United Arab Emirates — where they agreed to finalize a historical peace agreement. Everybody said this would be impossible. And, as you know, Mohammed is one of the great leaders of the Middle East.
After 49 years, Israel and the United Arab Emirates will fully normalize their diplomatic relations. They will exchange embassies and ambassadors, and begin cooperation across the board and on a broad range of areas, including tourism, education, healthcare, trade, and security.
This is a truly historic moment. Not since the Israel-Jordan peace treaty was signed more than 25 years ago has so much progress been made towards peace in the Middle East.
Egypt’s head of General Intelligence Service (GIS) Abbas Kamel visited South Sudan on Wednesday for talks with President Salva Kiir and several senior officials, including Vice President Riek Machar.
It is not clear when he conveyed the information; however, several current and former American officials who have worked in the Middle East say that the consultant would normally have conveyed his findings immediately to the American officials who oversaw the contract, in this case the embassy, State Department or Pentagon.
„There’s no higher concern that we have than maintaining the free and fair elections that are the cornerstone of our democracy,“ O’Brien said. „And look, we know that there are people overseas, the Chinese, the Iranians, the Russians, others who would like to interfere with our democracy. And we’re going to fight against that.“
The warning from the national security adviser to foreign governments less than 100 days before the November election comes after the intelligence community issued its first public assessment Friday on the candidate preferences of some foreign actors.
The top U.S. counterintelligence official announced Friday a series of foreign threats facing the 2020 presidential election, warning in particular that Russia is using a range of measures to „primarily denigrate“ former Vice President Joe Biden while China prefers that President Trump not win reelection.
William Evanina, the director of the National Counterintelligence and Security Center, pointed to China, Russia and Iran as the three primary foreign threats to the U.S. presidential race, cautioning that they are seeking to „sway voters’ preferences and perspectives,“ sow discord and „undermine the American people’s confidence in our democratic process.“
Revelations by a former police spy upend the official story blaming Iran for the 1994 bombing of a Jewish community center in Buenos Aires, and suggest a cover-up by dirty war elements may have let the real culprits off the hook.
By Gareth Porter
House Intelligence Committee Position Member Devin Nunes, R-Calif., instructed “Sunday Early morning Futures” in an distinctive job interview that “we’ve now expanded our investigation, full-blown investigation, into the Brookings Institute.”
The fabulist behind the infamous and discredited anti-Trump dossier has finally been exposed. His name is Igor Danchenko.
He is not some mysterious Russian agent operating in the bowels of the Kremlin. Danchenko is a Ukrainian-born resident of the United States who worked as a senior research analyst for the Washington D.C. liberal think tank, Brookings Institution.
The Assistance and Access Bill was passed in late 2018 but despite its nickname „the encryption bill“ it promotes insecurity and a dangerous global precedent, says the Independent National Security Legislation Monitor. Expecting Parliament to commence a review of the bill today, Internet Australia calls for the INSLM recommendations to be accepted.
The former British ambassador to Uzbekistan and a close associate of imprisoned WikiLeaks publisher Julian Assange says he was the “top target” of the 24/7 surveillance of Assange at Ecuador’s embassy in London by the Spanish security company UC Global, which, according to press reports and court documents, shared the surveillance with the CIA.
Craig Murray said he has been contacted by an attorney in the spying case on Assange and that he will be going to Madrid to testify. The founder of UC Global, David Morales, was arrested over the surveillance (including privileged Assange-lawyer conversations) and is on trial.
Murray told former CIA analyst Ray McGovern in an email, shared with Consortium News with Murray’s permission, that the CIA was “obsessed” with him.
The police are monitoring online social networks like Facebook and Twitter to try to identify activist leaders and the future direction of the protests, according to sources in law enforcement who spoke on condition of anonymity.
Powers like these have been deployed sparingly: A few days after the Sept. 11 attacks, a proclamation declaring a national emergency, followed by an executive order days later, invoked some presidential powers, including the use of National Guard and U.S. military forces.
What little we know about these secret powers comes from the Brennan Center for Justice at the New York University Law School, but we believe they may include suspension of habeas corpus, surveillance, home intrusion, arrest without a judicial warrant, collective if not mass arrests and more; some could violate constitutional protections.
The government is preparing to push ahead with a new counter-espionage legislation, the newspaper reported, adding that the new laws could introduce a “register of foreign agents” modelled on the approach in the United States and Australia.
Sens. Patrick Leahy (D-Vt.) and Mike Lee (R-Ut.) on Thursday pressed the Trump administration on whether and how mass surveillance programs authorized by the Foreign Intelligence Surveillance Act have been halted since the act’s expiration.
The letter to Attorney General William Barr and Director of National Intelligence John Ratcliffe raises concerns that the administration may be be continuing to conduct surveillance operations by relying on Executive Order 12333.
The Shin Bet would now be allowed to track people for the coming three weeks, beginning Tuesday. The law will remain in effect until January 2021.
The law also requires the Health Ministry to respond within 24 hours to appeals by people sent into quarantine based on the Shin Bet’s data, following public criticism of its accuracy.
1. Operation Mason, the police code-name for the search for Dr Kelly, was officially started before his family had reported him missing. The official explanation is that operation start times are often made retrospective to cover any preceding period relevant to the operation; but if this were the reason in this case, then the start time would need to be weeks, not hours earlier. Who authorised the opening of documentation on the operation and at precisely what time?
2. Why were there no fingerprints on Dr Kelly’s knife, pill packets, water bottle, glasses, mobile or watch? He wore no gloves. Police knew this when they gave evidence to Hutton but the absence of prints wasn’t mentioned.
3. Lord Hutton said photographic evidence showed Dr Kelly’s body was found propped against a tree, yet the first paramedic to reach the scene said he was originally flat on his back. Who moved the body and why?
Dr Kelly had been unmasked by officials a week previously as the assumed source of a highly damaging BBC report which suggested Blair’s government had ’sexed-up‘ the case for the Iraq war.
He always denied being the BBC’s prime source, yet its report added to mounting questions about the existence of the infamous weapons of mass destruction (WMD), used by the then Prime Minister to justify sending British troops into the conflict.
Johnson’s government has pleased President Donald Trump’s administration in recent weeks as it blocked telecoms giant Huawei Technologies Co. and took action over Hong Kong, but has stopped short of the kind of sanctions imposed on individuals and companies by Washington. While Pompeo’s goal is not to ask for more, according to people familiar with his plans, the MPs will try to get him to carry their demands to his meeting with Johnson.
The U.S. welcomed the U.K.’s announcement in July that it would remove Huawei from its future telecommunications infrastructure.
The U.K. will eliminate Chinese telecoms giant Huawei from its 5G network by 2027, after pressure from Sino-skeptic lawmakers and U.S. politicians.
“We convinced many countries…not to use Huawei,” U.S. President Trump said after the U.K. announced the removal.
Any information gathered on U.S. citizens is required to be deleted after 180 days if it doesn’t assist a government mission, but it can be given to federal government agencies, state and local groups and private-sector organizations that work in law enforcement, counterterrorism and homeland security operations, according to the newspaper.
“The Department of Justice (DOJ) and the Department of Homeland Security (DHS) appear to have increasingly abused emergency authorities to justify the use of force against Americans exercising their right to peaceful assembly,” wrote House Judiciary Committee Chairman Jerrold Nadler (D-N.Y.), Homeland Security Committee Chairman Bennie Thompson (D-Miss.) and Oversight and Reform Committee Chairwoman Carolyn Maloney (D-N.Y.).
MARTIN: First of all, would you just give us an update on the situation in Portland today?
BROWN: Obviously, things are very challenging right now. I was very, very clear with the Trump administration and the head of the Homeland Security to take their federal troops off the streets of Portland. The Trump administration needs to stop playing politics with people’s lives. We don’t have a secret police in this country. This is not a dictatorship. And Trump needs to get his officers off the streets.
When contacted by CNN, a spokesperson for the Portland Police Bureau said that their officers were not involved in the incident.
Customs and Border Protection also told CNN that their officers were not involved.
CNN has reached out to the Department of Homeland Security and US Marshals for a comment but has not yet heard back.