<$BlogRSDUrl$>

Wednesday, March 11, 2015

Never Ending War, By Design & Intent:

Lee Fang: IMMEDIATELY AFTER LAUNCHING EFFORT TO SCUTTLE IRAN DEAL, SENATOR TOM COTTON TO MEET WITH DEFENSE CONTRACTORS
"In an open letter organized by freshman Sen. Tom Cotton, R-Ark., 47 Senate Republicans today warned the leaders of Iran that any nuclear deal reached with President Barack Obama could expire as soon as he leaves office. Tomorrow, 24 hours later, Cotton will appear at an 'Off the Record and strictly Non-Attribution' event with the National Defense Industrial Association, a lobbying and professional group for defense contractors. The NDIA is composed of executives from major military businesses such as Northrop Grumman, L-3 Communications, ManTech International, Boeing, Oshkosh Defense and Booz Allen Hamilton, among other firms. Cotton strongly advocates higher defense spending and a more aggressive foreign policy. As The New Republic’s David Ramsey noted, 'Pick a topic — Syria, Iran, Russia, ISIS, drones, NSA snooping — and Cotton can be found at the hawkish outer edge of the debate…During his senate campaign, he told a tele-townhall that ISIS and Mexican drug cartels joining forces to attack Arkansas was an ‘urgent problem,''..."


IT Security & Western Spies Trying to Defeat It:

Jeremy Scahill & Josh Begley: THE CIA CAMPAIGN TO STEAL APPLE’S SECRETS
"Researchers working with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the 'Jamboree,' where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both 'physical' and 'non-invasive' techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption..."

Jeremy Scahill & Josh Begley: THE GREAT SIM HEIST -- HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE
"AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data..."

Micah Lee: SECRET ‘BADASS’ INTELLIGENCE PROGRAM SPIED ON SMARTPHONES
"British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies..."

Ryan Gallagher - OPERATION SOCIALIST -- THE INSIDE STORY OF HOW BRITISH SPIES HACKED BELGIUM’S LARGEST TELCO
"It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it 'Regin.' The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear..."


Media:

Glenn Greenwald: THE 'SNOWDEN IS READY TO COME HOME!' STORY: A CASE STUDY IN TYPICAL MEDIA DECEIT
"Most sentient people rationally accept that the U.S. media routinely disseminates misleading stories and outright falsehoods in the most authoritative tones. But it’s nonetheless valuable to examine particularly egregious case studies to see how that works. In that spirit, let’s take yesterday’s numerous, breathless reports trumpeting the 'BREAKING' news that 'Edward Snowden now wants to come home!' and is 'now negotiating the terms of his return!' Ever since Snowden revealed himself to the public 20 months ago, he has repeatedly said the same exact thing when asked about his returning to the U.S.: I would love to come home, and would do so if I could get a fair trial, but right now, I can’t..."

Wednesday, March 04, 2015

Nuclear Free Middle East?

Gholamali Khoshroo: Netanyahu’s Nuclear Deceptions
"...The paradox of the situation is that a government that has built a stockpile of nuclear weapons, rejected calls to establish a nuclear-weapons-free zone in the Middle East, made military incursions into neighboring states and flouted international law by keeping the lands of other nations under occupation, now makes such a big fuss over a country, Iran, that has not invaded another country since America became a sovereign nation. Mr. Netanyahu seems to be in a state of panic at the prospect of losing this tool with which to attack Iran, as we do all in our power to address the genuine concerns of the international community and arrive at a settlement over our country’s nuclear energy program..."

This page is powered by Blogger. Isn't yours?