Quotulatiousness

September 2, 2012

Margaret Thatcher and the British intelligence organizations

Filed under: Britain, Government — Tags: , , , , — Nicholas @ 00:01

An interesting post at the official website for Prime Minister David Cameron talks about former Prime Minister Margaret Thatcher and her relationship with the Joint Intelligence Committee during her time in office:

Soon after taking office a new Prime Minister receives special briefings from the Cabinet Secretary. One is on the ‘letters of last resort’, which give instructions to the commander of the British submarine on patrol with the nuclear deterrent, in the event of an attack that destroys the Government. Another briefing outlines the structure and control of the intelligence machinery, including the Joint Intelligence Committee (JIC) in the Cabinet Office. Sir John Hunt, the Cabinet Secretary in 1979, briefed Margaret Thatcher on the intelligence structure, including counter-subversion activities, the day after her election victory of 3 May.

Thatcher had started a programme of visits to Government departments to see first-hand what some of the 732,000 officials inherited from James Callaghan’s administration actually did. In September, during a routine briefing by Brian Tovey, the Director of GCHQ, Thatcher showed great interest in the way in which intelligence was collated and assessed by the JIC, stressing that assessment should be free from policy (or political) considerations. She also expressed a wish to attend a JIC meeting. It would be the first time a Prime Minister had attended the JIC since its creation in 1936.

It fell to Sir John Hunt, a former Secretary of the JIC, to make the arrangements, but there were complications. First, the JIC Chairman, Sir Antony Duff of the Foreign and Commonwealth Office (FCO), had also been made Deputy Governor of Southern Rhodesia (now Zimbabwe) after the British Government assumed direct rule of the rebellious colony. He was a key participant in the Lancaster House Conference, aiming finally to settle the Rhodesian problem, and could not be sure to attend the JIC until after its conclusion. Second, the JIC normally met on Thursday mornings in 70 Whitehall, which was also when the Cabinet met in 10 Downing Street, so a special JIC meeting would need to be arranged.

August 6, 2012

CSIS considers what to do with information possibly obtained through torture

Filed under: Cancon, Government — Tags: , , , — Nicholas @ 09:48

The Canadian Security Intelligence Service (CSIS) partners with the intelligence services of our allies, which sometimes means they get information that may have been partly or completely obtained through torture of suspects. This is a problem:

A secret high-level committee at Canada’s spy agency is tasked with deciding whether information received from abroad is tainted by torture, declassified records show.

Internal Canadian Security Intelligence Service memos reveal the key role that the recently formed Information Sharing Evaluation Committee plays in determining if the spy agency makes use of the suspect material.

The committee — whose existence was previously unknown outside the intelligence service — also helps CSIS decide whether to send information to foreign agencies in cases where it might lead to mistreatment.

Detailed instructions direct committee members to comb through databases, consult human rights reports and weigh the particular circumstances of each case to arrive at a decision.

Ultimately, CSIS director Dick Fadden makes the final call when the committee decides information is likely derived from torture, of if sending Canadian material to an allied agency could result in someone being abused.

July 30, 2012

QotD: Playing “The Last Post” over the notion of Apple’s innovation

Filed under: Business, Quotations, Technology — Tags: , , , , — Nicholas @ 00:02

This isn’t speculation — an Apple employee copied Sony’s design, circulated it to his bosses, and testified to these facts in court.

From now on, when anyone heaps phrase on Apple’s design excellence and superlative innovation, just point and laugh. Some of us have been saying for years that what Apple is really good at is ripping off other peoples’ ideas and stealing the credit for them with slick marketing. This, right here, is the proof.

Eric S. Raymond, “The Smartphone Wars: The iPhone Design Was Inspired by Sony”, Armed and Dangerous, 2012-07-29

June 5, 2012

Stuxnet, Duqu, and Flame: joint US-Israeli projects

Filed under: Middle East, Military, Technology, USA — Tags: , , , , , — Nicholas @ 09:02

The US and Israeli governments have admitted that the Stuxnet, Duqu, and Flame malware infections were joint efforts:

American and Israeli officials have finally confirmed that the industrial grade Cyber War weapons (Stuxnet, Duqu and Flame) used against Iran in the last few years were indeed joint U.S.-Israel operations. No other details were released, although many more rumors are now circulating. The U.S. and Israel were long suspected of being responsible for these “weapons grade” computer worms. Both nations had the motive to use, means to build and opportunity to unleash these powerful Cyber War weapons against Iran and other that support terrorism.

The U.S. Department of Defense had long asked for permission to go on the offensive using Cyber War weapons. But the U.S. government regularly and publicly declined to retaliate against constant attack from China, mainly because there were fears that there could be legal repercussions and that weapons used might get out of control and cause lots of damage to innocent parties.

Iran turned out to be another matter. Although not a serious Cyber War threat to the United States, Iran was trying to build nuclear weapons and apparently Israel had already been looking into using a Cyber War weapon to interfere with that. Given the nature of these weapons, which work best if the enemy doesn’t even know they exist, don’t expect many details to be released about this Cyber War program. What is known is that the Cyber War weapons unleashed on Iran were designed to concentrate only on very specific targets. So far, only three weapons that we know of have been used. One (Stuxnet) was designed to do damage to one specific facility, the plant where Iran produced nuclear fuel for power plants, and atomic weapons. That one worked. The other two (Duqu and Flame) were intelligence collection programs. They also apparently succeeded, remaining hidden for years and having lots of opportunity to collect enormous quantities of valuable data.

May 15, 2012

Conducting espionage operations in the age of the internet

Filed under: Britain, Middle East, Politics, USA — Tags: , , , , , , — Nicholas @ 10:04

Shashank Joshi in the Telegraph on the good and bad news coming out of the recently foiled “underwear bomber” incident:

This week began with news of a remarkable intelligence coup. It has ended in ignominy, and a reminder that the pathological leakiness of the American bureaucracy has consequences for counterterrorism.

According to the Associated Press (AP), the CIA foiled an audacious plot by Al Qaida in the Arabian Peninsula (AQAP) to attack an aircraft using an upgraded version of the underwear bomb that failed three years ago. The AP had, apparently, shown great responsibility in delaying publication for days at the request of the White House.

Then, the story grew both muddier and more remarkable still. The would-be bomber was in fact a mole. He was a British national of Saudi Arabian origin, recruited by MI5 in Europe and later run, with Saudi Arabia, by MI6. This is a testament to the unimaginable courage of the agent in question, and the ingenuity of British intelligence.

But the emergence of this story, with a blow-by-blow account of operational detail, is the result of reckless, impetuous leaking that could cost lives and compromise operations in the future.

Nerd politics: problems and opportunities

Filed under: Government, Liberty, Politics, Technology — Tags: , , , , , , — Nicholas @ 00:08

Cory Doctorow in the Guardian on the current state of “nerd politics:

In the aftermath of the Sopa fight, as top Eurocrats are declaring the imminent demise of Acta, as the Trans-Pacific Partnership begins to founder, as the German Pirate party takes seats in a third German regional election, it’s worth taking stock of “nerd politics” and see where we’ve been and where we’re headed.

Since the earliest days of the information wars, people who care about freedom and technology have struggled with two ideological traps: nerd determinism and nerd fatalism. Both are dangerously attractive to people who love technology.

In “nerd determinism,” technologists dismiss dangerous and stupid political, legal and regulatory proposals on the grounds that they are technologically infeasible. Geeks who care about privacy dismiss broad wiretapping laws, easy lawful interception standards, and other networked surveillance on the grounds that they themselves can evade this surveillance. For example, US and EU police agencies demand that network carriers include backdoors for criminal investigations, and geeks snort derisively and say that none of that will work on smart people who use good cryptography in their email and web sessions.

But, while it’s true that geeks can get around this sort of thing — and other bad network policies, such as network-level censorship, or vendor locks on our tablets, phones, consoles, and computers — this isn’t enough to protect us, let alone the world. It doesn’t matter how good your email provider is, or how secure your messages are, if 95% of the people you correspond with use a free webmail service with a lawful interception backdoor, and if none of those people can figure out how to use crypto, then nearly all your email will be within reach of spooks and control-freaks and cops on fishing expeditions.

[. . .]

If people who understand technology don’t claim positions that defend the positive uses of technology, if we don’t operate within the realm of traditional power and politics, if we don’t speak out for the rights of our technically unsophisticated friends and neighbours, then we will also be lost. Technology lets us organise and work together in new ways, and to build new kinds of institutions and groups, but these will always be in the wider world, not above it.

May 11, 2012

Britain’s government websites under attack

Filed under: Britain, China, Government, Technology — Tags: , , , — Nicholas @ 09:06

Perhaps I’m just cynical, but I had expected that any government website would need to be “hardened” against attack. The British government’s many official websites have indeed been undergoing attacks for quite some time:

The British Ministry of Defense has admitted, for the first time, that it is under heavy attack by hackers. It was also revealed that some of these attacks had succeeded. The good news is that the military is becoming more aggressive and imaginative in dealing with Cyber War defense. China was not directly accused of being behind any of these attacks, but it was mentioned that there are now discussions underway with the Chinese on the matter. All this is an old problem.

Last year, Britain went public to report a higher number of Internet based attacks. The report noted that the emphasis was now on economic assets. This included technology and business plans. For example, the Foreign and Commonwealth Office was under heavy cyber-attack for several months, apparently in an effort to obtain secret details of government plans and techniques for supporting British exports. Government Internet security officials were making all this public to encourage British firms to increase their Internet security.

All this was nothing new. Two years ago Britain’s domestic intelligence service, MI5, went public with numerous charges of Chinese Internet based espionage. MI5 accused China of using both agents and hacker software, to obtain secrets from specific companies and government organizations. This approach had Chinese personnel approaching specific British businessmen at trade shows, and offering gifts, like a thumb drive loaded with hidden hacker software that will load itself on to the victim’s PC and seek out valuable information. Internet based attacks, traced back to China, continue to send real looking email that has an attachment containing another of those stealthy hacker programs that seek out secrets, or even quietly take over the user’s PC. Three years ago, MI-5 sent alerts to major corporations warning them of similar attacks and advising increased security of their data.

April 23, 2012

Yet another New Orleans Saints scandal

Filed under: Football — Tags: , , , — Nicholas @ 15:21

A new report at the ESPN website:

The U.S. Attorney’s Office in the Eastern District of Louisiana was told Friday that New Orleans Saints general manager Mickey Loomis had an electronic device in his Superdome suite that had been secretly re-wired to enable him to eavesdrop on visiting coaching staffs for nearly three NFL seasons, “Outside the Lines” has learned.

Sources familiar with Saints game-day operations told “Outside the Lines” that Loomis, who faces an eight-game suspension from the NFL for his role in the recent bounty scandal, had the ability to secretly listen for most of the 2002 season, his first as general manager of the Saints, and all of the 2003 and 2004 seasons. The sources spoke with “Outside the Lines” under the condition of anonymity because of fear of reprisals from members of the Saints organization.

[. . .]

Under Article No. 9 of the Constitution and Bylaws of the NFL, which lists “Prohibited Conduct,” the league specifically bans the use of “…videotape machines, telephone tapping or bugging devices, or any other form of electronic device that might aid a team during the playing of a game.”

“That would be a stupendous advantage if you had that,” said Rick Venturi, who was the team’s defensive coordinator during the period the sources said Loomis could eavesdrop on opposing coaches.

“That’s shocking,” Venturi said, when told of the allegations. “I can tell you if we did it, nobody told me about it. … Nobody ever helped me during a game.”

March 31, 2012

Botched investigation into GCHQ staff member’s mysterious death

Filed under: Britain, Government, Science, Technology — Tags: , , , — Nicholas @ 09:17

This sounds particularly bad:

Forensic investigators have apologized for the bungling of the inquiry into the mysterious death of a codebreaker employed by the Government Communications Headquarters (GCHQ).

In August 2010, Gareth Williams, described as a mathematical genius by his peers and employed at GCHQ since leaving university, was found dead in his flat in London. Williams, who had recently qualified for deployment with MI6 — Britain’s version of the CIA — was found naked and partially decomposed in a sports bag that had been locked from the outside and placed in the bath.

In the pre-inquest hearing on Friday, the court heard that the investigation into Williams’ death had been botched from the start. LGS Forensics said that DNA found on Mr Williams’ body was investigated, but later turned out to have been transferred there from one of the forensic scientists investigating the death, and a search of the apartment turned up no clues as to his death.

March 24, 2012

The less-than-glamorous reality of Cold War spy work

Filed under: Books, Britain, Europe, Germany, History, Military, Russia — Tags: , , , , — Nicholas @ 00:08

A review of Steve Gibson’s Live and Let Spy: BRIXMIS – The Last Cold War Mission by Bill Durodié at spiked!:

Called the British Commander-in-Chief’s Mission to the Group Soviet Forces of Occupation in Germany, or BRIXMIS for short, it was part of an officially sanctioned exchange of observers between the Red Army and the British Army established by the victorious Allied powers and the USSR through the Robertson-Malinin agreement in 1946. Its ostensible purpose was to improve communication and relations between them.

In addition to BRIXMIS — and their French and American counterparts in the East — the Red Army also conducted similar operations through a unit in West Germany. But, diplomatic liaison and translation duties aside, the real purpose of these units soon became clear: to find out what each other was up to by heading out into those areas where they had been specifically told not to go.

[. . .]

For anyone who imagines that spying is glamorous, or somehow akin to being in a Bond movie, they will be disabused by Gibson’s chapter on document-gathering from dumps (literally). It had been recognised for some time that, when they went on manoeuvres in East Germany, the Soviet forces were not supplied with any toilet paper. They would use whatever came to hand — a copy of Pravda, a letter from a loved one, or even their mission papers. And after they were done, it was then that Her Majesty’s specially trained and equipped Cold War warriors really came into their own…

The book is republished with an expanded final chapter reflecting on what happened in the time following the fall of the Iron Curtain:

As a professor of political science at the University of Warwick, Robert Aldrich, notes in the new foreword, Gibson is now clearly of the mind that ‘much of what [he] was led to believe [during the Cold War], and some of what he was told, was simply wrong!’

[. . .]

Gibson’s resolute clearsightedness is to be admired. So despite having been caught up in the exhilaration of it all as a young man, despite devoting the prime of his life to the East-West conflict, he refuses to lie to himself. ‘The Cold War’, he notes, ‘was a giant historical cul-de-sac where all enlightened efforts at producing a good society were suspended’.

Aldrich astutely summarises a key argument of Live and Let Spy: ‘while Cold War warriors fought a tyrannical and ruthless version of Communism abroad, they remained ignorant of — and lost — an ideological battle at home’. He then adds accusingly: ‘Western politicians now offer a watered-down version of the interfering, intolerant, controlling and authoritarian government that they were initially set against rather than anything freer.’

February 29, 2012

NY Police domestic spy operation in Muslim neighbourhoods gets little press attention

Filed under: Law, Liberty, Religion, USA — Tags: , , , , , , , — Nicholas @ 10:11

Natalie Rothschild on the rather disturbing use of NYPD resources to conduct surveillance operations in Muslim areas of New York City and New Jersey:

It has emerged that the White House has funded the New York Police Department’s surveillance of entire Muslim neighbourhoods with money earmarked for fighting drug crime. The revelations were detailed in reports by the Associated Press this week. In response, senior law enforcement officials and politicians have been either unapologetic or silent. Most tellingly, the Obama administration, which has championed Muslim outreach and has said law enforcement should not put entire communities under suspicion, said on Monday that it has no opinion on the matter.

Since the 9/11 attacks, the Bush and Obama administrations have provided $135million to the New York and New Jersey region through the High Intensity Drug Trafficking Area programme (HIDTA). It’s unclear exactly how much of that money was spent on surveillance of Muslims because the programme has little oversight. But the AP discovered that the White House money has paid for cars that plainclothes NYPD officers used to conduct surveillance of Muslim neighbourhoods in New York and New Jersey, and for computers that stored information about Muslim college students, mosque sermons and social events. It also helps pay rent for the NYPD’s intelligence unit.

This is, effectively, a spying programme used to monitor American Muslims as they shop, work, socialise, pray and study. Police have photographed and mapped mosques and recorded license plates of worshippers. They have compiled lists of Muslims who took new, Americanised names, eavesdropped on conversations inside businesses owned or frequented by Muslims, infiltrated Muslim student groups and monitored websites of universities across north-east US. In the name of counterterrorism, Muslim American citizens have been catalogued, their private conversations and everyday activities recorded and stored in databases.

[. . .]

On Monday, White House spokesman Jay Carney said the administration has no opinion on how the HIDTA grant money was spent and that the White House has no authority to direct, manage or supervise any law-enforcement operations. If the administration truly has no power to influence a NYPD programme used for intrusive monitoring of scores of American citizens, then that would indicate great political impotence. After all, both in the domestic and international arenas, the Obama administration has warned against demonising and singling out Muslims in America and turned Muslim outreach into a priority. Well, it is hard to think of any starker way of ‘singling out’ a group than by stalking anyone who looks or sounds like they belong to it.

February 28, 2012

More on those links between Pakistan’s ISI and army leaders and the Taliban

Filed under: Asia, India, Military, Politics — Tags: , , , , , , — Nicholas @ 10:09

Strategy Page has a useful summary of the state of play in Pakistan in their oft-denied support of terrorist activities in Afghanistan and in India:

Pakistan officially denies there is any direct connection between the Pakistani Army, ISI (Pakistani intelligence) and Islamic terrorists. The government has recently admitted that Islamic terrorists have had cooperation from unnamed prominent Pakistani civilians. But a growing number of former (mostly retired) military and intelligence admit that the terrorist connections did exist. Few of these men will openly admit these connections, lest they endure retaliation. The army and ISI are known to kidnap and murder critics. Pakistan is living a dream/nightmare of having created and sustained Islamic terror organizations for decades, yet never admitting the role of the government in this. The denials are wearing thin.

Pakistan remains a much more violent place than India. Each month, there are 5-10 times as many terrorism related deaths in Pakistan as in India (a country with six times as many people as Pakistan). Most of the violence is (and always has been) in the Pushtun and Baluchi tribal territories along the Afghan and Iranian borders. These lands have always been poor (except for the recently discovered natural gas in Baluchistan, and, centuries ago, some parts of the Chinese “silk road” that passed through Pushtun lands) and the local empires simply ignored the Pushtuns and Baluchis. For thousands of years, these were the “badlands” that civilized people avoided. The many Baluchi and Pushtun tribes were too isolated from each other, and in love with their own independence, to allow formation of Baluchi and Pushtun states. But the Baluchis are overcoming their differences, much to the discomfort of Pakistan. The Pushtuns are as divided as ever, united only in their hostility to outsiders (a category which sometimes includes other Pushtun tribes.) Worse for the Pushtuns, they form the majority of the Taliban, and are far more into Islamic terrorism than the Baluchis.

[. . .]

Pakistan’s army and intelligence services have been taking a lot of international heat for the years of state-approved terrorism against tribal separatists in Baluchistan (southwest Pakistan). The Baluchis want autonomy and a larger share of the revenues from natural gas operations in their lands. The ISI and army have ordered the media they control to come up with stories to explain all the kidnappings and murders of tribal activists. The general story line is that the violence (against the government, as well as the tribal activists) has been organized by Israel, the CIA and other foreign intelligence agencies. Few Pakistanis will openly criticize these stories, as that could get you killed. But the true story does get out via the Internet, although you sometimes have to wade through a lot of noise (flame wars and Pakistani government efforts to bury critical posts with a flood of pro-government replies.)

February 10, 2012

Before Watergate the FBI had to put together files using wiretaps, informants, and detective work

Filed under: Government, History, Liberty, USA — Tags: , , , , , — Nicholas @ 11:03

Nowadays, of course, they wouldn’t need to do any of that: most of what they collected then could be gathered by looking you up on Facebook:

Bud Abbott and Lou Costello are perhaps best known for their comedy sketch Who’s on First?

But in the 1950s, the duo caught the FBI’s attention for other reasons.

“A police informant furnished information to the effect that Bud Abbott, the well-known motion picture and television star, is a collector of pornography, and alleged he has 1,500 reels of obscene motion pictures,” an agent wrote in an FBI file.

Of Costello, agents reported: “Information was secured reflecting that two prostitutes put on a lewd performance for Lou Costello,” for which they were paid $50 each.

[. . .]

During the era of legendary FBI director J Edgar Hoover, “you could find a reason to open a file on anyone”, says Steve Rosswurm, a historian at Lake Forest College in Illinois and author of a book about the FBI’s dealings with the Catholic Church.

“The reasons for the surveillance are as varied as the people being watched,” said British writer Nicholas Redfern, author of Celebrity Secrets: Official Government Files on the Rich and Famous

“It was very much dependent upon the character or the situation the subject of the file was in.”

Today, the bureau’s Cold War-era fears of communist infiltration, obscenity and homosexuality sound almost quaint..

January 31, 2012

Washington Post and the “Top Secret America” Project

Filed under: Government, Military, USA — Tags: , , , , , — Nicholas @ 00:03

Want to know how deep the rabbit hole goes? The Washington Post can at least get you started:

From the editors:

“Top Secret America” is a project nearly two years in the making that describes the huge national security buildup in the United States after the Sept. 11, 2001, attacks.

When it comes to national security, all too often no expense is spared and few questions are asked — with the result an enterprise so massive that nobody in government has a full understanding of it. It is, as Dana Priest and William M. Arkin have found, ubiquitous, often inefficient and mostly invisible to the people it is meant to protect and who fund it.

The articles in this series and an online database at topsecretamerica.com depict the scope and complexity of the government’s national security program through interactive maps and other graphics. Every data point on the Web site is substantiated by at least two public records.

December 10, 2011

“It was not, all in all, Canada’s finest hour. Perhaps that’s why we still don’t talk about it much.”

Filed under: Books, Cancon, History, Media — Tags: , , , , , — Nicholas @ 12:48

Robert Fulford on the event in Ottawa that started the Cold War:

For just one moment in history, Canada found itself at the dangerous centre of global politics. That was in 1945, when Igor Gouzenko left the Russian embassy in Ottawa with documents proving the Soviet Union was spying on Canada with the help of Canadian communists.

Gouzenko’s revelations were the opening shot in the Cold War. A new book, Stalin’s Man in Canada: Fred Rose and Soviet Espionage by David Levy, takes a rambling, anecdotal approach to a major figure in the story, the only Canadian member of Parliament ever convicted of conducting espionage for a foreign state.

Official Ottawa reacted badly to the news that there were spies in its midst. The government arrested the suspects and locked them up for weeks, without access to lawyers or families. They were paraded before a secret royal commission and persuaded to incriminate themselves. Gouzenko was given a new identity to protect him from Soviet assassins but the Mounties leaked nasty stories about him. For decades journalists treated him as a money-grubbing clown rather than the hero that he was.

Today the case remains largely unexplored and poorly remembered. Among those involved, only Gouzenko described his experience in a book, This Was My Choice, a rather thin and hasty account. Twentieth Century Fox produced a forgettable adaptation, The Iron Curtain, with Dana Andrews as Gouzenko.

« Newer PostsOlder Posts »

Powered by WordPress