or "probable cause"]
Government Tyrants 1 - Freedom Fighters 0
Bradley Manning convicted of some charges
Source
Bradley Manning acquitted of most serious charge, convicted of others
By Richard A. Serrano
July 30, 2013, 8:51 p.m.
FT. MEADE, Md. — Army Pfc. Bradley Manning was convicted Tuesday of violating the Espionage Act and faces up to 136 years in prison, but his acquittal on the even more serious charge of aiding the enemy was hailed as a victory for the press and the Internet against the government's crackdown on leaks of classified information.
Manning's leak of more than 700,000 State Department cables, terrorism detainee assessments, combat logs and videos was the largest breach of classified secrets in U.S. history. Among the information was a now-infamous 2007 video of an Apache combat helicopter attack in Iraq in which U.S. soldiers fired on civilians and killed 12, including two Reuters journalists.
Manning becomes one of only two people ever convicted under the Espionage Act for making classified data available to the public; the other, Samuel L. Morison, a government security analyst convicted in 1985, was pardoned by President Clinton on his final day in office.
"We won the battle, now we need to go win the war," said chief defense lawyer David Coombs, who was greeted by applause and thanks from Manning supporters when he left the courtroom. "Today is a good day, but Bradley is by no means out of the fire."
Under the aiding the enemy charge, Manning, 25, could have been sent to prison for life with no parole. The military judge, Army Col. Denise Lind, heard the case without a jury and did not explain her verdicts. She appeared to have accepted defense arguments that Manning did not understand that releasing the material could allow Al Qaeda and other foreign terrorist organizations to use the information to harm the United States.
The government's theory — that even if Manning did not directly convey information to an enemy, he could be charged with that crime because information released to the public could be obtained by U.S. adversaries — had serious implications for whistle-blowers and those who provide information about classified programs to journalists.
Prosecutors "pushed a theory that making information available on the Internet — whether through WikiLeaks, in a personal blog posting, or on the website of the New York Times — can amount to 'aiding the enemy,'" said Widney Brown, senior director for international law and policy at Amnesty International. That, Brown said, "is ludicrous."
A conviction for aiding the enemy would have "severely crippled the operation of a free press," said Thomas Fiedler, dean of the College of Communication at Boston University.
At Tuesday's hearing, Manning wore a blue dress uniform, wire rim glasses and a prison pallor after three years in pretrial confinement. He stood at ramrod attention and listened without emotion as the judge read the guilty and not-guilty verdicts on about two dozen charges.
A sentencing hearing is scheduled to begin Wednesday, with each side expected to present about 10 witnesses. Manning's lawyers may put him on the stand.
If so, it would be the second time he has addressed the court. In February, Manning pleaded guilty to 10 lesser charges of mishandling classified data. He said then that after collecting intelligence on the wars in Iraq and Afghanistan, "I began to become depressed with the situation we had become mired in year after year."
After the sentencing, Maj. Gen. Jeffrey S. Buchanan, commander of joint forces in the capital region, has the authority to toss out some or all of the guilty verdicts and, theoretically, release Manning. On Friday, Manning supporters rallied outside the gate of Ft. McNair in Washington, where Buchanan is stationed. They carried balloons and a 20-foot banner that read, "Maj. Gen. Buchanan, Do the Right Thing. Free Bradley Manning."
Manning was arrested in spring 2010 after the documents he took from government computer databases began appearing in sensational posts on the WikiLeaks website. For months he was held incommunicado, and his lawyers complained he was kept naked and tortured emotionally before his trial began in June.
Manning elected to allow Judge Lind to hear the case without a jury, probably worried that a panel of fellow soldiers weighing his fate would not be pleased that some of the material he gave to WikiLeaks was found in Osama bin Laden's compound in Pakistan after the Al Qaeda leader was killed by Navy SEALs in May 2011.
Military prosecutors presented evidence that Manning underwent extensive training about safeguarding classified data before becoming an Army intelligence analyst in Iraq, and that he instructed other soldiers in security procedures.
"He was a traitor, a traitor who understood the value of compromised information in the hands of the enemy and took deliberate steps to ensure that they, along with the world, received it," Maj. Ashden Fein, the chief prosecutor, told the judge.
The defense, however, portrayed Manning as a small-town youth from Oklahoma who joined the Army with good intentions, only to become deeply bothered when he discovered what he believed to be government misconduct. Coombs said Manning was a whistle-blower, a "young, naive, good-intentioned soldier."
The soldier has spawned a worldwide group of sympathizers who have rallied in his defense, urged his release and floated his name for the Nobel Peace Prize.
On Tuesday morning, hours before Manning learned his fate, two dozen supporters, many wearing black "TRUTH" T-shirts, hoisted signs and waved at workers arriving at Ft. Meade, where the court-martial has been held, and which also houses the highly secretive National Security Agency and the Defense Information Systems Agency.
Julian Assange, the founder of WikiLeaks, was asked before the verdicts whether a long prison sentence would be worth it to Manning.
"That's something Bradley Manning has to weigh up," Assange told CNN. "He was willing to take that risk because he believes apparently that the result is so important."
richard.serrano@latimes.com
3 hops - A lame excuse to nullify the 4th Amendment
Source
With 3 ‘hops,’ NSA gets millions of phone records
Associated Press Wed Jul 31, 2013 2:26 PM
WASHINGTON — President Barack Obama’s national security team acknowledged for the first time Wednesday that, when investigating one suspected terrorist, it can read and store the phone records of millions of Americans.
Since it was revealed recently that the National Security Agency puts the phone records of every American into a database, the Obama administration has assured the nation that such records are rarely searched and, when they are, officials target only suspected international terrorists.
But testimony before Congress on Wednesday showed how easy it is for Americans with no connection to terrorism to unwittingly have their calling patterns analyzed by the government.
It hinges on what’s known as “hop” or “chain” analysis. When the NSA identifies a suspect, it can look not just at his phone records, but also the records of everyone he calls, everyone who calls those people and everyone who calls those people.
If the average person called 40 unique people, three-hop analysis would allow the government to mine the records of 2.5 million Americans when investigating one suspected terrorist.
The NSA has said it conducted 300 searches of its telephone database last year. Left unsaid until Wednesday was that three-hop analysis off those searches could mean scrutinizing the phone records of tens or even hundreds of millions of people.
“So what has been described as a discrete program, to go after people who would cause us harm, when you look at the reach of this program, it envelopes a substantial number of Americans,” said Sen. Dick Durbin, the No. 2 Democrat in the Senate.
John Inglis, the NSA’s deputy director, conceded the point but said NSA officials “try to be judicious” about conducting hop analysis.
“And so while, theoretically, 40 times 40 times 40 gets you to a large number, that’s not typically what takes place,” he said. “We have to compare the theory to the practice.”
Such reassurances have done little to quell the sharp criticism from both parties over the once-secret program. Last week saw a close vote in the House on a measure that aimed to kill the phone surveillance program.
On Wednesday, the administration acknowledged some limitations to its sweeping surveillance powers are inevitable.
“We are open to re-evaluating this program in ways that can perhaps provide greater confidence and public trust that this is in fact a program that achieves both privacy protections and national security,” Robert Litt, counsel to the Office of the Director of National Intelligence, told skeptical members of the Senate Judiciary Committee.
This newest privacy-vs.-security debate was touched off when former government contract systems analyst Edward Snowden leaked classified documents exposing National Security Agency programs that store years of phone records on every American. That revelation prompted the most significant reconsideration yet of the vast surveillance powers Congress granted the president after the Sept. 11, 2001, attacks.
The administration intended to keep the telephone program a secret, and for more than a decade few in Congress showed any interest in limiting the surveillance. Snowden’s leaks abruptly changed the calculus on Capitol Hill.
“We have a lot of good information out there that helps the American public understand these programs, but it all came out late,” Sen. Sheldon Whitehouse, D-Rhode Island, said in a rebuke of government secrecy. “It all came out in response to a leaker. There was no organized plan for how we rationally declassify this so that the American people can participate in the debate.”
The telephone program is authorized under a provision of the USA Patriot Act, which Congress hurriedly passed after the Sept. 11,2001 attacks against the U.S. President George W. Bush’s administration said then what Obama’s administration says now: that in order to connect the dots, it needs to collect lots of dots.
Sen. Patrick Leahy was skeptical.
“There’s always going to be dots to collect, analyze and try to connect,” he said. “Government is already collecting data on millions of innocent Americans on a daily basis based on a secret legal interpretation of a statute that does not on its face appear to authorize this kind of bulk collection. So what’s going to be next? When is enough enough?”
Several Democrats promised bills that would provide tighter controls or more transparency. Proposals include eliminating the FBI’s ability to seize data without a court order, changing the way judges are appointed to the surveillance court and appointing an attorney to argue against the government in secret proceedings before that court. Another measure would force the government to reveal how many Americans have had their information swept up in surveillance.
Inglis said the NSA was willing to reconsider whether it needed to keep phone data for five years. And Deputy Attorney General James Cole said the Justice Department was considering whether and how to allow an outside attorney into the secret court to argue against the government.
Leaked docs give new insight into NSA’s searches
Source
Leaked docs give new insight into NSA’s searches
Associated Press Wed Jul 31, 2013 1:35 PM
LONDON — Documents published by the Guardian newspaper are providing new insight into the National Security Agency’s surveillance of world data, giving an over-the-shoulder look at the programs and techniques U.S. intelligence analysts use to exploit the hundreds of billions of records they gather each year.
Dozens of training slides published Wednesday divulge details about XKeyscore, one of a family of NSA programs that leaker Edward Snowden says has given America the ability to spy on “the vast majority of human communications.”
Some of the slides appear to carry screenshots showing what analysts would see as they trawled the intercepted conversations, including sample search queries such as “Show me all encrypted word documents from Iran” or “Show me all the word documents that reference Osama Bin Laden.”
In an indication of the program’s scope, one slide says that XKeyscore has led to the capture of more than 300 terrorists. In a statement, the NSA said that figure only included captures up to the year 2008, and pushed back against any suggestion of illegal or arbitrary collection of data.
“These types of programs allow us to collect the information that enables us to perform our missions successfully — to defend the nation and to protect U.S. and allied troops abroad,” the statement said.
How and from where the program draws its data isn’t completely clear, but one slide said XKeyscore was supported by 700 servers and 150 sites across the globe. Another slide seemed to show the program drawing data from a body codenamed SSO — an apparent reference to the NSA’s Special Source Operations, which previous Guardian articles have described as capturing large numbers of communications between the United States and other countries.
The volume of data available to analysts through XKeyscore appears to be vast. The Guardian quoted one slide as saying that nearly 42 billion records had been captured by the system during a one-month period in 2012 — a rate of half a trillion records every year. So much content was being collected, the newspaper said, that it could only be stored for short periods of time — generally just a few days.
“At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours,” the Guardian quoted one document as saying.
In a message forwarded to The Associated Press by Guardian spokesman Gennady Kolker, journalist Glenn Greenwald said the article about XKeyscore drew on half a dozen documents supplied to him by Snowden in Hong Kong. One of them — a 32-page overview of the program — was published in its entirety, albeit with several pages redacted.
The documents are the first to have been published in the Guardian since Snowden, who remains stuck at a Moscow airport, applied for temporary asylum in Russia on July 16.
Russian President Vladimir Putin said he’d be inclined to accept on condition that Snowden agreed not to hurt U.S. interests — implying that the American would have to stop leaking secrets. But Snowden’s Russian lawyer, Anatoly Kucherena, said Wednesday that the material for the article was provided long before Snowden promised to stop leaking.
“He warned me that he had already sent to the press an array of revealing information and secret documents and, unfortunately, could not stop its publication,” Kucherena was quoted as saying by the Interfax news agency.
Give Snowden his due: He made a surveillance debate possible
Source
Give Snowden his due: He made a surveillance debate possible
By Michael McGough
July 31, 2013, 12:42 p.m.
They call it the “Snowden effect.” Whatever you think of fugitive former National Security Agency consultant Edward J. Snowden -- hero, traitor, something in between -- his revelations about electronic surveillance programs have inspired a debate about broad questions of policy that was impossible because of the secrecy that enshrouded the programs themselves and their legal rationale. And that debate in turn has prompted defenders of the program to acknowledge that it can be reformed.
In Wednesday’s Washington Post, Sen. Dianne Feinstein, the chairwoman of the Intelligence Committee and a dogged defender of the NSA programs, says that she intends “to work with members of the Senate intelligence and judiciary committees to consider changes to the NSA call-records program in an effort to increase transparency and improve privacy protections.” That is the program under which the government collects so-called metadata -- information about the source, destination and duration of telephone calls.
Among other changes, Feinstein would have the government make public on an annual basis the number of Americans’ phone numbers “submitted as queries of the NSA database,” as well as the number of warrants obtained by the FBI to examine the actual content of phone calls. She also would reduce from five to two or three years the length of time phone records would be retained.
The improvements Feinstein proposes fall short of abolishing the bulk collection of telephone metadata unrelated to a specific terrorism investigation. But would even these refinements be on the table if Snowden hadn’t released information about the metadata program? Would President Obama be inviting congressional critics of the program (along with supporters) to the White House? According to Politico, the president will host a powwow on the surveillance program Thursday.
And without Snowden’s revelations, which continued Wednesday with a report in the Guardian about a versatile search program called XKeyscore, would the Senate Judiciary Committee be discussing changes in the way the secret Foreign Intelligence Surveillance Court operates and in how its judges are selected? Would the administration have released key documents about the metadata program, as it did Wednesday?
As they say in England, not bloody likely.
Even Obama, in the aftermath of the first Snowden leaks, said that he welcomed a debate over surveillance policy and whether it infringed on civil liberties. Without Snowden, that debate wouldn’t exist.
For that reason, some of Snowden’s supporters argue that he should be spared prosecution or even be given a presidential pardon. (Talk about “not bloody likely.”)
That doesn’t necessarily follow, for several reasons. Even if you don’t accept the notion that those who engage in civil disobedience should be willing to accept punishment, there is the question of whether some of Snowden’s leaks went beyond blowing the whistle on surveillance of Americans to compromise purely foreign intelligence.
But the “Snowden effect” is real, and salutary.
Too much information is being kept secret
'Classified' is government code for 'don't embarrass us'
I don't have a secret clearance and never have had one. But many times I have worked in secret engineering or manufacturing rooms, where I had to be baby sat by somebody with a secret clearance.
All of the secret stuff I saw was down right ridiculous. A list of 50 resistors in a printed circuit board was classified. One board had an IC, that was secret before it was mounted on the printed circuit board, but once soldered on the printed circuit board was no longer secret.
When we moved a PC into a secret engineering room it literally took us 6 months to get an approval to do that from some secret bureaucrats in Washington D.C.
article
'Classified' is government code for 'don't embarrass us'
Our View: Too much information is being kept secret
By Editorial board The Republic | azcentral.com Wed Jul 31, 2013 5:49 PM
Army Pfc. Bradley Manning’s conviction is really the sideshow.
What deserves the spotlight is the creeping secrecy of government. Our government. The government that’s supposed to be a beacon of light and liberty.
More than 5 million government employees and contractors have security clearances. That’s a lot of secrets. A lot of secret-keepers. Too many.
The Government Accountability Office is looking at whether too many things are being classified and how the decisions are made to release information to the public.
Rep. Duncan Hunter requested the study. He told Foreign Policy that “classification inflation” limits public access to information that should be available.
In requesting the GAO study, Hunter pointed out another problem: “With access to classified information contingent on the issuance of security clearances, overclassification stands to dangerously expand access to material that should ordinarily be limited.”
Manning and Edward Snowden show the dangers of having too many secret-keepers.
It’s easy to find examples of overzealous classification.
One of the pieces of information Manning made public was a video of a 2007 U.S. helicopter attack in Iraq in which U.S. airmen laugh and call the targets “dead bastards.”
That attack killed civilians, including a Reuters news photographer and his driver. A subsequent military investigation showed the happy-go-lucky troops misidentified camera equipment for weapons before killing people they so callously denigrated.
The only reason for classifying that video is to protect the military from embarrassment — cover your backside.
What’s more, mixing in fake secrets with real ones increases the pressure to blow the whistle.
Manning says his motivation was to expose the military’s “bloodlust” and U.S. diplomatic deception. He dodged conviction on the most serious charge of aiding the enemy, but was convicted on 22 espionage, theft and other charges in the release of secrets to WikiLeaks.
As a soldier, he broke trust. But he did the public a favor. Whistle-blowing is a time-honored way to keep government accountable.
That’s especially true when the government is showing an adolescentlike fetish for hiding things that don’t need to be hidden.
Another example from very close to home:
The Department of Homeland Security refuses to make public what it knows about how many undocumented migrants get away, how many are caught multiple times or what percentage successfully enter the U.S. It’s classified.
The Arizona Republic sought the information. Now, Republican and Democratic members of Arizona’s delegation are asking for it, too. The lack of data makes it impossible to accurately assess the effectiveness of individual DHS border strategies.
If there’s a good national- security reason to hide information on border crossings, we haven’t heard it.
Snowden’s leaks about National Security Agency spying got him a one-way ticket to no man’s land. But it also put a light on the kind of government snooping that makes a lot of Americans queasy.
This nation is under threat from terrorists, and there are good reasons for keeping some information classified.
But Manning, Snowden and the DHS raise big concerns about what’s being withheld from the American people and why. That’s an issue that deserves the spotlight.
Russia grants NSA leaker Snowden asylum
Of course you have to remember that Russia is a police state just like the USA, and the Russian government is almost certainly doing this for political reasons. But even still Edward Snowden is a freedom fighter for exposing the corruption and law breaking by the US government.
article
Russia grants NSA leaker Snowden asylum; he leaves airport
By Vladimir Isachenkov Associated Press Thu Aug 1, 2013 7:24 AM
MOSCOW — National Security Agency leaker Edward Snowden left the transit zone of a Moscow airport and entered Russia after authorities granted him asylum for one year, his lawyer said Thursday.
Anatoly Kucherena said that Snowden’s whereabouts will be kept secret for security reasons. The former NSA systems analyst was stuck at Moscow’s Sheremetyevo airport since his arrival from Hong Kong on June 23.
“He now is one of the most sought after men in the world,” Kucherena told reporters at the airport. “The issue of security is very important for him.”
The U.S. has demanded that Russia send Snowden home to face prosecution for espionage, but President Vladimir Putin dismissed the request.
Putin had said that Snowden could receive asylum in Russia on condition he stops leaking U.S. secrets. Kucherena has said Snowden accepted the condition.
The Guardian newspaper on Wednesday published a new report on U.S. intelligence-gathering based on information from Snowden, but Kucherena said the material was provided before Snowden promised to stop leaking.
Snowden, who revealed details of a U.S. intelligence program to monitor Internet activity, has received offers of asylum from Venezuela, Nicaragua and Bolivia and said he would like to visit those countries. However, the logistics of reaching any of those countries are complicated because his U.S. passport has been revoked.
Snowden’s father said in remarks broadcast Wednesday on Russian television that he would like to visit his son. Kucherena said he is arranging the trip.
The lawyer has said earlier that the temporary asylum would allow Snowden to travel freely around Russia, but wouldn’t allow him to leave the country. The one-year asylum can be extended.
WikiLeaks, a group which has adopted Snowden’s cause, said its legal adviser Sarah Harrison is now with him. The group also praised Russia for providing him shelter.
“We would like to thank the Russian people and all those others who have helped to protect Mr. Snowden,” WikiLeaks said on Twitter. “We have won the battle — now the war.”
Kucherena said that Snowden spent little time packing and left the airport in a taxi. The lawyer said the fugitive had friends in Russia, including some Americans, who could help ensure his security, but wouldn’t elaborate.
Snowden’s case has further strained U.S.-Russian ties already tense amid differences over Syria, U.S. criticism of Russia’s human rights record and other issues.
Putin’s foreign affairs aide, Yuri Ushakov, sought Thursday to downplay the impact this will have on the relations between the two countries.
“This issue isn’t significant enough to have an impact on political relations,” he said in remarks carried by Russian news agencies.
He said that the Kremlin hasn’t heard any signal from Washington that Obama could cancel his visit to Moscow ahead of next month’s G-20 summit in St.Petersburg.
Don't Google "pressure cooker" unless you love cops
Don't Google "pressure cooker" unless you love Homeland Security goons in your living room!!!
For those of you who have not used pressure cookers they are fantastic machines that cook much faster then a microwave oven.
You put a little water in them, which when heated turns to a gas which pressure cooks the food.
After you put the food in the pressure cooker you seal it up and put it on the stove.
If you only cook small stuff like I do the pressure cooker will get up to full pressure in one or two minutes.
If you slice up your veggies many things will be cooked in 1 or 2 minutes after the cooker is fully pressurized. You can cook fish in 4 or 5 minutes.
You can also cook things like roasts in them much quicker then in a conventional oven, but I have never done that. A beef brisket will cook in 50 to 70 minutes.
And I didn't know this until those nut jobs in Boston used them to kill people but pressure cookers also make great bombs.
Source
Google Pressure Cookers and Backpacks, Get a Visit from the Feds
The Atlantic Wire
Philip Bump
Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to see if they were terrorists. Which begs the question: How'd the government know what they were Googling?
Catalano (who is a professional writer) describes the tension of that visit.
[T]hey were peppering my husband with questions. Where is he from? Where are his parents from? They asked about me, where was I, where do I work, where do my parents live. Do you have any bombs, they asked. Do you own a pressure cooker? My husband said no, but we have a rice cooker. Can you make a bomb with that? My husband said no, my wife uses it to make quinoa. What the hell is quinoa, they asked. ...
Have you ever looked up how to make a pressure cooker bomb? My husband, ever the oppositional kind, asked them if they themselves weren’t curious as to how a pressure cooker bomb works, if they ever looked it up. Two of them admitted they did.
The men identified themselves as members of the "joint terrorism task force." The composition of such task forces depend on the region of the country, but, as we outlined after the Boston bombings, include a variety of federal agencies. Among them: the FBI and Homeland Security.
Ever since details of the NSA's surveillance infrastructure were leaked by Edward Snowden, the agency has been insistent on the boundaries of the information it collects. It is not, by law, allowed to spy on Americans — although there are exceptions of which it takes advantage. Its PRISM program, under which it collects internet content, does not include information from Americans unless those Americans are connected to terror suspects by no more than two other people. It collects metadata on phone calls made by Americans, but reportedly stopped collecting metadata on Americans' internet use in 2011. So how, then, would the government know what Catalano and her husband were searching for?
It's possible that one of the two of them is tangentially linked to a foreign terror suspect, allowing the government to review their internet activity. After all, that "no more than two other people" ends up covering millions of people. Or perhaps the NSA, as part of its routine collection of as much internet traffic as it can, automatically flags things like Google searches for "pressure cooker" and "backpack" and passes on anything it finds to the FBI.
Or maybe it was something else. On Wednesday, The Guardian reported on XKeyscore, a program eerily similar to Facebook search that could clearly allow an analyst to run a search that picked out people who'd done searches for those items from the same location. How those searches got into the government's database is a question worth asking; how the information got back out seems apparent.
It is also possible that there were other factors that prompted the government's interest in Catalano and her husband. He travels to Asia, she notes in her article. Who knows. Which is largely Catalano's point.
They mentioned that they do this about 100 times a week. And that 99 of those visits turn out to be nothing. I don’t know what happens on the other 1% of visits and I’m not sure I want to know what my neighbors are up to.
One hundred times a week, groups of six armed men drive to houses in three black SUVs, conducting consented-if-casual searches of the property perhaps in part because of things people looked up online.
But the NSA doesn't collect data on Americans, so this certainly won't happen
U.S. issues worldwide travel alert amid terrorism fears
I suspect this is another one of the things that H. L. Mencken is talking about when he says:
"The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary."
On the other hand the American government has murdered thousands and probably hundreds of thousands of innocent people in Afghanistan, Iraq and other Muslim countries with our unconstitutional wars so I can understand the Arab world attacking Americans to get even.
Source
U.S. issues worldwide travel alert amid terrorism fears
By Billy Kenber, Updated: Friday, August 2, 9:20 AM E-mail the writer
The State Department issued a worldwide travel alert Friday, warning of potential terrorist attacks by al-Qaeda and its affiliates in the Middle East and North Africa that could target tourists on trains, flights or other forms of public transportation.
The alert follows the decision to close 21 U.S. embassies across the Muslim world on Sunday in response to the same security threat, according to State Department officials.
“Current information suggests that al-Qaeda and affiliated organizations continue to plan terrorist attacks both in the region and beyond, and that they may focus efforts to conduct attacks in the period between now and the end of August,” the State Department said in a statement Friday. It said the potential for attacks was particularly high in the Middle East and North Africa and that it could come from or occur on the Arabian Peninsula.
U.S. citizens traveling abroad were urged to take precautions. The alert warned that “terrorists may elect to use a variety of means and weapons and target both official and private interests,” notably public transportation systems including “subway and rail systems, as well as aviation and maritime services.”
Speaking at a news briefing Thursday, State Department spokeswoman Marie Harf said a number of embassies were instructed to close on Sunday because of “security considerations.” Sunday is a normal working day in most Muslim countries, and embassies there would typically be open for business.
Harf stressed that officials were acting “out of an abundance of caution and care for our employees and others who may be visiting our installations.” She did not provide details of the security threat but said that embassies could remain closed into next week.
The last time the department issued a similar warning was on last year’s anniversary of the Sept. 11, 2001, attacks. The U.S. ambassador to Libya and three other Americans were killed Sept. 11 and 12, 2012, when militants assaulted two U.S. compounds in Benghazi.
Rep. Edward R. Royce (R-Calif.), chairman of the House Foreign Affairs Committee, told CNN’s “New Day” program: “It’s my understanding that it is al-Qaeda-linked, all right.”
Among the affected embassies are those in Afghanistan, Iraq, Kuwait, Saudi Arabia and Libya. Three consulates will also close — two in Saudi Arabia and one in the United Arab Emirates.
A Cheap Spying Tool With a High Creepy Factor
Low tech internet spying - NSA tools for the homeless???
Source
A Cheap Spying Tool With a High Creepy Factor
By SOMINI SENGUPTA
With a handful of plastic boxes and over-the-counter sensors, including Wi-Fi adapters and a USB hub, Brendan O’Connor, a security researcher, was able to monitor all the wireless traffic emitted by nearby wireless devices.Brendan O’Connor With a handful of plastic boxes and over-the-counter sensors, including Wi-Fi adapters and a USB hub, Brendan O’Connor, a security researcher, was able to monitor all the wireless traffic emitted by nearby wireless devices.
Brendan O’Connor is a security researcher. How easy would it be, he recently wondered, to monitor the movement of everyone on the street – not by a government intelligence agency, but by a private citizen with a few hundred dollars to spare?
Mr. O’Connor, 27, bought some plastic boxes and stuffed them with a $25, credit-card size Raspberry Pi Model A computer and a few over-the-counter sensors, including Wi-Fi adapters. He connected each of those boxes to a command and control system, and he built a data visualization system to monitor what the sensors picked up: all the wireless traffic emitted by every nearby wireless device, including smartphones.
Each box cost $57. He produced 10 of them, and then he turned them on – to spy on himself. He could pick up the Web sites he browsed when he connected to a public Wi-Fi – say at a cafe – and he scooped up the unique identifier connected to his phone and iPad. Gobs of information traveled over the Internet in the clear, meaning they were entirely unencrypted and simple to scoop up.
Even when he didn’t connect to a Wi-Fi network, his sensors could track his location through Wi-Fi “pings.” His iPhone pinged the iMessage server to check for new messages. When he logged on to an unsecured Wi-Fi, it revealed what operating system he was using on what kind of device, and whether he was using Dropbox or went on a dating site or browsed for shoes on an e-commerce site. One site might leak his e-mail address, another his photo.
“Actually it’s not hard,” he concluded. “It’s terrifyingly easy.”
Also creepy – which is why he called his contraption “creepyDOL.”
“It could be used for anything depending on how creepy you want to be,” he said.
You could spy on your ex-lover, by placing the sensor boxes near the places the person frequents, or your teenage child, or the residents of a particular neighborhood. You could keep tabs on people who gather at a certain house of worship or take part in a protest demonstration in a town square. Their phones and tablets, Mr. O’Connor argued, would surely leak some information about them – and certainly if they then connected to an unsecured Wi-Fi. The boxes are small enough to be tucked under a cafe table or dropped from a hobby drone. They can be scattered around a city and go unnoticed.
Mr. O’Connor says he did none of that – and for a reason. In addition to being a security researcher and founder of a consulting firm called Malice Afterthought, he is also a law student at the University of Wisconsin at Madison. He says he stuck to snooping on himself – and did not, deliberately, seek to scoop up anyone else’s data – because of a federal law called the Computer Fraud and Abuse Act.
Some of his fellow security researchers have been prosecuted under that law. One of them, Andrew Auernheimer, whose hacker alias is Weev, was sentenced to 41 months in prison for exploiting a security hole in the computer system of AT&T, which made e-mail addresses accessible for over 100,000 iPad owners; Mr. Aurnheimer is appealing the case.
“I haven’t done a full deployment of this because the United States government has made a practice of prosecuting security researchers,” he contends. “Everyone is terrified.”
He is presenting his findings at two security conferences in Las Vegas this week, including at a session for young people. It is a window into how cheap and easy it is to erect a surveillance apparatus.
“It eliminates the idea of ‘blending into a crowd,’” is how he put it. “If you have a wireless device (phone, iPad, etc.), even if you’re not connected to a network, CreepyDOL will see you, track your movements, and report home.”
Can individual consumers guard against such a prospect? Not really, he concluded. Applications leak more information than they should. And those who care about security and use things like VPN have to connect to their tunneling software after connecting to a Wi-Fi hub, meaning that at least for a few seconds, their Web traffic is known to anyone who cares to know, and VPN does nothing to mask your device identifier.
In addition, every Wi-Fi network that your cellphone has connected to in the past is also stored in the device, meaning that as you wander by every other network, you share details of the Wi-Fi networks you’ve connected to in the past. “These are fundamental design flaws in the way pretty much everything works,” he said.
Postal Service takes photos of all mail
Homeland Security, the FBI and the NSA aren't the only government agencies spying on you. The US Post Office snaps a photograph of every thing you mail.
Source
Postal Service takes photos of all mail
By ASSOCIATED PRESS | 8/2/13 10:25 AM EDT
WASHINGTON — The Postal Service takes pictures of every piece of mail processed in the United States — 160 billion last year — and keeps them on hand for up to a month.
In an interview with The Associated Press, Postmaster General Patrick Donahoe said the photos of the exterior of mail pieces are used primarily for the sorting process, but they are available for law enforcement, if requested.
The photos have been used "a couple of times" to trace letters in criminal cases, Donahoe told the AP on Thursday, most recently involving ricin-laced letters sent to President Barack Obama and New York Mayor Michael Bloomberg.
"We don't snoop on customers," said Donahoe, adding that there's no big database of the images because they are kept on nearly 200 machines at processing facilities across the country. Each machine retains only the images of the mail it processes.
"It's done by machine, so there's no central area where any of this information would be," he said. "It's extremely expensive to keep pictures of billions of pieces of mail. So there's no need for us to do that."
The images are generally stored for between a week and 30 days and then disposed of, he said. Keeping the images for those periods may be necessary to ensure delivery accuracy, for forwarding mail or making sure that the proper postage was paid, he said.
"Law enforcement has requested a couple of times if there's any way we could figure out where something came from," he said. "And we've done a little bit of that in the ricin attacks."
The automated mail tracking program was created after the deadly anthrax attacks in 2001 so the Postal Service could more easily track hazardous substances and keep people safe, Donahoe said.
"We've got a process in place that pretty much outlines, in any specific facility, the path that mail goes through," he said. "So if anything ever happens, God forbid, we would be able very quickly to track back to see what building it was in, what machines it was on, that type of thing. That's the intent of the whole program."
Processing machines take photographs so software can read the images to create a barcode that is stamped on the mail to show where and when it was processed, and where it will be delivered, Donahoe said.
The Mail Isolation Control and Tracking program was cited by the FBI on June 7 in an affidavit that was part of the investigation into who was behind threatening, ricin-tainted letters sent to Obama and Bloomberg. The program "photographs and captures an image of every piece of mail that is processed," the affidavit by an FBI agent said.
Mail from the same mailbox tends to get clumped together in the same batch, so that can help investigators track where a particular item was mailed from to possibly identify the sender.
"We've used (the Mail Isolation Control and Tracking program) to sort the mail for years," Donahoe said, "and when law enforcement asked us, 'Hey, is there any way you can figure out where this came from?' we were able to use that imaging."
Russia protects Snowden from the USA
|