Etiket arşivi: fbi

FBI’s abuse of the surveillance state is the real scandal needing investigation


That the stars of America’s national security establishment are being devoured by out-of-control surveillance is a form of sweet justice

General John Allen, the US’s leading military commander in Afghanistan, is being investigated over his ‘communications’ with Jill Kelley. Photograph: Jalil Rezayee/EPA

The Petraeus scandal is receiving intense media scrutiny obviously due to its salacious aspects, leaving one, as always, to fantasize about what a stellar press corps we would have if they devoted a tiny fraction of this energy to dissecting non-sex political scandals (this unintentionally amusing New York Times headline from this morning – "Concern Grows Over Top Military Officers’ Ethics" – illustrates that point: with all the crimes committed by the US military over the last decade and long before, it’s only adultery that causes "concern" over their "ethics"). Nonetheless, several of the emerging revelations are genuinely valuable, particularly those involving the conduct of the FBI and the reach of the US surveillance state.

As is now widely reported, the FBI investigation began when Jill Kelley – a Tampa socialite friendly with Petraeus (and apparently very friendly with Gen. John Allen, the four-star U.S. commander of the war in Afghanistan) – received a half-dozen or so anonymous emails that she found vaguely threatening. She then informed a friend of hers who was an FBI agent, and a major FBI investigation was then launched that set out to determine the identity of the anonymous emailer.

That is the first disturbing fact: it appears that the FBI not only devoted substantial resources, but also engaged in highly invasive surveillance, for no reason other than to do a personal favor for a friend of one of its agents, to find out who was very mildly harassing her by email. The emails Kelley received were, as the Daily Beast reports, quite banal and clearly not an event that warranted an FBI investigation:

"The emails that Jill Kelley showed an FBI friend near the start of last summer were not jealous lover warnings like ‘stay away from my man’, a knowledgeable source tells The Daily Beast. . . .

"’More like, ‘Who do you think you are? . . .You parade around the base . . . You need to take it down a notch,’" according to the source, who was until recently at the highest levels of the intelligence community and prefers not to be identified by name.

"The source reports that the emails did make one reference to Gen. David Petraeus, but it was oblique and offered no manifest suggestion of a personal relationship or even that he was central to the sender’s spite. . . .

"When the FBI friend showed the emails to the cyber squad in the Tampa field office, her fellow agents noted the absence of any overt threats.

"No, ‘I’ll kill you’ or ‘I’ll burn your house down,” the source says. ‘It doesn’t seem really that bad.’

"The squad was not even sure the case was worth pursuing, the source says.

"’What does this mean? There’s no threat there. This is against the law?’ the agents asked themselves by the source’s account.

"At most the messages were harassing. The cyber squad had to consult the statute books in its effort to determine whether there was adequate legal cause to open a case.

"’It was a close call,’ the source says.

"What tipped it may have been Kelley’s friendship with the agent."

That this deeply personal motive was what spawned the FBI investigation is bolstered by the fact that the initial investigating agent "was barred from taking part in the case over the summer due to superiors’ concerns that he was personally involved in the case" – indeed, "supervisors soon became concerned that the initial agent might have grown obsessed with the matter" – and was found to have "allegedly sent shirtless photos" to Kelley, and "is now under investigation by the Office of Professional Responsibility, the internal-affairs arm of the FBI".

[The New York Times this morning reports that the FBI claims the emails contained references to parts of Petraeus’ schedule that were not publicly disclosed, though as Marcy Wheeler documents, the way the investigation proceeded strongly suggests that at least the initial impetus behind it was a desire to settle personal scores.]

What is most striking is how sweeping, probing and invasive the FBI’s investigation then became, all without any evidence of any actual crime – or the need for any search warrant:

"Because the sender’s account had been registered anonymously, investigators had to use forensic techniques – including a check of what other e-mail accounts had been accessed from the same computer address – to identify who was writing the e-mails.

"Eventually they identified Ms. Broadwell as a prime suspect and obtained access to her regular e-mail account. In its in-box, they discovered intimate and sexually explicit e-mails from another account that also was not immediately identifiable. Investigators eventually ascertained that it belonged to Mr. Petraeus and studied the possibility that someone had hacked into Mr. Petraeus’s account or was posing as him to send the explicit messages."

So all based on a handful of rather unremarkable emails sent to a woman fortunate enough to have a friend at the FBI, the FBI traced all of Broadwell’s physical locations, learned of all the accounts she uses, ended up reading all of her emails, investigated the identity of her anonymous lover (who turned out to be Petraeus), and then possibly read his emails as well. They dug around in all of this without any evidence of any real crime – at most, they had a case of "cyber-harassment" more benign than what regularly appears in my email inbox and that of countless of other people – and, in large part, without the need for any warrant from a court.

But that isn’t all the FBI learned. It was revealed this morning that they also discovered "alleged inappropriate communication" to Kelley from Gen. Allen, who is not only the top commander in Afghanistan but was also just nominated by President Obama to be the Commander of US European Command and Supreme Allied Commander Europe (a nomination now "on hold"). Here, according to Reuters, is what the snooping FBI agents obtained about that [emphasis added]:

"The U.S. official said the FBI uncovered between 20,000 and 30,000 pages of communications – mostly emails spanning from 2010 to 2012 – between Allen and Jill Kelley . . . .

"Asked whether there was concern about the disclosure of classified information, the official said, on condition of anonymity: ‘We are concerned about inappropriate communications. We are not going to speculate as to what is contained in these documents.’"

So not only did the FBI – again, all without any real evidence of a crime – trace the locations and identity of Broadwell and Petreaus, and read through Broadwell’s emails (and possibly Petraeus’), but they also got their hands on and read through 20,000-30,000 pages of emails between Gen. Allen and Kelley.

This is a surveillance state run amok. It also highlights how any remnants of internet anonymity have been all but obliterated by the union between the state and technology companies.

But, as unwarranted and invasive as this all is, there is some sweet justice in having the stars of America’s national security state destroyed by the very surveillance system which they implemented and over which they preside. As Trevor Timm of the Electronic Frontier Foundation put it this morning: "Who knew the key to stopping the Surveillance State was to just wait until it got so big that it ate itself?"

It is usually the case that abuses of state power become a source for concern and opposition only when they begin to subsume the elites who are responsible for those abuses. Recall how former Democratic Rep. Jane Harman – one of the most outspoken defenders of the illegal Bush National Security Agency (NSA) warrantless eavesdropping program – suddenly began sounding like an irate, life-long ACLU privacy activist when it was revealed that the NSA had eavesdropped on her private communications with a suspected Israeli agent over alleged attempts to intervene on behalf of AIPAC officials accused of espionage. Overnight, one of the Surveillance State’s chief assets, the former ranking member of the House Intelligence Committee, transformed into a vocal privacy proponent because now it was her activities, rather than those of powerless citizens, which were invaded.

With the private, intimate activities of America’s most revered military and intelligence officials being smeared all over newspapers and televisions for no good reason, perhaps similar conversions are possible. Put another way, having the career of the beloved CIA Director and the commanding general in Afghanistan instantly destroyed due to highly invasive and unwarranted electronic surveillance is almost enough to make one believe not only that there is a god, but that he is an ardent civil libertarian.

The US operates a sprawling, unaccountable Surveillance State that – in violent breach of the core guarantees of the Fourth Amendment – monitors and records virtually everything even the most law-abiding citizens do. Just to get a flavor for how pervasive it is, recall that the Washington Post, in its 2010 three-part "Top Secret America" series, reported: "Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications."

Equally vivid is this 2007 chart from Privacy International, a group that monitors the surveillance policies of nations around the world. Each color represents the level of the nation’s privacy and surveillance policies, with black being the most invasive and abusive ("Endemic Surveillance Societies") and blue being the least ("Consistently upholds human rights standards"):

And the Obama administration has spent the last four years aggressively seeking to expand that Surveillance State, including by agitating for Congressional action to amend the Patriot Act to include Internet and browsing data among the records obtainable by the FBI without court approval and demanding legislation requiring that all Internet communications contain a government "backdoor" of surveillance.

Based on what is known, what is most disturbing about the whole Petraeus scandal is not the sexual activities that it revealed, but the wildly out-of-control government surveillance powers which enabled these revelations. What requires investigation here is not Petraeus and Allen and their various sexual partners but the FBI and the whole sprawling, unaccountable surveillance system that has been built.

Related notes

(1) One of the claims made over the last week was that Broadwell, in public comments about the Benghazi attack, referenced non-public information – including that the CIA was holding prisoners in Benghazi and that this motivated the attack – suggesting that someone gave her classified information. About those claims, a national security reporter for Fox reported:

"that a well-placed Washington source confirms that Libyan militiamen were being held at the CIA annex and may have been a possible reason for the attack. Multiple intelligence sources, she also reported, said ‘there were more than just Libyan militia members who were held and interrogated by CIA contractors at the CIA annex in the days prior to the attack. Other prisoners from additional countries in Africa and the Middle East were brought to this location.’"

Though the CIA denies that "the agency is still in the detention business", it certainly should be investigated to determine whether the CIA is maintaining off-the-books detention facilities in Libya.

(2) I’ve long noted that Michael Hastings is one of the nation’s best and most valuable journalists; to see why that is so, please watch the amazing 8-minute clip from last night’s Piers Morgan Show on CNN embedded below, when he appeared with two Petraeus-defending military officials (via the Atlantic’s Adam Clark Estes). When you’re done watching that, contrast that with the remarkably candid confession this week from Wired’s national security reporter Spencer Ackerman on how he, along with so many other journalists, hypnotically joined what he aptly calls the "Cult of David Petraeus".

(3) I gave a 40-minute speech this summer on the Surveillance State and the reasons it is so destructive, which can be viewed on the video below; Alternet transcribed the speech here:

TOP SECRET : FBI Awareness Message: Threats to Water Retention and Control Structures


FBI Awareness Message … Threats to Water Retention and Control Structures.pdf

TOP SECRET : FBI Awareness Message : Threats to Maritime Transportation


FBI Awareness Message … Threats to Maritime Transportation.pdf

TOP SECRET : DHS-FBI Suspicious Activity Reporting Bulletin: Misrepresentation


DHS-FBI Suspicious Activity Reporting Bulletin … Misrepresentation.pdf

FBI’dan İstihbarat Uygulaması Siparişi /// CC : @siring @arslandidem @fatihaltayli @nevsinmengu


FBI sosyal medya ortamında halka açık bilgileri gözetleyebilecek, takip edecek, stratejik bazı anahtar kelimeleri ve söz öbeklerini tanıyacak, ayrıştıracak, analiz yapacak bir bilgisayar uygulamasının kendisine özel geliştirilmesi için resmen kendi birimi olan Stratejik Bilgi ve Operasyonlar Merkezi ‘nin(SOIC) sitesi üzerinden bilişim sektörüne talepte bulundu.

OLASI SALDIRILARA VE ACİL DURUMLARA KARŞI ÖNCEDEN HAZIRLIKLI OLMAK İÇİN

Amaç ise son zamanlarda sosyal medyada Anonymous gibi grupların yaptıkları siber saldırı olasılıklarına yönelik önceden istihbarat toplayabilmek ve yine sosyal medya üzerinden terör eylemleri gerçekleştirmek için faaliyette bulunan ve örgütlenen grupların yapacakları olası saldırılara ve acil durumlara karşı önceden hazır olmak.

UYGULAMA ESNEK OLMALI, DEĞİŞEN TEHDİTLERE KARŞI HIZLA ADAPTE OLABİLMELİ

FBI’nın projeye dair yayınladığı ilanda uygulamanın kesinlikle esnek, olması, stratejik ve taktik avantajı sürdürebilmek adına değişen tehditlere karşı hızla adapte olabilmesi şartları aranıyor ve bu uygulama talebinin FBI’ın SOIC biriminin olası vakalar karşısında uyanık olması ve stratejik karar verme işlevini geliştirmek için yaptığı söyleniyor.

Bu istihbarat faaliyetini yürütecek uygulamanın " keşif ve gözetleme görevlerinde,Ulusal Özel Güvenlik Vakaları (NSSE) operasyonlarında ve planlamasında, SOIC operasyonlarında, karşı istihbarat, terörizm ve daha fazlasında" kullanılacağı da vurgulanıyor.

HALKA AÇIK VERİLERİ DİDİKLEYEBİLECEK ANAHTAR KELİMELERİ KULLANABİLMELİ

Globalpost theAtlantic.com sitesine dayandırarak verdiği haberde, "sistemin terörizm, suç ve diğer FBI ilişkili operasyonlarda internet aracılığıyla oluşabilecek tehditlere karşı halka açık verileri didikleyebilecek anahtar kelimeleri kullanacağını" söyledi.

CIA VE SAVUNMA BAKANLIĞI GİBİ ABD’NİN FEDERAL BİRİMLERİ HALİHAZIRDA BENZER UYGULAMALARI KULLANIYOR

Aynı zamanda diğer ABD federal birimlerinin de benzer uygulamalar sahip olduğu, bu birimler arasında CIA ve savunma bakanlığı olduğu vurgulanıyor.

CIA’IN VIRGINIA EYALETİNDE YILLARDIR KULLANDIĞI SOSYAL MEDYA TAKİP MERKEZİ VAR

"CIA yıllardır Virginia’daki sosyal medya takip merkezinde bunu sürdürüyor" deniyor. ABD Savunma Bakanlığı’nın da Ağustos ayında sosyal ağ analizinde eğitimli kişilere açık çağrı yaptığının altı çiziliyor.

Habertürk

http://www.turkishny.com/technology/91-technology/78834-fbidan-istihbarat-uygulamasi-siparisi

FBI Seeks Data-Mining App for Social Media


The FBI has become the latest federal agency interested in mining social media for intelligence information.

The agency is looking for ideas for developing a social media application that can search for significant data from social networking activity to be used for intelligence purposes, according to a request for information (RFI) posted on FedBizOpps.gov.

More Government Insights

The FBI is looking for a "geospatial alert and analysis mapping application" that will allow its Strategic Information and Operations Center (SIOC) to "quickly vet, identify and geo-locate breaking events, incidents and emerging threats," according to the RFI.

[ How does data mining affect user privacy? See Global CIO: Data Mining Faces The Supreme Court Test. ]

The agency wants the tool to be in the form of a "secure, lightweight web application portal, using mashup technology," and plans to use it to share information with intelligence partners to coordinate and synchronize awareness of events across operations, it said.

Moreover, the application must be "infinitely flexible" to adapt to changing threats, and those using it must have access to a common operating dashboard from which they can view both unclassified open-source information feeds and use tools to analyze social media during a crisis as it happens.

Other features the FBI hopes its data-mining tool will have include the ability to automatically "search and scrape" social-networking and open-source news websites for information about breaking world events. It also wants to give users of the tool the ability to do relevant keyword searches on sites such as Facebook, CNN, Fox News, and other popular information outlets on the Internet.

The FBI is certainly not the first federal agency to recognize the value in information being shared via social media.

Other federal agencies–including the CIA, Department of Homeland Security (DHS), and even the research agency for federal intelligence efforts, the Intelligence Advanced Research Projects Agency (IARPA)–also are interested in mining the Web for picking up clues about public opinion or world events for use in their respective missions.

In addition to its own aim to build a data-mining tool, the FBI also will likely benefit from the fruits of IARPA’s research efforts in this area. IARPA is seeking to create technology that will continuously analyze and mine data from websites, blogs, social media, and other public information to help it better forecast global events.

In the meantime, In-Q-Tel, the investment firm established by the CIA to support U.S. intelligence agencies, has invested in a startup called Visible Technologies that monitors social media content on the Web so agencies can watch and analyze public opinion on the Web as revealed through social networks.

The DHS, too, has said it monitors Twitter, Facebook, and other popular websites to help it maintain situational awareness and perform its necessary duties in support of international crises and events such as the earthquake in Haiti.

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

http://www.informationweek.com/news/government/security/232500552

FBI – National Cyber Security Awareness Month


National Cyber Security Awareness Month 2012:
Are You the Weakest Link?

October is National Cyber Security Awareness Month—for the ninth straight year. So what’s new?

Well, since last October, the threat has continued to grow even more complex and sophisticated. Just 12 days ago, in fact, FBI Director Robert Mueller said that “cyber security may well become our highest priority in the years to come.”

For its part, the FBI is strengthening its cyber operations to sharpen its focus on the greatest cyber threats to national security: computer intrusions and network attacks. We are enhancing the technological capabilities of all investigative personnel and hiring additional computer scientists to provide expert technical support to critical investigations. We are creating two distinct task forces in each field office: Cyber Task Forces, focused on intrusions and network attacks that will draw on our existing cyber squads; and Child Exploitation Task Forces, focused on crimes against children. We are also increasing the size and scope of the National Cyber Investigative Joint Task Force—the FBI-led multi-agency focal point for coordinating and sharing cyber threat information to stop current and future attacks.

The FBI also runs several other cyber-related programs, including the Innocent Images National Initiative—which combats online child predators—and the Internet Crime Complaint Center—a partnership between the Bureau and the National White Collar Crime Center that serves as a clearinghouse for triaging cyber complaints and provides an easy-to-use online tool for reporting these complaints.

Because of the interconnectedness of online systems, every American who uses digital technologies at home or in the office can—and must—play a part in cyber security. For example, if you open a virus-laden e-mail attachment at work, you could infect your entire company’s computer network. Don’t be the weakest link: get educated on cyber safety.

Here are a few basic steps you can take to be more secure:

  • Set strong passwords, and don’t share them with anyone.
  • Keep a clean machine—your operating system, browser, and other critical software are optimized by installing regular updates.
  • Maintain an open dialogue with your family, friends, and community about Internet safety.
  • Limit the amount of personal information you post online, and use privacy settings to avoid sharing information widely.
  • Be cautious about what you receive or read online—if it sounds too good to be true, it probably is.

Visit the links below for more tips on protecting your computers and other electronic devices, information on cyber threats, and details on how to report cyber crimes or scams:

Report Cyber Crime
How to Protect Your Computer
Emerging E-Scams | Internet Fraud
Keep Safe on Social Networking Sites

For more information:
FBI Cyber Crime Webpage
Department of Homeland Security Stop.Think.Connect. Campaign
Department of Homeland Security’s National Cyber Security Awareness Month Website
StaySafeOnline Website

TOP-SECRET-FBI Going Dark: Law Enforcement Problems in Lawful Surveillance


TOP-SECRET-FBI Going Dark… Law Enforcement Problems in Lawful Surveillance.pdf

The FBI – Couple Pleads Guilty to Operating Gambling Business and Structuring Over $100,000


HONOLULU—Lloyd Robert Marshall, age 67, and Nitta Mitsuko Marshall, age 65, former Waianae residents, today pled guilty before United States Magistrate Judge Barry M. Kurren to conspiracy to conduct, operate, finance, supervise, and direct an illegal gambling business involving cockfighting, dice tables, and card games at their Puuhulu Road property in Waianae. The Marshalls also entered guilty pleas to 13 counts of structuring over $132,000 in proceeds during a one-year period from the illegal gambling business to evade certain regulations relating to currency transactions. Under federal law, a Currency Transaction Report must be filed by a financial institution with the Internal Revenue Service in regard to any currency transaction over $10,000. It is illegal to structure transactions with financial institutions in order to avoid this filing requirement.

Florence T. Nakakuni, United States Attorney for the District of Hawaii, said that the Marshalls also agreed to forfeit $170,578.75 in cash, representing gambling proceeds which were seized on July 2, 2011, during a search warrant executed on their property, and their interest in real property used as the venue for the illegal gambling activities. According to documents filed in connection with the case, from approximately 2009 to July 2011, the Marshalls agreed to use their property as a site of illegal cockfighting contests and dice and card games. Police observed from 100 to 600 people at these “derbies.” People attending the games paid parking and entrance fees.

The defendants face maximum penalties of five years’ imprisonment for the gambling charges and 10 years’ imprisonment for each of the structuring counts, along with fines totaling up to $250,000 and $500,000 respectively, when they are sentenced on January 28, 2013, before Chief United States District Judge Susan Oki Mollway.

The case was investigated by the Federal Bureau of Investigation, the Internal Revenue Service-Criminal Investigation, U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations, and the Honolulu Police Department. Assistant United States Attorney Beverly Wee Sameshima is handling the prosecution.

Unveiled by Cryptome – FBI Has No Files on Cyberpunks


Federal Bureau of Investigation
September 10, 2012 (Received Septembe 14, 2012)

FOIPA Request No. 1198150-00
Subject: CYPHERPUNKS

“Based the information you provided we conducted a search of the Central Records System. We were unable to identify main file records responsive to the FOIA.”

Now with one record, our emailed FOIA request:

August 31, 2012

Federal Bureau of Investigation
Attn: FOI/PA Request
Record/Information Dissemination Section
170 Marcel Drive
Winchester, VA 22602-4843

Dear FBI FOIA Office,

Under provisions of the FOIA I request any and all FBI records on the group “Cypherpunks” affiliated with the online Cypherpunk Mail List established in 1992 and continuing to the present.

A description of the Cypherpunks group and some of its members, including me, is available on Wikipedia:

http://en.wikipedia.org/wiki/Cypherpunks

This material will be published on the public education website Cryptome.org of which I am the administrator.

I agree to pay for costs associated with this request as provided by the FOIA.

Thank you very much.

Sincerely,

John Young
Cryptome.org

The arcanity of FOIA requests is that if not precise the responses will be this generic unresponsive FBI response. A cypherpunks may have a separate file in a personal name, anonym, nickname or association with another organization, or several, which would not be provided in response to a “cypherpunks” request. John Young, for example, has been visited twice by the FBI, and telephoned twice more, but no FBI records have been found in response to several FOIA requests to various components of the FBI, each of which has a separate file system. These restricted systems are usually not linked to the “Central Records System main file records” often cited in FOIA answers to head off further inquiry and to require expensive, slow, law suits for access.

İSTİHBARAT ALANI

Sınırsız, Seçkin, Sansürsüz, Kemalist Haber Blogu

Derin İstihbarat

strateji, güvenlik, araştırma, istihbarat, komplo teorileri, mizah, teknoloji, mk ultra, nwo

İSTİHBARAT

Şifresiz Yayın!