Followng Pope Francis' demand that the Vatican Bank review its procedures, Reuters reports that the bank is likely to close all accounts held by foreign embassies, following concerns about large cash deposits and withdrawals by the missions of Iran, Iraq and Indonesia, according to people with knowledge of the situation. The private bank IOR has around EUR7.1 billion in assets but is concerned it could be "an unwitting vehicle for money laundering and other illicit finances."
Monday, September 30, 2013
An introductory guide to digital network intelligence for NSA field agents, included in documents disclosed by former contractor Edward Snowden, describes the agency's metadata repository, codenamed Marina. Any computer metadata picked up by NSA collection systems is routed to the Marina database, the guide explains. Phone metadata is sent to a separate system.
"The Marina metadata application tracks a user's browser experience, gathers contact information/content and develops summaries of target," the analysts' guide explains. "This tool offers the ability to export the data in a variety of formats, as well as create various charts to assist in pattern-of-life development."
The guide goes on to explain Marina's unique capability: "Of the more distinguishing features, Marina has the ability to look back on the last 365 days' worth of DNI metadata seen by the Sigint collection system, regardless whether or not it was tasked for collection."
There were apparently two policy changes that allowed this to happen, and both occurred in the past three years. First, in November of 2010, the NSA was allowed to start looking at phone call and email logs of Americans to try to help figure out associations for "foreign intelligence purposes." Note that phrase. We'll come back to it. For years, the NSA had been barred from viewing any content on US persons, and the NSA, President Obama and others have continued to insist to this day that there are minimization procedures that prevent spying on Americans. Except, this latest revelation shows that, yet again, this isn't actually true.
The second policy change came in January of 2011, when the NSA was told it could start creating this massive "social graph" on Americans without having to make sure they weren't Americans any more, as indicated above.
The city's Independent Budget Office annual figure of $167,731 — which equates to about $460 per day for the 12,287 average daily New York City inmates last year — was based on about $2 billion in total operating expenses for the Department of Correction, which included salaries and benefits for staff, judgments and claims as well as debt service for jail construction and repairs.
But there are particularly expensive costs associated with Rikers.
The department says it spends $30.3 million annually alone on transportation costs, running three bus services that usher inmates to and from court throughout the five boroughs, staff from a central parking lot to Rikers jails and visitors to and around the island. There were 261,158 inmates delivered to court last year.
Compliance officer Cathy Scharf told an auditorium full of aghast colleagues about her experiences at a Utah bank that illegally processed at least $200 million for the offshore gambling sites PokerStars and Full Tilt Poker.
She said her bosses told her the bank would fail without the illegal income and brought in criminal lawyers to threaten her with arrest if she told on them.
Saturday, September 28, 2013
Five years ago this fall, an epidemic of fraud and thievery in the financial-services industry triggered the collapse of our economy. The resultant loss of tax revenue plunged states everywhere into spiraling fiscal crises, and local governments suffered huge losses in their retirement portfolios – remember, these public pension funds were some of the most frequently targeted suckers upon whom Wall Street dumped its fraud-riddled mortgage-backed securities in the pre-crash years.
Today, the same Wall Street crowd that caused the crash is not merely rolling in money again but aggressively counterattacking on the public-relations front. The battle increasingly centers around public funds like state and municipal pensions. This war isn't just about money. Crucially, in ways invisible to most Americans, it's also about blame. In state after state, politicians are following the Rhode Island playbook, using scare tactics and lavishly funded PR campaigns to cast teachers, firefighters and cops – not bankers – as the budget-devouring boogeymen responsible for the mounting fiscal problems of America's states and cities.
By Matt Taibbi - Rolling Stone - Read full article »»
By JAMES RISEN and LAURA POITRAS - NY Times -Read full article »»
Read full article »»
The NSA history, American Cryptology during the Cold War, is a multi-volume study that covers the intersection of secret communications intelligence with Cold War history. The National Security Archive filed the initial mandatory declassification review request for the histories in 2006. The next year, when the NSA denied significant information from the histories the Archive filed an appeal. The Agency declassified more information in 2008 and the Archive posted the first three volumes on its Web site in 2008, with commentary by Matthew Aid. The NSA had denied so much, however, that the Archive filed a final appeal with the Interagency Security Classification Appeals Panel (ISCAP) that same year. Book I remains under appeal. Five years after the Archive's appeal, the ISCAP has compelled the NSA to release more information from Books II and III.
National Security Archive Electronic Briefing Book No. 441 - Read full article »»
The unmanned surveillance planes have helped FBI agents storm barricaded buildings, track criminal suspects and examine crime scenes since 2006, longer than previously known, according to the 35-page inspector general’s audit of drones used by the Justice Department.
The FBI unmanned planes weigh less than 55 pounds each and are unarmed, the report said. The FBI declined requests to discuss its drone operations Thursday.
LA Times - Read full article »»
Newly Declassified Government Documents: Pre 9/11 Bin Laden Hijack Plot Was Ignored By US Intelligence
It took the government 11 years to furnish the records, requested in May 2002 as part of JW’s Terrorism Research and Analysis Project, and they are just as alarming today as they would have been a decade ago. The documents, from the Defense Intelligence Agency (DIA) reveal that Al Qaeda had a sophisticated plan to hijack a commercial airliner departing Frankfurt International Airport between March and August 2000. The hijack team was to consist of an Arab, a Pakistani and a Chechen and their targets were U.S. airlines, Lufthansa and Air France.
Judicial Watch - Read full article »»
Upstream collection... occurs when NSA obtains internet communications, such as e-mails, from certain US companies that operate the Internet background, i.e., the companies that own and operate the domestic telecommunications lines over which internet traffic flows.
She clearly means "backbone" rather than "background." She's discussing this in an attempt to defend the NSA's "accidental" collection of information it shouldn't have had. But that point is not that important. Instead, the important point is that she's now admitted what most people suspected, but which the administration has totally avoided admitting for many, many years since the revelations made by Mark Klein.
So, despite years of trying to deny that the NSA can collect email and other communications directly from the backbone (rather than from the internet companies themselves), Feinstein appears to have finally let the cat out of the bag, perhaps without realizing it.
Read full article »»
Friday, September 27, 2013
Pulitzer Prize-winning journalist Seymour Hersh says that the raid which killed Osama Bin Laden in 2011 is “one big lie” and that “not one word” of the Obama administration’s narrative on what happened is true.
In a wide-ranging interview published today by the Guardian, Hersh savages the US media for failing to challenge the White House on a whole host of issues, from NSA spying, to drone attacks, to aggression against Syria.
On the subject of the Navy Seal raid that supposedly resulted in the death of the Al-Qaeda terror leader, Hersh remarked, “Nothing’s been done about that story, it’s one big lie, not one word of it is true.”
Hersh added that the Obama administration habitually lies but they continue to do so because the press allows them to get away with it.
“It’s pathetic, they are more than obsequious, they are afraid to pick on this guy [Obama],” Hersh told the Guardian.
Thursday, September 26, 2013
Skull and Bones
In 1945, with the end of the war, George H. W. “Poppy” Bush entered Yale University. The CIA recruited heavily at all of the Ivy League schools in those days, with the New Haven campus the standout. “Yale has always been the agency’s biggest feeder,” recalled CIA officer Osborne Day (class of’43), “In my Yale class alone there were thirty-five guys in the agency.” Bush’s father, Prescott, was on the university’s board, and the school was crawling with faculty serving as recruiters for the intelligence services . . . Yale’s society’s boys were the cream of the crop, and could keep secrets to boot. And no secret society was more suited to the spy establishment than Skull and Bones, for which Poppy Bush, like his father, was tapped in his junior year. Established in 1832, Skull and Bones is the oldest secret society at Yale, and thus at least theoretically entrusted its membership with a more comprehensive body of secrets than any other campus group. Bones alumni would appear throughout the public and private history of both wartime and peacetime intelligence . . .
When Bush entered Yale, the university was welcoming back countless veterans of the OSS to its faculty. Bush, with naval intelligence work already under his belt by the time he arrived at Yale, would have been seen as a particularly prime candidate for recruitment.
Secret Cold War Documents Reveal NSA Spied on Senators …along with journalists, civil rights leaders, Muhammad Ali and a Washington Post humor columnist.
As Vietnam War protests grew, the U.S. National Security Agency (NSA) tapped the overseas communications of prominent American critics of the war — including a pair of sitting U.S. senators. That’s according to a recently declassified NSA history, which called the effort “disreputable if not outright illegal.”
For years the names of the surveillance targets were kept secret. But after a decision by the Interagency Security Classification Appeals Panel, in response to an appeal by the National Security Archive at George Washington University, the NSA has declassified them for the first time. The names of the NSA’s targets are eye-popping. Civil rights leaders Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali, New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. But perhaps the most startling fact in the declassified document is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Sen. Frank Church (D-Idaho) and Sen. Howard Baker (R-Tenn.). As shocking as the recent revelations about the NSA’s domestic eavesdropping have been, there has been no evidence so far of today’s signal intelligence corps taking a step like this, to monitor the White House’s political enemies.
Tuesday, September 24, 2013
According to various sources, behind all this bloody turmoil lies a program known as Direct Commercial Sales (DCS). This group operates within the US State Department’s Directorate of Defense Trade Controls (DDTC). The DCS program regulates private U.S. companies’ overseas sales of weapons and other defense articles, defense services, and military training. It is separate from the Foreign Military Sales (FMS) program, which manages government-to-government sales. It is within little-known programs such as this that vast sums of money are shuffled through international banks, corporate business and foreign governments.
In a program entitled “Blue Lantern” the DDTC monitors end-use recipients of weapons and services licensed by the State Department provided by Direct Commercial Sales. Some defense industry sources now claim that DCS is “playing both sides against the middle for corporate or political gain.” Such activity has been traced back to operations in Cuba in the 1950s and 60’s, the Iran-Contra Scandal of the Reagan administration and the long-lost War on Drugs. An objective look at this program also lends tremendous support to critics who contend that the United States is the “arms merchant of the world.”
In Blue Lantern reports going back to the early 2000s, it was found that many investigations of end users of weaponry supplied by US firms were “unfavorable,” with arms sometimes ending up in the hands of foreign enemies. Such reports were handed to law enforcement agencies for possible legal action but usually have been dropped for foreign relations considerations.
William Robert “Tosh” Plumlee, a former CIA contract pilot who flew arms and ammunition for the agency as far back as the overthrow of Cuban dictator Fulgencio Batista and the 1961 Bay of Pigs Invasion, questioned if such arms dealing might be another “off-the-books” covert operation run by the CIA’s Special Tactical Unit akin to the arms-for-drugs deal in Iran-Contra and the Cuban Project of the 1950s, in which both Fidel Castro and the Batista Government in Cuba were sold weapons from American stockpiles for corporate profit. Numerous field reports have stated Plumlee flew arms to Nicaragua during the Iran-Contra Scandal. In testimony to the US Senate, Plumlee also said he returned to the US with loads of cocaine during the Reagan years. Recently, Plumlee has worked as a photojournalist along the US-Mexican border and participated in investigations into the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) Fast and Furious sting operation..
Plumlee said he perceives the same type of operations being conducted today in the Middle East. He reported to federal officials large shipments of “High Impact” weapons as well as small arms and ammunition being funneled through a network of clandestine CIA safe houses in Turkey, Jordan, Qatar, Pakistan and other Middle Eastern locations by hired civilians and mercenaries financed by private US corporations and the CIA’s “Black Budget.” Plumlee said he worked with a unit called Task Force Seven under Able Charlie Command headquartered at Ft Bliss, Texas.
Lois G. Lerner, the woman at the center of the IRS tea party targeting scandal, retired from the agency Monday morning after an internal investigation found she was guilty of “neglect of duties” and was going to call for her ouster, according to congressional staff.
Her departure marks the first government official to pay a significant price in the scandal, though Republicans were quick to say her decision doesn’t put the matter to rest and pointed out that she still can be called before Congress to testify.
Monday, September 23, 2013
The Government Is Spying On Us Through Our Computers, Phones, Cars, Buses, Streetlights, At Airports And On The Street, Via Mobile Scanners And Drones, Through Our Smart Meters, And In Many Other Ways
Even now – after all of the revelations by Edward Snowden and other whistleblowers – spying apologists say that the reports are “exaggerated” or “overblown”, and that the government only spies on potential bad guys.
In reality, the government is spying on everyone’s digital and old-fashioned communications.
Sunday, September 22, 2013
The Supreme Court has been asked to consider two cases—United States v. Wurie and Riley v. California—which challenge the legality of warrantless cellphone searches under the Fourth Amendment. Police (and the Obama Administration) maintain that these searches are necessary, stopping suspects from deleting crucial information about drug deals and trafficking rings, but civil liberties advocates say that's no excuse for officers not to get a warrant. Here's everything you need to know about these searches, and whether the Supreme Court might stop them:
Friday, September 20, 2013
Falling crime rates are bad for business at privately run prisons, and a new report shows the companies that own them require them to be filled near capacity to maintain their profit margin.
Here are just some of the improprieties by big banks over the last century (you’ll see that many shenanigans are continuing today):
Laundering money for terrorists (the HSBC employee who blew the whistle on the banks’ money laundering for terrorists and drug cartels says that the giant bank is still laundering money, saying: “The public needs to know that money is still being funneled through HSBC to directly buy guns and bullets to kill our soldiers …. Banks financing … terrorists affects every single American.” He also said: “It is disgusting that our banks are STILL financing terror on 9/11 2013“. And see this)
Funding the Nazis
Financing illegal arms deals, and funding the manufacture of cluster bombs (and see this and this) and other arms which are banned in most of the world
Launching a coup against the President of the United States
Handling money for rogue military operations
Laundering money for drug cartels. See this, this, this, this and this (indeed, drug dealers kept the banking system afloat during the depths of the 2008 financial crisis). A whistleblower said: “America is losing the drug war because our banks are [still] financing the cartels“, and “Banks financing drug cartels … affects every single American“. And see this.)
A secret document, published in declassified form for the first time by the Guardian today, reveals that the US Air Force came dramatically close to detonating an atom bomb over North Carolina that would have been 260 times more powerful than the device that devastated Hiroshima.
The document, obtained by the investigative journalist Eric Schlosser under the Freedom of Information Act, gives the first conclusive evidence that the US was narrowly spared a disaster of monumental proportions when two Mark 39 hydrogen bombs were accidentally dropped over Goldsboro, North Carolina on 23 January 1961. The bombs fell to earth after a B-52 bomber broke up in mid-air, and one of the devices behaved precisely as a nuclear weapon was designed to behave in warfare: its parachute opened, its trigger mechanisms engaged, and only one low-voltage switch prevented untold carnage.
Thursday, September 19, 2013
Since at least 2003, the New York Police Department has been labeling some of its internal documents "Secret," a designation that has baffled government secrecy experts, journalists and civil liberties lawyers.
By labeling documents "secret," the Intelligence Division appears to be operating its own in-house classification system, similar to those used at federal agencies like the CIA, where Intel's chief, David Cohen, previously worked for 35 years.
The FBI is instructing local police departments and "communities against terrorism" to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist, in a circular released to local police departments.
The circular thus adds 9/11 official story skeptics to a growing list of targets described by federal law enforcement to be security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties."
Speaking at the keynote LinuxCon panel this year, Linus Torvalds, who created the open-source Linux operating system 22 years ago, revealed that the government had approached him about installing a backdoor into system’s structure. Linux is the preferred operating system for the privacy conscious infosec community.
It’s just the latest in a string of revelations illustrating how the NSA have for a number of years attempted to intervene in the very structuring of online communications and cryptography to enable easier surveillance.
Wednesday, September 18, 2013
In the 1930′s, an outstanding Major General of the Marine Corps, Smedley Butler, went public with information that he was approached by powerful industrialists to be involved in a plot to overthrow the United States government. Led by powerful business magnates with the intention of ousting President Roosevelt and installing a Fascist dictatorship ruled by business magnates and a private army of half a million US soldiers, this coup was disrupted by Butler’s integrity and willingness to be one of the military industrial complex’s first whistle-blowers.
What possible connection could there have been between George H.W. Bush and the assassination of John F. Kennedy? Or between the C.I.A. and the assassination? Or between Bush and the C.I.A.? For some people, apparently, making such connections was as dangerous as letting one live wire touch another.
In his book, Family of Secrets: The Bush Dynasty, America’s Invisible Government and the Hidden History of the Last Fifty Years, Russ Baker, editor of WhoWhatWhy, documents some of the strangest and least known events relating to the assassination, whose 50th anniversary falls this November 22.
The deeper parts of this classification system are classified, but some new details and codewords have been revealed in documents from the recent Snowden-leaks.
The United States government classifies information according to the degree which the unauthorized disclosure would damage national security. Like many other countries, the US has three classifications levels. From the highest to the lowest level these are:
- TOP SECRET (TS) - SECRET (S) - CONFIDENTIAL (C)
Government documents that do not have a classification can be marked as: - UNCLASSIFIED (U)
Top Level Telecommunications -Read full article »»
Tuesday, September 17, 2013
No telecommunications company has ever challenged the secretive Foreign Intelligence Surveillance court's orders for bulk phone records under the Patriot Act, the court revealed on Tuesday.
The secretive Fisa court's disclosure came inside a declassification of its legal reasoning justifying the National Security Agency's ongoing bulk collection of Americans' phone records.
As we approach the 100 year anniversary of the creation of the Federal Reserve, it is absolutely imperative that we get the American people to understand that the Fed is at the very heart of our economic problems. It is a system of money that was created by the bankers and that operates for the benefit of the bankers. The American people like to think that we have a "democratic system", but there is nothing "democratic" about the Federal Reserve. Unelected, unaccountable central planners from a private central bank run our financial system and manage our economy. There is a reason why financial markets respond with a yawn when Barack Obama says something about the economy, but they swing wildly whenever Federal Reserve Chairman Ben Bernanke opens his mouth. The Federal Reserve has far more power over the U.S. economy than anyone else does by a huge margin. The Fed is the biggest Ponzi scheme in the history of the world, and if the American people truly understood how it really works, they would be screaming for it to be abolished immediately. The following are 25 fast facts about the Federal Reserve that everyone should know...
Sunday, September 15, 2013
The new study by IHS Jane's, a defence consultancy, estimates there are around 10,000 jihadists - who would include foreign fighters - fighting for powerful factions linked to al-Qaeda.
Another 30,000 to 35,000 are hardline Islamists who share much of the outlook of the jihadists, but are focused purely on the Syrian war rather than a wider international struggle.
There are also at least a further 30,000 moderates belonging to groups that have an Islamic character, meaning only a small minority of the rebels are linked to secular or purely nationalist groups.
The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL.
The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called "Follow the Money" (FTM). The collected information then flows into the NSA's own financial databank, called "Tracfin," which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions.
For more than two years, The Sixth Floor Museum, the city's official assassination museum in the School Book Depository Building, has lied about its involvement in the Dallas Police Department's campaign to cleanse Dealey Plaza of people who preach assassination theories to tourists.
Emails and now a lengthy legal deposition — the sworn testimony of a career police officer involved in the police department's "Dealey Plaza Initiative" — show irrefutably that The Sixth Floor was the lead agency goading the police all along.
Friday, September 13, 2013
A spokesperson for the New York Department of Transportation, Scott Gastel, says the E-Z Pass readers are on highways across the city, and on streets in Manhattan, Brooklyn and Staten Island, and have been in use for years. The city uses the data from the readers to provide real-time traffic information, as for this tool. The DoT was not forthcoming about what exactly was read from the passes or how long geolocation information from the passes was kept. Notably, the fact that E-ZPasses will be used as a tracking device outside of toll payment, is not disclosed anywhere that I could see in the terms and conditions.
Thursday, September 12, 2013
Wednesday, September 11, 2013
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
Inside Gen. Keith Alexander's all-out, barely-legal drive to build the ultimate spy machine
Tuesday, September 10, 2013
On the 12th anniversary of 9/11, a new national survey by the polling firm YouGov reveals that one in two Americans have doubts about the government’s account of 9/11, and after viewing video footage of World Trade Center Building 7’s collapse, 46% suspect that it was caused by a controlled demolition. Building 7, a 47-story skyscraper, collapsed into its own footprint late in the afternoon on 9/11.
The poll was sponsored by ReThink911, a global public awareness campaign launched on September 1. The campaign includes a 54-foot billboard in Times Square and a variety of transit and outdoor advertising in 11 other cities, all posing the question, “Did you know a third tower fell on 9/11?”
Monday, September 9, 2013
Sunday, September 8, 2013
A cold Arctic summer has led to a record increase in the ice cap, leading experts to predict a period of global cooling.
There has been a 60 per cent increase in the amount of ocean covered with ice compared to this time last year, they equivalent of almost a million square miles.
A leaked report to the UN Intergovernmental Panel on Climate Change (IPCC) seen by the Mail on Sunday, has led some scientists to claim that the world is heading for a period of cooling that will not end until the middle of this century.
If correct, it would contradict computer forecasts of imminent catastrophic warming. The news comes several years after the BBC predicted that the arctic would be ice-free by 2013.
The United States’ National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google’s Android mobile operating system.
The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.
September 7, 2013
The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material.
In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.
Saturday, September 7, 2013
Thursday, September 5, 2013
Newly revealed documents show that the NSA has circumvented or cracked much of the encryption that automatically secures the emails, Web searches, Internet chats and phone calls of Americans and others around the world. The project, referred to internally by the codename Bullrun, also includes efforts to weaken the encryption standards adopted by software developers.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.
The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.
Soldier N apparently claimed Diana and Dodi’s driver Henri Paul were blinded by an intense flash of light moments before he lost control of their Mercedes. The claim appears to support testimony from an ex-spy at the inquest into Diana and Dodi’s death.
The former MI6 agent told the hearing that he was aware of a colleague’s proposal to kill Serbian leader Slobodan Milosevic by using a strobe light in a tunnel to distract his driver, causing a crash.
And he revealed the existence of a shadowy unit within the SAS known as The Increment which comprises troops from the SAS and SBS for the purposes of carrying out lethal operations on behalf of MI6.
Wednesday, September 4, 2013
Today, Wednesday 4 September 2013 at 1600 UTC, WikiLeaks released ‘Spy Files #3′ – 249 documents from 92 global intelligence contractors. These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.
The NSA runs a massive, full-time hacking operation targeting foreign systems, the latest leaks from Edward Snowden show. But unlike conventional cybercriminals, the agency is less interested in hacking PCs and Macs. Instead, America’s spooks have their eyes on the internet routers and switches that form the basic infrastructure of the net, and are largely overlooked as security vulnerabilities.
Under a $652-million program codenamed “Genie,” U.S. intel agencies have hacked into foreign computers and networks to monitor communications crossing them and to establish control over them, according to a secret black budget document leaked to the Washington Post. U.S. intelligence agencies conducted 231 offensive cyber operations in 2011 to penetrate the computer networks of targets abroad.
Monday, September 2, 2013
For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.
The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.
The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.