tagged w/ Hacking
The hacktivist collective Anonymous, along with other hacker groups based in the Middle East and North Africa, began an operation, dubbed "OpUSA," targeting the websites of nine major U.S. government agencies and over 130 banks earlier this morning in a protest against American foreign policy. Targets include the Pentagon, the National Security Agency, the FBI and the White House, along with the websites of banks such as Bank of America, Capital One and TD Bank. Calling themselves the "N4m3le55 Cr3w," the collective of hacker groups said in a statement that it aims to make sure "this May 7th will be a day to remember."
The relatively amorphous Anonymous, a decentralized and loosely associated collective of hackers, grew out of the internet imageboard 4Chan back in the early 2000s. As the very interesting and informative 2012 documentary on the group, "We Are Legion: The Story of the Hacktivists," highlights, there is no one group called Anonymous with one set of goals or ideals. Rather there are a collection of groups and individuals that operate under the name Anonymous, often with varying agendas ranging from principle social activism to just messing with people because they can. Because of this, their actions can range from the awesome (such as their support for protesters during the Arab uprisings) to the simply mean and unnecessary (such as posting flashing animations on the website of an epilepsy support group).
Anonymous is joined by groups including the Izz al-Din Qassam Cyber Fighters, whose sole aim is apparently to get the "Innocence of Muslims" video removed from YouTube. Other groups involved in OpUSA include Mauritania hackers, Muslim liberation army, antisec, and lulzsec. Over the past six months, the Qassam Cyber Fighters have successfully carried out distributed denial of service (DDoS) attacks against large American banks. The groups have been publicizing their planned operation for weeks now, and in their statement posted on the website Pastebin on April 21 they said that America will pay for the war crimes it has committed:
"America you have committed multiple war crimes in Iraq, Afghanistan, Pakistan, and recently you have committed war crimes in your own country. You have killed hundreds of innocent children and families with drones, guns, and now bombs. America you have hit thousands of people where it hurts them, now it is our time for our Lulz. For this you shall pay."The hacktivist collective Anonymous, along with other hacker groups based in the... more
Aaron's Swartz's suicide in January triggered waves of indignation, and rightly so. He faced multiple felony counts and years in prison for what were, at worst, trivial transgressions of law. But his prosecution revealed the excess of both anti-hacking criminal statutes, particularly the Computer Fraud and Abuse Act (CFAA), and the fixation of federal prosecutors on severely punishing all forms of activism that challenge the power of the government and related entities to control the flow of information on the internet. Part of what drove the intense reaction to Swartz's death was how sympathetic of a figure he was, but as noted by Orin Kerr, a former federal prosecutor in the DOJ's computer crimes unit and now a law professor at GWU, what was done to Swartz is anything but unusual, and the reaction to his death will be meaningful only if channeled to protest other similar cases of prosecutorial abuse:
"I think it's important to realize that what happened in the Swartz case happens in lots and lots of federal criminal cases. . . . What's unusual about the Swartz case is that it involved a highly charismatic defendant with very powerful friends in a position to object to these common practices. That's not to excuse what happened, but rather to direct the energy that is angry about what happened. If you want to end these tactics, don't just complain about the Swartz case. Don't just complain when the defendant happens to be a brilliant guy who went to Stanford and hangs out with Larry Lessig. Instead, complain that this is business as usual in federal criminal cases around the country - mostly with defendants who no one has ever heard of and who get locked up for years without anyone else much caring."
Prosecutorial abuse is a drastically under-discussed problem in general, but it poses unique political dangers when used to punish and deter online activism. But it's becoming the preeminent weapon used by the US government to destroy such activism.
More at link
http://www.guardian.co.uk/commentisfree/2013/mar/21/barrett-brown-persecution-anonymousAaron's Swartz's suicide in January triggered waves of indignation, and... more
Excerpt from Rolling Stone Magazine December 7, 2012:
The Rise and Fall of Jeremy Hammond: Enemy of the State- by Janet Reitman
On a cold day in mid-December 2011, a hacker known as "sup_g" sat alone at his computer – invisible, or so he believed. He'd been working on the target for hours, long after the rest of his crew had logged off: an epic hack, the "digital equivalent of a nuclear bomb," as it later would be described, on the servers of a Texas-based intelligence contractor called Strategic Forecasting Inc. Stratfor served as a sort of private CIA, monitoring developments in political hot spots around the world and supplying analysis to the U.S. security establishment.
A member of the online activist movement Anonymous, sup_g was part of a small team of politically motivated hackers who had breached Stratfor's main defenses earlier that month – ultimately "rooting," or gaining total access to, its main web servers. In them, they had found a cornucopia of treasure: passwords, unencrypted credit-card data and private client lists revealing Stratfor's deep ties to both big business and the U.S. intelligence and defense communities. But perhaps the most lucrative find of all was Stratfor's e-mail database: some 3 million private messages that exposed a wide array of nefarious and clandestine activities – from the U.S. government's monitoring of the Occupy movement to Stratfor's own role in compiling data on a variety of activist movements, including PETA, Wikileaks and even Anonymous itself
Read more: http://www.rollingstone.com/culture/news/the-rise-and-fall-of-jeremy-hammond-enemy-of-the-state-20121207#ixzz2M909sybR
Follow us: @rollingstone on Twitter | RollingStone on FacebookExcerpt from Rolling Stone Magazine December 7, 2012: The Rise and Fall of Jeremy... more
Cyber-threats are the new pretext to justify expansion of power and profit for the public-private National Security State
NSA headquarters Maryland
The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. Photograph: NSA/Getty Images
As the US government depicts the Defense Department as shrinking due to budgetary constraints, the Washington Post this morning announces "a major expansion of [the Pentagon's] cybersecurity force over the next several years, increasing its size more than fivefold." Specifically, says the New York Times this morning, "the expansion would increase the Defense Department's Cyber Command by more than 4,000 people, up from the current 900.
The Pentagon's rhetorical justification for this expansion is deeply misleading. Beyond that, these activities pose a wide array of serious threats to internet freedom, privacy, and international law that, as usual, will be conducted with full-scale secrecy and with little to no oversight and accountability. And, as always, there is a small army of private-sector corporations who will benefit most from this expansion.
Disguising aggression as "defense"
Let's begin with the way this so-called "cyber-security" expansion has been marketed. It is part of a sustained campaign which, quite typically, relies on blatant fear-mongering.
In March, 2010, the Washington Post published an amazing Op-Ed by Adm. Michael McConnell, Bush's former Director of National Intelligence and a past and current executive with Booz Allen, a firm representing numerous corporate contractors which profit enormously each time the government expands its "cyber-security" activities. McConnell's career over the last two decades - both at Booz, Allen and inside the government - has been devoted to accelerating the merger between the government and private sector in all intelligence, surveillance and national security matters (it was he who led the successful campaign to retroactively immunize the telecom giants for their participation in the illegal NSA domestic spying program). Privatizing government cyber-spying and cyber-warfare is his primary focus now.
McConnell's Op-Ed was as alarmist and hysterical as possible. Claiming that "the United States is fighting a cyber-war today, and we are losing", it warned that "chaos would result" from an enemy cyber-attack on US financial systems and that "our power grids, air and ground transportation, telecommunications, and water-filtration systems are in jeopardy as well." Based on these threats, McConnell advocated that "we" - meaning "the government and the private sector" - "need to develop an early-warning system to monitor cyberspace" and that "we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment - who did it, from where, why and what was the result - more manageable." As Wired's Ryan Singel wrote: "He's talking about changing the internet to make everything anyone does on the net traceable and geo-located so the National Security Agency can pinpoint users and their computers for retaliation."
As usual, though, reality is exactly the opposite. This massive new expenditure of money is not primarily devoted to defending against cyber-aggressors. The US itself is the world's leading cyber-aggressor. A major purpose of this expansion is to strengthen the US's ability to destroy other nations with cyber-attacks. Indeed, even the Post report notes that a major component of this new expansion is to "conduct offensive computer operations against foreign adversaries".
It is the US - not Iran, Russia or "terror" groups - which already is the first nation (in partnership with Israel) to aggressively deploy a highly sophisticated and extremely dangerous cyber-attack. Last June, the New York Times' David Sanger reported what most of the world had already suspected: "From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons." In fact, Obama "decided to accelerate the attacks . . . even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet." According to the Sanger's report, Obama himself understood the significance of the US decision to be the first to use serious and aggressive cyber-warfare:
This significant expansion under the Orwellian rubric of "cyber-security" is thus a perfect microcosm of US military spending generally. It's all justified under by the claim that the US must defend itself from threats from Bad, Aggressive Actors, when the reality is the exact opposite: the new program is devoted to ensuring that the US remains the primary offensive threat to the rest of the world. It's the same way the US develops offensive biological weapons under the guise of developing defenses against such weapons (such as the 2001 anthrax that the US government itself says came from a US Army lab). It's how the US government generally convinces its citizens that it is a peaceful victim of aggression by others when the reality is that the US builds more weapons, sells more arms and bombs more countries than virtually the rest of the world combined.
Threats to privacy and internet freedom
Back in 2003, the Rumsfeld Pentagon prepared a secret report entitled "Information Operations (IO) Roadmap", which laid the foundation for this new cyber-warfare expansion. The Pentagon's self-described objective was "transforming IO into a core military competency on par with air, ground, maritime and special operations". In other words, its key objective was to ensure military control over internet-based communications:
It further identified superiority in cyber-attack capabilities as a vital military goal in PSYOPs (Psychological Operations) and "information-centric fights":
And it set forth the urgency of dominating the "IO battlespace" not only during wartime but also in peacetime:
As a 2006 BBC report on this Pentagon document noted: "Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans." And while the report paid lip service to the need to create "boundaries" for these new IO military activities, "they don't seem to explain how." Regarding the report's plan to "provide maximum control of the entire electromagnetic spectrum", the BBC noted: "Consider that for a moment. The US military seeks the capability to knock out every telephone, every networked computer, every radar system on the planet."
Since then, there have been countless reports of the exploitation by the US national security state to destroy privacy and undermine internet freedom. In November, the LA Times described programs that "teach students how to spy in cyberspace, the latest frontier in espionage." They "also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives." The program, needless to say, "has funneled most of its graduates to the CIA and the Pentagon's National Security Agency, which conducts America's digital spying. Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security."Cyber-threats are the new pretext to justify expansion of power and profit for the... more
Aaron Swartz, internet activist and computer programer (he helped create an early version of RSS), died of an apparent suicide in his New York apartment Friday, Jan. 11. He was 26.
http://www.examiner.com/article/aaron-swartz-the-genius-and-suicide-of-an-internet-activist?cid=db_articlesAaron Swartz, internet activist and computer programer (he helped create an early... more
[[ Cross-VM Side-channel attacks against cryptography keys ]] fA group of researchers has developed a side-channel attack targeting virtual machines that could pose a threat to cloud computing environments.
See more at: http://thehackernews.com/2012/11/cross-vm-side-channel-attacks-against.html[[ Cross-VM Side-channel attacks against cryptography keys ]] fA group of researchers... more
Mobile version of Official NBC website and NBC Sports Rotoworld forums are currently defaced with a message reading "hacked by pyknic." and "Remember, Remember The Fifth of November, The Gunpowder Treason and Plot. I know of no reason why the gunpowder treason should ever be forgot."
See more at: http://thehackernews.com/2012/11/nbc-websites-hacked-to-promote-nov5th.htmlMobile version of Official NBC website and NBC Sports Rotoworld forums are currently... more
EXCLUSIVE -- ImageShack Server and Symantec Database hacked and Dumped using some zero day exploits....
Read : http://thehackernews.com/2012/11/imageshack-server-and-symantec-database.htmlEXCLUSIVE -- ImageShack Server and Symantec Database hacked and Dumped using some zero... more
[ OVERVIEW of Guy Fawkes Day (5th November 2012) ] Hack of 28,000 Paypal Accounts, Hacking of ImageShack Server , thousands of researchers database leak from Symantec portal, then NBC Sports Rotoworld forums and NBC Mobile site was defaced by pyknic hacker and a claim that user names and passwords for the site had been compromised, Anonymous leaks the VMware ESX Server Kernel source code online , numerous Australian sites, and the Organization for Security and Cooperation in Europe.
See more at: http://thehackernews.com/2012/11/guy-fawkes-day-ends-with-hack-of-28000.html[ OVERVIEW of Guy Fawkes Day (5th November 2012) ] Hack of 28,000 Paypal Accounts,... more
"Please don't mind, its 5th of November" slogan for today !
Anonymous Hackers hacked into "Telecom Italy" and dump Social Security Number, Social Insurance Number, 30000 credentials and lots of vulnerabilities exposed.
See more at: http://thehackernews.com/2012/11/anonymous-hack-30000-accounts-and.html"Please don't mind, its 5th of November" slogan for today !... more
In 2009, the FBI told Coca-Cola executives that hackers had broken into their computer systems - Hackers had broken into the company’s computer systems and were pilfering sensitive files about its attempted $2.4 billion acquisition of China Huiyuan Juice Group (1886)
See more at: http://thehackernews.com/2012/11/chinese-hackers-target-coca-cola-and.htmlIn 2009, the FBI told Coca-Cola executives that hackers had broken into their computer... more
This isn’t the only vulnerability in the drone fleet. In March of 2011, an unknown software glitch caused a Predator stationed at a U.S. base in Africa to start its engine without human direction. Last October, as Danger Room first reported, Air Force technicians discovered a virus infecting the drones’ remote cockpits in Las Vegas. It took weeks of sustained effort to clean up the machines. The aircraft, which rely on GPS to guide them through the air, can run into problems if GPS signals are jammed in a particular area — something that can be done with cheap, commercially available hardware. Iranian officials claimed they hacked the GPS control signal of an advanced drone, though it’s impossible to verify that lofty claim.
No one who works with UAVs is questioning the fundamental integrity of the drone fleet at the moment; it would take an incredibly sophisticated hacker to commandeer a Predator, for example. Nor is anyone pretending that this premiere tool of the U.S.global counterterror campaign is flawless.
Predators and the larger, better-armed Reapers transmit video and accept instructions in one of two ways. The first is via satellite, to remote pilots and sensor operators who are often on the other side of the planet; these satellite communications are encrypted, and are generally considered secure.
The second is through a radio frequency signal called the Common Data Link, which is used to share the drone’s video feed with troops on the ground. The CDL’s carrier signal — its specific pattern of frequencies, in a given order and for a given length of time — tells both transmitter and receiver on how to function. The problem is that the Predators’ version of the CDL carrier signal (also known as a “waveform”) didn’t include an order to encrypt the signal. So neither the transmitter on the drone nor the receivers that troops used on the ground employed encryption, either.
There were reasons for this. The original Predator, just 27 feet long, was little more than a scaled-up model plane with an 85-horsepower engine. It had a payload of just half a ton for all its fuel, cameras and radios. And encryption systems can be heavy. (Big crypto boxes are a major reason the Army’s futuristic universal radio ended up being too bulky for combat, for example.) With the early Predator models, the Air Force made the conscious decision to leave off the crypto.
The flying branch was well aware of the risk. “Depending on the theater of operation and hostile electronic combat systems present, the threat to the UAVs could range from negligible with only a potential of signal intercept for detection purpose, to an active jamming effort made against an operating, unencrypted UAV,” the Air Force reported in 1996. ”The link characteristics of the baseline Predator system could be vulnerable to corruption of down links data or hostile data insertions.”
The Predator models steadily grew in power and payload, and took a big leap in dimensions and capability with the 36-foot-long Reaper version introduced in 2007. The Reaper has a 950-horsepower engine and a nearly 4,000-pound payload — more than enough capacity for crypto-enabled systems which, like all electronics, had shrunk in size and weight.
The problem was that, by then, the military had rushed to the battlefield hundreds of Remotely Operated Video Enhanced Receivers, or Rovers – rugged, laptop-sized receivers with screens for watching drone footage. And those early version of the Rovers were developed and distributed so fast, the military once again left the crypto off. “It could be both intercepted (e.g., hacked into) and jammed,” e-mails an Air Force officer with knowledge of the program.
Which mean the Pentagon was stuck, for a time. The military couldn’t replace the old CDL waveform with something encryptable until the Rovers — and the radio transmitters aboard the Predators — could handle such a signal.
Eventually, the Rovers began to be swapped out for newer models. The latest version, the “Tactical Rover,” (.pdf) is about the size of an old-school mobile phone. It can use both the Advanced Encryption Standard an the triple-Data Encryption Standard to secure video feeds. There are now about a thousand of the units in the military’s hands.
And now, the Predators and Reapers are starting to get enhanced radios, too. “The fleet-wide upgrade begins later this year and carries on for several years,” says Maj. Mary Danner-Jones, an Air Force spokesperson. The service is spending $12 million on crypto-enabled Vortex transceivers (.pdf).
That’s allowing a new, hardened waveform to be introduced throughout the Predator and Reaper fleet. The Air Force recently gave Predator-maker General Atomics Aeronautical Systems a $26 million contract to retrofit its drone cockpits to accept the carrier signal, among other enhancements.(more at link)This isn’t the only vulnerability in the drone fleet. In March of 2011, an... more
Democrats can feel proud of their ability to beat back many of the voter ID laws that swept across the nation, but the truth is voters are still exposed to an even greater culprit...the malfunctioning, hackable voting machines. It isn’t the number of registrations that determine the outcome of an election. The focus should be on making certain that every vote is accurately counted.
If officials were truly concerned about the sanctity of the vote, making certain each vote cast is accurately counted would be first and foremost, but that isn’t the case. Despite overwhelming evidence that the machines are faulty, we continue to use them.
We’re conducting elections on machines that give no receipts and cannot be audited. We frown on recall elections and recounts are virtually impossible. For all of our declarations about liberty and “we the people”, our elections are no better than those of a third world country.
Read more...Democrats can feel proud of their ability to beat back many of the voter ID laws that... more
In cyberattacks, hacking humans is highly effective way to access systems
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
(click on the link not only for the article but also for a very interesting video)In cyberattacks, hacking humans is highly effective way to access systems... more
This is a mess you don't want to be a part of: Hacker group AntiSec claims it has gotten a hold of FBI data that contained over 12 million Apple ID numbers linked with other personal information. They have chosen to release just 1 million of them because, as they explain in this post, "a million would be enough," presumably to get the message across. More than just the Apple UDID number, which is a unique, hard to guess code associated with each device (like a serial number), the hack found full names, cell numbers, addresses, and zipcodes tied to the IDs. AntiSec hasn't included that data in the list, only providing the Apple Device UDID, Apple Push Notification Service DevToken, Device Name, and Device Type. Considering all the information at stake -- a leak like this could lead to identity theft -- you might want to check if you're one of the affected devices.
If you happen to know your Apple ID number, which is an alpha-numeric string of 20+ characters, then you can just plug it into this identifier The Next Web put together. (They promise that doesn't store the information, just uses it to check against AntiSec's list.) Since it's likely that you do not know that long complicated code off the top of your head — especially with all those other passwords you have to remember — getting the number involves plugging an iPhone into its home computer and hooking it up to iTunes. Here is a very easy tutorial on how to find it with a few simple steps. In short, plug the phone in, head to "YourPhone" on the iTunes sidebar. Click the summary tab, and there it should say the serial number, click that and then the UDID will show up, as picture below.
Full Story: http://news.yahoo.com/check-own-one-1-million-hacked-iphones-ipads-131638363.htmlThis is a mess you don't want to be a part of: Hacker group AntiSec claims it has... more
July 2 (Bloomberg) -- Twitter Inc. must turn over information about an Occupy Wall Street protester’s posts, a New York judge ruled, comparing the duties of social media sites to those of witnesses to a street crime.
State Supreme Court Judge Matthew A. Sciarrino Jr.’s June 30 ruling denied Twitter’s request to quash a subpoena from Manhattan District Attorney Cyrus Vance Jr. The company must turn over tweets posted by Malcolm Harris from Sept. 15, 2011, to Dec. 30, 2011.
“What you give to the public belongs to the public. What you keep to yourself belongs only to you,” Sciarrino said in a ruling that addressed the difficulty of setting law in the evolving world of social media.
The case will determine whether Twitter faces the burden of responding to subpoenas for its users, the San Francisco-based company has said. The outcome is significant throughout the U.S. as law enforcement becomes more aggressive in seeking information about what people do and say on the Internet, the American Civil Liberties Union said in a May 31 court filing.
Full Story: http://www.washingtonpost.com/business/twitter-must-turn-over-information-about-protesters-posts/2012/07/03/gJQA1CTsKW_story.htmlJuly 2 (Bloomberg) -- Twitter Inc. must turn over information about an Occupy Wall... more
They simply wait for the technology to be developed and steal it...too easy
War on Whistleblowers: More journalists linked to case charging ex-CIA officer with leaks about interrogatorsThe identities of journalists who allegedly received illegal leaks from former CIA officer John Kiriakou are spilling into the public domain in the wake of his indictment last week on charges that he disclosed the names of CIA personnel involved in interrogations of terror suspects.
Two New York-based reporters, Matthew Cole and Richard Esposito, are among the journalists the government has alleged as being on the receiving end of leaks from Kiriakou, sources familiar with the case told POLITICO.
Cole, described in court papers as “Journalist A,” worked until earlier this year as a producer for ABC News’s investigative unit, but the alleged leaks to him took place before he joined ABC.
Esposito, described in court papers as “Journalist C,” is the senior investigative reporter for ABC’s I-team, headed up by Brian Ross. A complaint filed in the case earlier this year indicates that Esposito and Kiriakou “collaborated on a preliminary book proposal” and in the course of that effort Kiriakou “apparently” gave Esposito classified information.
Cole’s alleged role is closer to the core of the case against Kiriakou and also raises questions about whether Cole, whose website indicates he was working on a book at the time, was straddling the line between traditional journalism and information gathering for lawyers representing Guantanamo detainees.
The indictment says Kiriakou gave Cole the last name of a CIA officer after Cole presented Kiriakou with a first name and other information. “Approximately two hours after” Kiriakou emailed Cole the last name, Cole sent it to a defense investigator working with attorneys for terror suspects held at Guantanamo, the complaint filed in the case says. “My guy came through with his memory,” Cole wrote to the defense investigator later that day, according to the complaint.
Public court papers don’t offer much in the way of context for Cole’s interaction with the defense investigator, who was not named.
Cole did not respond to several Twitter messages seeking comment for this story, but in late February he used one of his Twitter accounts to unleash a barrage of harsh criticism of the Obama administration over a series of prosecutions of individuals accused of leaking classified information to journalists.
“How can journalists protect their communications with sources leaking details to how (sic) the US government accountable? #stopthesuppression” Cole wrote in one message. Other of his Tweets included hashtags such as “#Obamaonlylikesleaksthatmakehimlookdecisiveorheroic” and “#Obamaswaragainstjournalists.”
Cole’s last story on the ABC website appears to be from Jan. 9, about two weeks before Kiriakou was arrested. A reporter who called ABC and asked for Cole last week was told he was no longer with the company, but as of when this post first appeared Monday night, Cole remained on a list of staffers on the ABC investigative team’s web page. Cole appears to have opened a new Twitter account that describes him as “a journalist covering national security...most recently, an investigative producer for ABC News.” Before joining ABC as a staffer, Cole had written a variety of stories for outlets like New York Magazine, ESPN the Magazine and GQ.
An ABC spokesman declined to be interviewed for this post, as did Esposito. Kiriakou's alleged disclosure to him is not mentioned in the indictment filed last week.
Kiriakou’s lead defense attorney, Plato Cacheris, had no immediate response to a message seeking comment for this report.
Another ABC journalist, White House Correspondent Jake Tapper, recently drew attention for publicly challenging the Obama administration for criticizing press repression in other countries while trying to jail journalists’ sources in the U.S. In his Feb. 22 exchange with White House Press Secretary Jay Carney in the White House Briefing Room, Tapper cited Kiriakou’s prosecution, but did not mention that two of the journalists who allegedly received illegal leaks had ABC ties.
“The administration is taking this person [Kiriakou] to court. There just seems to be a disconnect here. You want aggressive journalism abroad; you just don’t want it in the United States,” Tapper said, in comments highlighted a few days later by The New York Times.
Through a spokesman, Tapper declined to comment for this post. However, a colleague of Tapper said he had "zero" knowledge at the time he asked the question that ABC journalists had any links to the case.
Court documents filed in Kiriakou’s case don’t identify any journalists by name, but soon after his arrest in January it became evident that New York Times reporter Scott Shane was one of the reporters who allegedly got illegal leaks from the former CIA officer. The complaint and the indictment refer to Shane as “Journalist B” and cite a specific story he wrote in June 2008 that described the involvement of CIA officer Deuce Martinez in the capture and interrogation of Al Qaeda operative Abu Zubyadah in Pakistan in 2002.
The Times issued a statement in January saying the newspaper and its reporters had not been contacted by investigators or provided any information to the government in connection with the case. The Times statement appeared to try to distinguish Shane’s alleged role in the case from that of “Journalist A,” now identified as Cole.
A knowledgeable source who asked not to be named said Friday that he did not believe any ABC journalists had been approached by the government or cooperated with the investigation.
None of the journalists referred to in court papers has been charged with any crime. Under the Espionage Act, even private citizens who obtain classified information outside of official channels can be charged with disclosing it. The government has never filed such a case against a journalist. Prosecutors did file such charges in 2005 against two ex- lobbyists for the American Israel Public Affairs Committee, but the prosecution was abandoned in 2009.
http://www.politico.com/blogs/under-the-radar/2012/04/more-journalists-linked-to-case-charging-excia-officer-120047.html#.T4RT_t2fnfw.twitterThe identities of journalists who allegedly received illegal leaks from former CIA... more
This is a January 13th article, but the article's contents are important and are going to be VERY relevant throughout the 2012 election season.
In a major step towards global centralization of election processes, the world’s dominant Internet voting company has purchased the USA’s dominant election results reporting company.
When you view your local or state election results on the Internet, on portals which often appear to be owned by the county elections division, in over 525 US jurisdictions you are actually redirected to a private corporate site controlled by SOE software, which operates under the name ClarityElections. com.
The good news is that this firm promptly reports precinct-level detail in downloadable spreadsheet format. As reported by BlackBoxVoting. org in 2008, the bad news is that this centralizes one middleman access point for over 525 jurisdictions in AL, AZ, CA, CO, DC, FL, KY, MI, KS, IL, IN, NC, NM, MN, NY, SC, TX, UT, WA. And growing.
As local election results funnel through SOE’s servers (typically before they reach the public elsewhere), those who run the computer servers for SOE essentially get “first look” at results and the ability to immediately and privately examine vote details throughout the USA.
In 2004, many Americans were justifiably concerned when, days before the presidential election, Ohio Secretary of State Ken Blackwell redirected Ohio election night results through the Tennessee-based server for several national Republican Party operations.
This is worse: This redirects results reporting to a centralized privately held server which is not just for Ohio, but national; not just USA-based, but global.
A mitigation against fraud by SOE insiders has been the separation of voting machine systems from the SOE results reports. Because most US jurisdictions require posting evidence of results from each voting machine at the precinct, public citizens can organize to examine these results to compare with SOE results. Black Box Voting spearheaded a national citizen action to videotape / photograph these poll tapes in 2008.
With the merger of SOE and SCYTL, that won’t work (if SCYTL’s voting system is used). When there are two truly independent sources of information, the public can perform its own “audit” by matching one number against the other.
These two independent sources, however, will now be merged into one single source: an Internet voting system controlled by SCYTL, with a results reporting system also controlled by SCYTL.
With SCYTL internet voting, there will be no ballots. No physical evidence. No chain of custody. No way for the public to authenticate who actually cast the votes, chain of custody, or the count.
SCYTL is moving into or already running elections in: the United Kingdom, France, Canada, Norway, Switzerland, United Arab Emirates, South Africa, India and Australia.
SCYTL is based in Barcelona; its funding comes from international venture capital funds including Nauta Capital, Balderton Capital and Spinnaker.
Here is the link to the press release regarding SYCTL’s acquisition of SOE:
http://www.marketwatch.com/story/scytl-acquires-soe-software-becoming-the-leading-election-software-provider-2012-01-11This is a January 13th article, but the article's contents are important and are... more