government

Government-created viruses for surveillance

From John Twelve Hawks’s “ How We Live Now” (2005):

The Traveler describes for the first time in any book the secret computational immunology programs being developed in Britain. These programs behave like the leucocytes floating through our bloodstream. The programs wander through the Internet, searching, evaluating, and hiding in a person’s home PC, until they detect a “dangerous” statement or unusual information. After gathering our personal information, they return to the central computer. There is no reason why they can’t easily be programmed to destroy a target computer … such as the one on which you’re reading this essay.

Government-created viruses for surveillance Read More »

What RFID passports really mean

From John Twelve Hawks’s “ How We Live Now” (2005):

The passports contain a radio frequency identification chip (RFID) so that all our personal information can be instantly read by a machine at the airport. However, the State Department has refused to encrypt the information embedded in the chip, because it requires more complicated technology that is difficult to coordinate with other countries. This means that our personal information could be read by a machine called a “skimmer” that can be placed in a doorway or a bus stop, perhaps as far as 30 feet away.

The U.S. government isn’t concerned by this, but the contents of Paris Hilton’s cell phone, which uses the same kind of RFID chip, were skimmed and made public last year. It may not seem like a problem when a semi-celebrity’s phone numbers and emails are stolen, but it is quite possible that an American tourist walking down a street in a foreign country will be “skimmed” by a machine that reads the passport in his or her pocket. A terrorist group will be able to decide if the name on the passport indicates a possible target before the tourist reaches the end of the street.

The new RFID passports are a clear indication that protection is not as important to the authorities as the need to acquire easily accessible personal information.

What RFID passports really mean Read More »

Surveillance cameras that notice aberrations

From John Twelve Hawks’s “ How We Live Now” (2005):

And everywhere we go, there are surveillance cameras – thousands of them – to photograph and record our image. Some of them are “smart” cameras, linked to computer programs that watch our movements in case we act differently from the rest of the crowd: if we walk too slowly, if we linger outside certain buildings, if we stop to laugh or enjoy the view, our body is highlighted by a red line on a video monitor and a security guard has to decide whether he should call the police.

Surveillance cameras that notice aberrations Read More »

The US is becoming less democratic

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

For there is a precedent in modern Western history for a country whose leader exploits national humiliation and fear to restrict public freedoms; for a government that makes permanent war as a tool of state policy and arranges for the torture of its political enemies; for a ruling class that pursues divisive social goals under the guise of national “values”; for a culture that asserts its unique destiny and superiority and that worships military prowess; for a political system in which the dominant party manipulates procedural rules and threatens to change the law in order to get its own way; where journalists are intimidated into confessing their errors and made to do public penance. Europeans in particular have experienced such a regime in the recent past and they have a word for it. That word is not “democracy.”

The US is becoming less democratic Read More »

An empire cannot be created by a republic

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

Historians and pundits who leap aboard the bandwagon of American Empire have forgotten a little too quickly that for an empire to be born, a republic has first to die. In the longer run no country can expect to behave imperially – brutally, contemptuously, illegally – abroad while preserving republican values at home. For it is a mistake to suppose that institutions alone will save a republic from the abuses of power to which empire inevitably leads. It is not institutions that make or break republics, it is men. And in the United States today, the men (and women) of the country’s political class have failed. Congress appears helpless to impede the concentration of power in the executive branch; indeed, with few exceptions it has contributed actively and even enthusiastically to the process.

An empire cannot be created by a republic Read More »

Illegality practices by the US in the “War on Terror”

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

The unrepublican veneration of our presidential “leader” has made it uniquely difficult for Americans to see their country’s behavior as others see it. The latest report from Amnesty International – which says nothing that the rest of the world doesn’t already know or believe but which has been denied and ridiculed by President Bush – is a case in point. The United States “renders” (i.e., kidnaps and hands over) targeted suspects to third-party states for interrogation and torture beyond the reach of US law and the press. The countries to whom we outsource this task include Egypt, Saudi Arabia, Jordan, Syria (!), Pakistan – and Uzbekistan. Where outsourcing is impractical, we import qualified interrogators from abroad: in September 2002 a visiting Chinese “delegation” was invited to participate in the “interrogation” of ethnic Uighur detainees held at Guantánamo.

At the US’s own interrogation centers and prisons in Iraq, Afghanistan, and Guantánamo Bay, at least twenty-seven “suspects” have been killed in custody. This number does not include extrajudicial, extraterritorial “targeted assassinations”: a practice inaugurated by Benito Mussolini with the murder of the Rosselli brothers in Normandy in 1937, pursued with vigor by Israel, and now adopted by the Bush administration. The Amnesty report lists sixty alleged incarceration and interrogation practices routinely employed at US detention centers, Guantánamo in particular. These include immersion in cold water to simulate drowning, forced shaving of facial and body hair, electric shocks to body parts, humiliation (e.g., being urinated upon), sex-ual taunting, the mocking of religious belief, suspension from shackles, physical exertion to the point of exhaus-tion (e.g., rock-carrying), and mock execution.

Any and all of these practices will be familiar to students of Eastern Europe in the Fifties or Latin America in the Seventies and Eighties – including the reported presence of “medical personnel.” But American interrogators have also innovated. One technique has been forcibly to wrap suspects – and their Korans – in Israeli flags: a generous gesture to our only unconditional ally, but calculated to ensure that a new generation of Muslims worldwide will identify the two countries as one and hate them equally.

All of these practices – and many, many others routinely employed at Guantánamo, at Kandahar and Bagram in Afghanistan, at al-Qaim, Abu Ghraib, and elsewhere in Iraq – are in breach of the Geneva Conventions and the UN Convention against Torture, to both of which the US is a signatory

Illegality practices by the US in the “War on Terror” Read More »

America, a militarized society

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

[Andrew] Bacevich is a graduate of West Point, a Vietnam veteran, and a conservative Catholic who now directs the study of international relations at Boston University. He has thus earned the right to a hearing even in circles typically immune to criticism. What he writes should give them pause. His argument is complex, resting on a close account of changes in the US military since Vietnam, on the militarization of strategic political thinking, and on the role of the military in American culture. But his conclusion is clear. The United States, he writes, is becoming not just a militarized state but a military society: a country where armed power is the measure of national greatness, and war, or planning for war, is the exemplary (and only) common project.

Why does the US Department of Defense currently maintain 725 official US military bases outside the country and 969 at home (not to mention numerous secret bases)? Why does the US spend more on “defense” than all the rest of the world put together? After all, it has no present or likely enemies of the kind who could be intimidated or defeated by “star wars” missile defense or bunker-busting “nukes.” And yet this country is obsessed with war: rumors of war, images of war, “preemptive” war, “preventive” war, “surgical” war, “prophylactic” war, “permanent” war. As President Bush explained at a news conference on April 13, 2004, “This country must go on the offense and stay on the offense.”

Among democracies, only in America do soldiers and other uniformed servicemen figure ubiquitously in political photo ops and popular movies. Only in America do civilians eagerly buy expensive military service vehicles for suburban shopping runs. In a country no longer supreme in most other fields of human endeavor, war and warriors have become the last, enduring symbols of American dominance and the American way of life. “In war, it seemed,” writes Bacevich, “lay America’s true comparative advantage.” …

For Bacevich’s deepest concern lies closer to home. In a militarized society the range of acceptable opinion inevitably shrinks. Opposition to the “commander in chief” is swiftly characterized as lèse-majesté; criticism becomes betrayal. No nation, as Madison wrote in 1795 and Bacevich recalls approvingly, can “preserve its freedom in the midst of continual warfare.”[12] “Full-spectrum dominance” begins as a Pentagon cliché and ends as an executive project.

America, a militarized society Read More »

International Law in the modern world

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

Things go wrong, and not just in Iraq. International law – like the UN itself – was conceived in a world of sovereign states, a world where wars broke out between countries, peace was duly brokered among states, and a major concern of the post–World War II settlement was to guarantee the inviolability of borders and sovereignty. Today’s wars typically happen within states. The distinctions between peace-making and peacekeeping – between intervention, assistance, and coercion – are unclear, as are the rights of the conflicting parties and the circumstances under which foreign agencies may resort to force. In this confusing new world, well-meaning Western diplomats and observers have sometimes proven unable to distinguish between warring states – operating under conventional diplomatic norms – and locally powerful criminal tyrants, such as the leaders of Sudan. Negotiation with the latter all too often amounts to collaboration and even complicity.

International Law in the modern world Read More »

Wikipedia defines fascism

From Wikipedia’s “Fascism” (5 July 2006):

Fascism is a radical totalitarian political philosophy that combines elements of corporatism, authoritarianism, extreme nationalism, militarism, anti-rationalism, anti-anarchism, anti-communism and anti-liberalism. …

A recent definition that has attracted much favorable comment is that by Robert O. Paxton:

“Fascism may be defined as a form of political behavior marked by obsessive preoccupation with community decline, humiliation, or victim-hood and by compensatory cults of unity, energy, and purity, in which a mass-based party of committed nationalist militants, working in uneasy but effective collaboration with traditional elites, abandons democratic liberties and pursues with redemptive violence and without ethical or legal restraints goals of internal cleansing and external expansion.” (Anatomy of Fascism, p 218)

Fascism is associated by many scholars with one or more of the following characteristics: a very high degree of nationalism, economic corporatism, a powerful, dictatorial leader who portrays the nation, state or collective as superior to the individuals or groups composing it.

Wikipedia defines fascism Read More »

Fouche proud of terror, expanded

From Napoleonic Literature’s “The Court and Camp of Buonaparte: The Ministers: Fouche“:

But whatever might be the merit of his services at Nantes, it was far eclipsed by those he had soon afterwards the happiness to perform at Lyons. On his arrival there with Collot d’Herbois, he announced to the terrified citizens the reward they were to expect for having dared to resist the majesty of the people, and especially for having put to death some revolutionary agents. “The representatives of the people will be impassive in the execution of their mission. They have been intrusted with the thunderbolt of public vengeance, which they will not cease to hurl until the public enemies are crushed. They will have the courage to march over countless tombs of the conspirators, to traverse boundless ruins, that they may arrive at the happiness of nations,–at the regeneration of the world!” He wrote in like terms to his employers at Paris: “Nothing can disarm our severity: indulgence, we must say, is a dangerous weakness. We never cease to strike the enemies of the people; we annihilate them in a manner at once signal, terrible, and prompt. Their bloody corses, thrown into the Rhone, must appear both on the banks and at the mouth of that river, a spectacle of fear, and of the omnipotence of the people! Terror, salutary terror, is here in truth the order of the day; it represses all the efforts of the wicked; it divests crime of all covering and tinsel!

Fouche proud of terror, expanded Read More »

Fouche’s daily list for Napoleon

From Central Missouri State University’s “Joseph Fouche“:

Fouché established an organization of policing and intelligence gathering that was decades ahead of its time. Napoleon, frequently on military campaigns, depended on Fouché’s information to maintain control over France and his military effectiveness. Six days a week, every week, Fouché sent secret reports to Napoleon. The information represented an incredible array of topics:

1. Palace gossip.

2. Audience reaction to a new play.

3. Stock market prices.

4. Desertions from the army.

5. Arrests of foreign agents.

6. Results of interrogations.

7. News of crime.

8. Offenses by soldiers.

9. Fires.

10. Rebellion against the Gendarmarie.

11. Intercepted correspondence.

12. Visiting personages.

13. Public reception of news of victories.

14. Shipping news.

15. Indiscretions of Fouché’s enemies.

16. Contractor’s tenders.

17. Agitation against the draft.

18. Suicides.

19. Prison epidemics.

20. Progress of construction.

21. Unemployment figures.

22. Extracts from inter-ministerial correspondence.

23. Persons detained or under special surveillance (Stead, 1983, pp. 41-48).

Fouche’s daily list for Napoleon Read More »

Fouche proud of terror

From Central Missouri State University’s “Joseph Fouche“:

As chief police officer of the revolutionary government, Fouché was given the power to impose the government’s policies quickly and mercilessly. He demonstrated his willingness to accomplish this feat when, after the population of Lyons revolted against the government, he personally presided over the mass executions in that unhappy city (Forssell, 1970, pp. 71-78).

As the guillotine blade dropped and the massed canon fire dispatched the condemned by the hundreds, Fouché proudly wrote to Paris of his accomplishments, “Terror, salutary terror is now the order of the day (Schom, 1992, p. 112).”

Fouche proud of terror Read More »

Japanese nuclear secrets revealed on P2P network

From Mike’s “That’s Not A New Hit Song You Just Downloaded — It’s Japan’s Nuclear Secrets” (techdirt: 23 June 2005):

While IT managers may not see the importance of security software for themselves, you would think they would be a little more careful with things like interns and contractors. Not so, apparently. Over in Japan, a lot of people are not happy after discovering that a lot of classified technical data on nuclear power plants was leaked onto the internet by a contractor using a computer with a file sharing app that was apparently left open to sharing everything on the machine. First off, what kind of nuclear plant contractor is putting a file sharing app on his work laptop? Also, the article notes that the laptop was infested with viruses, but later seems to blame the file sharing app rather than the viruses — so it’s not entirely clear what the viruses have to do with this story. Update: Another article on this story notes that it was the virus that made the material available via the file sharing app. It also notes that the guy was using his personal computer — and somehow this was allowed. It also details the information leaked, including inspection data, photographs and names of inspectors, as well as where they stayed when they did the inspections. No matter what, you have to wonder why the guy was allowed to use his personal computer or to use any computer for this data that hadn’t been checked first for viruses or other vulnerabilities.

From Mike’s “Security Through Begging” (techdirt: 16 March 2006):

Last summer, the surprising news came out that Japanese nuclear secrets leaked out, after a contractor was allowed to connect his personal virus-infested computer to the network at a nuclear power plant. The contractor had a file sharing app on his laptop as well, and suddenly nuclear secrets were available to plenty of kids just trying to download the latest hit single. It’s only taken about nine months for the government to come up with its suggestion on how to prevent future leaks of this nature: begging all Japanese citizens not to use file sharing systems — so that the next time this happens, there won’t be anyone on the network to download such documents.

Japanese nuclear secrets revealed on P2P network Read More »

Why airport security fails constantly

From Bruce Schneier’s “Airport Passenger Screening” (Crypto-Gram Newsletter: 15 April 2006):

It seems like every time someone tests airport security, airport security fails. In tests between November 2001 and February 2002, screeners missed 70 percent of knives, 30 percent of guns, and 60 percent of (fake) bombs. And recently, testers were able to smuggle bomb-making parts through airport security in 21 of 21 attempts. …

The failure to detect bomb-making parts is easier to understand. Break up something into small enough parts, and it’s going to slip past the screeners pretty easily. The explosive material won’t show up on the metal detector, and the associated electronics can look benign when disassembled. This isn’t even a new problem. It’s widely believed that the Chechen women who blew up the two Russian planes in August 2004 probably smuggled their bombs aboard the planes in pieces. …

Airport screeners have a difficult job, primarily because the human brain isn’t naturally adapted to the task. We’re wired for visual pattern matching, and are great at picking out something we know to look for — for example, a lion in a sea of tall grass.

But we’re much less adept at detecting random exceptions in uniform data. Faced with an endless stream of identical objects, the brain quickly concludes that everything is identical and there’s no point in paying attention. By the time the exception comes around, the brain simply doesn’t notice it. This psychological phenomenon isn’t just a problem in airport screening: It’s been identified in inspections of all kinds, and is why casinos move their dealers around so often. The tasks are simply mind-numbing.

Why airport security fails constantly Read More »

L.A. police using drones to spy on citizens

From Zachary Slobig’s “Police launch eye-in-the-sky technology above Los Angeles” (AFP: 17 June 2006):

Police launched the future of law enforcement into the smoggy Los Angeles sky in the form of a drone aircraft, bringing technology most commonly associated with combat zones to urban policing.

The unmanned aerial vehicle, which looks like a child’s remote control toy and weighs about five pounds (2.3 kilograms), is a prototype being tested by the Los Angeles County Sheriff’s Department. …

“This technology could be used to find missing children, search for lost hikers, or survey a fire zone,” said Commander Sid Heal, head of the Technology Exploration Project of the Los Angeles County Sheriff’s Department. “The ideal outcome for us is when this technology becomes instrumental in saving lives.”

The SkySeer would also be a helpful tool to nab burglary suspects on rooftops and to chase down suspects fleeing on foot. The drone comes equipped with low-light and infrared capabilities and can fly at speeds up to 30 miles (48 kilometers) per hour for 70 minutes. …

A small camera capable of tilt and pan operations is fixed to the underside of the drone which sends the video directly to a laptop command station. Once launched, the craft is set to fly autonomously with global positioning system (GPS) coordinates and a fixed flight pattern.

As technology improves, the drone will be outfitted with zoom capabilities. For now, the craft simply flies lower to hone in on its target. …

“The plane is virtually silent and invisible,” said Heal. “It will give us a vertical perspective that we have never had.”

The Los Angeles Sheriff’s Department operates a fleet of 18 helicopters, priced between three and five million dollars each. The SkySeer will cost between 25,000 and 30,000 dollars.

L.A. police using drones to spy on citizens Read More »

4 ways to eavesdrop on telephone calls

From Bruce Schneier’s “VOIP Encryption” (Crypto-Gram Newsletter: 15 April 2006):

There are basically four ways to eavesdrop on a telephone call.

One, you can listen in on another phone extension. This is the method preferred by siblings everywhere. If you have the right access, it’s the easiest. While it doesn’t work for cell phones, cordless phones are vulnerable to a variant of this attack: A radio receiver set to the right frequency can act as another extension.

Two, you can attach some eavesdropping equipment to the wire with a pair of alligator clips. It takes some expertise, but you can do it anywhere along the phone line’s path — even outside the home. This used to be the way the police eavesdropped on your phone line. These days it’s probably most often used by criminals. This method doesn’t work for cell phones, either.

Three, you can eavesdrop at the telephone switch. Modern phone equipment includes the ability for someone to listen in this way. Currently, this is the preferred police method. It works for both land lines and cell phones. You need the right access, but if you can get it, this is probably the most comfortable way to eavesdrop on a particular person.

Four, you can tap the main trunk lines, eavesdrop on the microwave or satellite phone links, etc. It’s hard to eavesdrop on one particular person this way, but it’s easy to listen in on a large chunk of telephone calls. This is the sort of big-budget surveillance that organizations like the National Security Agency do best. They’ve even been known to use submarines to tap undersea phone cables.

4 ways to eavesdrop on telephone calls Read More »

Quick ‘n dirty explanation of onion routing

From Ann Harrison’s Onion Routing Averts Prying Eyes (Wired News: 5 August 2004):

Computer programmers are modifying a communications system, originally developed by the U.S. Naval Research Lab, to help Internet users surf the Web anonymously and shield their online activities from corporate or government eyes.

The system is based on a concept called onion routing. It works like this: Messages, or packets of information, are sent through a distributed network of randomly selected servers, or nodes, each of which knows only its predecessor and successor. Messages flowing through this network are unwrapped by a symmetric encryption key at each server that peels off one layer and reveals instructions for the next downstream node. …

The Navy is financing the development of a second-generation onion-routing system called Tor, which addresses many of the flaws in the original design and makes it easier to use. The Tor client behaves like a SOCKS proxy (a common protocol for developing secure communication services), allowing applications like Mozilla, SSH and FTP clients to talk directly to Tor and route data streams through a network of onion routers, without long delays.

Quick ‘n dirty explanation of onion routing Read More »

Identity theft method: file false unemployment claims

From Michael Alter’s States fiddle while defrauders steal (CNET News.com: 21 June 2005):

More than 9 million American consumers fall victim to identity theft each year. But the most underpublicized identity theft crime is one in which thieves defraud state governments of payroll taxes by filing fraudulent unemployment claims.

It can be a fairly lucrative scheme, too. File a false unemployment claim and you can receive $400 per week for 26 weeks. Do it for 100 Social Security numbers and you’ve made a quick $1.04 million. It’s tough to make crime pay much better than that.

The victims in this crime–the state work force agencies that tirelessly oversee our unemployment insurance programs and the U.S. Department of Labor–are reluctant to discuss this topic for obvious reasons. …

The slow response of state and federal agencies is quickly threatening the integrity of the unemployment insurance system. It turns out that crime is a very efficient market and word spreads quickly. Got a stolen Social Security number? You can more easily turn it into money by defrauding the government than by defrauding the credit card companies.

The net result of this fraud is that unemployment taxes are going up, and that makes it that much harder for small businesses and big businesses to do business. Even more, higher payroll taxes slow down economic growth because they make it more expensive to hire new employees.

Identity theft method: file false unemployment claims Read More »

It’s easy to track someone using a MetroCard

From Brendan I. Koerner’s “Your Cellphone is a Homing Device” (Legal Affairs: July/August 2003):

Law enforcement likewise views privacy laws as an impediment, especially now that it has grown accustomed to accessing location data virtually at will. Take the MetroCard, the only way for New York City commuters to pay their transit fares since the elimination of tokens. Unbeknownst to the vast majority of straphangers, the humble MetroCard is essentially a floppy disk, uniquely identified by a serial number on the flip side. Each time a subway rider swipes the card, the turnstile reads the bevy of information stored on the card’s magnetic stripe, such as serial number, value, and expiration date. That data is then relayed back to the Metropolitan Transportation Authority’s central computers, which also record the passenger’s station and entry time; the stated reason is that this allows for free transfers between buses and subways. (Bus fare machines communicate with MTA computers wirelessly.) Police have been taking full advantage of this location info to confirm or destroy alibis; in 2000, The Daily News estimated that detectives were requesting that roughly 1,000 MetroCard records be checked each year.

A mere request seems sufficient for the MTA to fork over the data. The authority learned its lesson back in 1997, when it initially balked at a New York Police Department request to view the E-ZPass toll records of a murder suspect; the cops wanted to see whether or not he’d crossed the Verrazano Narrows Bridge around the time of the crime. The MTA demanded that the NYPD obtain a subpoena, but then-Justice Colleen McMahon of the State Supreme Court disagreed. She ruled that “a reasonable person holds no expectation of confidentiality” when using E-ZPass on a public highway, and an administrative subpoena – a simple OK from a police higher-up – was enough to compel the MTA to hand over the goods.

It’s easy to track someone using a MetroCard Read More »