Tuesday, November 18, 2014

James Bond - Disavowed


Taking a bullet for your country isn't all it's cracked up to be - when your country abandons you.


What happens when one of our covert special operations types is injured on the job -- and disavowed by the US Government?

We've reviewed the cases of several folks who operated at arms-length from the USG and were severely injured during covert or clandestine operations.  The results have not been encouraging to our HUMINT operatives who are/will be tasked with taking on dangerous assignments at arms length and officially "... disavowed by the Secretary" as the saying goes in Mission Impossible.

In past Administrations, the Director of Central Intelligence [and the earlier Directors of National Intelligence - before Clapper] were privy to the functions and missions of special operatives who provided intelligence support and assistance to foreign governments while our own government proclaimed either neutrality or hostility.  The value of such operations lay in the concept that in the process of "regime change", the USG would have linkage to the new rulers.

Chiang: Not adored by China
For example, in World War II, Operation Dixie Cup tasked two OSS officers to work closely with China's adversarial leaders -- Mao Tse Tung and Chiang Kai-Shek, presuming who ever won out, the US would have linkage.

That worked, sort-of, since we had excellent relations with Chiang, whom the common folk of China despised, and who ended up running Taiwan which manufactured IT components, and whose Kuomintang [KMT] managed the Golden Triangle in Southeast Asia shipping illicit drugs abroad to bolster Taiwan's economy.

Chairman Mao
On the other hand, the OSS officer who worked with Mao ended up targeted by the Democrat-dominated House Un-American Activities Committee [HUAC] as a "Commie", stripped of his Military benefits, and watched helplessly as his personal US assets were seized by Congressional dictate.  He subsequently moved and remained overseas for the remainder of his life - still a patriot working with Military Intelligence, but damning the CIA which had functioned as an extension of the HUAC to continue harassing him.

Since then, and perhaps because of that egregious episode, an arm of US Intelligence known as The Company [often mistaken as an alias for the CIA] operated as a non-official organization to provide support to US clandestine and covert operatives, and often performed these functions with their own personnel and funds -- generally without the knowledge of CIA Station Chiefs or US diplomatic personnel.

That process worked well and efficiently before our current Administration, since earlier, there was a built-in "black" mechanism to assist our "special" operatives whose covers demanded no linkage to the USG.

Under our current DNI, HUMINT has been trashed and all fail-safe measures deleted.

The "black" mechanism process was discarded in recent years as this Administration populated the actionable Intelligence Community with unskilled and inexperienced senior executives incapable of maintaining secrets, but who, instead, revealed Sources and Methods to the US and international Media; in the process, they Outed intelligence operatives and in several cases, cost these officers their lives.

Equally egregious, these bumbling incompetents or malicious bureaucrats abandoned operators who have been injured to such an extent they are no longer employable -- and worse, they need, but cannot obtain government assistance.

They are expected to fend for themselves -- with life-threatening injuries, maladies, and diseases; at best, some of these operatives have been provided some medical care at Military facilities, but their medical files are classified and not releasable to private sector -- and perhaps more-adept physicians capable of providing more effective and curative care.  Ultimately, such cases exclude any financial support, leaving these officers destitute and totally dependent on their families and friends -- who are barred from discussing these situations with anyone, on threat of National Security prosecution.

We think it's worthwhile chatting with our Representatives on the HPSCI [House Permanent Select Committee on Intelligence] and Senators on the SSCI [Senate Select Committee on Intelligence] and the Armed Services Committees to address this issue.

Our Solution:

Given the disturbing proclivity of this Administration to Out" our operatives who have quietly served their country -- and then abandoning them [and their families] with no support mechanism, we recommend such officers receive status as Military Veterans with cover documentation in the form of a special DD-214 so they can obtain medical treatment and VA benefits for training, housing, and schooling.

These officers have operated in covert or clandestine status, following the exclusionary dictum
"... the Secretary will disavow all knowledge....",
but they rightfully expect their government to "have their back".

If our government can provide support to deserters such as Bowe Berghahl, they can certainly support our true patriots.


Monday, October 20, 2014

NSA-Telecom Inc?


Click here for related story [Forbes]
[An update (21OCT2014) on this story follows the text of this post

Forbes reports a highly unusual transaction from one of our most revered Blue Chip companies -- none other than Big Blue!

Reportedly, IBM had "steep operating losses" and "... will PAY $1.5 BILLION to get rid of its [micro]chip division."
[For IBM, $1.5 Billion is slightly more than a "rounding error" - why get rid of a future profit center?]

Further, "... IBM has essentially agreed to GIVE its Microelectronics OEM semiconductor business and manufacturing operations to Globalfoundaries."

So, why would one of the largest companies in the world, with $100 Billion in operating revenue, not only GIVE away its microchip subsidiary -- a GROWTH industry, but PAY $1.5 BILLION to get rid of it!

What's the story behind the story!

Let's review the unusual factors in this transaction.

1) "IBM has agreed to essentially give its Microelectronics OEM semiconductor business 
     and manufacturing operations to GlobalFoundries."

2)  The Emirate of Abu Dhabi is the owner of GlobalFoundaries
      through its subsidiary Advanced Technology Investment Company (ATIC).

      a) Abu Dhabi has become a prime Middle East ally of US Intelligence, as well as a key
          money-laundering conduit for NSA and CIA [and drug cartels] for a covert
          corporate acquisitions process.
          [Think of a sophisticated, high-tech Iran-Contra operation; Janet Reno, Clinton's 
           Attorney General, shut down investigations of BCCI and its control of US banks]

      b) This acquisition will make Abu Dhabi the controlling entity in supplying integrated circuits
          for telecom companies AMD, Broadcom, Qualcomm and STMicroelectronics.
          [Will NSA add in firmware to these chips to track and reroute data to NSA servers?]

3)  ATIC acquired AMD [Advanced Micro Devices] in 2009 and Chartered Semiconductor in 2010

     a)  AMD is the second largest [Intel is first] global supplier of microprocessors and dominant as
          a major global supplier of graphics processing units [e.g., your cell phone screen imagery].
          [If you have a PC, it likely has either an AMD or an Intel processor in it.]

     b)  AMD acquired the low-power micro-server manufacturer SeaMicro
           (1) Collaborated with Verizon to power cloud services - and cell phone transmissions.
           (2) Signal processing bandwidth at peak of 1.28 Tb/s [terabytes per second]
                 [that's per second; Comcast limits users to 500 GB per month!]
           (3) Cloud Computing capacity [supporting cell-phone data links] per server storage unit
                 is five (5) petabytes [or 5,000 terabytes, or 5 million GB].
                 [Size is important; up to 1,800 servers can fit in a single server rack - or 9 million TB!]

     c)  AMD is also a major global supplier of motherboard chipsets, embedded processors and
          graphics processors for servers, workstations, personal computers, and embedded systems
          applications -- supporting the telecommunications industry.
          [thus, the path for NSA to embed firmware on most computers and cell phones.

4)  This acquisition will make Abu Dhabi the controlling entity in supplying integrated circuits for telecom companies AMD, Broadcom, Qualcomm and STMicroelectronics.

5)  Sanjay Jha, CEO of GlobalFoundries, was the Chairman and CEO of Motorola Mobility [cell phones/technology currently being acquired by Lenovo of China].  Earlier, he was the CEO of Qualcomm.

His spin-offs, subsidiaries, and acquisitions include
      a) ON Semiconductor [integrated passive (monitoring) devices,
      b) Solomon Systech [image processing]
      c) Iridium [network of 66 communications satellites; principal
          client is DOD]
      d) subsidiary is Motorola Solutions [RFID (Radio Frequency
          Identification];
          identifies, tracks and exploits electronic cell phone tags containing stored data
      e) acquisition is Sendo [created Symbian, a closed-source mobile Operating System (OS);
          notable for its graphics user interface [GUI]  and multiple language capabilities.
       f) Freescale Semiconductor [digital signal processors/controllers], was purchased by the
          Blackstone Group [assets: $35 Billion; and the Carlyle Group [assets: $40 Billion].
          Reportedly engaged in an electronic "cloaking" process which would hide aircraft from
          ground radar; additionally, their R&D projects include radar interference and electronic
          countermeasures designed to disrupt electric grids, the Internet, the Cellular network, and
          emergency frequencies used by police and fire departments.

      - Freescale Semiconductor is particularly notable since 20 of its employees were on Malaysian Flight 370, which went missing.  Nine of those passengers were the owners of a patent which contributed to the "cloaking" process.  In addition, there were 20 US Special Operations passengers aboard - whom some believe carried out the hijacking, flying the plane to Diego Garcia and imprisoning the passengers.


Our conclusion?

We'll take a wild guess here and conclude that NSA has joined forces with private sector financiers and the Abu Dhabi leadership to gain control of a select group of companies which dominate the cellular communications industry, to include those involved in manufacture of the microprocessor components integral to computers, storage, and processing -- which are then integrated into computer systems and cellular devices.  With the corporate structure based in Abu Dhabi, there is no concern over running afoul of the US legal system.

Having control over the manufacture of all those components would allow for the insertion of dormant coding on the microprocessors which could be activated at some point in the future to allow a "back door" into computers, servers and cellular devices to either initiate a virus, or to transmit all signal data to a remote server -- defeating all installed anti-virus measures.

We've seen some of this activity in action, and have to presume that the rest is at least on the drawing board, waiting for the opportunity to seize control of your cell phone calls and texts, your laptop, and your company's servers.

---------
As a footnote, we'll add a new Congressional Inquiry to this account.
It seems that General Keith Alexander, former head of NSA, created a company called IronNet -- designed primarily to win NSA contracts and retain access to all of NSA's capabilities.

It seems that he's carried this to an extreme by bringing NSA's Chief Technical Officer [CTO], Patrick Dowd, over to his company 20 hours per week, which, of course, blatantly violates federal law and government regulations.  Alexander defended his actions by agreeing to pay Dowd for his time.

Rep Alan Grayson [D-FL] is investigating, and called this arrangement
"...an obvious violation of standards of ethical conduct for employees of the Executive Branch"

Those of us who served in the Military with Alexander are gratified that this obsequious twit is finally being revealed for the charlatan that he is.

Sunday, October 19, 2014

NSA Helps Cops Spy

[america.aljazeera.com]

Click here for related story [Bloomberg]

We've commented earlier about NSA sharing their high tech capabilities with local police agencies, which was the basis for much of Mr Snowden's leaks of NSA Top Secret briefing slides.

As you may recall, NSA's mission was to spy on foreign powers, both enemy and friendly, to assure US national security.  However, after 9/11 [well, in reality, long before], NSA began spying on US citizenry; they started with Congress and political candidates, and moved from there down to Joe the Plumber -- for no other reason than that they could.

NSA: Rogue Agency                                          [FARSNews]
Of late, the NSA is an agency without portfolio.

With all their whiz-bang hardware and software, they still can't break most encrypted communications since the protective technology is much stronger than NSA's hacking capabilities.

Think in terms of encryption between two communicators in which they call is transmitted over a broad bandwidth, changing frequencies hundreds of times a minute, with the encryption changing modes every few seconds.

It takes time to even locate a transmission, much less to lock on to it; and then there's the key word search -- but if it's encrypted, NSA won't hear it.

So, NSA focuses on clear, open text communications which they can gather in huge volume, store in massive vaults, and then sorted -- very efficiently by computers.  That helps analysts, but leaves the barrier of access to the really good intelligence.

So, NSA turns inward, to collect all the metadata on American citizens which DHS has now declared as "potential terrorists".  The definition of "terrorist" has now been adjusted to cover anyone who is critical of the government -- especially the President.

NSA, via DHS, has now assumed a training and support mission to local police forces monitor the local population; of late, DHS has "showered more than $35 Billion on states and localities for 'terrorism prevention'."

 In the story linked to this blog, we learn that police are now using NSA equipment at the local level to not only track citizen telecommunications, but to disrupt, reroute, and block telecommunications -- particularly cell phones.  Since targets are unaware they are being monitored, and the equipment is essentially unregistered and used by street level cops, there is no judicial link to such surveillance in which court orders are required.

Harris StingRay II
The Harris Corporation, a Defense contractor, is authorized by the Federal Communications Commission [FCC] to sell a mobile/cell phone tracking system the size of a suitcase called the StingRay - an IMSI-catcher [International Mobile Subscriber Identity].  The function of the StingRay is send signals which mimic cell towers, thereby accessing all the identifying data from cell phones up to a mile away.


Its capabilities include:
1) Extracting data from cellphone internal storage [e.g., all phone numbers, logs, voicemails, etc.]
2) Writing Metadata to internal storage [e.g., boosting power to extend the transmission range to assist monitoring of the call; making it easy to track.
3) Tracking and Locating the cell phone or compatible cellular device even when the device is turned off.
4)  Denial of Service, or blocking of all transmissions while the StingRay conducts its surveillance.
5)  Interception of Communications Content by simulating a cell site which forces a connection with the target device [cell phone] to
     a) conduct "GSM Target Key Extraction"  to obtain the target device encryption key
     b) download the target device's IMSI and other identifying data;
     c) simulates the target device to connect to the legitimate service provider;
     d) forwards signals between the target device and the legitimate cell site -- while decrypting
         and recording the communications content

Police say they purchase these systems to "detect mobile phone detonated bombs like those used in Middle East IEDs".  In reality, the police use the StingRay to monitor and disrupt cell phones of private citizens -- and protestors at rallies.

Chicago spent $150,000 on StingRay equipment; Harris has also peddled its equipment to San Francisco, Takoma, and Miami, but they will not disclose the purpose for which their equipment is being used.

Local law enforcement and the federal government have blocked judicial enforcement simply refusing to turn over records demanded by the courts.  In one case, when the court demanded police documents, the US Marshalls Service seized the records to ensure the court could not access them.