Prospero Posted August 27, 2013 Posted August 27, 2013 « Moi, président de la Bolivie, séquestré en Europe » prevodEvo Morales, predsednik Bolivije, napisao je autorski tekst za ugledni svetski časopis Le Monde Diplomatique o prisilnom zadržavanju na bečkom aerodromu. Moralesov avion bio je zadržan zbog sumnje da se u njemu nalazi bivši saradnik NSA Edvard Snouden. 2. jula dogodio se jedan od najneobičnijih događaja u istoriji međunarodnog prava: najprije je predsedničkom avionu Višenacionalne Države Bolivije zabranjeno da nadleće teritorije Francuske, Španije, Italije i Portugala, a potom sam ja, predsednik Bolivije, zadržan na aerodromu u Beču (Austrija) čitavih 14 sati. Nekoliko nedelja kasnije, ovaj napad na članove jedne službene delegacije, koji su počinile zemlje s reputacijom demokratskih država koje poštuju zakone, nastavlja izazivati zgražavanje, a sve su češće i osude građana, društvenih organizacija, međunarodnih organa i vlada širom sveta.Šta se dogodilo? Bio sam u Moskvi i nekoliko trenutaka pre početka zvaničnog susreta sa predsednikom Vladimirom Putinom jedan asistent me je upozorio na tehničke poteškoće: nemoguće je vratiti se u Portugal kako je prvotno bilo predviđeno. Već po završetku razgovora s ruskim predsednikom postalo je jasno da problem nikako nije tehnički... Naš ministar spoljnih poslova David Čokeuanka uspeo je iz La Paza da organizuje zaustavljanje u Las Palmasu na španskom ostrvu Gran Kanaria i utvrdio novi plan leta. Činilo se da je sve u redu... Pa ipak, dok smo još bili u vazduhu, avijatički pukovnik Selijer Arispe, koji komanduje Predsedničkom vazdušnom flotom i koji je pilotirao avionom toga dana, došao je da me obavesti: "Pariz nam je uskratio dozvolu za preletanje! Ne smemo ući u francuski vazsušni prostor." Njegovo se iznenađenje moglo meriti samo s njegovom zabrinutošću: upravo smo trebali da uđemo u vazdušni prostor iznad Heksagona.Mogli smo, naravno, da pokušamo da se vratimo u Rusiju, ali postojala je opasnost da će nam nestatii kerozina. Pukovnik Arispe kontaktirao je kontrolni toranj bečkog aerodroma kako bi zatražio dozvolu za hitno sletanje. Ovim putem želim da se zahvalim austrijskim vlastima koje su nam dale zeleno svetlo. Smestili smo se u malu kancelariju bečkog aerodroma koji su nam stavili na raspolaganje. Bio sam usred razgovora sa svojim potpredsednikom Alvarom Garsíjom Linerom i ministrom Čokeunakom kako bismo pokušali da donesemo dobru odluku o daljnjim postupcima pa smo, pre svega, pokušavali da shvatiti razloge za odluku francuskih vlasti, kad nas je pilot informisao da nam je i Italija uskratila dozvolu za ulazak u njezin vazdušni prostor.U tom trenutku posetio me je amabasador Španije u Austriji Alberto Karnero. Obavestio me je da je odobren naš novi plan leta i da se možemo zaputiti ka Španiji. Jedino je potrebno, objasnio je, da se pre toga pretraži predsednički avion. To je naime uvslov sine qua non našeg sletanja u Las Palmasu na Gran Kanariju. Kad sam ga pitao o razlozima ovog zahteva, Karnero je spomenuo ime Edvarda Snoudena, radnika američke agencije koja za Vašington obavljala određene špijunske aktivnosti. Odgovorio sam mu da ga poznajem samo iz novina. Podsetio sam španskog diplomatu i na to da moja zemlja poštuje međunarodne konvencije: u svakom slučaju, nisam tražio da se bilo ko izruči u Boliviju. Karnero je za vreme naših razgovora bio u stalnom kontaktu s pomoćnim sekretarom za spoljne poslove Španije Rafaelom Mendivilom Peidrom koji je, po svemu sudeći, od njega tražio da insistira na zahtevu. "Nećete pretražiti ovaj avion", morao sam snažno naglasiti. "Ako ne verujete to što vam govorim, znači da predsednika suverene države Bolivije smatrate lažovom." Diplomata je izašao da primi dalja uputstva od svog nadređenog, pa se potom vratio. Tražio je da ga pozovem da "popije kafu" u avionu. "Ali vi mene smatrate delinkventom?" upitao sam ga. "Ako želite ući u taj avion, morat ćete to učiniti silom. Neću se opirati vojnoj ili policijskoj operaciji jer nemam nikakvih sredstava za to." Već vidno uplašen, amabasador je odbacio opciju ulaska silom, ali nije propustio da ukaže na to da on u takvim uslovima ne može odobriti naš plan leta. "U devet sati ujutro javićemo vam da li možete ili ne možete poći. Do tada to moramo raspraviti s našim prijateljima", objasnio je. Prijateljima? "Ali ko su ti prijatelji koje spominjete? Nema sumnje, govorite o Francuskoj i Italiji?" Odbio je da odgovori i povukao se... Iskoristio sam tu priliku da porazgovaram sa argentinskom predsednicom Kristinom Fernadez, izvrsnom advokaticom koja me uputila u pravna pitanja, kao i venecuelanskim i ekvatorskim predsednicima Nikolasom Madurom i Rafaelom Koreom, koji su bili zabrinuti zbog ove situacije. Predsednik Korea me je kasnije nazvao nekoliko puta tokom tog dana kako bi saznao novosti. Ova mi je solidarnost dala snagu. "Evo, oni nemaju nikakva prava da pretraže tvoj avion!" ponavljali su. Poznato mi je da predsednički avion ima isti pravni status kao ambasada. Ovi saveti, kao i dolazak ambasadora zemalja Bolivarskog saveza za narode naše Amerike (ALBA) udesetorostručili su moju odlučnost da ostanem čvrst. Ne, nećemo pružiti Španiji ni bilo kojoj drugoj zemlji – a Sjedinjenim Američkim Državama još manje nego ostalima – zadovoljstvo da pretražuju naš avion. Branimo svoj dignitet, suverenitet i čast naše zemlje, naše domovine. Nikad nećemo pristati na ovakvu ucenu. Ambasador Španije se ponovo pojavio. Odsutan duhom, zabrinut, nemiran i nervozan, naznačio je da smo konačno dobili sva odobrenja i da možemo poći. Konačno smo poleteli...Ova zabrana preletanja, koju su simultano i koordinirano izdale četiri zemlje pod jedinstvenom komandom Central Intelligence Agency (CIA), usmerena protiv jedne suverene zemlje, a za koju je jedini izgovor bila sumnja da možda prevozimo Snoudena, jasno ukazuje na političku težinu najveće imperijalne sile: Sjedinjenih Američkih Država. Sve do 2. jula (datuma kad su me zadržali na aerodromu) svako je shvatao da SAD poseduje sigurnosne agencije kako bi zaštitila svoju teritoriju i svoje stanovništvo. Ali ovo što Vashington sada čini je nepojmljivo. Kršeći sva načela dobrih običaja i međunarodnih konvencija, pretvorio je deo evropskog kontinenta u kolonizovanu teritoriju. To je i povreda ljudskih prava, koja su jedna od tekovina Francuske revolucije. Kolonijalni duh koji omogućava da se na taj način podčine različite zemlje pokazuje još jednom da za imperiju koji želi da nametne svoje namere ne postoje granice, legalne ni moralne, kao ni teritorijalne. A sada je jasno celom svetu da takva jedna sila može prekršiti svaki zakon, narušiti svaki suverenitet, zanemariti svako ljudsko pravo.Moć SAD-a svakako počiva na njegovoj oružanoj sili, koja je uključena u razne osvajačke ratove i koju podržava izvanredan vojno-industrijski kompleks. Etape njihovih intervencija dobro su poznate svima: nakon vojnog osvajanja sledi nametanje slobodnog tržišta, pa jednog zaista jedinstvenog koncepta demokratije i, konačno, podvrgavanje stanovništva pohlepi multinacionalnih kompanija. Neizbrisivi trag imperijalizma, bio on vojni ili ekonomski, razara Irak, Avganistan, Libiju, Siriju. Neke od tih zemalja bile su napadnute samo zato što su bile pod sumnjom da kriju oružje za masovno uništenje ili da pružaju utočište terorističkim organizacijama. To su zemlje u kojima je na hiljade ljudi ubijeno, a Međunarodni krivični sud nije pokrenuo niti jedan jedini proces.Ali američka moć proizlazi i iz podzemnih, manje vidljivih instrumenata kojima je namena da šire strah, ucene, zastrašivanje. Jedan od recepata koje Vašington rado koristi kako bi održao svoj status je "kazna za primer drugima", u najčistijem kolonijalnom stilu, koji je primenjivan u represiji Indijanaca Abija Ajale. Sada se obrušio na narode koji su se odlučili da se oslobode i na političke vođe koji su odlučili da vladaju u ime najpotlačenijih. Sećanje na ove politike kažnjavanja za primer drugima još je uvek živo u Latinskoj Americi: setite se samo državnih udara protiv Uga Čaveza u Venezueli 2002. godine, protiv predsednika Hodnurasa Manuela Zelaje 2009. godine, pa protiv Korie 2010., protiv paragvajskog predsednika Fernanda Luga 2012. i naravno protiv naše vlade 2008, pod vođstvom američkog ambasadora u Boliviji Filipa Goldberga. Bio je to "primer" za domoroce, radnike, seljake i socijalne pokrete, kako se ne bi usudili da podignu glavu i suprotstave se vladajućim klasama. "Primer" kako bi se pokorili oni koji se odupiru, a ostali zastrašili. Ali i "primer" koji sada navodi siromašne na celom našem kontinentu i na celom svetu da udvostruče svoje napore i da se ujedine, kako bi osnažili svoje borbe.Napad čije smo bili žrtve otkriva dva lica jedne te iste represije, protiv koje su se narodi odlučili pobuniti: imperijalizma i njegova političkog i ideološkog blizanca, kolonijalizma. Zadržavanje predsedničkog aviona i njegovog osoblja – nešto što smo imali pravo smatrati nezamislivim na početku XXI veka – ilustruje preživljavanje jednog oblika rasizma unutar određenih evropskih vlada. Za njih Indijanci, kao i demokratski ili revolucionarni procesi u koje su uključeni, predstavljaju prepreke na putu civilizacije. Taj rasizam danas se skriva u aroganciji i najbudalastijim "tehničkim" objašnjenjima koja imaju za svrhu da zamaskiraju političku odluku donetu u nekom vašingtonskoj kancelariji. Tu su i vlade koje su izgubile čak i sposobnost da se prepoznaju kao kolonizirane i koje nastoje da zaštite reputaciju svog gospodara...Ko govori o imperiju, govori i o kolonijama. Zalaganjem za pokoravanje naredbama imperija neke su evropske zemlje potvrdile status potčinjenih zemalja. Kolonijalna narav odnosa između SAD i Evrope pojačala se nakon napada od 11. septembra što je svima postalo jasno 2004. godine, kad smo saznali za nedopuštene letove američkih vojnih aviona koji su prevozili navodne ratne zarobljenike u Gvanatanamu ili u evropske zatvore. Danas znamo da su ti pretpostavljeni "teroristi" bili podvrgnuti mučenju; to su činjenice o kojima čak i organizacije za zaštitu ljudskih prava vrlo često ćute. Po svemu sudeći, rat protiv terorizma sveo je staru Evropu na ravan kolonije; radi se o neprimerenom činu, čak neprijateljskom, koji možemo analizirati kao oblik državnog terorizma po tome što izručuje privatni život miliona građana na milost hirova imperija. Ali uvreda međunarodnom pravu koju predstavlja naše zadržavanje mogla bi značiti prelomnu tačku. Evopa je kolevka najplemenitijih ideja: slobode, jednakosti, bratstva. Uveliko je doprinela naučnom progresu, kao i rađanju demokratije. Ali ona je sada tek bleda senka same sebe: neo-opskurantizam preti narodima ovog kontinenta, kontinenta koji je pre nekoliko vekova prosvetio celi svet revolucionarnim idejama koje su budile nadu.Naše zadržavanje moglo bi da pruži svim narodima i vladama Latinske Amerike, Kariba, Evrope, Azije, Afrike i Severne Amerike jedinstvenu priliku da naprave solidaran blok koji bi osudio nedostojno ponašanje država uključenih u ovo kršenje međunarodnog prava. Isto tako, ovo je idealna prilika da se ojačaju mobilizacije socijalnih pokreta koji žele izgraditi jedan drugačiji svet, svet bratstva i komplementarnosti, kakav upravo narodi sveta trebaju da izgrade. Sigurni smo da narodi sveta, a naročito narodi Evrope, osećaju da agresija koje smo bili žrtva pogađa jednako tako i njih i njihove. Protumačićemo njihovo zgražavanje kao indirektan način da nam ponude izvinjenje, koju nam i dalje duguju neke od odgovornih vlada.
DarkAttraktor Posted August 27, 2013 Author Posted August 27, 2013 Evo objasnio. imo, odlican piece. hits all the right spots.a sad jos malo o NSA poslasticama. Cenk cenking™ it:http://www.youtube.com/watch?v=S6zvaH_dvvY
Indy Posted August 27, 2013 Posted August 27, 2013 (edited) Po zaustavljanju Moralesovog aviona, kao i zadržavanju Greenwaldovog dečka u prolazu kroz London (u oba slučaja radikalni koraci koji izrazito ne doprinose pozitivnom globalnom imidžu USA), mogu samo da zaključim da E. Snowden ima u posedu nešto masivno neprijatno za USA administraciju. Za red veličina više od ovog što je dosad iscurelo. Edited August 27, 2013 by Indy
braca Posted August 27, 2013 Posted August 27, 2013 Konspirolozi su mu ga dali po mašti, ima svega, neki tipuju na UFO/vanzemaljce ;)
DarkAttraktor Posted August 28, 2013 Author Posted August 28, 2013 Rap News pomaze kandidaturu Assangea sa election videom kakav novac ne moze kupiti. Assange segment pocinje na circa 3:30 koga mrzi da gleda celo:http://www.youtube.com/watch?v=QWU6tVxzO1I
bigvlada Posted August 28, 2013 Posted August 28, 2013 Konspirolozi su mu ga dali po mašti, ima svega, neki tipuju na UFO/vanzemaljce ;)Vidim da ih bedak što su u Area 51 testirali samo avione nije dugo držao. ^_^
noskich Posted August 29, 2013 Posted August 29, 2013 Neofasizam: http://www.policestateusa.com/2013/fbi-interrogated-man-after-comment-about-american-police-state-on-facebook/Nakon nekoliko sati nakon posta na Facebooku FBI zove na razgovor.
Indy Posted August 30, 2013 Posted August 30, 2013 BS from the UKDocuments seized from the partner of Guardian journalist Glenn Greenwald might threaten U.K. national security, damage the economy and lead to “widespread loss of life,” a government adviser said.
Prospero Posted August 31, 2013 Posted August 31, 2013 52,6 milijardi dolara za National Intelligence Program: U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary By Barton Gellman and Greg Miller, Published: August 29 U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget. The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress. The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees. The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online. “The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring, the proliferation of weapons of mass destruction technology, and asymmetric threats in such areas as cyber-warfare,” Director of National Intelligence James R. Clapper Jr. wrote in response to inquiries from The Post. “Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats,” he said. Among the notable revelations in the budget summary: ●Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community. ●The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.” ●Long before Snowden’s leaks, the U.S. intelligence community worried about “anomalous behavior” by employees and contractors with access to classified material. The NSA planned to ward off a “potential insider compromise of sensitive information” by re-investigating at least 4,000 people this year who hold high-level security clearances. ●U.S. intelligence officials take an active interest in friends as well as foes. Pakistan is described in detail as an “intractable target,” and counterintelligence operations “are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel.” The latter is a U.S. ally but has a history of espionage attempts against the United States. ●In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five “mission objectives.” Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of the intelligence program’s spending. ●The governments of Iran, China and Russia are difficult to penetrate, but North Korea’s may be the most opaque. There are five “critical” gaps in U.S. intelligence about Pyongyang’s nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un. ... Formally known as the Congressional Budget Justification for the National Intelligence Program, the “top-secret” blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30. The document describes a constellation of spy agencies that track millions of surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage, and conducting cyber-operations. In an introduction, Clapper said the threats facing the United States “virtually defy rank-ordering.” He warned of “hard choices” as the intelligence community — sometimes referred to as the “IC” — seeks to rein in spending after a decade of often double-digit budget increases. The current budget proposal envisions that spending will remain roughly level through 2017 and amounts to a case against substantial cuts. “Never before has the IC been called upon to master such complexity and so many issues in such a resource-constrained environment,” Clapper wrote. An espionage empire The summary provides a detailed look at how the U.S. intelligence community has been reconfigured by the massive infusion of resources that followed the 2001 attacks. The United States has spent more than $500 billion on intelligence during that period, an outlay that U.S. officials say has succeeded in its main objective: preventing another catastrophic terrorist attack in the United States. The result is an espionage empire with resources and a reach beyond those of any adversary, sustained even now by spending that rivals or exceeds the levels at the height of the Cold War. The current total budget request was 2.4 percent below that of fiscal 2012. In constant dollars, it was about twice the estimated size of the 2001 budget and 25 percent above that of 2006, five years into what was then known as the “global war on terror.” Historical data on U.S. intelligence spending is largely nonexistent. Through extrapolation, experts have estimated that Cold War spending probably peaked in the late 1980s at an amount that would be the equivalent of $71 billion today. Spending in the most recent cycle surpassed that amount, based on the $52.6 billion detailed in documents obtained by The Post plus a separate $23 billion devoted to intelligence programs that more directly support the U.S. military. Lee H. Hamilton, an Indiana Democrat who chaired the House Intelligence Committee and co-chaired the commission that investigated the Sept. 11 attacks, said that access to budget details will enable an informed public debate on intelligence spending for the first time, much as Snowden’s disclosures of NSA surveillance programs brought attention to operations that had assembled data on nearly every U.S. citizen. “Much of the work that the intelligence community does has a profound impact on the life of ordinary Americans, and they ought not to be excluded from the process,” Hamilton said. “Nobody is arguing that we should be so transparent as to create dangers for the country,” he said. But, he added, “there is a mind-set in the national security community: ‘Leave it to us, we can handle it, the American people have to trust us.’ They carry it to quite an extraordinary length so that they have resisted over a period of decades transparency. . . . The burden of persuasion as to keeping something secret should be on the intelligence community, the burden should not be on the American public.” Experts said that access to such details about U.S. spy programs is without precedent. “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007,” said Steven Aftergood, an expert at the Federation of American Scientists, a Washington-based organization that provides analyses of national security issues. “But a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.” The only meaningful frame of reference came in 1994, when a congressional subcommittee inadvertently published a partial breakdown of the National Intelligence Program. At the time, the CIA accounted for just $4.8 billion of a budget that totaled $43.4 billion in 2012 dollars. The NSA and the National Reconnaissance Office, which operates satellites and other sensors, commanded far larger shares of U.S. intelligence budgets until years after the Cold War ended. During the past decade, they have taken a back seat to the CIA. The NSA was in line to receive $10.5 billion in 2013, and the NRO was to get $10.3 billion — both far below the CIA, whose share had surged to 28 percent of the total budget. Overall, the U.S. government spends 10 times as much on the Defense Department as it does on spy agencies. “Today’s world is as fluid and unstable as it has been in the past half century,” Clapper said in his statement to The Post. “Even with stepped up spending on the IC over the past decade, the United States currently spends less than one percent of GDP on the Intelligence Community.” Dominant position The CIA’s dominant position is likely to stun outside experts. It represents a remarkable recovery for an agency that seemed poised to lose power and prestige after acknowledging intelligence failures leading up to the 2001 attacks and the 2003 U.S.-led invasion of Iraq. The surge in resources for the agency funded secret prisons, a controversial interrogation program, the deployment of lethal drones and a huge expansion of its counterterrorism center. The agency was transformed from a spy service struggling to emerge from the Cold War into a paramilitary force. The CIA has devoted billions of dollars to recruiting and training a new generation of case officers, with the workforce growing from about 17,000 a decade ago to 21,575 this year. The agency’s budget allocates $2.3 billion for human intelligence operations and $2.5 billion to cover the cost of supporting the security, logistics and other needs of those missions around the world. A relatively small amount of that total, $68.6 million, was earmarked for creating and maintaining “cover,” the false identities employed by operatives overseas. There is no specific entry for the CIA’s fleet of armed drones in the budget summary, but a broad line item hints at the dimensions of the agency’s expanded paramilitary role, providing more than $2.6 billion for “covert action programs” that would include drone operations in Pakistan and Yemen, payments to militias in Afghanistan and Africa, and attempts to sabotage Iran’s nuclear program. The black budget illuminates for the first time the intelligence burden of the wars in Afghanistan and Iraq. For 2013, U.S. spy agencies were projected to spend $4.9 billion on “overseas contingency operations.” The CIA accounted for about half of that figure, a sum factored into its overall $14.7 billion budget. Those war expenditures are projected to shrink as the United States withdraws forces from Afghanistan. The budget also indicates that the intelligence community has cut the number of contractors it hires over the past five years by about 30 percent. Critical gaps Despite the vast outlays, the budget blueprint catalogues persistent and in some cases critical blind spots. Throughout the document, U.S. spy agencies attempt to rate their efforts in tables akin to report cards, generally citing progress but often acknowledging that only a fraction of their questions could be answered — even on the community’s foremost priority, counterterrorism. In 2011, the budget assessment says intelligence agencies made at least “moderate progress” on 38 of their 50 top counterterrorism gaps, the term used to describe blind spots. Several concern Lebanon’s Hezbollah movement, an enemy of Israel that has not attacked U.S. interests directly since the 1990s. Other blank spots include questions about the security of Pakistan’s nuclear components when they are being transported, the capabilities of China’s next-generation fighter aircraft, and how Russia’s government leaders are likely to respond to “potentially destabilizing events in Moscow, such as large protests and terrorist attacks.” A chart outlining efforts to address key questions on biological and chemical weapons is particularly bleak. U.S. agencies set annual goals for at least five categories of intelligence collection related to these weapons. In 2011, the agencies made headway on just two gaps; a year earlier, the mark was zero. The documents describe expanded efforts to “collect on Russian chemical warfare countermeasures” and assess the security of biological and chemical laboratories in Pakistan. A table of “critical” gaps listed five for North Korea, more than for any other country that has pursued or is pursuing a nuclear bomb. The intelligence community seems particularly daunted by the emergence of “homegrown” terrorists who plan attacks in the United States without direct support or instruction from abroad, a threat realized this year, after the budget was submitted, in twin bombings at the Boston Marathon. The National Counterterrorism Center has convened dozens of analysts from other agencies in attempts to identify “indicators” that could help law enforcement officials understand the path from religious extremism to violence. The FBI was in line for funding to increase the number of agents who surreptitiously track activity on jihadist Web sites. But a year before the bombings in Boston, the search for meaningful insight into the stages of radicalization was described as one of the “more challenging intelligence gaps.” High-tech surveillance The documents make clear that U.S. spy agencies’ long-standing reliance on technology remains intact. If anything, their dependence on high-tech surveillance systems to fill gaps in human intelligence has intensified. A section on North Korea indicates that the United States has all but surrounded the nuclear-armed country with surveillance platforms. Distant ground sensors monitor seismic activity and scan the country for signs that might point to construction of new nuclear sites. U.S. agencies seek to capture photos, air samples and infrared imagery “around the clock.” In Iran, new surveillance techniques and technologies have enabled analysts to identify suspected nuclear sites that had not been detected in satellite images, according to the document. In Syria, NSA listening posts were able to monitor unencrypted communications among senior military officials at the outset of the civil war there, a vulnerability that President Bashar al-Assad’s forces apparently later recognized. One of the NRO’s functions is to extract data from sensors placed on the ground near suspected illicit weapons sites in Syria and other countries. Across this catalogue of technical prowess, one category is depicted as particularly indispensable: signals intelligence, or SIGINT. The NSA’s ability to monitor e-mails, phone calls and Internet traffic has come under new scrutiny in recent months as a result of disclosures by Snowden, who worked as a contract computer specialist for the agency before stockpiling secret documents and then fleeing, first to Hong Kong and then Moscow. The NSA was projected to spend $48.6 million on research projects to assist in “coping with information overload,” an occupational hazard as the volumes of intake have increased sharply from fiber-optic cables and Silicon Valley Internet providers. The agency’s ability to monitor the communications of al-Qaeda operatives is described in the documents as “often the best and only means to compromise seemingly intractable targets.” Signals intercepts also have been used to direct the flight paths of drones, gather clues to the composition of North Korea’s leadership and evaluate the response plans of Russia’s government in the event of a terrorist attack in Moscow. The resources devoted to signals intercepts are extraordinary. Nearly 35,000 employees are listed under a category called the Consolidated Cryptologic Program, which includes the NSA as well as the surveillance and code-breaking components of the Air Force, Army, Navy and Marines. The NSA is planning high-risk covert missions, a lesser-known part of its work, to plant what it calls “tailored radio frequency solutions” — close-in sensors to intercept communications that do not pass through global networks. Even the CIA devotes $1.7 billion, or nearly 12 percent of its budget, to technical collection efforts, including a joint program with the NSA called “CLANSIG,” a covert program to intercept radio and telephone communications from hostile territory. The agency also is pursuing tracking systems “that minimize or eliminate the need for physical access and enable deep concealment operations against hard targets.” The CIA has deployed new biometric sensors to confirm the identities and locations of al-Qaeda operatives. The system has been used in the CIA’s drone campaign. Spending on satellite systems and almost every other category of collection is projected to shrink or remain stagnant in coming years, as Washington grapples with budget cuts across the government. But the 2013 intelligence budget called for increased investment in SIGINT. Counterintelligence The budget includes a lengthy section on funding for counterintelligence programs designed to protect against the danger posed by foreign intelligence services as well as betrayals from within the U.S. spy ranks. The document describes programs to “mitigate insider threats by trusted insiders who seek to exploit their authorized access to sensitive information to harm U.S. interests.” The agencies had budgeted for a major counterintelligence initiative in fiscal 2012, but most of those resources were diverted to an all-hands emergency response to successive floods of classified data released by the anti-secrecy group WikiLeaks. For this year, the budget promised a renewed “focus . . . on safeguarding classified networks” and a strict “review of high-risk, high-gain applicants and contractors” — the young, nontraditional computer coders with the skills the NSA needed. Among them was Snowden, then a 29-year-old contract computer specialist whom the NSA trained to circumvent computer network security. He was copying thousands of highly classified documents at an NSA facility in Hawaii, and preparing to leak them, as the agency embarked on the new security sweep. “NSA will initiate a minimum of 4,000 periodic reinvestigations of potential insider compromise of sensitive information,” according to the budget, scanning its systems for “anomalies and alerts.” Julie Tate contributed to this report. i interaktivni prikaz
Dark Wader Posted September 5, 2013 Posted September 5, 2013 Hopa cupa http://www.theguardi...-codes-security US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.
Indy Posted September 7, 2013 Posted September 7, 2013 N.S.A. Able to Foil Basic Safeguards of Privacy on WebThe National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.Enlarge This ImageThe agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
Indy Posted September 7, 2013 Posted September 7, 2013 (edited) ^Inspirisan ovim gore, poceh da citam Digital Fortress Dan Brown-a. Koliko god je on (recimo) trash pisac, zanimljivo koliko je taj roman ispao dokumentarni.----A u vezi s ovim iznad, zanimljive vesti u vezi kompjutera iz kompanije Lenovo. Izgleda da otkad je IBM kupljen od strane Kineza (i preimenovan u Lenovo) "pet ociju" (Five Eyes: US, UK, AUS, NZ, CAN) su izbacili Lenovo kompjutere iz upotrebe u okviru svojih medjupovezanih obavestajnih mreza. Prica se da je to zbog toga sto su u chipove u Lenovo kompjterima ugradjena "back doors" za hackovanje ovih sistema od strane kineskih vlasti. Navodno. Lenovo porice (neoficijelno).Sto me navodi da se zapitam, a ko proizvodi chipove koje koriste kompjuteri u mrezama "Pet ociju"? Koliko mi je poznato*, od elektronike, skoro se sve danas pravi u Kini (ili okolnim zemljama).(*Nisam uspeo da pronadjem precizne podatke o tome, barem ne na brzinu). Edited September 7, 2013 by Indy
Dark Wader Posted September 7, 2013 Posted September 7, 2013 Slična priča kao sa Lenovom je bila i za Huawei i njihovu opremu. E sad, da li su ih izbacili zbog što Kinezi imaju svoj backdoor ili pak nisu njima ostavili ni jedan drugi...
Recommended Posts