Surveillance

  • Israeli drone strike, in coordination with Egypt, destroys militants’ rockets deployed on Egyptian territory

    The growing intelligence cooperation between Egypt and Israel was in evidence earlier today (Friday) when the Israel Air Force (IAF), in coordination with the Egyptian military, used drone strikes to destroy ready-to-launch rockets and rocket launchers on Egyptian territory, killing five Egyptian militants in the process. The rockets were deployed on Thursday in a desert area near the town  of Rafah, and were discovered by an Egyptian surveillance fly-over.

  • Navy uses drones for help with radar, communications

    Scientists recently launched unmanned aerial vehicles (UAVs) from a research vessel in a significant experiment that could help boost the U.S. Navy’s radar and communications performance at sea.

    Sailing off Virginia Beach, Virginia, from 13 to 18 July, the Office of Naval Research’s (ONR) Research Vessel (R/V) Knorr explored ocean and atmospheric weather variations that can change the angle that radar and radio waves bend, making it more difficult for ships to remain undetected and hindering their ability to communicate or locate adversaries.

  • view counter
  • DEA uses NSA surveillance information to make arrests

    The Drug Enforcement Administration (DEA) has benefitted from multiple tips from the National Security Administration’s (NSA) surveillance programs – although not necessarily the programs revealed by Edward Snowden. DEA officials in a secret office known as the Special Operations Division (SOD) are assigned to handle incoming tips from the NSA. The information exchanged between the two agencies includes intelligence intercepts, wiretaps, informants, and a massive database of telephone records.

  • The FBI uses hackers’ methods in its surveillance programs

    The U.S. government is planning to expand its suspect surveillance programs to include tactics which are commonly used by computer hackers.The FBI typically uses hacking in cases involving organized crime, child pornography, or counterterrorism, a former U.S. official said. The agency is less inclined to use these tools when investigating hackers, out of fear the suspect will discover and publicize the technique.

  • view counter
  • Locating criminals by tracking their cell phones’ digital fingerprints

    To keep from being tracked and getting caught, criminals use evasion tactics such as modifying the built-in ID code in their cell phone or swapping out SIM cards, making it impossible for law enforcement to track the criminals down by relying solely on cell phone signals. German engineers found, however, that the radio hardware in a cellphone — a collection of components like power amplifiers, oscillators, and signal mixers — all introduce radio signal inaccuracies. When these inaccuracies, or errors, are taken together, as seen in the digital signal sent to a cell tower, the result can be read as a unique digital signal –a digital fingerprint. These digital fingerprints do not change even if the built-in ID code has been modified, or the SIM card has been swapped out.

  • Russia grants Snowden a 1-year temporary refugee status (updated)

    Edward Snowden has left Moscow’s Sheremetyevo airport and has entered Russia after he had been granted temporary asylum – the official language: a temporary refugee status — for one year. U.S. lawmakers said Russia’s decision had damaged U.S.-Russian relations. “Russia has stabbed us in the back,” said Senator Charles Schumer (D-New York). “Each day that Mr. Snowden is allowed to roam free is another twist of the knife.” The White House said the United States was “extremely disappointed that the Russian government would take this step,” a step which “undermines a long-standing record of law enforcement cooperation.

  • view counter
  • NSA director faces tough crowd at Black Hat conference

    The National Security Agency (NSA) director General Keith Alexander was met with some applause but mostly skepticism – and even boos — when he spoke during a Black Hat conference in Las Vegas earlier this week. Alexander said that there are only twenty-two people who work at the NSA who can approve the surveillance of a specific phone number, and thirty-five analysts who can review the inquiries.

  • Russia grants Snowden a 1-year temporary refugee status

    Edward Snowden has left Moscow’s Sheremetyevo airport and has entered Russia after he had been granted temporary asylum – the official language: a temporary refugee status — for one year. It is not yet known whether Snowden’s plan is to stay in Russia permanently, or whether he will try to move on to one of the four Latin American countries — Venezuela, Bolivia, Nicaragua, and Ecuador – which last month had offered him asylum. U.S. lawmakers said Russia’s decision had damaged U.S.-Russian relations, and the White House hinted that President Obama may cancel a planned summit meeting with Putin in Moscow in September.

  • U.S. Appeals Court: govt. does not need search warrant to track cellphones

    Law enforcement agencies have won a victory Tuesday when a federal appeals court ruled that government authorities could extract historical location data directly from telecommunications carriers without a search warrant. The ruling by the U.S. Court of Appeals for the Fifth Circuit is the first ruling directly to address the constitutionality of warrantless searches of historical location data stored by cellphone service providers. He appeals court said that historical location data is a business record which is the property of the cellphone provider. The appeals court also said that the collection of such data by authorities does not have to meet a probable cause standard as outlined under the Fourth Amendment, which protects against unlawful search and seizure and requires a search warrant.

  • Two Chicago terrorism cases bring the issue of expanded surveillance to the fore

    A Chicago attorney representing a teenager facing terrorism charges raised concerns during a pre-trial hearing about whether expanded surveillance methods were used in her client’s case. This is the second time in less than a month that the issue of expanded surveillance methods was brought up in a Chicago terrorism case.

  • Manning found guilty of violating the Espionage Act, acquitted of aiding the enemy (updated)

    A military judge earlier this afternoon (Tuesday) found Private Manning Pfc. Bradley Manning guilty of more than twenty counts of violating the Espionage Act. The judge, Army Col. Denise Lind, found Manning not guilty of aiding the enemy. Manning admitted to being to source of the massive leaks of U.S. government documents and videos, leaks which came to be called WikiLeaks. In all, Manning has leaked more than 700,000 documents. The sentencing phase will begin Wednesday. The conviction for violating several aspects of the Espionage Act, and for stealing government property, could lead to punishment of up to 136 years in prison.

  • Manning found guilty of violating the Espionage Act, acquitted of aiding the enemy

    A military judge earlier this afternoon (Tuesday) found Private Manning Pfc. Bradley Manning guilty of more than twenty counts of violating the Espionage Act. The judge, Army Col. Denise Lind, found Manning not guilty of aiding the enemy. Manning admitted to being to source of the massive leaks of U.S. government documents and videos, leaks which came to be called WikiLeaks. In all, Manning has leaked more than 700,000 documents. The sentencing phase will begin Wednesday. Violating several aspects of the Espionage Act could lead to punishment of up to 100 years in prison.

  • Deeply divided House rejects effort to curb NSA data collection program

    In an exceedingly close vote — 205-to-217 — a bitterly divided House of Representative on Wednesday rejected legislation proposed to block the National Security Agency (NSA) from continuing its metadata collection programs. The debate over the balance between security and privacy – and whether, indeed, the NSA surveillance programs threatened privacy — saw the formation of an unusual coalition of liberal Democrats and libertarian and tea party Republicans calling for curbing the NSA surveillance power.

  • Details of al Qaeda’s “next generation” bomb, aborted effort to take out its designer, emerge

    Al Qaeda engineers have been working on designing a sophisticated bomb powerful enough to bring down passenger planes but which is designed to avoid detection by explosives detection machines or trained dogs at airports. “All of our explosive detection equipment wasn’t calibrated to detect [this type of bomb]” TSA director John Pistole said. “And all of our 800 bomb-sniffing dogs had not been trained for that specific type.” A CIA informant inside a Yemeni cell of al Qaeda volunteered to place the bomb on a U.S.-bound plane, but instead delivered it to his CIA handlers in Saudi Arabia. A CIA effort to learn more about the bomb maker, Ibrahim Hassan Asiri, and take him out was aborted when someone leaked the story to AP. The news service refused pleas by the administration to postpone publication of the story until the end of the operation. The AP did agree to delay publication by a week to ten days to allow the CIA to extricate the agent and his family from Saudi Arabia to safety before publication. Asiri and his bomb-making assistants are still at large.

  • FAA warns Colorado town about drone hunting

    The town of Deer Trail, Colorado is considering the idea of allowing town residents to purchase hunting permits to shoot down drones operated by the government. The proposed permit would cost $25, and residents would be entitled to a $100 reward from the city for a successful attempt to shoot down a drone, if the drone’s “markings and configuration are consistent with those used on any similar craft known to be owned or operated by the United States federal government.”