U.S. Congress requests ban on Chinese Tech Companies

Despite the warning from Congress, the United States allows Chinese companies to manufacture military and computer technologies which are equipped with back doors for spying purposes.

By LUIS MIRANDA | THE REAL AGENDA | OCTOBER 8, 2012

Chinese telecom firms Huawei and ZTE are a threat to American security. That’s the conclusion of a report completed by the Intelligence Committee of the U.S. Congress after a year of research.

According to the commission, it is impossible to ensure that the two groups are independent of the Chinese government and therefore can be used to undermine U.S. security. “On the basis of classified and unclassified information, Huawei and ZTE can not guarantee their independence from the influence of a foreign state, so it poses a threat to U.S. security,” says the report.

The commission believes that the Chinese government could use these two groups for the rapid growth of economic and military espionage, or cyber attacks. Huawei has answered that 70% of its business is in China. The company works in 150 countries and in none of those it has had any problems. Of course, the United States is not any country and the behind the stage war between these two foes has not stopped.

According to U.S. research commission, the two groups did not provide satisfactory answers to parliamentary questions on their relations with the Chinese government. “China has the means, the opportunity and the motivation to use telecommunications companies for malicious purposes,” according to the report to be released Monday.

In conclusion, the commission said that the U.S. “should block acquisitions and mergers involving Huawei and ZTE because they would pose a threat to the national security interests of the United States. “U.S. government systems of communication,” the commission concludes , “especially in sensitive areas should not include equipment or components from Huawei and ZTE.”

But the Backdoor is left Open

Whether the commission’s concern is legitimate or not, the truth is that the report comes too late and too short about the way the Chinese have been able to infiltrate the U.S. Huawei and ZTE are not the only two companies manufacturing equipment for the U.S. government and its military. According to current and former intelligence sources in the United States, the Chinese have now have the capacity to access much of the equipment produced in China and that is being used on American territory.

The Chinese do so by utilizing previously installed components that allow them to remotely access the equipment from abroad. This revelation was first presented by Lignet, an intelligence company that detailed how communications equipment can potentially be disabled by the Chinese. The devices installed in the machines are popularly knows as backdoors because they provide hidden access to anyone who knows how to use them.

Mundane technologies fabricated in China and other Asian countries have already been demonstrated to have secret access points which can be used by technology companies, at the request of government agencies to spy on users. The same situation occurs with military grade equipment, for example, which is manufactured abroad for the United States government. Both hardware and software can be set up to enable outsiders to get into communication and weapons systems just as government agencies use the cameras built in computers and cellphones or GPS technology to monitor people’s every move.

Backdoors installed in communication devices for consumers or government use can be exploited for spying purposes to gain control of information, movement and habits, for example. Both Huawei and ZTE have been informally accused of installing microchips and stealth circuitry to enable remote control of devices manufactured in their factories. Huawei is a Chinese corporation that occupies its resources to offer networking and communication equipment and services. This company is only second to technology giant Ericsson as a provider of mobile telecommunications equipment and software.

But Huawei’s reach goes beyond American territory. It is a key provider of equipment and services that have to do with almost everything to other developed nations. It is similar to what USAID represents for the United States. The organization is an American funded front to infiltrate other countries under the auspices of humanitarian aid. Suspicion about USAID’s activities in several countries had gotten it kicked out of several countries. The most recent one is Russia.

Well known technology companies such as Symantec held partnerships with Huawei in the past, but the security software enterprise apparently ended that relationship due to the security concerns posed by the U.S. government. Another notable client of the Chinese company is the government of Iran, which has prompted some people to think that the Iranians themselves could use the backdoors to infiltrate American infrastructure. So far, however, it’s been the Americans and Israelis who have attacked Iran in several occasions with computer bugs known as Trapwire, Stuxnet and others.

Given this scenario, it sounds logical to hear the American government talking about strengthening internet security for the sake of protecting its infrastructure. The part that is not so logical is that the U.S. government allows the same technology companies to continue manufacturing sensible portions of that infrastructure, which is what opens the door to internet insecurity. Another issue is that the Americans also intend to clamp down on internet freedom by using cyber threats as a justification to ban certain portions of the world wide web.

The Real Agenda encourages the sharing of its original content ONLY through the use of the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web.

NSA Whistleblower: “We are headed towards a Police State”

By LUIS MIRANDA | THE REAL AGENDA | SEPTEMBER 24, 2012

According to former National Security Agency employee, Kirk Wiebe, the agency had the capability to grab everyone’s data even before 9/11. He said that the terrorist events of 2001 were a trigger for the NSA to act with complete disregard for the US Constitution and mainly the Forth Amendment.

Wiebe and his fellow whistleblower Thomas Drake, explain that the terrorist attacks gave the NSA and the US government an excuse to get military contractors involved in the creation of a broader surveillance state that provides no limits whatsoever to what government agencies such as the NSA can do with any piece of information from US citizens or even people who reside abroad.

As it stands today, the power of the NSA is simply unchecked. Drake says that inside the agency there is a widely held belief that it is necessary to trade anonymity for security, which is the opposite of what the United States founding fathers advised people to do. When asked about whether the United States could unwind the powers afforded to the NSA and other government agencies, he referred viewers to the secretive ways in which the NSA misbehaved in 1960s and 70s to conclude that it is not possible to simply trust the agency or anything it does today.

The questions back in the 60s and 70s was whether or not the availability of a technical capacity to spy on everyone, as it is done today, could be manageable to avoid abuse, or even further, if it could be rolled back. According to Drake, the question is why would people trust the NSA anymore than it did in the 60s and 70s, when it was well-known that the agency was operating above the law?

When questioned about whether the United States was moving towards becoming a tyrannical state, just as other nations like North Korea or China, Kirk Wiebe was clear and succinct: “In my estimation we are. We are headed towards a Police State.” Wiebe candidly recounted how the current intelligence operations led by the NSA look a lot like Gestapo or like Stasi in Germany. “We are moving in that direction. People are trashing the Constitution. They’ve lost their respect for it.

He also told viewers how he had written congressman Rosco Bartlet about his concerns and how the answer he got back from Mr. Bartlet was as astonishing as the concerns he posed on the letter regarding privacy and legislation. Congressman Bartlet responded that the thing that gave him confidence about the creation and approval of spectacular powers given to the NSA and other government agencies was that “everything was being done in good faith.”

 

The Real Agenda encourages the sharing of its original content ONLY through the use of the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web, unless you request and receive written permission to do so. If permission is granted, you must publish the article EXACTLY as it appears on The Real Agenda.

U.S. Drone Military Bases all over the World and Amerika

RT | JUNE 14, 2012

The US is planning to expand secret intelligence bases throughout Africa with a view to combating terrorism in the region, says a new report by the Washington Post. It is the latest in a US push to militarize its presence on the continent.

The plans include the deployment of spy planes equipped with high-tech surveillance technology.

The US is set to extend its influence, opening a number of intelligence air bases “from the fringes of the Sahara to jungle terrain along the equator,” said the Washington Post.

The initiative dates back to 2007 and is indicative of the rapid expansion of US Special Forces operations in the region as part of the decade-long war against Al-Qaeda.

The US will use the strategically-placed bases to launch spy planes disguised as private aircraft kitted-out with a range of sensors able to record video, track infrared heat trails and tap into radio and mobile phone signals.

The reasoning behind the ratcheting-up of surveillance on the African continent by the US is the increasing presence of terrorist cells that could potentially destabilize the region.

The Washington Post said that the US government currently has a number of intelligence facilities across Africa, including Uganda, Ethiopia, Kenya, the Seychelles, Burkina Faso and Mauritania.

The bases in Burkina Faso and Mauritania are used to spy on Al-Qaeda.

The US military has expressed concerns over the growing influence of the Nigerian terrorist sect Boko Haram, blamed for a wave of bombings in the country in December and Al-Qaeda affiliate Al-Shabab in Somalia.

In addition, 100 special troops are currently in action in Uganda to hunt for Joseph Kony, the leader of a brutal guerrilla group known as the Lord’s Resistance Army.

Some state department officials have questioned the necessity to step-up a US presence in Africa given that many of the terrorist groups active on the continent represent no direct threat to the US.

In spite of doubts the US continues to rack up its presence in Africa. Last month the Army Times confirmed US military plans to deploy over 3,000 troops across the continent as part of a “regionally aligned force concept.”

US to maintain ‘Light Footprint’ in Africa?

Officially the US is painting an altogether different picture of its operations in Africa. Army General Carter F. Ham top US Africa command officer said that the US is not seeking permanent military bases in the region.

“In Africa, I would say a light footprint is consistent with what we need and consistent with the defense guidance,”
said General Carter.

The general said he recognized that some African nations were concerned over increased US military presence across Africa, but stressed that this did not necessarily mean the US would be establishing more bases there.

However, in a testimony to US Congress in March he said that he wanted to increase US surveillance and reconnaissance in Africa.

“Without operating locations on the continent, ISR [intelligence, surveillance and reconnaissance] capabilities would be curtailed, potentially endangering US security,” he said.

From WIRED Magazine: 64 Drone Bases on American Soil

We like to think of the drone war as something far away, fought in the deserts of Yemen or the mountains of Afghanistan. But we now know it’s closer than we thought. There are 64 drone bases on American soil. That includes 12 locations housing Predator and Reaper unmanned aerial vehicles, which can be armed.

Public Intelligence, a non-profit that advocates for free access to information released a map of military UAV activities in the United States on Tuesday. Assembled from military sources — especially this little-known June 2011 Air Force presentation (.pdf)  – it is arguably the most comprehensive map so far of the spread of the Pentagon’s unmanned fleet.  What exact missions are performed at those locations, however, is not clear. Some bases might be used as remote cockpits to control the robotic aircraft overseas, some for drone pilot training. Others may also serve as imagery analysis depots.

The medium-size Shadow is used in 22 bases, the smaller Raven in 20 and the miniature Wasp in 11. California and Texas lead the pack, with 10 and six sites respectively and there are also 22 planned locations for future bases. ”It is very likely that there are more domestic drone activities not included in the map, but it is designed to provide an approximate overview of the widespread nature of Department of Defense activities throughout the U.S.,” Michael Haynes from Public Intelligence tells Danger Room.

The possibility of military drones (as well as those controlled by police departments and universities) flying over American skies have raised concerns among privacy activists. As the American Civil Liberties Union explained in its December 2011 report, the machines potentially could be used to spy on American citizens. The drones’ presence in our skies “threatens to eradicate existing practical limits on aerial monitoring and allow for pervasive surveillance, police fishing expeditions, and abusive use of these tools in a way that could eventually eliminate the privacy Americans have traditionally enjoyed in their movements and activities.”

As Danger Room reported last month, even military drones, which are prohibited from spying on Americans, may “accidentally” conduct such surveillance — and keep the data for months afterwards while they figure out what to do with it. The material they collect without a warrant, as scholar Steven Aftergood revealed, could then be used to open an investigation.

The Posse Comitatus Act prohibits the U.S. military from operating on American Soil, and there’s no evidence that drones have violated it so far.

This new map comes almost two months after the Electronic Frontier Foundation (EFF) revealed another one, this time of public agencies – including Police Departments and Universities – that have a permit issued by the Federal Aviation Agency to use UAVs in American airspace.

“It goes to show you how entrenched drones already are,” said Trevor Timm, an EFF activist, when asked about the new map. “It’s clear that the drone industry is expanding rapidly and this map is just another example of that. And if people are worried about military technology coming back and being sold in the U.S., this is just another example how drone technology is probably going to proliferate in the U.S. very soon.”

Domestic proliferation isn’t the same as domestic spying, however. Most — if not all — of these military bases would make poor surveillance centers. Many of the locations are isolated, far from civilian populations. Almost half of the bases on the map work only with the relatively-small Raven and Shadow drones; their limited range and endurance make them imperfect spying tools, at best. It’s safe to assume that most of the bases are just used for military training.

Privacy concerns aside, the biggest issue might be safety, as we’ve been reminded on Monday when a giant army drone crashed in Maryland.

The CIA to use Home Appliances as Spies

Agency director says it will ‘transform’ surveillance

By ROB WAUGH | MAIL ONLINE | MARCH 17, 2012

When people download a film from Netflix to a flat screen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are.

David Petraeus, Director of the CIA.

Spies will no longer have to plant bugs in your home – the rise of ‘connected’ gadgets controlled by apps will mean that people ‘bug’ their own homes, says CIA director David Petraeus.

The CIA claims it will be able to ‘read’ these devices via the internet – and perhaps even via radio waves from outside the home.

Everything from remote controls to clock radios can now be controlled via apps – and chip company ARM recently unveiled low-powered, cheaper chips which will be used in everything from fridges and ovens to doorbells.

The resultant chorus of ‘connected’ gadgets will be able to be read like a book – and even remote-controlled, according to CIA Director David Petraeus, according to a recent report by Wired’s ‘Danger Room’ blog.

Petraeus says that web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ said Petraeus.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -  all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously  ‘dumb’ home appliances such as fridges, ovens and lighting systems.

This week, one of the world’s biggest chip companies, ARM, has unveiled a new processor built to work inside ‘connected’ white goods.

The ARM chips are smaller, lower-powered and far cheaper than previous processors – and designed to add the internet to almost every kind of electrical appliance.

It’s a concept described as the ‘internet of things’.

Futurists think that one day ‘connected’ devices will tell the internet where they are and what they are doing at all times – and will be mapped by computers as precisely as Google Maps charts the physical landscape now.

Privacy groups such as the Electronic Frontier Foundation have warned of how information such as geolocation data can be misused – but as more and more devices connect, it’s clear that opportunities for surveillance will multiply.

US Military to be under DARPA Surveillance

If there was any doubt the powers that be do not trust the US military men a women, this spying program must clear all doubts.

RT
December 23, 2011

The Pentagon will soon be prying through the personal correspondence and computer files of US military personnel, thanks to a $9-million program that will put soldiers’ private emails under Uncle Sam’s microscope.

Defense Advanced Research Projects Agency, or DARPA, has awarded the grant to five institutions led by Georgia Tech to help develop a system of spying on solderis’ Internet and computer habits, a multi-million dollar investment that they say will serve as a preemptive measure to make sure “insider threats” can’t materialize in the military.

The Pentagon is calling the project “Proactive Discovery of Insider Threats Using Graph Analysis and Learning,” or “PRODIGAL,” and it will scour the e-mails, text messages and files transfers of solders’ “for unusual activity,” writes Georgia Tech, using “a suit of algorithms” that will be able to weed out any weirdness within the Department of Defense that could become a security threat.

A spokesman for DARPA deferred to answer to the Army Times how, exactly, they plan on conducting the surveillance over the correspondence. Wired.com’s Danger Room writes, however, that every keystroke, log-in and file upload initiated over DoD networks will be under strict scrutiny in hopes of breaking up any more Bradley Mannings from making their way into the military.

Rep. Peter King (Rep-NY) said at a hearing earlier this month that “The Fort Hood attack was not an anomaly.” According to the congressman, the shooting spree carried out by Nidal Hasan in 2009 “was part of al-Qaeda’s two-decade success at infiltrating the US military for terrorism, an effort that is increasing in scope and threat.”

Given the Senate and House’s recent go-ahead with the National Defense Authorization Act, a legislation that will allow for the government to indefinitely detain and torture American citizens over suspected terrorist ties, a little cyber-sleuthing of soldiers seems like nothing at all.

For the tens of thousands of defense workers separated from their loved ones by a multitude of miles and battle fields, however, the move comes as one big burden from Big Brother, and a smack in the face sent to the very men and women who are defending a supposed freedom for everyone else in America. Operation Homefront, a program that offers aid to military familes during times of deployment, offer campaigns in which they provide soldiers with laptops so that they can stay in touch with loved ones. Earlier this month, they unloaded several computers on soldiers at Fort Riley thanks to a partnership with CDW Government LLC.

“We are grateful that through our continued partnership with Operation Homefront, we are able to honor the sacrifice of military families and help alleviate some of the stress they often feel when separated from their deployed family members,” Brigadier General John Howard (Ret.), CDW-G DoD business development manager, said in a statement at the time. “While email can never replace the presence of a parent or spouse at home, these laptops provide a vital connection to home when it is needed the most.”

“Although we can never take the sacrifice out of a deployment, we hope that the laptops will help improve the quality of life for our military personnel and their families,” added Amy Palmer, chief operating officer for Operation Homefront. “Without the means to afford computers, many soldiers and their families must wait to hear from one another, which can affect morale on and off the battlefield. However, with the help of CDW-G, many families of deployed soldiers can now communicate daily, easing concerns of worried loved ones.”

While PRODIGAL doesn’t stand to exactly put the Pentagon between the sender of the email and the recipient, it will cause soldiers to censor their thoughts with often the only people they can relate to.

In the past year, DARPA has announced other plans to pry into military personnel, including the Narrative Networks project to find out who is most susceptible to propaganda, and Power Dreaming, an initiative that will scan brainwave patterns of sleeping soldiers to try to determine what causes what dreams.

Related Links:

Togel178

Pedetogel

Sabatoto

Togel279

Togel158

Colok178

Novaslot88

Lain-Lain

Partner Links