Cyberwars: ACLU and NSA ex-Director to Debate Tomorrow!

keith-alexander-nsa-flickrIn what is sure to be a barn-burner of a debate, the former head of the National Security Agency – General Keith Alexander – will be participating tomorrow in a with ACLU Executive Director Anthony Romero. The televised, surveillance-themed debate, will take place tomorrow –  June 30th, 10:30am Eastern Time – on MSNBC. The subject: whether or not the NSA’s vast surveillance and data mining programs are making American’s safer.

While many would prefer that the current head of the NSA be involved in the debate, General Alexander is a far better spokesperson for the controversial programs that have been the subject of so much controversy. After all, “Emperor Alexander” – as his subordinates called him – is the man most directly responsible for the current disposition of the  NSA’s cyber surveillance and warfare program.Who better to debate their merit with the head of the ACLU – an organization dedicated to the preservation of personal freedom?

Edward-Snowden-660x367And according to classified documents leaked by Edward Snowden, General Alexander’s influence and power within the halls of government knew no bounds during his tenure. A four-star Army general with active units under his command, he was also the head of the National Security Agency, chief of the Central Security Service, and the commander of the US Cyber Command. It is this last position and the power it wields that has raised the greatest consternation amongst civil-libertarians and privacy advocates.

Keith Alexander is responsible for building this place up between 2005 and 2013, insisting that the US’s inherent vulnerability to digital attacks required that he and those like him assume more authority over the data zipping around the globe. According to Alexander, this threat is so paramount that it only makes sense that all power to control the flow of information should be concentrated in as few hands as possible, namely his.

NSA_fort_meadeIn a recent security conference held in Canada before the Canadian Security Intelligence Service (CSIS), Alexander expressed the threat in the following, cryptic way:

What we see is an increasing level of activity on the networks. I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.

If this alone were not reason enough to put people on edge, there are also voices within the NSA who view Alexander as a quintessential larger-than-life personality. One former senior CIA official who agreed to speak on condition of anonymity, claimed:

We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets. We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.

And it is because of such freedom to monitor people’s daily activities that movements like the February 11th “The Day We Fight Back” movement – an international cause that embraced 360 organizations in 70 countries that were dedicated to ending mass surveillance – have been mounted, demanding reform.

us_supremecourtIn addition, a series of recent ruling from the US Supreme Court have begun to put the kibosh on the surveillance programs that Alexander spent eight years building up. With everything from cell phone tracking to cell phone taps, a precedent is being set that is likely to outlaw all of the NSA domestic surveillance. But no matter what, the role of Snowden’s testimony in securing this landmark event cannot be underestimated.

In fact, in a recent interview, the ACLU’s Anthony Romero acknowledged a great debt to Snowden and claimed that the debate would not be happening without him. As he put it:

I think Edward Snowden has done this country a service… regardless of whether or not what he did was legal or illegal, whether or not we think the sedition laws or the espionage laws that are being used to possibly prosecute Snowden are too broad, the fact is that he has kick-started a debate that we did not have. This debate was anemic. Everyone was asleep at the switch.

One can only imagine what outcome this debate will have. But we can rest assured that some of the more predictable talking points will include the necessities emerging out of the War on Terror, the rise of the information revolution, and the dangers of Big Brother Government, as well as the NSA’s failure to prevent such attacks as the Boston Marathon Bombing, the Benghazi Embassy bombing, and a slew of other terrorist incidents that took place during Alexander’s tenure.

Do I sound biased? Well perhaps that’s because I am. Go ACLU, stick to Emperor Alexander!

Sources: engadget.com, democracynow.org

Drone Wars: Bigger, Badder, and Deadlier

UAVsIn their quest to “unman the front the lines”, and maintain drone superiority over other states, the US armed forces have been working on a series of designs that will one day replace their air fleet of Raptors and Predators. Given that potential rivals, like Iran and China, are actively imitating aspects of these designs in an added incentive, forcing military planners to think bigger and bolder.

Consider the MQ-4C Triton Unmanned Aerial System (UAS), a jet-powered drone that is the size of a Boeing 757 passenger jet. Developed by Northrop Grumman and measuring some 40 meters (130 feet) from wingtip to wingtip, this “super drone” is intended to replace the US Navy’s fleet of RQ-4 Global Hawks, a series of unmanned aerial vehicles that have been in service since the late 90’s.

Triton_droneThanks to a sensor suite that supplies a 360-degree view at a radius of over 3700 kms (2,300 miles), the Triton can provide high-altitude, real-time intelligence, surveillance and reconnaissance (ISR) at heights and distances in excess of any of its competitors. In addition, the drone possess unique de-icing and lightning protection capabilities, allowing to plunge through the clouds to get a closer view at surface ships.

And although Triton has a higher degree of autonomy than the most autonomous drones, operators on the ground are still relied upon to obtain high-resolution imagery, use radar for target detection and provide information-sharing capabilities to other military units. Thus far, Triton has completed flights up to 9.4 hours at altitudes of 15,250 meters (50,000 feet) at the company’s manufacturing facility in Palmdale, California.

?????????????????????????????????Mike Mackey, Northrop Grumman’s Triton UAS program director, had the following to say in a statement:

During surveillance missions using Triton, Navy operators may spot a target of interest and order the aircraft to a lower altitude to make positive identification. The wing’s strength allows the aircraft to safely descend, sometimes through weather patterns, to complete this maneuver.

Under an initial contract of $1.16 billion in 2008, the Navy has ordered 68 of the MQ-4C Triton drones with expected delivery in 2017. Check out the video of the Triton during its most recent test flight below:


But of course, this jetliner-sized customer is just one of many enhancements the US armed forces is planning on making to its drone army. Another is the jet-powered, long-range attack drone that is a planned replacement for the aging MQ-1 Predator system. It’s known as the Avenger (alternately the MQ-1 Predator C), a next-generation unmanned aerial vehicle that has a range of close to 3000 kms (1800 miles).

Designed by General Atomics, the Avenger is designed with Afghanistan in mind; or rather, the planned US withdrawal by the end 0f 2014. Given the ongoing CIA anti-terrorism operations in neighboring Pakistan are expected to continue, and airstrips in Afghanistan will no longer be available, the drones they use will need to have significant range.

(c) Kollected Pty Ltd.

The Avenger prototype made its first test flight in 2009, and after a new round of tests completed last month, is now operationally ready. Based on the company’s more well-known MQ-9 Reaper drone, Avenger is designed to perform high-speed, long-endurance surveillance or strike missions, flying up to 800 kms (500 mph) at a maximum of 15,250 meters (50,000 feet) for as long as 18 hours.

Compared to its earlier prototype, the Avenger’s fuselage has been increased by four feet to accommodate larger payloads and more fuel, allowing for extended missions. It can carry up to 1000 kilograms (3,500 pounds) internally, and its wingspan is capable of carrying weapons as large as a 2,000-pound Joint Direct Attack Munition (JDAM) and a full-compliment of Hellfire missiles.

Avenger_drone1Switching from propeller-driven drones to jets will allow the CIA to continue its Pakistan strikes from a more distant base if the U.S. is forced to withdraw entirely from neighboring Afghanistan. And according to a recent Los Angeles Times report, the Obama administration is actively making contingency plans to maintain surveillance and attacks in northwest Pakistan as part of its security agreement with Afghanistan.

The opportunity to close the gap between the need to act quickly and operating from a further distance with technology isn’t lost on the US military, or the company behind the Avenger. Frank Pace, president of the Aircraft Systems Group at General Atomics, said in a recent statement:

Avenger provides the right capabilities for the right cost at the right time and is operationally ready today. This aircraft offers unique advantages in terms of performance, cost, timescale, and adaptability that are unmatched by any other UAS in its class.

??????????????????????????????What’s more, one can tell by simply looking at the streamlined fuselage and softer contours that stealth is part of the package. By reducing the drone’s radar cross-section (RCS) and applying radar-absorbing materials, next-generation drone fleets will also be mimicking fifth-generation fighter craft. Perhaps we can expect aerial duels between remotely-controlled fighters to follow not long after…

And of course, there’s the General Atomic’s Avenger concept video to enjoy:


Sources:
wired.com, (2)

Drone Wars: New Leaks Reveal Human Cost of Drone Strikes

drone-strikeIt would be an understatement to say that drones and UAVs are hot button issue right now. As an ongoing part of the “war on terror”, the use of remotely piloted vehicles to target terrorism suspects remain a popular one within the US, with 56% of respondents indicating that they supported it (as of Feb. 2013). However, when the matter of civilian casualties and collateral damage is introduced, the issue becomes a much stickier one.

What’s more, it is becoming increasingly evident that how the drone program is being presented is subject to spin and skewing. Much like the NSA’s domestic surveillance programs, it is in the Obama administration’s and the Pentagon’s best interest to present the issue in terms of “hunting terrorists” while categorically avoiding any mention of the real costs involved. And thanks to recent revelations, these efforts may prove to be more difficult in the future.

drone_mapIt was just over weeks ago, on July 22nd, that London’s Bureau of Investigative Journalism released a leaked Pakistani report that detailed numerous civilian casualties by drone strikes in the country’s Federally Administered Tribal Areas (FATA). For years now, obtaining information about civilian casualties caused by US and NATO strikes in this region has been incredibly difficult – information which these documents have now provided.

The 12-page dossier was compiled for the the authorities in the tribal areas, the Bureau notes, and investigates 75 CIA drone strikes and five attacks by NATO in the region conducted between 2006 and 2009. According to the document, 746 people were killed in the strategic attacks. At least 147 of the victims were civilians, and 94 were children.

on April 3, 2009 in Now Zad in Helmand province, Afghanistan.This directly contradicts inquired made by the United Nations, which began investigating the legality of the drone program and strikes last year. According to the U.N.’s special rapporteur on counterterrorism and human rights (Ben Emmerson) Pakistan then claimed at least 400 civilians had been killed in U.S. strikes in the country since 2006. Quite the discrepancy.

And while a majority of other tallies relied on media reports of drone strikes, the FATA list was compiled by government officials who were sent out to investigate damage firsthand in the wake of attacks. According to the Bureau, on several occasions officials registered different casualty rates than the media outlets reported.

Drone-strike-damageThe Bureau went on record to say that there were gaps in the information provided, like why none of the names of the casualties were provided, or why civilian casualties were not provided for 2009, the last year covered in the report. It is possible that logistical factors played a role, such as the lack of accurate census data in the FATA region, and that casualty figures for the year 2009 were difficult to obtain due to the acceleration of drone strikes during that year.

It is this last aspect which is likely to give many pause, since it was the decision of the outgoing Bush administration to intensify drone strikes during the last few months of his presidency, a decision which the Obama administration adopted and maintained. And the list provided only shows a gap between the official numbers and those obtained on the ground during the years of 2006 and 2009, when the strikes began.

drone_loadoutWhat are we to make then of the years running from 2009 to 2013, where drone strikes in the western region of Pakistan became a much more common occurrence and the body count – civilian or otherwise – can only be expected to have escalated? This could another reason that figures were omitted from 2009, which is that the Pakistani government was concerned that they might spark outrage if they were to ever be made public.

However, that is all speculation at this point, and more time and investigation are certainly needed to determine what the cost in human terms has been. One thing is for sure though, the use of drones in Pakistan, Yemen and Somalia are likely to become increasingly controversial as more information emerges and an accurate picture of the death toll is presented.

drone_map1For years now, the US government has denied that large civilian casualty counts exist, but it continues to withhold the numbers. But some claim those numbers will not shed any real light even if they are released, since it is still not clear how the US forces distinguish between civilians and “militants” or “combatants”.

In a major speech on national security in May 2013, Obama strongly defended the drone program but said the administration would codify the process it goes through before ordering attacks and would work with Congress to create more oversight. However, no promises were made about the number of deaths leading up to this declaration, whether or not those facts and figured would be made public, and strikes continue to take place which violate this new mandate.

obama_dronesAs the saying goes, “the first casualty of war is the truth”. And without much effort, one can easily draw parallels between this latest phase in the “war on terror” to the vagaries of Iraq, Abu Ghraib and Guantanamo Bay, where information was withheld, numbers debated and legalities issued in order to justify highly questionable acts.

And for those old enough to remember, the specter of Vietnam is also apparent here. Then, as now, the public is forced to rely on leaked information and confidential informants simply because the official stories being issued by their government are full of discrepancies, denials, and apparent fabrications. One would think we had learned something in the last five decades, but apparently not!

Sources: huffingtonpost.com, thebureauinvestigates.com

Drone Wars: X-47B Makes First Carrier Landing!

X47B_arrested_landing_610x407In any developmental milestone, the X-47B made its first arrested landing aboard an aircraft carrier yesterday. This latest test, which comes after a successful arrested landing on an airstrip and a successful deployment from an aircraft carrier, may help signal a new era for the use of unmanned aircraft in military operations.

For months now, the US Navy has been testing the Unmanned Aerial Combat Air System – the first drone aircraft that requires only minimal human intervention – pushing the boundaries in the hopes of determining how far the new autonomous air system can go. And with this latest landing, they just proved that the X-47B is capable of being deployed and landing at sea.

nimitz-class-carrier-640x424Aircraft landings on a carrier are a tricky endeavor even for experienced pilots, as the ship’s flight deck is hardly spacious, and rises, falls, and sways with the ocean waves. To stop their forward momentum in the shortest distance possible, carrier aircraft have a hook on the underside of the fuselage that latches onto cables stretched across the flight deck. This means that pilots need to land precisely to grab the hook and come to a complete stop in time.

The test flight began when the drone took off from the Naval Air Station at Patuxent River, Md. and then flew to meet the USS George H.W. Bush at sea, a flight which took 35 minutes. Upon reaching the carrier, the same which it took off from this past May, it touched down and caught the 3 wire with its tailhook at a speed of 145 knots, coming to a dead stop in less than 350 feet. After the first landing, it was launched from the Bush’s catapult and then made a second arrested landing.

X-47BThe Navy tweeted about the success shortly after it happened, and Ray Mabus – Secretary of the Navy – followed that up with a press statement:

The operational unmanned aircraft soon to be developed have the opportunity to radically change the way presence and combat power are delivered from our aircraft carriers.

Naturally, there is still plenty of testing likely to be done before such drones can be considered ready to go into combat zones. For example, perhaps, automated drone-to-drone refueling is scheduled for some time in 2014, another aspect of the UCAS the Navy is determined to try before deploying them in actual operations. Still, for fans and critics alike, this was a major step.

Which brings us to the darker side of this latest news. For many, a fleet of semi or fully-automated drones is a specter that induces serious terror. Earlier this year, the Obama administration sought to allay fears about the development of the X-47 and the ongoing use of UAVs in combat operations by claiming that steps would be taken to ensure that when it came to life and death decisions, a human would always be at the helm.

drone_mapBut of course, promises have been broken when it comes to the use of drones, which doesn’t inspire confidence here. Just eight days after the Obama Administration promised to cease clandestine operations where drones were used by the CIA to conduct operations in Pakistan, Yemen, and Somalia, one such drone was used to kill Wali ur-Rehman – the second in command of the Pakistani Taliban. This was a direct violation of Obama’s promise that UAVs would be used solely against Al-Qaeda and other known anti-US terrorist groups outside of Afghanistan.

What’s more, the development of unmanned drones that are able to function with even less in the way of human oversight has only added to many people’s fear about how, where, and against whom these drones will be used. Much has gone on that the public is now aware of thanks to the fact that only a handful of people are needed to control them from remote locations. If human agency is further removed, what will this mean for oversight, transparency, and ensuring they are not turned on their own citizens?

UAVsBut of course, it is important to point out that the X-47B is but an experimental precursor to actual production models of a design that’s yet to be determined. At this point, it is not farfetched to assume that preventative measures will be taken to ensure that no autonomous drone will ever be capable of firing its weapons without permission from someone in the chain of command, or that human control will still be needed during combat phases of an operation. Considering the potential for harm and the controversy involved, it simply makes sense.

But of course, when it comes to issues like these the words “trust us” and “don’t worry” are too often applied by those spearheading the development. Much like domestic surveillance and national security matters, concerned citizens are simply unwilling to accept the explanation that “this will never be used for evil” anymore. At this juncture, the public must stay involved and apprised, and measures instituted from the very beginning.

And be sure to check out this video of the X-47B making its first arrested landing. Regardless of the implications of this latest flight, you have to admit that it was pretty impressive:


Source:
news.cnet.com

Cyberwars: Massive Government Surveillance Uncovered!

wire_tappingOn Friday, Washington DC found itself embroiled in controversy as revelations were made about the extent to which US authorities have been spying on Americans in the last six years. This news came on the heels of the announcement that the federal government had been secretly cataloging all of Verizon’s phone records. No sooner had the dust settled on that revelation that it became known that the scope of the Obama administration’s surveillance programs was far greater than anyone had imagined.

According to updated information on the matter, it is now known that The National Security Agency (NSA) and the FBI have been tapping directly into the central servers of nine leading U.S. Internet companies, extracting everything from audio and video chats, photographs, e-mails, documents, and connection logs that would enable their analysts to track foreign targets.

prism3This information was revealed thanks to a secret document that was leaked to the Washington Post, which shows for the first time that under the Obama administration, the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing. Equally distressing is the names being named: U.S. Service Providers such as Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.

The document further indicates that all of this has been taking place since 2007, when news disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced then-president George W. Bush to look for new authority to justify his program warrantless domestic surveillance. It’s continuance and expansion under Obama has created a great deal of understandable intrigue, and not only because of promises made that “illegal wiretapping” would not take place under his watch.

prism1The joint FBI-NSA program responsible for mining all the data is known as PRISM, and it may very well be the first of its kind. While the NSA and FBI have a long history of monitoring suspects via phone records and computer activity, and are both accustomed to corporate partnerships that help it divert data traffic or sidestep barriers, such a vast program has never before been possible. In the current information age, there is an immense wealth of information out there, and where better to access all of this than in Silicon Valley?

Not long after the news broke in Washington, London’s Guardian reported that GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. According to the same leaked information, PRISM appears to allow the GCHQ to circumvent the formal legal process required in Britain to seek personal material such as emails, photos and videos from an internet company based outside of the country.

prism2But perhaps worst of all is the fact that this process is entirely above board, at least for the companies involved. Back in 2007, Congress passed the Protect America Act, and then in 2008 followed it up with the FISA Amendments Act, both of which immunized private companies that cooperated voluntarily with U.S. intelligence collection against prosecution. And late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues.

An anticipated, a bi-partisan amalgam of Senators came out to defend the initial reports of phone record monitoring shortly after it was announced. In a rare display of solidarity that cut across party lines, Democrats and Republicans from both the Senate and House came forward to say that the program was justified, only spied on terrorists, and that law-abiding citizens need not worry.

National Security Agency - aerial view
National Security Agency – aerial view

Once again, the argument “if you’ve done nothing wrong, you’ve got nothing to fear” finds itself employed by people who do not want to voice criticisms about a government spying program. Echoes of the Bush administration and McCarthy era all over again. Needless to say, all of this has many people worried, not the least of which are people opposed to government intrusion and the protection of privacy for the past decade.

Ever since it became possible to “mine data”  from numerous online digital sources, there has been fear that corporations or governments might try to ascertain the habits and comings and goings of regular people in order to effectively monitor them. For some time now, this sort of monitoring has been somewhat benign, in the form of anticipating their spending habits and using targeted advertising. But always, the fear that something more sinister and totalitarian might emerge.

government-surveillanceAnd with the “War on Terror”, the Patriot Act, domestic warrantless wiretapping, the legitimization of torture, and a slew of other crimes the Bush administration was indicted in, people all over the world have become convinced that “Big Brother” government is just around the corner, if indeed it is not already here.

The fact that such processes have continued and even expanded under Obama, a man who originally pledged not to engage in such behavior, has made a bad situation worse. In many ways, it demonstrates that fears that he too would succumb to internal pressure were justified. Much as he was won over by the Pentagon and CIA to continue the war in Afghanistan and UAV programs, it seems that the constellation of FBI and NSA specialists advising him on domestic surveillance has managed to sway him here as well.

Stealth-Wear1One can only hope that this revelation causes the federal government and the Obama administration to reconsider their stances. After all, these are the same people who were convinced to stand down on the use of UAVs in oversees operations and to take measures that would ensure transparency in the future. We can also hope that the NSA and FBI will be required to once again have to rely on the court system and demonstrate “just cause” before initiating any domestic surveillance in the future.

Otherwise, we might all need to consider getting our hands on some stealth wear and personal cameras, to shield ourselves and create an environment of “sousveillance” so we can spy on everything the government does. Might not hurt to start monitoring the comings and goings of every telecommunications and Silicon Valley CEO while were at it! For as the saying goes, “who watches the watchers?” I’ll give you a hint: we do!

Also, be sure to check out the gallery of artist Adam Harvey, the man who pioneered “stealth wear” as a protest against the use of drones and domestic surveillance. To learn more about sousveillance, the concept of a society monitored by common people, check out Steve Mann’s (inventor of the EyeTap) blog.

Sources: washingtonpost.com, guardian.co.uk, policymic.com, ahprojects.com, eyetap.blogspot.ca

 

Drone Wars: New Promises, Same Problems

(U.S. Air Force photo/Staff Sgt. Brian Ferguson)(Released)The practice of using UAV’s as part of a targeted strategy in Pakistan, Afghanistan, Somalia and Yemen has become so frequent that its come to characterize the Obama administration’s handling of the “War on Terror”. Reaction to this policy has been increasingly critical, due in no small part to unanswered questions surrounding civilian death tolls and the rapid escalation of deployment. In response, the Obama administration announced this past week that the surge is at an end.

In a speech made to the National Defense University in Washington on Thursday, Obama emphasized that from now on, the use of UAV’s would be in the hand of the military instead of clandestine intelligence organizations such as the CIA. He also indicated that the rules for launching the strikes would be stricter. For instance, there must be a “near certainty” that no civilians will be killed, and the strikes are to become less frequent.

predator_profileWhile Obama would not declare an end to the war on terrorism, he did offer to work with Congress to constrain some of his own authorities for waging it, which may include the creation of a court modeled on the secretive one used by the NSA to oversea the surveillance of suspected foreign agents. He also expressed a preference to constrain “and ultimately repeal” the broad latitude of warmaking powers granted in the Authorization to Use Military Force (AUMF), an act that was created in 2001 by the Bush administration which is considered the wellspring of the “War on Terror”.

And above all, issues of legality are to take a backseat to the moral and ethical implications raised by ongoing use. Or as he put it: “To say a military tactic is legal, or even effective is not to say it is wise or moral in every instance.”

Naturally, a great many questions remain. In addition to how drones will be used in the years to come to combat terrorism and militants, there’s also questions surrounding their use thus far. Despite pledges made by Obama that changes will be made, the history of the program is still shrouded in mystery. Fittingly, Bloomberg Businessweek created a map to serve as a reminder of the scope of that program, calling it the first ever “comprehensive compilation of all known lethal U.S. drone attacks.”

drone_map

It should be noted though that the numbers represent an estimate which were compiled with the help of the nonprofit Bureau of Investigative Journalism. Sources in Washington apparently offer a wide range of numbers, and the State Department remains hush hush on the issue of casualties. However, the estimates presented in this infographic still present a stark and sobering picture:

  • Yemen: at least 552 killed between 2002 and 2013. The site of the first ever drone strike in 2002.
  • Pakistan: at least 2,561 killed between 2004 and 2013.
  • Somalia: at least 23 killed between 2011 and 2012.

drone_map1Naturally, it is hoped that Obama’s promise to curb the use of drones represents a renewed commitment to comply with international law, treaties and human rights. However, what was apparently missing from the speech was an indication about how easy it will be to get information about strikes that are made in the future. According to the New York Times’ Mark Mazzetti, who provided live analysis of the speech, Obama’s speech didn’t address the issue:

One of the big outstanding questions is just how transparent the Obama administration will be about drone strikes in the future. Will administration officials begin to publicly confirm strikes after they happen?

There was no mention of this in the speech, and it is telling that the president did not mention the C.I.A. at all. It seems quite certain that past operations in Pakistan, Yemen and elsewhere are not going to be declassified anytime soon.

Also, moving operations from the C.I.A. to the Pentagon does not automatically mean that the strikes will be publicly discussed. The Pentagon is carrying out a secret drone program in Yemen right now, and it is very difficult to get information about those operations.

So… promises to curb the use of drones have been made, as well as promises to create some kind of oversight for future operations. And this does seem consistent with many of the criticisms made about the ongoing war on terrorism, specifically the Bush administrations handling of it and how his reliance on special executive powers were unlawful and unconstitutional.

But until such time as information on how these strikes occur and who is being killed, the issue will remain a contentious and divisive one. So long as governments can wage war with automated or remote machinery and kill people without transparency and in secrecy, will this not constitute a form of illegal – or at the very least, a very opaque – warfare?

Sources: wired.com, fastcoexist.com, businessweek.com

Hacker Wars: Hacker Breaches U.S. Army Database

Hackers-With-An-AgendaIt appears that the ongoing campaign of cyber warfare has claimed yet another victim, once again a government institution. In the latest in a long series of institutions and organizations plagued by cyber crime, the U.S. Army Corps of Engineers announced that back in January, a hacker compromised a U.S. Army database that holds sensitive information about vulnerabilities in U.S. dams.

The database in question was the U.S. Army Corps of Engineers’ National Inventory of Dams, a source that contains information about 79,000 dams throughout the US and tracks such information as the number of estimated deaths that could occur if a specific dam failed. It’s accessible to government employees who have accounts, and non-government users can query the database, but are not permitted to download data from it.

hacker_damThe breach was first reported by Free Beacon, a non-profit online publication, and has since been confirmed by the Army Corps of Engineers. Pete Pierce, a spokesman for the ACE, released a statement, saying that:

The U.S. Army Corps of Engineers is aware that access to the National Inventory of Dams (NID), to include sensitive fields of information not generally available to the public, was given to an unauthorized individual in January 2013 who was subsequently determined to not to have proper level of access for the information. [U.S. Army Corps of Engineers] immediately revoked this user’s access to the database upon learning that the individual was not, in fact, authorized full access to the NID.

The Corps of Engineers further indicated on their website that account usernames and passwords had since changed “to be compliant with recent security policy changes.”

Unnamed U.S. officials told the Free Beacon that the breach was traced to “the Chinese government or military cyber warriors,” but offered no information to support the claim. It is well known by intrusion specialists that hackers can use proxy servers or hijacked computers to conduct a breach and make it look as if the source was a specific country or individual.

hackers_securityMichelle Van Cleave, a former senior adviser to the Executive Agent for Homeland Security and Department of Defense and a former consultant to the CIA, went on record as saying that the breach appeared to be part of an effort to collect “vulnerability and targeting data” for future cyber or military attacks, though she didn’t say how she came to this conclusion.

If the intrusion was the work of the Chinese military, then it’s possible this was nothing more than a fact-finding mission on their part, designed to gather information on America’s infrastructure and hydroelectric facilities. The far worse possibility was that this was the result of private hackers, who sought to obtain information about US dams are part of a planned attack, looking to see which dam would cause the most harm if it were disabled by a physical or cyber-attack.

Whether it was the result of government-sponsored hackers, private hackers, or potential terrorists, it is clear that in the wake of the recent intrusions into US government databases, and the recent bombing in Boston, that security forces in the US will be on the lookout for similar breaches. In an age of electronic warfare, the best defense is not a good offense, but the ability to identity enemies and deploy countermeasures.

Source: Wired.com

Revengers Attack!

superheroes_chargeIt’s time, my fellow superheroes! We have the location of the Storehouse that contains the answers to the Tyrene Code, the hiding place of a strange device – possibly alien in origin – that can convey superhuman powers on an individual. We knew that this mission would take us places we might not want to venture, and to unlock secrets that were perhaps better kept. But as they say, you can’t put the genie back in the bottle, and this is one secret that was bound to break sooner or later!

Not only is this a mission of extreme importance for the sake of all mankind, it’s importance to us on a personal level. As we all know, our powers have come from various sources over the years. For some, it remains a total mystery but for others, a mystery with a culprit that may be revealed very soon. Veiled Tsunami, you always did believe your father was working with alien technology, that came from a warehouse somewhere, yes? This could be it! The answer to your questions and the key to unlocking what your father was working on.

Based on the mission profile which I received from my NSA source, and all the intel provided by each and ever member of our league, we now know that the criminals who stole the first Tyrene painting must have this storehouse in their sights. They will be looking to break in, steal the device, and use it for their own purposes. At the same time, we can expect that the feds will have it locked down tight, relying on heavily-trained security forces and some hired thugs to protect it. This won’t be easy and there are likely to be more than a few surprises.

As such, I have decided to divide our forces up as follows:

Team One:
This group will be made up of the advance scouting party. Their job will be to infiltrate the storehouse, detect traps and defenses, and disable them. They will identify the guards and any other threats and attempt to neutralize them stealthily. The team will consist of:

Atrum Auditor
Erotica Girl
Pax
Styka

Team Two:
This is our main assault group, the breach and clear team that will go in once team one has identified and taken out all preliminary defenses. They will be responsible for hitting the base, taking down its remaining defenders, and locating the alien device. Once that is accomplished, they will plant explosives and dust off before the device is destroyed. This team will consist of:

Captain Smackdown
Freedom Fighter
Panacea
Veiled Tsunami

Team Three:
This group is our reserve, to be called in if and when things get too hot for team two, or if reinforcements arrive in the thick of things. Our heaviest hitters will be placed here, and lie in wait until the situation requires they enter the fray and wreak a little “constructive havoc” on the opposition. As the case may be, they may also be required to cover our escape. This team will consist of:

Bonfire
Dark Angel
Judgement

Good luck to us all. Let’s make this one for the history books, or at least something the world will talk of long after we’re gone! Suit up, get to your teams, and I’ll see you all when the mission is complete!

The Safehouse: A Revenger Mission Update!

Alchemy Symbols by sgtfarris
Alchemy Symbols by sgtfarris

It’s come to this, my fellow Revengers! We know where the answers to the Tyrene Code lies, even though we appear to be missing a key piece. After assembling the other paintings that make up the Tyrene collection and speaking to my source, we have come up with some theories regarding what’s this might all be about. Although things remains highly speculative at this point, we believe Tyrene came into contact with some kind of advanced or even alien tech in the past.

But regardless of what it is, it seems clear at this point that the international man of mystery known as Michael Tyrene drew great power from it. Given that, it’s little wonder then why this person known as “The Alchemist” wants to get their hands on it. No doubt they are assuming that if it gave one man extraordinary powers, it could another. And I’m thinking he’s not the only one.

Which means we need to do something about it. Since we have a location of where it is being kept, I’d say the only thing we can do now is move in and take it out. As we all know, super human abilities are not something to be treated lightly. And though there are those who might call us hypocrites for denying them to others, I think we can all agree, they are some things mankind wasn’t meant to possess!

Join me now in planning our assault on the Storehouse. Be advised, this won’t be an easy mission. As a CIA facility, it will be guarded, and I’ve already received some intel from our colleague Dark Angel that our meeting with my NSA source was being monitored. I think we can expect multiple challenges as we move to hit this place. So stealth and tact will be needed, until it’s not!

So… who’s in?