Tag Archives: Espionage

NGO Sues CIA over Freedom of Information


[T]he Central Intelligence Agency has a track record of holding itself apart from, and largely above, the Freedom of Information Act, consistently ignoring deadlines, refusing to work with requesters, and capriciously rejecting even routine requests for what should be clearly public information.  Additionally, we [MuckRock] are suing against the CIA’s general practice of rejecting requests for email records which do not include the time frame, subject, and to and from fields, regardless of what other information is including to help narrow the request. This practice replaces the required functional test for whether or not a request reasonably describes the records sought with a per se test that automatically rejects any request for email records based on whether or not it includes all four pieces of information, virtually ensuring that vast amounts of CIA email records go unprocessed and unreleased.

Excerpt, Michael Morisy, Why we’re suing the CIA: After 10,000 requests, MuckRock launches its first lawsuit, MuckRock Press Release, June 11, 2014

How China Advertises its Anti-Satellite Capabilities

china anti satellite

Chinese media claimed on May 3, 2014 without reference to specific sources…that China has destroyed the control chip of a Japanese spy satellite with a secret weapon.  The attack reportedly happened when the satellite was tracking a Chinese J-20 stealth fighter jet in northwestern China. The satellite is the third Japanese spy satellite launched from Kagoshima, Japan….Chinese media goes on to claim that US analysts believe that China used the electromagnetic pulse weapon Poacher One in the attack. That is China’s top secret military research and development project.

The PLA’s electromagnetic weapon Poacher One is able to transmit an electromagnetic pulse of several megawatt continuously for one minute to destroy all military and civil electronic information and communications systems operating within a few kilometres. It can also destroy an enemy’s internal chips.  The report claims further that US military previously revealed that the PLA had sent a satellite near a US spy satellite and blinded it with spray of coating on its camera. PLA has lots of means to attack and interfere with satellites. US military is concerned that neutralisation of US satellites by PLA’s space force will be its nightmare in war.  However, the development of anti-satellite technology does not stop there. It may be the basis for the technology to intercept an ICBM. That will be a much greater worry for the US military.

Excerpt from CHANKAIYEE2 , China claims successful attack on Japanese military satellite; destroyed control chip with “secret weapon”, China Daily,  MAY 3, 2014

Sniffing Clandestine Nuclear Reactors: the Role of Neutrinos

Antares Neutrino Detector. Image from wikipedia

The International Atomic Energy Agency (IAEA) works with its Member States to promote safe, secure and peaceful nuclear technologies. In a context of international tension and nuclear renaissance, neutrino detectors could help IAEA to enforce the Treaty on the Non-Proliferation of Nuclear Weapons (NPT)…[A] futuristic neutrino application could help detect and localize an undeclared nuclear reactor from across borders. The SNIF (Secret Neutrino Interactions Finder) concept proposes to use a few hundred thousand tons neutrino detectors to unveil clandestine fission reactors….The proposed detector will fit inside an oil supertanker. The main challenge would be to operate such a huger detector (138,000 tons) underwater.

Excerpt Thierry Lasserre et al, SNIF: A Futuristic Neutrino Probe for Undeclared Nuclear Fission Reactors, Nov. 16, 2010



Military Aims to Exploit Your Biosignature

thermal infrared scanner

Human-Centered Intelligence, Surveillance & Reconnaissance (ISR) Leveraged Science & Technology (S&T) Program

The overall RHX (Human Effectiveness Directorate, Anticipate & Influence Behavior Division of the Air Force Research Laboratory) research objective is to develop human-centered S&T that enables the Air Force to more effectively execute the ISR mission…   Current ISR systems are ideal for identifying and tracking entities such as aircraft and vehicles but are less capable of identifying and tracking the human. This research will develop technologies to enable the Air Force to identify, locate and track humans of interest within the operational environment….The scope of human-centered ISR research spans the complete range of human performance starting at the individual molecular, cellular, genomic level and progressing to complex human-to-human and human-to-machine interactions. Human-centered ISR reaches across multiple domains (air, space, cyber) and has broad application to other DoD organizations and the Intelligence Community (IC).  Human-centered ISR research encompasses three major research areas: (1) human signatures, (2) human trust and interaction and (3) human analyst augmentation. The human signatures research develops technologies to sense and exploit human bio-signatures at both the molecular level and macro (anthropometric) level. The human trust and interaction research develops technologies to improve human-to-human interactions as well as human-to-machine interactions. The human analyst augmentation research develops technologies to enhance analyst performance and to test the efficacy of newly developed technologies within a simulated operational environment.

OBJECTIVE 1: Human Signatures

The objective of the Human Signatures Program is to develop technologies to discover, characterize and transition biological-based signatures (biosignatures) to enable effective human and environmental threat detection, identification and exploitation, and operator performance assessment across a variety of Air Force mission areas. Human signatures research seeks to identify and characterize unique biosignatures that can be exploited to identify, locate and track specific individuals or groups of people possessing certain characteristics of operational interest. Bioignatures range from the micro-level (molecular, cellular, genomic) up to whole body physiological signatures based on anthropometric and biomechanical properties and characteristics.

Exploitation of biosignatures also requires development of (1) sensors designed to detect and collect biosignatures; (2) analytics and informatics to process, analyze, fuse and utilize biosignature sensor data; (3) end user systems that integrate biosignatures into the layered sensor network and provide analysis, visualization, and prediction tools to exploit biosignature data.

OBJECTIVE 2: Human Trust and Interaction

The Human Trust and Interaction Program conducts research examining human-to-human interactions and human-to-machine interactions with the focus on developing technological solutions to enhance ISR capabilities and human performance assessments. Research is divided into two major areas: (1) human insight and trust and (2) human language technologies.  The objectives of the Human Interaction and Trust Program are broken down into three subareas. These are: (1) Trust and Suspicion; (2) Trust in Automation; and (3) Social Signature Exploitation. Trust and Suspicion research focuses on the recognition of suspicious activities in the cyberspace realm. The needs include the full gamut of open source data including social media to the more traditional intelligence sources. Trust in Automation is driven by human-machine teams and how humans relate to technology. A key need in this area is the establishment of trust between human operators and the machines/software they are teamed with to complete their mission. Finally, the Social Signature Exploitation theme focuses on recognizing behavior indicators that are based on social and cultural factors to assess and predict military relevant events. The need includes the use of open and closed data resources to assist decision making on the use of force or non-physical actions.

Excerpt  from Human-Centered Intelligence, Surveillance & Reconnaissance (ISR) Leveraged Science & Technology (S&T) Program, Solicitation Number: BAA-HPW-RHX-2014-0001, Agency: Department of the Air Force, Office: Air Force Materiel Command, Location: AFRL/RQK – WPAFB, available online

FISA Court and Transparency: public information and informed debate

public information

According to the Opinion of Judge F. Dennis Saylor of the FISA court, of Sept. 13, 2013 in response to a motion by the ACLU for release of certain opinions of the FISA court:

“The unauthorized disclosure in June 2013 [Edward Snowden disclosure] of a Section 215 order, and government statements in response to that disclosure, have engendered considerable public interest and debate about Section 215 of the Partiot Act. Publication of FISC opinions relating to this provision would contribute to an informed debate. Congressional amici emphasize the value public information and debate in representing their constituents and discharging their legislative responsibilities. Publication would also assure citizens of the integrity of this Court’s proceedings.

In addition, publication with only limited redactions may now be feasible, given the extent of the government’s recent public disclosures about how Section 215 is implemented. Indeed, the government advises that a declassification review process is already underway.  In view of these circumstances, and as an exercise of discretion, the Court has determinedthat it is appropriate to take steps toward publication of any Section 215 Opinions that are not subject to the ongoing FOIA litigation…”

Excerpt, See United States Foreign Intelligence Surveillance Court, In Re Orders of this Court Interpreting Section 215 of the Patriot Act, Docket No. Misc. 13-02

Who is Cryptome?

Salonica.  Image from cryptome.org

Cryptome unfamiliar to the general public, is well-known in circles where intelligence tactics, government secrets and whistle-blowing are primary concerns. Since its creation in 1996, Cryptome has amassed more than 70,000 files — including lists of secret agents, high-resolution photos of nuclear power plants, and much more.

Its co-founder and webmaster, a feisty 77-year-old architect, doesn’t hesitate when asked why.  “I’m a fierce opponent of government secrets of all kinds,” says John Young. “The scale is tipped so far the other way that I’m willing to stick my neck out and say there should be none.”  Young describes several exchanges with federal agents over postings related to espionage and potential security breaches, though no charges have ever been filed. And he notes that corporate complaints of alleged copyright violations and efforts to shut Cryptome down have gone nowhere.

For Young, there’s a more persistent annoyance than these: the inevitable comparisons of Cryptome to WikiLeaks, the more famous online secret-sharing organization launched by Julian Assange and others in 2006.  Young briefly collaborated with WikiLeaks’ creators but says he was dropped from their network after questioning plans for multimillion-dollar fundraising. Cryptome operates on a minimal budget — less than $2,000 a year, according to Young, who also shuns WikiLeaks-style publicity campaigns.  “We like the scholarly approach — slow, almost boring,” says Young. He likens Cryptome to a “dusty, dimly lit library.”  That’s not quite the image that Reader’s Digest evoked in 2005, in an article titled “Let’s Shut Them Down.” Author Michael Crowley assailed Cryptome as an “invitation to terrorists,” notably because of its postings on potential security vulnerabilities.Cryptome’s admirers also don’t fully buy into Young’s minimalist self-description….

Young considers himself a freedom-of-information militant, saying he is unbothered by “the stigma of seeming to go too far.” Claims that Cryptome aids terrorists or endangers intelligence agents are “hokum,” he said. “We couldn’t possibly publish information to aid terrorists that they couldn’t get on their own,” he said, depicting his postings about security gaps as civic-minded.  “If you know a weakness, expose it, don’t hide it,” he said…

As a motto of sorts, the Cryptome home page offers a quote from psychiatrist Carl Jung: “The maintenance of secrets acts like a psychic poison which alienates the possessor from the community.”  The website says Cryptome welcomes classified and confidential documents from governments worldwide, “in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance.”  Young attributes Cryptome’s longevity and stature to its legion of contributors, most of them anonymous, who provide a steady stream of material to post.  Among the most frequently downloaded of Cryptome’s recent postings were high-resolution photos of the Fukushima Dai-ichi nuclear plant in Japan after it was badly damaged in the March 2011 tsunami/earthquake disaster.

Cryptome also was a pivotal outlet last year for amorous emails between national security expert Brett McGurk and Wall Street Journal reporter Gina Chon, which led McGurk to withdraw as the Obama administration’s nominee to be ambassador to Iraq.  Other documents on the site list names of people purported to be CIA sources, officers of Britain’s MI6 spy agency, and spies with Japan’s Public Security Investigation Agency….

Another exchange with the FBI came in November 2003, according to Young, when two agents paid him a visit to discuss recent Cryptome postings intended to expose national security gaps. The postings included maps and photos of rail tunnels and gas lines leading toward New York’s Madison Square Garden, where the Republican National Convention was to be held the next year….Another confrontation occurred in 2010, when Cryptome posted Microsoft’s confidential Global Criminal Compliance Handbook, outlining its policies for conducting online surveillance on behalf of law enforcement agencies. Contending that the posting was a copyright violation, Microsoft asked that Cryptome be shut down by its host, Network Solutions. Criticism of Microsoft followed, from advocates of online free speech, and the complaint was withdrawn within a few days….

Moreover, Young urges Cryptome’s patrons to be skeptical of anything placed on the site, given that the motives of the contributors may not be known.  “Cryptome, aspiring to be a free public library, accepts that libraries are chock full of contaminated material, hoaxes, forgeries, propaganda,” Young has written on the site. “Astute readers, seeking relief from manufactured and branded information, will pick and choose…”

Excerpts from DAVID CRARY, Older, Quieter Than WikiLeaks, Cryptome Perseveres, Associated Press, Mar. 9, 2013

How to Command the Deep Sea: the deep sea capsules of DARPA

earth and ocean

From Defense Advanced Research Projects Agency(DARPA) website:

Distributed systems to hibernate in deep-sea capsules for years, wake up when commanded, and deploy to surface providing operational support and situational awareness.

Today, cost and complexity limit the Navy to fewer weapons systems and platforms, so resources are strained to operate over vast maritime areas. Unmanned systems and sensors are commonly envisioned to fill coverage gaps and deliver action at a distance. However, for all of the advances in sensing, autonomy, and unmanned platforms in recent years, the usefulness of such technology becomes academic when faced with the question, “How do you get the systems there?” DARPA’s Upward Falling Payloads program seeks to address that challenge.

The UFP concept centers on developing deployable, unmanned, distributed systems that lie on the deep-ocean floor in special containers for years at a time. These deep-sea nodes would then be woken up remotely when needed and recalled to the surface. In other words, they “fall upward.”

“The goal is to support the Navy with distributed technologies anywhere, anytime over large maritime areas. If we can do this rapidly, we can get close to the areas we need to affect, or become widely distributed without delay,” said Andy Coon, DARPA program manager. “To make this work, we need to address technical challenges like extended survival of nodes under extreme ocean pressure, communications to wake-up the nodes after years of sleep, and efficient launch of payloads to the surface.”

Source DARPA, Jan. 11, 2013

DARPA will host a Proposers’ Day Conference for the Upward Falling Payload (UFP) program on Friday, January 25, 2012 in Arlington, VA at the DARPA Conference Center, in support of the Broad Agency Announcement (BAA) DARPA-BAA-13-17

Cost and complexity limit the number of ships and weapon systems the Navy can support in forward operating areas. This concentration of force structure is magnified as areas of contested environments grow. A natural response is to develop lower-cost unmanned and distributed systems that can deliver effects and situation awareness at a distance. However, power and logistics to deliver these systems over vast ocean areas limit their utility. The Upward Falling Payload (UFP) program intends to overcome these barriers. The objective of the UFP program is to realize a new approach for enabling forward deployed unmanned distributed systems that can provide non-lethal effects or situation awareness over large maritime areas. The approach centers on pre-deploying deep-ocean nodes years in advance in forward areas which can be commanded from standoff to launch to the surface. The UFP system is envisioned to consist of three key subsystems: (1) The ‘payload’ which executes waterborne or airborne applications after being deployed to the surface, (2) The UFP ‘riser’ which provides pressure tolerant encapsulation and launch (ascent) of the payload, and (3) The UFP communications which triggers the UFP riser to launch. A multi-phase effort is envisioned to design, develop, and demonstrate UFP systems.

Source: Federal Business Opportunities

Who is Trapwire? CIA’s surveillance machinery

Trapwire is the name of a program revealed in the latest Wikileaks bonanza—it is the mother of all leaks, by the way….. “Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology—and have installed it across the U.S. under the radar of most Americans, according to emails hacked by Anonymous.  Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company (has been acquired by Cubic corporation) staffed with elite from America’s intelligence community.  The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.”  So: those spooky new “circular” dark globe cameras installed in your neighborhood park, town, or city—they aren’t just passively monitoring. They’re plugged into Trapwire and they are potentially monitoring every single person via facial recognition.

Excerpts, David Seaman, WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network, Businessinsider.com, Aug. 10, 2012

See also Top Secret America

wikileaks page

Gliders: the robot submarines

Ten years ago there were fewer than 30 gliders in the world, all built either by academic institutions or the armed forces. Now there are at least 400, and most are made by one of three firms: iRobot, whose product is called, simply, Seaglider; Teledyne Webb, which manufactures the Slocum Glider (named after Joshua Slocum, the first man to sail solo around the world); and Bluefin Robotics (the third member of the Massachusetts sea-glider cluster, based in Quincy), which sells the Spray Glider. Broadly speaking, these machines have three sorts of application: scientific, military and commercial.

At the moment, science rules the roost. For cash-strapped oceanographers, gliders are a blessing. Their running costs are negligible and, though buying one can cost as much as $150,000, that sum would purchase a mere three days of, say, a manned trip to the Southern Ocean.  Gliders, moreover, give a continuous view of what is going on, rather than the series of snapshots yielded by equipment lowered from a vessel at the surface. Besides tracking pollution, watching volcanoes and measuring icebergs, they are following fish around, monitoring changing temperatures in different layers of seawater and mapping the abundance of algae. The Ice Dragon, a modified Seaglider operated by the Virginia Institute of Marine Science, has explored under the Antarctic ice shelf, and another modified Seaglider, the Deepglider, can plumb the depths down to 6km (20,000 feet). Teledyne Webb’s Storm Glider, meanwhile, lurks in hurricane-prone areas, bobbing up to take readings during extreme weather.  Gliders are also quiet—so quiet that, as one researcher puts it, you can use them “to hear a fish fart”. This was demonstrated by a recent project run by the University of South Florida, in which a glider successfully mapped the locations of red grouper and toadfish populations on the West Florida Shelf from the noises the fish made.

Military applications are growing, too. America’s navy, for example, has ordered 150 gliders from Teledyne Webb’s sister company, Teledyne Brown, for what it calls its Littoral Battlespace Sensing-Glider programme. To start with, these gliders will be used individually, to measure underwater conditions that affect things like sonar. Eventually, the plan is to link them into a network that moves around in a co-ordinated manner.  Gliders are also ideal for gathering intelligence. Having no propellers and no engine noise, they are difficult to detect. They can be delivered by submarine, and can lurk unseen for as long as is necessary. Any shipping, whether on the surface or under it, which passes near a glider can be detected, identified and pinpointed without it realising it has been spotted. Indeed, the American navy is now evaluating a design called the Waveglider, made by Liquid Robotics of Sunnyvale, California, for submarine-detection work.

The third use, commerce, seems, at the moment, to be the smallest—though that may be because the companies involved are keeping quiet about what they are doing. But Joe Dyer, the chief strategy officer at iRobot, thinks oil-and-gas exploration will be a big market for the firm’s gliders, because they can survey large areas of seabed in detail at low cost.  ACSA, a French glider firm, has a similar market in mind. In March it launched the SeaExplorer, a streamlined, wingless glider with a speed of one knot—twice as fast as the American competition. According to Patrice Pla, ACSA’s marketing manager, SeaExplorer’s lack of wings reduces the chance of its getting tangled in nets. Its payload bay, meanwhile, is designed to take interchangeable modules so that it can hold whatever equipment is required. That means customers do not have to buy different gliders for different applications.

Nor is ACSA the only non-American in the field. A glider called Sea Wing, for example, has been developed at the Shenyang Institute of Automation, in China, by Yuan Dongliang of the country’s Institute of Oceanography. It was tested last year and operated successfully in the western Pacific at depths of up to 800 metres. Meanwhile, at Tianjin University, a team of glider researchers is trying to improve the machines’ endurance. They are testing fuel cells instead of batteries and are also working on the idea of powering them with a thermal engine that draws its energy from the differences in temperature between seawater at different depths.

Japanese researchers, too, are building gliders. At Osaka University, Masakazu Arima is involved in several glider projects. One is a small, low-cost version called ALEX that has independently movable wings. Another is a solar-powered device called SORA. Though SORA has to surface to recharge, its requirements are so modest that it does not take long to do so. It can travel underwater for months, surface for a few days, then carry on. It can therefore stay at sea indefinitely.

Dr Arima’s greatest interest, though, is like America’s navy’s: that his gliders should collaborate. His plan is to deploy 1,000 of them in a network that surveys and measures the oceans. If it works, the single spies of sea-gliding really will have become battalions, and the ocean’s fish will find themselves shadowed by shoals of mechanical counterparts.

Exploring the Oceans:20,000 colleagues under the sea, Economist, June 9, 2012, at 84

See also Underwater drones