Journal: Washington Post Continues to Die….

09 Terrorism, 10 Transnational Crime, Government, Law Enforcement, Military
Walter Pincus
Walter Pincus

Meet Walter Pincus.  He has “covered” the U.S. Intelligence Community for over two decades.

Fine Print: U.S. Intelligence and Afghan Narcotics

By Walter Pincus

Tuesday, August 18, 2009

Click on the story title to read the story.  The entire story is built arouind an Air Force contracting announcement, and everything there-in is taken at face value including the absurd claim electronic processing of Dari information not only allows it to accept locally generated Afghan intelligence but to also return finished intelligence reports in Dari to the Afghan counternarcotics police.

Continue reading “Journal: Washington Post Continues to Die….”

Journal: Stronger Signals–Naked Virginia Police Chiefs

Law Enforcement
Original Source Online
Original Source Online

+++++++Phi Beta Iota Editorial Comment+++++++

We've seen quite a few stupid, abusive policemen–generally in Third World countries, struggling to make a living, treating corruption as a form of life insurance.  What we have not seen ourselves in Virginia, is stupid, abusive police chiefs and ignorant abusive “undercover” officers who go after citizens whose only crime is being “alert” and sharing information with others about operations so badly managed they are too obvious to laugh about….kind of like CIA running operations out of official installations with kids throwing money around and no real ability to do anything other than take scraps off the foreign liaison table.  Or truly naked, really drunken police sliding down banisters greased with beer in a Washington, D.C. hotel, where local police refused to enforce the law against their visiting brethren.

Editor“JZ” Jason Liszkiewicz surfaced this story and Editor Robert Steele decided to go with it.  Both are law abiding citizens and the latter has given at least 5 of his 9 lives for his country.

Continue reading “Journal: Stronger Signals–Naked Virginia Police Chiefs”

Journal: Weaponizing Web 2.0

Commerce, Commercial Intelligence, Law Enforcement
Washington Post Full Story
Washington Post Full Story

By Brian Krebs

July 29, 2009; 3:15 PM ET

The Washington Post

Imagine simply visiting a Web forum and finding that doing so forced your browser to post an embarrassing Twitter message to all of your contacts, or caused you to admit a stranger to your online social network. Now consider the same dynamic being used to move money out of your online auction account or delete the contents of your e-mail inbox.

. . . . . . .

The problem with the token-based security approach, as researchers prior to Hamiel and Moyer have noted, is that it works only if the attacker doesn't have access to that random string of data as well.

To take the Alice and Bob on the forum example a step further, consider what happens when Alice views a forum posting by Bob that includes a link to an off-site image hosted at a site controlled by Bob. That image, when loaded by Alice's browser, will automatically send Bob's site a referrer URL that includes the full token that is unique to Alice's browser session with that forum. Armed with the referring URL's token, Bob can then respond to the image request from Alice's browser with a request to silently take action on that forum in Alice's name.

. . . . . . .

Moyer said one way to prevent this attack is commonly used on banking Web sites involves what's known as a nonce, which is essentially a random, one-time-use-only number that is appended to a URL each time a visitor loads a page on that site. He noted that one reason most sites don't adopt this approach is that it requires far more computational and Web server capacity, which can drive up costs — particularly for high-traffic sites.

DefCon White Paper
DefCon White Paper

+++++++Phi Beta Iota Editorial Comment+++++++

In 1990-1991 Winn Schwartau testified to Congress.  They ignored him the way they ignored Peak Oil testimony in 1974-1975.  In 1995 Robert Steele organized three top experts, Schwartau, Jim A from NSA, and Bill Caelii, and submitted a cross-walk of crystal clear recommendations adding up to $1 billion a year to Marty Harris, responsible for the security of the National Information Infrastructure (NII).  Today the US Government is about to waste $12 billion a year helping NSA further its own agenda while ignoring the root needs of the American people for trusted electromagnetic services.  The federal government is so busy attacking other people it is neglecting the people that created the federal government as a service of common concern.  The gap between those exercising public power and those who elected them and pay them has grown cataclysmic.  Public intelligence in the public interest is one way to help the Republic heal.

Journal: Washington State Privatizes All-Source Fusion Center Intelligence

Law Enforcement
Privatizing Intelligence
Privatizing Intelligence

Washington Joint Analytical Center Seattle

private intelligence outsourcing,

1525 pages, 2006-200

July 26, 2009

Summary

This confidential 1525 page scanned file (61Mb, PDF) is notable for its comprehensive insight into the revolving door world of public-private intelligence in the United States and attempts by the Washington State Patrol to privatize its “criminal intelligence” function.

The document details a tendering process for private sector deployment of intelligence functions inside the Washington Joint Analytical Center (WAJAC) on behalf of the Washington State Patrol (WSP).

It includes pricing, proposals, contracts, background checks, courses, certificates, and resumes of past intelligence work by tender applicant personnel—including detainee interrogation and deployments throughout the world.

The WAJAC is an intelligence “fusion” center used for data-sharing by a number of law enforcement-military groups. Elsewhere, these centers, have been secretly promoted by the US Army as a method to evade posse comitatus restrictions.

Similarly, usurping regulated police with private intelligence contractors reduces accountability. Contractors, for instance, usually do not have to comply with the Freedom of Information Act.

+++++++Phi Beta Iota Editorial Comment+++++++

Please click on WikiLeaks Logo for the Full Story and other related links.

It is our strongly held view that intelligence is both an inherent responsibility of the commander, and cannot be “delegated” in the sense of failing to treat intelligence as a commander's responsibility 24/7; and that intelligence for purposes of national security is an inherent function of government, with the specific observation that secret sources and methods and all-source analysis should be restricted to career employees of the government at whatever level they are being undertaken.  Contractors have a huge and legitimate role to play, but clandestine collection, covert actions, and the final responsibility for analytics and dissemiantion of analytic judgements to the commander, should not be done by contractors.

Similarly, we believe that clearances are a privilege, and that anyone who resigns from government service prior to their projected retirement eligibility date should expect to automatically lose their clearances and fall to the back of the line.  We must put an end to robbing one side of government of a perfectly-positioned government employee, so as to allow a contractor to meet a need elsewhere in government with an employee whose primary attribute these days is the clearance, not the bucket of skills actually needed.