Facebook Tests Software to Track Your Cursor on ScreenJuly 7, 2014
Van nieuwsblog.burojansen.nl
Facebook Inc.FB -0.24% is testing technology that would greatly expand the scope of data that it collects about its users, the head of the company’s analytics group said Tuesday.
The social network may start collecting data on minute user interactions with its content, such as how long a user’s cursor hovers over a certain part of its website, or whether a user’s newsfeed is visible at a given moment on the screen of his or her mobile phone, Facebook analytics chief Ken Rudin said Tuesday during an interview.
Facebook’s Ken Rudin
Mr. Rudin said the captured information could be added to a data analytics warehouse that is available for use throughout the company for an endless range of purposes–from product development to more precise targeting of advertising.
Facebook collects two kinds of data, demographic and behavioral. The demographic data—such as where a user lives or went to school—documents a user’s life beyond the network. The behavioral data—such as one’s circle of Facebook friends, or “likes”—is captured in real time on the network itself. The ongoing tests would greatly expand the behavioral data that is collected, according to Mr. Rudin. The tests are ongoing and part of a broader technology testing program, but Facebook should know within months whether it makes sense to incorporate the new data collection into the business, he said
New types of data Facebook may collect include “did your cursor hover over that ad … and was the newsfeed in a viewable area,” Mr. Rudin said. “It is a never-ending phase. I can’t promise that it will roll out. We probably will know in a couple of months,” said Mr. Rudin, a Silicon Valley veteran who arrived at Facebook in April 2012 from Zynga Inc.ZNGA -0.31%, where he was vice president of analytics and platform technologies.
As the head of analytics, Mr. Rudin is preparing the company’s infrastructure for a massive increase in the volume of its data.
Facebook isn’t the first company to contemplate recording such activity. Shutterstock Inc.SSTK +0.11%, a marketplace for digital images, records literally everything that its users do on the site. Shutterstock uses the open-source Hadoop distributed file system to analyze data such as where visitors to the site place their cursors and how long they hover over an image before they make a purchase. “Today, we are looking at every move a user makes, in order to optimize the Shutterstock experience….All these new technologies can process that,” Shutterstock founder and CEO Jon Oringer told the Wall Street Journal in March.
Facebook also is a major user of Hadoop, an open-source framework that is used to store large amounts of data on clusters of inexpensive machines. Facebook designs its own hardware to store its massive data analytics warehouse, which has grown 4,000 times during the last four years to a current level of 300 petabytes. The company uses a modified version of Hadoop to manage its data, according to Mr. Rudin. There are additional software layers on top of Hadoop, which rank the value of data and make sure it is accessible.
The data in the analytics warehouse—which is separate from the company’s user data, the volume of which has not been disclosed—is used in the targeting of advertising. As the company captures more data, it can help marketers target their advertising more effectively—assuming, of course, that the data is accessible.
“Instead of a warehouse of data, you can end up with a junkyard of data,” said Mr. Rudin, who spoke to CIO Journal during a break at the Strata and Hadoop World Conference in New York. He said that he has led a project to index that data, essentially creating an internal search engine for the analytics warehouse.
October 30, 2013, 7:15 AM ET
By STEVE ROSENBUSH
Find this story at 30 October 2013
Copyright ©2014 Dow Jones & Company, Inc
Report: Facebook Is Collecting Data on Your Cursor MovementsJuly 7, 2014
Van nieuwsblog.burojansen.nl
Facebook may be adding to the list of things it knows about you.
The social network is reportedly experimenting with new technology that tracks and collects data about a user’s activity on the site, including cursor movements, according to the Wall Street Journal. The technology is being tested now with a small group of users.
SEE ALSO: How to Change Your Facebook Relationship Status Without Alerting Friends
The data could be used in a number of different ways, from product development to advertising, Facebook analytics chief Ken Rudin told the Journal.
The technology can supposedly determine where a user is hovering his or her cursor on the screen, meaning it could be used to determine the most appropriate places for advertisements. The technology also tracks whether Facebook’s mobile users can see their News Feed at any particular time from their smartphone.
Facebook did not immediately respond to Mashable’s request for comment.
Facebook will reportedly decide “within months” whether or not to continue this data collection and analysis. It could be relevant for targeted advertising where Facebook has already seen quarter-over-quarter growth in 2013.
Facebook is set to reports the company’s quarterly earnings Wednesday afternoon.
UPDATE, Oct. 30, 8:55 p.m. ET: Facebook responded to our request for comment with the following statement:
“Like most websites, we run numerous tests at any given time to ensure that we’re creating the best experience possible for people on Facebook. These experiments look at aggregate trends of how people interact with the site to inform future product decisions. We do not share this information with anyone outside of Facebook and we are not using this information to target ads.”
BY KURT WAGNEROCT 30, 2013
Find this story at 30 October 2013
copyright http://mashable.com/
What Facebook Collects and SharesJuly 7, 2014
Van nieuwsblog.burojansen.nl
What Facebook could know about you, and why you should care.
Facebook is a resource for opinions and hobbies, celebrities and love interests, friends and family, and all the activities that whirl them together in our daily lives. Much like other social networking sites, Facebook is free except for one thing that all users give up: a certain amount of personal information.
Facebook privacy policy provides extensive information about the use of personal data of registered users. It clearly specifies what personal information is collected, how it is used, parties to whom this information may be disclosed, and the security measures taken to protect the information.
By reading and understanding the privacy policy, a user is able to weigh the risks involved in trusting this popular Web site, before one enters any personal information into its pages or installs its applications.
Information Collected by Facebook
Facebook collects two types of information: personal details provided by a user and usage data collected automatically as the user spends time on the Web site clicking around.
Regarding personal information, the user willfully discloses it, such as name, email address, telephone number, address, gender and schools attended, for example. Facebook may request permission to use the user’s email address to send occasional notifications about the new services offered.
Facebook records Web site usage data, in terms of how users access the site, such as type of web browser they use, the user’s IP address, how long they spend logged into the site, and other statistics. Facebook compiles this data to understand trends for improving the site or making marketing decisions.
Facebook now has fine-grained privacy settings for its users. Users can decide which part of their information should be visible and to whom. Facebook categorizes members of the user’s network as “Friends” and “Friends of Friends,” or a broader group, such as a university or locality, and “Everyone,” which includes all users of the site. The categorization increases the granularity of the privacy settings in a user’s profile.
Children: No one under 13 is permitted to register. Children between 13 and 18 require parental permission before sending personal information over Internet. A policy alone, however, does not stop children from using the site, and parents must be watchful of their children’s online activities in order to enforce these policies.
Facebook stores users’ personal information on secure servers behind a firewall.
Sharing of Information with Third Parties
Facebook does not provide personal information to third parties without the user’s consent. Facebook also limits the information available to Internet search engines. Before accepting third-party services, Facebook makes the third party sign an agreement that holds it responsible for any misuse of personal information. However, advertising by third parties on Facebook can lead to their gaining access to user information, such as IP address or cookie-based web usage information that allows personalization of advertisements.
Precautions for Users
Facebook provides thousands of third-party applications for its users to download. Facebook further personalizes the advertisements of these applications on the user’s profiles. It does this by mining through other sources on the Internet to information about the likings and interests of these users. Sources for such mined data are newspapers, blogs and instant messaging to provide services customized according to the user’s personality. However, because these sources are not affiliated with Facebook, it raises a concern of data mining by these sources.
Facebook does not actually provide a mechanism for users to close their accounts, and thus raises the concern that private user data will remain indefinitely on Facebook’s servers.
Over time, the CEO and Board of Directors of a company change, or the company may even be sold. Under such circumstances, a concern arises about the private information held by the company. Deactivation without deletion of a user’s account implies that the data continue to be present on the servers. If a company is then sold, the data of those users who are currently deactivated may be subject to compromise.
Conclusion
Facebook has an explicitly stated privacy policy. It aims to enhance the social networking experience of users by reducing their concerns about the privacy of their data on the Web site. However, the more the Web site tries to incorporate open innovation by allowing third-party access and other such facilities, the more it puts personal information at risk, thereby increasing the probability of losing the trust of its users.
Find this story at 2014
Copyright © 2003–2012 Carnegie Mellon CyLab
Where Does Facebook Stop and the NSA Begin?July 7, 2014
Van nieuwsblog.burojansen.nl
Sometimes it’s hard to tell the difference.
“That social norm is just something that has evolved over time” is how Mark Zuckerberg justified hijacking your privacy in 2010, after Facebook imperiously reset everyone’s default settings to “public.” “People have really gotten comfortable sharing more information and different kinds.” Riiight. Little did we know that by that time, Facebook (along with Google, Microsoft, etc.) was already collaborating with the National Security Agency’s PRISM program that swept up personal data on vast numbers of internet users.
In light of what we know now, Zuckerberg’s high-hat act has a bit of a creepy feel, like that guy who told you he was a documentary photographer, but turned out to be a Peeping Tom. But perhaps we shouldn’t be surprised: At the core of Facebook’s business model is the notion that our personal information is not, well, ours. And much like the NSA, no matter how often it’s told to stop using data in ways we didn’t authorize, it just won’t quit. Not long after Zuckerberg’s “evolving norm” dodge, Facebook had to promise the feds it would stop doing things like putting your picture in ads targeted at your “friends”; that promise lasted only until this past summer, when it suddenly “clarified” its right to do with your (and your kids’) photos whatever it sees fit. And just this week, Facebook analytics chief Ken Rudin told the Wall Street Journal that the company is experimenting with new ways to suck up your data, such as “how long a user’s cursor hovers over a certain part of its website, or whether a user’s newsfeed is visible at a given moment on the screen of his or her mobile phone.”
There will be a lot of talk in coming months about the government surveillance golem assembled in the shadows of the internet. Good. But what about the pervasive claim the private sector has staked to our digital lives, from where we (and our phones) spend the night to how often we text our spouse or swipe our Visa at the liquor store? It’s not a stretch to say that there’s a corporate spy operation equal to the NSA—indeed, sometimes it’s hard to tell the difference.
In light of what we know now, Zuckerberg’s high-hat act has a bit of a creepy feel, like that guy who told you he was a documentary photographer, but turned out to be a Peeping Tom.
Yes, Silicon Valley libertarians, we know there is a difference: When we hand over information to Facebook, Google, Amazon, and PayPal, we click “I Agree.” We don’t clear our cookies. We recycle the opt-out notice. And let’s face it, that’s exactly what internet companies are trying to get us to do: hand over data without thinking of the transaction as a commercial one. It’s all so casual, cheery, intimate—like, like?
But beyond all the Friends and Hangouts and Favorites, there’s cold, hard cash, and, as they say on Sand Hill Road, when the product is free, you are the product. It’s your data that makes Facebook worth $100 billion and Google $300 billion. It’s your data that info-mining companies like Acxiom and Datalogix package, repackage, sift, and sell. And it’s your data that, as we’ve now learned, tech giants also pass along to the government. Let’s review: Companies have given the NSA access to the records of every phone call made in the United States. Companies have inserted NSA-designed “back doors” in security software, giving the government (and, potentially, hackers—or other governments) access to everything from bank records to medical data. And oh, yeah, companies also flat-out sell your data to the NSA and other agencies.
To be sure, no one should expect a bunch of engineers and their lawyers to turn into privacy warriors. What we could have done without was the industry’s pearl-clutching when the eavesdropping was finally revealed: the insistence (with eerily similar wording) that “we have never heard of PRISM”; the Captain Renault-like shock—shock!—to discover that data mining was going on here. Only after it became undeniably clear that they had known and had cooperated did they duly hurl indignation at the NSA and the FISA court that approved the data demands. Heartfelt? Maybe. But it also served a branding purpose: Wait! Don’t unfriend us! Kittens!
O hai, check out Mark Zuckerberg at this year’s TechCrunch conference: The NSA really “blew it,” he said, by insisting that its spying was mostly directed at foreigners. “Like, oh, wonderful, that’s really going to inspire confidence in American internet companies. I thought that was really bad.” Shorter: What matters is how quickly Facebook can achieve total world domination.
Maybe the biggest upside to l’affaire Snowden is that Americans are starting to wise up. “Advertisers” rank barely behind “hackers or criminals” on the list of entities that internet users say they don’t want to be tracked by (followed by “people from your past”). A solid majority say it’s very important to control access to their email, downloads, and location data. Perhaps that’s why, outside the more sycophantic crevices of the tech press, the new iPhone’s biometric capability was not greeted with the unadulterated exultation of the pre-PRISM era.
The truth is, for too long we’ve been content to play with our gadgets and let the geekpreneurs figure out the rest. But that’s not their job; change-the-world blather notwithstanding, their job is to make money. That leaves the hard stuff—like how much privacy we’ll trade for either convenience or security—in someone else’s hands: ours. It’s our responsibility to take charge of our online behavior (posting Carlos Dangerrific selfies? So long as you want your boss, and your high school nemesis, to see ’em), and, more urgently, it’s our job to prod our elected representatives to take on the intelligence agencies and their private-sector pals.
The NSA was able to do what it did because, post-9/11, “with us or against us” absolutism cowed any critics of its expanding dragnet. Facebook does what it does because, unlike Europe—where both privacy and the ability to know what companies have on you are codified as fundamental rights—we haven’t been conditioned to see Orwellian overreach in every algorithm. That is now changing, and both the NSA and Mark Zuckerberg will have to accept it. The social norm is evolving.
—By Monika Bauerlein and Clara Jeffery | November/December 2013 Issue
Find this story at November/December 2013
Copyright ©2014 Mother Jones and the Foundation for National Progress.
The Bahamas Wants to Know Why the NSA is Recording Its Phone CallsJuly 7, 2014
Van nieuwsblog.burojansen.nl
Government officials in the Bahamas want their U.S. counterparts to explain why the National Security Agency has been intercepting and recording every cell phone call taking place on the island nation.
Responding to a report published by The Intercept on Monday, which revealed that the NSA has been targeting the Bahamas’ entire mobile network and storing the audio of every phone call traversing the network for up to 30 days, Bahamian officials told the Nassau Guardian that they had contacted the U.S. and vowed to release a statement regarding the revelations.
In a front-page story published Tuesday, Bahamian Minister of Foreign Affairs Fred Mitchell told the Guardian that his government had reached out to the U.S. for an explanation. Mitchell said the cabinet was set to meet to discuss the matter and planned to issue a statement on the surveillance. The Bahamian minister of national security told the paper he intended to launch an inquiry into the NSA’s surveillance but did not provide a comment.
A source familiar with the situation told The Intercept that the cabinet meeting had indeed taken place, but an official in Mitchell’s office said there would be no comment Tuesday. “You’ll have to call back,” said the official, who did not identify herself.
Calls to the office of the prime minister went unanswered, as did a call to Bahamas Telecommunications Company, the Bahamas’ largest communications provider.
U.S. officials at the embassy in the Bahamian capital of Nassau, meanwhile, told the Guardian it would not comment on “every specific alleged intelligence activity.”
“The United States values its relationship with the Bahamas,” Neda Brown, a U.S. embassy spokesperson, told the paper. Contacted by The Intercept, Brown directed inquires to the State Department’s Bureau of Western Hemispheres. The bureau did not return a request for comment made late Tuesday.
In addition to the Bahamas, The Intercept‘s report also revealed NSA’s targeting of mobile networks in Mexico, Kenya and the Philippines. Calls and emails to the embassies of each country were not returned Tuesday.
By Ryan Devereaux20 May 2014, 5:58 PM EDT 151
Find this story at 20 May 2014
© 2014 First Look Productions, Inc.
WikiLeaks ignores ‘deaths’ warning, threatens to name NSA-targeted countryJuly 7, 2014
Van nieuwsblog.burojansen.nl
Internet, Mass media, Security, USA, WikiLeaks
Despite warnings that doing so “could lead to increased violence” and potentially deaths, anti-secrecy group WikiLeaks says it plans to publish the name of a country targeted by a massive United States surveillance operation.
On Monday this week, journalists at The Intercept published a report based off of leaked US National Security Agency documents supplied by former contractor Edward Snowden which suggested that the NSA has been collecting in bulk the contents of all phone conversations made or received in two countries abroad.
Only one of those nations, however — the Bahamas — was named by The Intercept. The other, journalists Ryan Devereaux, Glenn Greenwald and Laura Poitras wrote this week, was withheld as a result of “credible concerns that doing so could lead to increased violence.”
WikiLeaks has since accused The Intercept and its parent company First Look Media of censorship and says they will publish the identity of the country if the name remains redacted in the original article. The Intercept’s Greenwald fired back over Twitter, though, and said his outlet chose to publish more details than the Washington Post, where journalists previously reported on a related call collection program but chose to redact more thoroughly.
“We condemn Firstlook for following the Washington Post into censoring the mass interception of an entire nation,” WikiLeaks tweeted on Monday.
“It is not the place of Firstlook or the Washington Post to deny the rights of an entire people to know they are being mass recorded,” WikiLeaks added. “It is not the place of Firstlook or WaPo to decide how a people will [choose] to act against mass breaches of their rights by the United States.”
When Greenwald defended his decision to publish the names of four countries where telephony metadata is collected by the NSA but withhold a fifth where content is recorded as well, WikiLeaks said it could be interpreted as meaning that the unknown country doesn’t deserve to know they’re being surveilled, but Greenwald said The Intercept was “very convinced” it could lead to deaths. Later, WikiLeaks equated this as an act of racism.
But as the conversation escalated, the WikiLeaks Twitter announced it would disclose the nation’s identify if The Intercept did not, despite requests from the US government to leave that information redact over fears of what the response could be.
“When has true published information harmed innocents?” WikiLeaks asked. “To repeat this false Pentagon talking point is to hurt all publishers.”
“We will reveal the name of the censored country whose population is being mass recorded in 72 hours,” WikiLeaks wrote at 6:35 p.m. EST Tuesday evening. If the organization intends to uphold that promise, that the identity of the country could be revealed before the weekend.
As RT reported earlier this week, The Intercept story made claims that the NSA has used a program codenamed MYSTIC to collect basic phone records in at least five countries, similar to the metadata that has been controversially collected in bulk domestically as revealed in one of the first documents released by Snowden last year. In the Bahamas and one more locale, though, The Intercept reported that NSA documents reveal another program, codenamed SOMALGET, is deployed in order to process “over 100 million call events per day.”
SOMALGET, the document reads, is a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.” According to The Intercept, the decision to wiretap all calls in and out of the Bahamas was made unilaterally and without the knowledge of the island’s government or its quarter-of-a-million people.
Published time: May 20, 2014 18:38
Edited time: May 22, 2014 11:17 Get short URL
Find this story at 20 May 2014
© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2014
Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the BahamasJuly 7, 2014
Van nieuwsblog.burojansen.nl
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.
According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.
SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.
The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
“The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”
By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
In addition, the program is a serious – and perhaps illegal – abuse of the access to international phone networks that other countries willingly grant the United States for legitimate law-enforcement surveillance. If the NSA is using the Drug Enforcement Administration’s relationship to the Bahamas as a cover for secretly recording the entire country’s mobile phone calls, it could imperil the longstanding tradition of international law enforcement cooperation that the United States enjoys with its allies.
“It’s surprising, the short-sightedness of the government,” says Michael German, a fellow at New York University’s Brennan Center for Justice who spent 16 years as an FBI agent conducting undercover investigations. “That they couldn’t see how exploiting a lawful mechanism to such a degree that you might lose that justifiable access – that’s where the intelligence community is acting in a way that harms its long-term interests, and clearly the long-term national security interests of the United States.”
The NSA refused to comment on the program, but said in a statement that “the implication that NSA’s foreign intelligence collection is arbitrary and unconstrained is false.” The agency also insisted that it follows procedures to “protect the privacy of U.S. persons” whose communications are “incidentally collected.”
Informed about the NSA’s spying, neither the Bahamian prime minister’s office nor the country’s national security minister had any comment. The embassies of Mexico, Kenya, and the Philippines did not respond to phone messages and emails.
In March, The Washington Post revealed that the NSA had developed the capability to record and store an entire nation’s phone traffic for 30 days. The Post reported that the capacity was a feature of MYSTIC, which it described as a “voice interception program” that is fully operational in one country and proposed for activation in six others. (The Post also referred to NSA documents suggesting that MYSTIC was pulling metadata in some of those countries.) Citing government requests, the paper declined to name any of those countries.
The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.
MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
1
A top-secret description of the MYSTIC program written by the NSA’s Special Source Operations division
If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
SOMALGET’s capabilities are further detailed in a May 2012 memo written by an official in the NSA’s International Crime and Narcotics division. The memo hails the “great success” the NSA’s drugs and crime unit has enjoyed through its use of the program, and boasts about how “beneficial” the collection and recording of every phone call in a given nation can be to intelligence analysts.
Rather than simply making “tentative analytic conclusions derived from metadata,” the memo notes, analysts can follow up on hunches by going back in time and listening to phone calls recorded during the previous month. Such “retrospective retrieval” means that analysts can figure out what targets were saying even when the calls occurred before the targets were identified. “[W]e buffer certain calls that MAY be of foreign intelligence value for a sufficient period to permit a well-informed decision on whether to retrieve and return specific audio content,” the NSA official reported.
“There is little reason,” the official added, that SOMALGET could not be expanded to more countries, as long as the agency provided adequate engineering, coordination and hardware. There is no indication in the documents that the NSA followed up on the official’s enthusiasm.
2
A 2012 memo written by the NSA’s International Crime & Narcotics division
The documents don’t spell out how the NSA has been able to tap the phone calls of an entire country. But one memo indicates that SOMALGET data is covertly acquired under the auspices of “lawful intercepts” made through Drug Enforcement Administration “accesses”– legal wiretaps of foreign phone networks that the DEA requests as part of international law enforcement cooperation.
When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.”
“Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe.
But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.”
What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
Selander’s first-hand experience is echoed in the 2004 memo by the manager of the NSA’s drug-war efforts, which was titled “DEA: The Other Warfighter.” The DEA and the NSA “enjoy a vibrant two-way information-sharing relationship,” the memo observes, and cooperate so closely on counternarcotics and counterterrorism that there is a risk of “blurring the lines between the two missions.”
Still, the ability to record and replay the phone calls of an entire country appears to be a relatively new weapon in the NSA’s arsenal. None of the half-dozen former U.S. law enforcement officials interviewed by The Intercept said they had ever heard of a surveillance operation quite like the NSA’s Bahamas collection.
“I’m completely unfamiliar with the program,” says Joel Margolis, a former DEA official who is now executive vice president of government affairs for Subsentio, a Colorado-based company that installs lawful intercepts for telecommunications providers. “I used to work in DEA’s office of chief counsel, and I was their lead specialist on lawful surveillance matters. I wasn’t aware of anything like this.”
3
A 2012 memo written by the NSA’s International Crime & Narcotics division
For nearly two decades, telecom providers in the United States have been legally obligated under the 1994 Communications Assistance for Law Enforcement Act to build their networks with wiretapping capabilities, providing law enforcement agencies with access to more efficient, centrally managed surveillance.
Since CALEA’s passage, many countries have adopted similar measures, making it easier to gather telecommunications intelligence for international investigations. A 2001 working group for the United Nations Office on Drugs and Crime went so far as to urge countries to consider permitting foreign law enforcement agencies to initiate international wiretaps directly from within their own territories.
The process for setting up lawful intercepts in foreign countries is largely the same as in the United States. “Law enforcement issues a warrant or other authorization, a carrier or a carrier’s agent responds to the warrant by provisioning the intercept, and the information is sent in sort of a one-way path to the law enforcement agency,” says Marcus Thomas, a former FBI assistant director who now serves as chief technology officer for Subsentio.
When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.”
The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.”
Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
“Most telecom hardware vendors will have some solutions for legal interception,” says a former mobile telecommunications engineer who asked not to be named because he is currently working for the British government. “That’s pretty much because legal interception is a requirement if you’re going to operate a mobile phone network.”
The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA.
One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
The classified 2013 intelligence budget also describes MYSTIC as using “partner-enabled” access to both cellular and landline phone networks. The goal of the access, the budget says, is to “provide comprehensive metadata access and content against targeted communications” in the Caribbean, Mexico, Kenya, the Philippines, and the unnamed country. The budget adds that in the Bahamas, Mexico, and the Philippines, MYSTIC requires “contracted services” for its “operational sustainment.”
SSO_Dictionary_Excerpt
Definitions of terms related to the MYSTIC program, drawn from an NSA glossary
The NSA documents don’t specify who is providing access in the Bahamas. But they do describe SOMALGET as an “umbrella term” for systems provided by a private firm, which is described elsewhere in the documents as a “MYSTIC access provider.” (The documents don’t name the firm, but rather refer to a cover name that The Intercept has agreed not to publish in response to a specific, credible concern that doing so could lead to violence.) Communications experts consulted by The Intercept say the descriptions in the documents suggest a company able to install lawful intercept equipment on phone networks.
Though it is not the “access provider,” the behemoth NSA contractor General Dynamics is directly involved in both MYSTIC and SOMALGET. According to documents, the firm has an eight-year, $51 million contract to process “all MYSTIC data and data for other NSA accesses” at a facility in Annapolis Junction, Maryland, down the road from NSA’s headquarters. NSA logs of SOMALGET collection activity – communications between analysts about issues such as outages and performance problems – contain references to a technician at a “SOMALGET processing facility” who bears the same name as a LinkedIn user listing General Dynamics as his employer. Reached for comment, a General Dynamics spokesperson referred questions to the NSA.
According to the NSA documents, MYSTIC targets calls and other data transmitted on Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries.
In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
Punching into this portion of a county’s mobile network would give the NSA access to a virtually non-stop stream of communications. It would also require powerful technology.
“I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world.
The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets.
But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
marijauna
A slide from a 2013 NSA Special Source Operations presentation
The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general.
So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States?
The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.
“From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
Beyond the Bahamas, the other countries being targeted by MYSTIC are more in line with the NSA’s more commonly touted priorities. In Kenya, the U.S. works closely with local security forces in combating the militant fundamentalist group Al-Shabab, based in neighboring Somalia. In the Philippines, the U.S. continues to support a bloody shadow war against Islamist extremists launched by the Bush administration in 2002. Last month, President Barack Obama visited Manila to sign a military pact guaranteeing that U.S. operations in Southeast Asia will continue and expand for at least another decade.
Mexico, another country targeted by MYSTIC, has received billions of dollars in police, military, and intelligence aid from the U.S. government over the past seven years to fight the war on drugs, a conflict that has left more than 70,000 Mexicans dead by some estimates. Attorney General Eric Holder has described Mexican drug cartels as a U.S. “national security threat,” and in 2009, then-CIA director Michael Hayden said the violence and chaos in Mexico would soon be the second greatest security threat facing the U.S. behind Al Qaeda.
Photo credit: Marcelo A. Salinas/MCT/Zumapress.com
Photo credit: Marcelo A. Salinas/MCT/Zumapress.com
The legality of the NSA’s sweeping surveillance in the Bahamas is unclear, given the permissive laws under which the U.S intelligence community operates. Earlier this year, President Obama issued a policy directive imposing “new limits” on the U.S. intelligence community’s use of “signals intelligence collected in bulk.” In addition to threats against military or allied personnel, the directive lists five broad conditions under which the agency would be permitted to trawl for data in unrestricted dragnets: threats posed by foreign powers, terrorism, weapons of mass destruction, cybersecurity, and “transnational criminal threats, including illicit finance and sanctions evasion.”
SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless.
“I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.”
“An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.”
It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
Documents published with this article:
SOMALGET memo
SIDToday: DEA – The “Other” Warfighter
SSO Dictionary Excerpt
MYSTIC
SSO March 14, 2013
SSO April 18, 2013 – What’s New
SSO May 2, 2013
SSO May 3, 2013 – MYSTIC
SSO May 3, 2012
Black Budget
By Ryan Devereaux, Glenn Greenwald and Laura Poitras19 May 2014, 12:37 PM EDT 395
Find this story at 19 May 2014
© 2014 First Look Productions, Inc
Greenwald: Washington Post ‘suppressed’ foreign countries under NSA eavesdropping programJuly 7, 2014
Van nieuwsblog.burojansen.nl
It’s been a couple of months since the Washington Post published a scoop on the extraordinary overseas eavesdropping capabilities of the U.S. government. Under the bylines of Barton Gellman and Ashkan Soltani, the paper revealed that the National Security Agency (NSA) had amassed a system — known as “MYSTIC” — enabling it to “rewind and review” all of the telephone conversations of a foreign country.
From the story: “A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.” Details on the program came from documents supplied by NSA whistleblower Edward Snowden as well as from sources familiar with the program.
A really juicy scoop, with one desiccating caveat: The Post withheld a detail critical to understanding the scope and capabilities of the program:
At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Ah, a legacy media outlet acceding to a request from the U.S. government. Or, in other words, the raison d’etre of Glenn Greenwald, the former Guardian columnist and current First Look Media talent who has long criticized American media outlets for wimping out on disclosure of sensitive information. In a recent interview with Amy Goodman of Democracy Now, Greenwald riffed, “[t]he editors at The Washington Post are very much old-style, old-media, pro-government journalists, the kind who have essentially made journalism in the U.S. neutered and impotent and obsolete.”
Following the Post’s story on MYSTIC, the Erik Wemple Blog waited a couple of weeks and then asked Greenwald, essentially, where’s your story on this thing? He responded, “I can’t comment on that yet, except to say that, obviously, if we were to publish something that the WashPost has announced it thinks shouldn’t be published, it would take work (and thus time) with editors, lawyers and the like.”
Time, indeed. Yesterday, The Intercept, First Look Media’s magazine on national security matters, published its version of the Post’s MYSTIC story. In the very headline of the piece, it drew a distinction between its piece and that of the Washington Post: “Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas.”
The Bahamas? The what?
Under the bylines of Ryan Devereaux, Greenwald and Laura Poitras, The Intercept reports that the NSA worked with the Drug Enforcement Agency (DEA) to secure a “backdoor” to the cell phone network of the island nation, “without the knowledge or consent of the Bahamian government.” Noting that the agency commonly cites such life-and-death imperatives as anti-terrorism to justify its eavesdropping program, in this case it’s going after drug traffickers and smugglers, “a far cry from derailing terror plots or intercepting weapons of mass destruction,” notes the story.
If the Bahamas sounds like an odd place on which to focus such a spy initiative, that’s perhaps by design, notes the story: It could well be a “sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere.”
As for the “elsewhere,” Greenwald and The Intercept go there, to a point. Here’s the big reveal of the story: “Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.”
John Cook, The Intercept’s editor-in-chief, declined an interview request about the decisions behind the story, instead leaving the matter to Twitter. Which provides a rich back-and-forth for this case.
Following publication of the story, Wikileaks ripped The Intercept for failing to embrace a more radical form of transparency:
The principals then went off to the races:
And then some input from The Intercept’s priest of adversarial press-government relations:
Compare that sentiment with what Greenwald tweeted the day the Washington Post published its MYSTIC story:
As part of the back-and-forth Wikileaks made a bid for renewed relevance with this boast:
The exchange proves that in the world of radical media-government adversarialists, purity is a prerequisite. Here, Greenwald apparently thought his publication was sticking to its governing principles in publishing the names of four countries, only to get shouted down by Wikileaks for not going far enough (Greenwald couldn’t be reached for comment). In a previous post, Greenwald has criticized the NSA for allegedly spilling details of top-secret programs when it suits its propaganda mission, only to turn around and insist to media outlets that lives will be endangered if they publish sensitive information.
The Intercept’s partial defiance of the NSA in publishing the names of four countries surely adds contour to the story of MYSTIC — the example of the Bahamas alone fleshes out various legal and diplomatic considerations involved in foreign surveillance. The more careful Washington Post version of the story was interesting yet unsatisfying: Absent a specific country, it was more difficult to reach hard conclusions on the program’s legitimacy, legality and efficacy. Those are the dangers of scaling back detail in consideration of security concerns. When asked if naming just the Bahamas as a way of explaining NSA capabilities would have been a tolerably cautious approach, Washington Post Executive Editor Martin Baron replied, “You make some assumptions here, but I’m not going to address them.”
There are also perils to The Intercept’s approach. It may have touched off a macho-transparentist scramble to out that one country whose secretness The Intercept genuinely wants to protect.
Whatever the outcome, each outlet apparently got the same pitch from the government: “We shared with both news outlets the very same concerns about risks to human life and national security,” says NSA spokeswoman Vanee’ Vines in a statement to this blog. She also sent along this statement:
Every day, NSA provides valuable intelligence on issues of concern to all Americans – such as international terrorism, cyber crime, international narcotics trafficking, and the proliferation of weapons of mass destruction. The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all.
NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets. Moreover, all of NSA’s efforts are strictly conducted under the rule of law and provide appropriate protection for privacy rights.
The Agency collects data to meet specific security and intelligence requirements such as counterintelligence, counterterrorism, counterproliferation, cyber security, force protection for U.S. troops and allies, and combating transnational crime.
Erik Wemple writes the Erik Wemple blog, where he reports and opines on media organizations of all sorts.
BY ERIK WEMPLE May 20
Find this story at 20 May 2014
© 1996-2014 The Washington Post
Glenn Greenwald: how the NSA tampers with US-made internet routersJuly 7, 2014
Van nieuwsblog.burojansen.nl
The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
For years, the US government loudly warned the world that Chinese routers and other internet devices pose a “threat” because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA’s documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
Tell us what you think: Star-rate and review this book
The drumbeat of American accusations against Chinese internet device manufacturers was unrelenting. In 2012, for example, a report from the House Intelligence Committee, headed by Mike Rogers, claimed that Huawei and ZTE, the top two Chinese telecommunications equipment companies, “may be violating United States laws” and have “not followed United States legal obligations or international standards of business behaviour”. The committee recommended that “the United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies”.
The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products: “Private-sector entities in the United States are strongly encouraged to consider the long-term security risks associated with doing business with either ZTE or Huawei for equipment or services. US network providers and systems developers are strongly encouraged to seek other vendors for their projects. Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security threat to the United States and to our systems.”
The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: “‘If Huawei gets in the middle of US-China relations,’ and causes problems, ‘it’s not worth it’.”
But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA’s Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.
The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some “SIGINT tradecraft … is very hands-on (literally!)”.
Eventually, the implanted device connects back to the NSA. The report continues: “In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network.”
It is quite possible that Chinese firms are implanting surveillance mechanisms in their network devices. But the US is certainly doing the same.
Warning the world about Chinese surveillance could have been one of the motives behind the US government’s claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA’s own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
The Guardian, Monday 12 May 2014 22.39 BST
Find this story at 12 May 2014
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Inhoudsopgave Observant #65, juni 2014June 30, 2014
01 inhoudsopgave
02 G4S: Media, privatisering en burger- en mensenrechten
03 Media smullen van G4S ‘terreurexpert’
04 The United Nations and G4S
05 Dangerous Partnership & Contracting Insecurity
06 Overheidstaken G4S in strijd met duurzaamheidsbeleid
07 Met de billen bloot op facebook
08 FB inlichtingendienst
09 Google zoekt met je mee…
10 AIVD benadert IT’er om hackers-informatie
11 Van bemiddelaar tot doelwit AIVD
12 Boekrecensie: The Way of the Knife
13 migratie-beleid.nl
14 Grensgevangenen
15 donateurs gezocht
Hier is de nieuwe Observant van Buro Jansen & Janssen. Om de twee maanden lukt nog niet, maar is nog steeds het streven. In dit nummer aandacht voor G4S, het grootste beveiligingsbedrijf van de wereld. Het motto van het bedrijf is ‘Securing your world’, maar is dat wel zo en hoe kritisch gaan de media en de overheid met het bedrijf om? Daarnaast Facebook (FB) als inlichtingendienst en als profiling center. Opnieuw benaderingen, een nieuwe website, een recensie, een oud boek en nog veel meer. Wilt u dat Jansen & Janssen de komende jaren onderzoek blijft doen naar politie, justitie en inlichtingendiensten, steun ons dan.
Wordt donateur of vraag familie, vrienden en bekenden donateur te worden. Bankrekening N56INGB00006039 04 (ING 603904 BIC: INGBNL2A) ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam. Res Publica is de stichting van Jansen & Janssen.
Mocht je een interessant artikel hebben over je confrontatie met politie en justitie, een nieuwe wetgeving, onderzoek of scriptie mail het dan ons, info@burojansen.nl.
Al 30 jaar diepgravend, kritisch en doortastend burgerrechten onderzoek. Buro Jansen & Janssen gewoon inhoud.
G4S: Media, privatisering en burger-/mensenrechtenJune 29, 2014 - bron: Buro Jansen & Janssen
Heel langzaam sluipt de privatisering de beveiligingswereld in. Veiligheid lijkt te worden geïnterpreteerd als een allesomvattend concept. Beveiligingsfirma G4S draagt dit totale concept van veiligheid uit en dringt zo door tot in de haarvaten van de samenleving.
In enkele landen om ons heen verloopt het proces van beveiligingsontwikkeling nog wat sneller, maar over de gehele linie is duidelijk dat privatisering de veiligheid langzaam overneemt. Niet alleen vinden er controles op vliegvelden, in gevangenissen, politiecellen en winkels plaats, ook neemt de beveiliging van ambulances, reguliere opvang voor vluchtelingen, logistieke diensten en zelfs rond subsidieverlening toe.
lees meer
Media smullen van G4S ‘terreurexpert’June 28, 2014 - bron: Buro Jansen & Janssen
Hij duikt de afgelopen jaren geregeld op in de media als ‘onafhankelijk’ expert op het gebied van terreur, Glenn Schoen. Hij verkondigt doemscenario’s die de overheid dienen aan te sporen het pakket aan veiligheidsmaatregelen verder op te schroeven. Schoen echter is werkzaam voor de private beveiligingsfirma G4S, in wezen verkoopt hij zijn product.
Glenn Schoen is een graag geziene gast in de wereld van de media. Van het tv-programma Dit is de dag van Tijs van de Brink, BNR nieuwsradio, Pauw en Witteman, Met het Oog op Morgen tot aan Hubert Smeets van NRC Handelsblad: ze maken allemaal dolgraag gebruik van de diensten van Schoen. Hij wordt onder andere omschreven als ‘terrorisme deskundige/expert’, ‘terreurdeskundige/expert’, ‘Al Qaida deskundige/expert’, ‘veiligheidsdeskundige/expert’, ‘veiligheidsanalist’ en ‘beveiligingsdeskundige’.
lees meer
The United Nations and G4SJune 27, 2014 - bron: Buro Jansen & Janssen
The United Nations and G4S: Challenges in the contracting of private military security companies for international peacekeeping and humanitarian support
Two reports authored by Lou Pingeot and published by the Global Policy Forum and the Rosa Luxemburg Stiftung – New York Office present the alarming trend of the United Nations (UN) contracting private military security companies (PMSCs) to provide a broad range of security and non-security services connected to peacekeeping and humanitarian missions as well as other UN operations. This article briefly reviews some of the findings of Pingeot’s reports and the concerns raised regarding the relationships between the UN and PMSCs, particularly in light of the companies’ track record of malfeasance and human rights abuses.
Pingeot’s reports identified ten major PMSCs and of dozens smaller and local companies in the industry that have been contracted by the UN. This article focuses on G4S and its contracts with UN agencies, summarizing the UN contracts with the G4S family and presenting some examples of the company’s misconduct. The responses of G4S to Pingeot’s reports are also presented.
The fundamental concerns with the UN’s use of PMSCs are described, along with the UN’s response to the initial report, as presented by Pingeot in the follow-up report. The article ends with questions raised by this issue, in particular how to address the trend towards the “securitization” of peacekeeping and humanitarian efforts and how to hold private multinational corporations in the military and security industry accountable for their actions.
lees meer
Dangerous PartnershipJune 26, 2014
Uit de samenvatting van Dangerous Partnership
The United Nations is increasingly hiring Private Military and Security Companies (PMSCs) for a wide array of se¬curity services. The UN’s leadership says these services are needed to protect the organization’s staff and worldwide operations from growing threats and unprecedented dan¬gers. But many reports from governments, NGOs and the media have shown how PMSCs have committed serious human rights abuses, killed or injured innocent civilians, engaged in financial malfeasance and committed many other breaches of the law. Given the track record of these companies, serious questions arise as to whether PMSCs are appropriate UN partners for the complex task of cre¬ating a secure, just and lawful world. Opacity around the UN’s use of PMSCs has so far prevented a healthy debate.
This report aims to clarify the issue and reflect on its impli¬cations for the future of the UN. The report will consider the problems as well as possible solutions – not just through regulatory reform but also through re-thinking the UN’s ap¬proach to peace and security frameworks more generally. It is our hope to stimulate debate and discussion, so as to break through the silence and to re-think the role of a more democratic and effective UN in the years ahead.
Dangerous Partnership, Private Military & Security
tracting Insecurity – Private military and securit
Overheidstaken G4S in strijd duurzaamheidsbeleidJune 25, 2014 - bron: Buro Jansen & Janssen
Beveiligingsbedrijf G4S raakt internationaal geregeld in opspraak, onder meer vanwege wangedrag van haar personeel. Verbindt de Nederlandse overheid, dat G4S heeft omarmd, hier geen consequenties aan? Buro J&J dook in de samenwerkingscontracten, met onthutsend resultaat.
In Duurzaam afwimpelen (28 maart 2012) analyseerde Buro Jansen & Janssen het duurzaamheidsbeleid van de Nederlandse overheid. Bij dit beleid gaat het vooral over ketenpartners, eigen verantwoordelijkheid van de bedrijven en het ‘maatschappelijk middenveld als kwaliteitsbewaker’.
Aan de hand van schoonmakers en de elektronica-industrie werd beschreven dat de controle op milieu-, sociale- en andere aspecten van een product of dienst erg de wensen overlaat. Bezuinigingen op het maatschappelijk middenveld, gebrekkige controle en ondoorzichtige uitbesteding van opdrachten maken een duurzaamheidslabel zinloos. In het artikel over Chiquita van 23 juli 2013 wordt dit nog eens onderschreven.
Bijkomend probleem van het duurzaamheidsvraagstuk is dat de overheid als consument slechts moeizaam openheid geeft over de producten en diensten die zij afneemt. In het kader van het onderzoek naar beveiligingsreus G4S stelt Buro jansen & Janssen de vraag in hoeverre de overheid bij het uitbesteden van beveiligingstaken haar eigen duurzaamheidsnormen hanteert.
lees meer
<< oudere artikelen nieuwere artikelen >>