Saturday, June 22, 2013

NACIONALIZAÇÕES À VISTA

“Nacionalizações à vista”
Para grandes problemas, grandes soluções.
O Governo tem já no curriculum vitae, dois Orçamentos de Estado chumbados, estamos no decorrer do mês de Junho, e as alterações ao Orçamento Retificativo ainda não forma elaboradas e muito menos discutidas no Parlamento; daí que o Governo possa negar-se a efetuar o pagamento dos subsídios de férias à Função Pública, dando-lhe jeito que se protele o Orçamento de Estado definitivo, porque assim não tem compromissos políticos em falta, e a margem de incerteza económica é de tal maneira grave, que penso até que exista uma espécie de acordo secreto para a manutenção do status quo, envolvendo o PCP e o BE, pactuado com os Partidos Políticos no Governo e com os socialistas, para que a indefinição orçamental se mantenha, no sentido que seja viável e possível o 2.º resgate a Portugal.
Queria cortar caminho nas razões pelas quais as nacionalizações virão a grande velocidade para o tabuleiro político, que já se sabem sobremaneira. Por um lado o caso BPN, foi um exemplo de uma nacionalização feita á liberal “entalado”, que compra um passivo financeiro gigante e depois vende a qualquer preço, sendo que esse diferencial entre o que o Estado perdeu na compra do Banco e o que encaixou com a venda, foi o início do Titanic.
Ao que parece, e já estou receosa que seja a esquerda populista e mais a dita radical, a executar a “salvação nacional”, dado que ainda temos empresas coim participações estatais que são diamantes. Nomeadamente os 11% do estado na REN (Rede Elétrica Nacional), que o Governo PSD com olhar guloso pensa já em dispersar essa mesma participação pública. No entanto, várias questões se colocam nas secretárias do Poder : a descida de juros provoca uma subida do preço alvo por ação na ordem de uma valorização de 20,3%. Ora, a REN tem uma carteira de ações na Bolsa de Valores de 5,2% que representa um número aproximado de 80 milhões de euros ( logo se 5% estão para 80 milhões €, 100% estão para 16 mil milhões €), atrativo sem dúvida para qualquer Governo que se queira salvar do pesadelo e do afogamento do défice público; por outro lado, sendo a Rede Elétrica Nacional, fundamental para a independência e segurança nacional, e tendo previsto em Plano de Investimentos 3.200 mil milhões €, sendo que 900 milhões € estavam destinados à rede de transportes e armazenamento de Gás natural, ponto essencial de várias linhas políticas desenhadas na última década respeitantes a negociações bilaterais, a começar coma Espanha, e depois com os países do Magreb, alienar portanto a participação pública desenha-se uma possibilidade entre mãos, quer estejam incluídas as subsidiárias associadas à REN, como a atividade de exploração de minerais (Também de interesse estratégico), com as minas de ouro no Alto Alentejo, ou a Rede Ecológica Nacional, que recebe prioritariamente fundos europeus de relevância económica para o desenvolvimento sustentável. O negócio da alienação da participação do Estado na REN é bem possível que se concretize, mas é igualmente possível que logo a seguir se proceda à nacionalização da empresa. E é este o xadrez que pode salvar o Governo da agonia, mas muito sublimemente com o concordo da Oposição.


Tuesday, June 11, 2013

MADELEIN MCANN

[Image]
The following text is an unredacted version retrieved from Google cache, with redacted text in red identifying a former undercover police officer who worked with MI5. See other hosts of this via Google on "Henri Exton."
September 25, 2009
Mark Hollingsworth Investigates The McCann Files
Disillusioned with the Portuguese police, Gerry and Kate McCann turned to private detectives to find their missing daughter. Instead the efforts of the private eyes served only to scare off witnesses, waste funds and raise false hopes. Mark Hollingsworth investigates the investigators.
by Mark Hollingsworth
It was billed as a ‘significant development’ in the exhaustive search for Madeleine McCann. At a recent dramatic press conference in London, the lead private investigator David Edgar, a retired Cheshire detective inspector, brandished an E-FIT image of an Australian woman, described her as ‘a bit of a Victoria Beckham lookalike’, and appealed for help in tracing her. The woman was seen ‘looking agitated’ outside a restaurant in Barcelona three days after Madeleine’s disappearance. ‘It is a strong lead’, said Edgar, wearing a pin-stripe suit in front of a bank of cameras and microphones. ‘Madeleine could have been in Barcelona by that point. The fact the conversation took place near the marina could be significant.’
But within days reporters discovered that the private detectives had failed to make the most basic enquiries before announcing their potential breakthrough. Members of Edgar’s team who visited Barcelona had failed to speak to anyone working at the restaurant near where the agitated woman was seen that night, neglected to ask if the mystery woman had been filmed on CCTV cameras and knew nothing about the arrival of an Australian luxury yacht just after Madeleine vanished.
The apparent flaws in this latest development were another salutary lesson for Kate and Gerry McCann, who have relied on private investigators after the Portuguese police spent more time falsely suspecting the parents than searching for their daughter. For their relations with private detectives have been frustrating, unhappy and controversial ever since their daughter’s disappearance in May 2007.
The search has been overseen by the millionaire business Brian Kennedy, 49, who set up Madeleine’s Fund: Leaving No Stone Unturned, which aimed ‘to procure that Madeleine’s abduction is thoroughly investigated’. A straight-talking, tough, burly self-made entrepreneur and rugby fanatic, he grew up in a council flat near Tynecastle in Scotland and was brought up as a Jehovah’s Witness. He started his working life as a window cleaner and by 2007 had acquired a £350 million fortune from double-glazing and home-improvement ventures. Kennedy was outraged by the police insinuations against the McCanns and, though a stranger, worked tirelessly on their behalf. ‘His motivation was sincere,’ said someone who worked closely with him. ‘He was appalled by the Portuguese police, but he also had visions of flying in by helicopter to rescue Madeleine.’
Kennedy commissioned private detectives to conduct an investigation parallel to the one run by the Portuguese police. But his choice showed how dangerous it is when powerful and wealthy businessmen try to play detective. In September 2007, he hired Metodo 3, an agency based in Barcelona, on a six-month contract and paid it an estimated £50,000 a month. Metodo 3 was hired because of Spain’s ‘language and cultural connection’ with Portugal. ‘If we’d had big-booted Brits or, heaven forbid, Americans, we would have had doors slammed in our faces’ said Clarence Mitchell, spokesperson for the McCann’s at the time. ‘And it’s quite likely that we could have been charged with hindering the investigation as technically it’s illegal in Portugal to undertake a secondary investigation.
The agency had 35 investigators working on the case in Britain, France, Spain, Portugal and Morocco. A hotline was set up for the public to report sightings and suspicions, and the search focussed on Morocco. But the investigation was dogged by over-confidence and braggadocio. ‘We know who took Madeleine and hope she will be home by Christmas,’ boasted Metodo 3’s flamboyant boss Francisco Marco. But no Madeleine materialised and their contract was not renewed.
Until now, few details have emerged about the private investigation during those crucial early months, but an investigation by ES shows that key mistakes were made, which in turn made later enquiries far more challenging.
ES has spoken to several sources close to the private investigations that took place in the first year and discovered that:
* The involvement of Brian Kennedy and his son Patrick in the operation was counter-productive, notably when they were questioned by the local police for acting suspiciously while attempting a 24-hour ‘stake out’.
* The relationship between Metodo 3 and the Portuguese police had completely broken down.
* Key witnesses were questioned far too aggressively, so much so that some of them later refused to talk to the police.
* Many of the investigators had little experience of the required painstaking forensic detective work.
By April 2008, nearing the first anniversary of the disappearance, Kennedy and the McCanns were desperate. And so when Henri Exton, a formerundercover police officer who worked on MI5 operations, and Kevin Halligen, a smooth-talking Irishman who claimed to have worked for covert British government intelligence agency GCHQ, walked through the door, their timing was perfect. Their sales pitch was classic James Bond spook-talk: everything had to be ‘top secret’ and ‘on a need to know basis’. The operation would involve 24-hour alert systems, undercover units, satellite imagery and round-the-clock surveillance teams that would fly in at short notice. This sounded very exciting but, as one source close to the investigation told ES, it was also very expensive and ultimately unsuccessful. ‘The real job at hand was old-fashioned, tedious, forensic police work rather than these boy’s own, glory boy antic,’ he said.
But Kennedy was impressed by the license-to-spy presentation and Exton and Halligen were hire for a fee of £100,000 per month plus expenses. Ostensibly, the contract was with Halligen’s UK security company, Red Defence International Ltd, and an office was set up in Jermyn Street, in St James’s. Only a tiny group of employees did the painstaking investigative work of dealing with thousands of emails and phone calls. Instead, resources were channelled into undercover operations in paedophile rings and among gypsies throughout Europe, encouraged by Kennedy. A five-mansurveillance team was dispatched in Portugal, overseen by the experienced Exton, for six weeks.
Born in Belgium in 1951Exton had been a highly effective undercover officer for the Manchester police. A maverick and dynamic figure, he successfully infiltrated gangs of football hooligans in the 1980’s. While not popular among his colleagues, in 1991 he was seconded to work on MI5 undercover operations against drug dealers, gangsters and terrorists, and was later awarded the Queen’s Police Medal for ‘outstanding bravery’. By all accounts, the charismatic Exton was a dedicated officer. But in November 2002, the stress appeared to have overcome his judgement when he was arrested for shoplifting.
While working on an MI5 surveillanceExton was caught leaving a tax-free shopping area at Manchester airport with a bottle of perfume he had not paid for. The police were called and he was given the option of the offence being dealt with under caution or to face prosecution. He chose a police caution and so in effect admitted his guilt. Exton was sacked, but was furious about the way he had been treated and threatened to sue MI5. He later set up his own consulting company and moved to Bury in Lancashire.
While Exton, however flawed, was the genuine article as an investigator, Halligen was a very different character. Born in Dublin in 1961, he has been described as a ‘Walter Mitty figure’. He used false names to collect prospective clients at airports in order to preserve secrecy, and he called himself ‘Kevin’ or ‘Richard’ or ‘Patrick’ at different times to describe himself to business contacts. There appears to be no reason for all this subterfuge except that he thought this was what agents did. A conspiracy theorist and lover of the secret world, he is obsessed by surveillance gadgets and even installed a covert camera to spy on his own employees. He claimed to have worked for GCHQ, but in fact he was employed by the Atomic Energy Authority (AEA) as head of defence systems in the rather less glamorous field of new information technology, researching the use of ‘special batteries’. He told former colleagues and potential girlfriends that he used to work for MI5, MI6 and the CIA. He also claimed that he was nearly kidnapped by the IRA, was involved in the first Gulf War and had been a freefall parachutist.
Very little of this is true. What is true is that Halligen has a degree in electronics, worked on the fringes of the intelligence community while at AEA and does understand government communications. He could also be an astonishingly persuasive, engaging and charming individual. Strikingly self-confident and articulate, he could be generous and clubbable. ‘He was very good company but only when it suited him’ says one friend. He kept people in compartments.’
After leaving the AEA, Halligen set up Red Defence International Ltd as an international security and political risk company, advising clients on the risks involved in investing and doing business in unstable, war-torn and corrupt countries. He worked closely with political risk companies and was a persuasive advocate of IT security. In 2006, he struck gold when hired by Trafigura, the Dutch commodities trading company. Executives were imprisoned in the Ivory Coast after toxic waste was dumped in landfills near its biggest city Abidjan. Trafigura was blamed and hired Red Defence International at vast expense to help with the negotiations to release its executives. A Falcon business jet was rented for several months during the operation and it was Halligen’s first taste of the good life. The case only ended when Trafigura paid $197 million to the government of the Ivory Coast to secure the release of the prisoners.
Halligen made a fortune from Trafigura and was suddenly flying everywhere first-class, staying at the Lansborough and Stafford hotels in London and The Willard hotel in Washington DC for months at a time. In 2007 he set up Oakley International Group and registered at the offices of the prestigious law firm Patton Boggs, in Washington DC, as an international security company. He was now strutting the stage as a self-proclaimed international spy expert and joined the Special Forces Club in Knightsbridge, where he met Exton.
During the Madeleine investigation, Halligen spent vast amounts of time in the HeyJo bar in the basement of the Abracadabra Club near his Jermyn Street office. Armed with a clutch of unregistered mobile phones and a Blackberry, the bar was in effect his office. ‘He was there virtually the whole day,’ a former colleague told ES. ‘He had an amazing tolerance for alcohol and a prodigious memory and so occasionally he would have amazing bursts of intelligence, lucidity and insights. They were very rare but they did happen.’
When not imbibing in St James’s, Halligen was in the United States, trying to drum up investors for Oakley International. On 15 August 2008, at the height of the McCann investigation crisis, he persuaded Andre Hollis, a former US Drug enforcement agency official, to write out an $80,000 cheque to Oakley in return for a ten per cent share-holding. The money was then transferred into the private accounts of Halligen and his girlfriend Shirin Trachiotis to finance a holiday in Italy, according to Hollis. In a $6 million lawsuit filed in Fairfax County, Virginia, Hollis alleges that Halligen ‘received monies for Oakley’s services rendered and deposited the same into his personal accounts’ and ‘repeatedly and systematically depleted funds from Oakley’s bank accounts for inappropriate personal expenses’.
Hollis was not the only victim. Mark Aspinall, a respected lawyer who worked closely with Halligen, invested £500,000 in Oakley and lost the lot. Earlier this year he filed a lawsuit in Washington DC against Halligen claiming $1.4 million in damages. The finances of Oakley International are in chaos and numerous employees, specialist consultants and contractors have not been paid. Some of them now face financial ruin.
Meanwhile, Exton was running the surveillance teams in Portugal and often paying his operatives upfront, so would occasionally be out-of-pocket because Halligen had not transferred funds. Exton genuinely believed that progress was being made and substantial and credible reports on child trafficking were submitted. But by mid-August 2008, Kennedy and Gerry McCann were increasingly concerned by an absence of details of how the money was being spent. At one meeting, Halligen was asked how many men constituted a surveillance team and he produced a piece of paper on which he wrote ‘between one and ten’. But he then refused to say how many were working and how much they were being paid.
While Kennedy and Gerry McCann accepted that the mission was extremely difficult and some secrecy was necessary, Halligen was charging very high rates and expenses. And eyebrows were raised when all the money was paid to Oakley International, solely owned and managed by Halligen. One invoice, seen by ES, shows that for ‘accrued expenses to May 5, 2008’ (just one month into the contract), Oakley charged $74,155. The ‘point of contact’ was Halligen who provided a UK mobile telephone number.
While Kennedy was ready to accept Halligen at face value, Gerry McCann ­ sharp, focused and intelligent ­ was more sceptical. The contract with Oakley International and Halligen was terminated by the end of September 2008, after £500,000-plus expenses had been spent.
For the McCanns it was a bitter experience, Exton has returned to Cheshire and, like so many people, is owed money by Halligen. As for Halligen, he has gone into hiding, leaving a trail of debt and numerous former business associates and creditors looking for him. He was last seen in January of this year in Rome, drinking and spending prodigiously at the Hilton Cavalieri and Excelsior hotels. He is now believed by private investigators, who have been searching for him to serve papers on behalf of creditors, to be in the UK and watching his back. Meanwhile, in the eye of the storm, the McCanns continue the search for their lost daughter
TAL&QUAL, Lisbon weekly newspaper
Friday, 14 July 2000
Translated from the original Portuguese article by the author, Frederico Duarte

Coelho under surveillance

The European Parliament has chosen the Portuguese European Parliament Member MP Carlos Coelho to lead the investigation on "Echelon,", the worldwide eavesdropping system. The Portuguese is going to be the man that, for a year, will be under the most stringent surveillance of the world of espionage
The Portuguese European Parliament Member, Carlos Coelho, of PSD (Partido Social Democrata, Social-Democrat Party, member of the Christian Democrat group in the European Parlament-EP), newly-appointed president of the investigation committee of the EP that, starting in September, will investigate the Echelon spy system, will be the most watched man in the world during the next year.
"My telephones, faxes and e-mails might already be under surveillance," he told a Tal&Qual reporter this week with a shrug of shoulders that shows his perfect awareness of the situation.
Originally from Lisbon, where he was born 40 years ago, Carlos Coelho was president of the Young Social-Democrats and became the youngest MP in Europe at the age of 19 when he replaced the late MP Natália Correia in the Portuguese national parliament. His personality is marked by a very peculiar sense of humour that makes him, for instance, wear ties with rabbit images (in Portuguese Coelho = rabbit), which is enough to break with protocol rules in the most serious situations.
Carlos Coelho was also one of the youngest Portuguese government member when he was the under-secretary to the minister of Education Manuela Ferreira Leite. Now, his election for "first-vigilant" of Echelon is due to the fact that he¹s a member of the Committe on Citizen¹s Freedoms and Rights, Justice and Home Affairs at the EP.
On the other hand, if our man in Strasbourg faces any difficulty penetrating the complex world of espionage, he can always hope for advice from his colleague and leader of the PSD MP¹s at the EP, Pacheco Pereira, the author of the introductory text of the Portuguese version of the most polemical espionage book since the end of the Cold War: The Mitrokhin Archive, which will be published next November in Portugal.
Industrial espionage
Carlos Coelho is going to co-ordinate a group of 36 MPs for a year, starting next September. "There's a system which is organized and controlled by the American secret services which has the capacity to intercept practically all forms of communication of voice and data at a planetary scale," Carlos Coelho said last March to the European Committee, in Brussels.
After the Berlin Wall fell and the end of Cold War between the United States and the former USSR, this powerful surveillance system known as Echelon "was directed not with purely military and defence intentions, but with commercial, industrial and tecnological goals," the Portuguese MP also said.
Several journalistic investigations about Echelon, the most recent made by Duncan Campbell, shows well how information gathered by the spy satellites from the USA ruined important business of European companies. In 1994, for instance, the system intercepted telephone calls between the French company Thomson-CSF and the Brasilian SIVAM to negotiate a surveillance system in the Amazon jungle. After those telephone interceptions, bribe allegations were raised that the French had tried to buy over a member of the Brasilian governmental board. In the end, the business went to the American company Raytheon, the same that is in charge of the maintenance and engineering services of the American Echelon base in Sugar Grove, Virginia, in the US.
A year later it was the turn of the aviation company Airbus, also French, to be the victim of the action of the US spies.
According to the Duncan Campbell report the American satellites got access to every fax and telephone call between Airbus, the government and members of the air force of Saudi Arabia. The agents found that the French were offering a bribe to a Saudi official. Thanks to this information, the Americans won the 6 billion dollar business that went to Boeing and McDonnell Douglas.
Allies
One additional problem for Carlos Coelho is that one of the partners of the Americans on this spy system is the United Kingdom, also a member of the European Union. "If France tells us that we can't have acess to certain information because they consider it to be a state secret, we are not going to insist on the request. As for UK, the case might be different...," explained Carlos Coelho this week to Tal&Qual.
"In September, I will start co-ordinating the group, first asking the nations involved on Echelon  for the necessary co-operation. Only afterwards will I see what can be done in face of the answers that we will get from those countries," added the same Euro MP.
The origins of Echelon date to 1947, when the secret services of the UK and USA created the UKUSA agreement. The intention was to watch the movements of the nations that after Word War II were left behind the iron curtain raised by the communists from Moscow.
As years went by, the antennas of the UKUSA agreement spread to the allied countries of Canada, Australia and New Zeland, creating a privileged net of Anglo-Saxon information. Excluded from this group are the other powerful European nations such as France, Italy and Germany.
Abbreviations
For the study about Echelon it's better to forget CIA. The name to remember for this information net is NSA -- National Security Agency. Created in 1952, NSA's main goal is just to gather information. It has no agents like CIA, and doesn¹t make international operations able to inspire espionage romances like the mythical John Le Carré. But, in order to get an idea about how effective they are, let's just state the fact that it was the NSA which found the exact location of the Argentinian guerrilla Che Guevara when he was in Bolivia, information that led to his death.
For the most part members at NSA are recruited from the Air Force, Navy and Army. Only a small number are the civilian.
As for the English, forget the lesser and lesser secret services of MI5 and James Bond's MI6. Now the abbreviation is GCHQ -- Government Communications Headquarters. But, let's not assume that on this game there's any kind of loyalty. One example: the NSA men at the American embassy in London do spy on the diplomatic talks of their allies at UKUSA. It's a spy world.
Well informed sources
In order to know more about the world of espionage, and in particular about Echelon, the best place where Carlos Coelho might start looking is the internet site ... This place is managed by John Young, a New York architect that, without geting a penny for it, publishes every day documents that arrive to him from every part of the world. His archive is large and has the most diverse information on cryptography, news, articles and documents about actions made by several "intelligence" services of several nations. The archive is available on-line and can be very precious to our Euro MP.
On the other side, in case Carlos Coelho think it might be necessary, he can always call to testify on his committtee the former British secret agent of MI5, David Shayler, that now lives in a farm near Paris and that can not return to the UK. The former agent, in case he returns home, faces the risk of being arrested because he revealed less than correct actions of the secret services while he worked there. David Shayler will also be able to explain to the committee how easy it is for the British services to spy inside and, mainly, outside their borders.


Frederico Duarte is a 27-year-old journalist at Tal&Qual since 1996. Mr. Duarte is preparing a book on Michael John Smith who was convicted in 1993 of charges by the British Government that he was a spy for the KGB. Mr. John Smith was sentenced to 25 years and is now in Full Sutton Prison, York.



Mr. Duarte has researched and written on intelligence and espionage since 1992, when his interest was stimulated by the John Smith case that had connections with Oporto, Portugal, Mr. Duarte's hometown. Mr. Duarte has found information on the John Smith case not presented during the trial which supports Mr. John Smith's claims of innocence. He welcomes additional information on the case. Send to: fredericoduarte@lycos.com

Thursday, June 6, 2013

INTELLIGENCE

LOSING THE CODE WAR

STEPHEN BUDIANSKY
The great age of code breaking is over -- and with it much of our ability to track the communications of our enemies
Within days of the September 11 attacks U.S. intelligence agencies were being blamed in many quarters for their failure to detect the terrorists' plans in advance. Mistakes in the formulation and execution of intelligence policy were no doubt made. Yet there is no one to blame for what is probably by far the greatest setback in recent years to American capabilities for keeping tabs on terrorists: the fact that it is now virtually impossible to break the encrypted communication systems that PCs and the Internet have made available to everyone -- including, apparently, al Qaeda. The real culprits behind this intelligence failing are the advance of technology and the laws of mathematics.
For more than a decade the National Security Agency has been keenly aware that the battle of wits between code users and code breakers was tipping ineluctably in favor of the code users. Their victory has been clinched by the powerful encryption software now incorporated in most commercial e-mail and Web-browser programs.
It has always been theoretically possible to produce a completely unbreakable code, but only at considerable inconvenience. In the 1920s two groups of code users, Soviet spies and German diplomats, became aware of the vulnerability of their existing systems and began to rely on what are known as one-time pads. In this system sender and receiver are supplied with matching pages containing strings of numbers; each page is used as a key for encoding and decoding a single message and then discarded. If properly used, this scheme is unbreakable, Yet in practice corners were invariably cut, because the system was logistically complicated, involving -- among other things -- teams of couriers to deliver new onetime pads as the old ones were used up.
Until the end of the twentieth century any more practical coding system that could be devised was susceptible to a basic flaw that a skilled code breaker could exploit. Language is extremely patterned -- certain letters and words occur far more often than others. The essential task of a code key is to disguise that non-randonmess. The key might, for example, consist of a long string of random numbers specifying where in the alphabet each letter of the message text should be shifted. If the first letter of the message were A and the first key number 3, then that A would become D in the coded version of the text; if the fourth letter were A and the fourth key number 5, then that A would become F; and so on. Many schemes were developed to provide users with very long key strings, in an attempt to approach the security offered by the one-time pad. Some systems used code books containing tens of thousands of key numbers; others, such as the famous German Enigma machine of World War II, used rotating wheels containing wires and electrical contacts to generate a sequence of permutations.
Yet eventually some of the strings of key would have to be used in more than one message, and when they were, the underlying patterns of language would begin to glow dimly through. The history of twentieth-century code breaking is at its heart the development of a series of increasingly sophisticated mathematical methods to detect non-randomness. The best code breakers were usually able to keep pace with the latest advances in code making, because of the practical limitations of producing very long strings of truly random, non-repeating key. The Enigma machine could be reset each day to one of a million million million million different key-string permutations, yet because of the machine's reliance on mechanically rotating wheels, those different combinations were not completely random or independent; subtle mathematical relationships connected one combination to another, and Allied code breakers were able to develop a brilliant mathematical technique that required them to test only a few thousand different combinations to break each day's setting. In effect, they discovered a shortcut, much like a safecracker's using a stethoscope to listen to the tumblers fall rather than attempting the "brute force" approach of trying every single combination.
But the postwar advent of general-purpose computers -- stimulated by funding from the NSA -- began a process that by the end of the century gave code makers an unassailable lead.
At first, when the extremely high price of computers ensured that government agencies would always have a commanding technological lead over the public, computers enabled the code breakers to abandon much subtlety in favor of brute force: the computers could simply run through every possible key setting to find the one that worked. But this was ultimately a losing proposition, because in terms of computing power it is always cheaper and easier to generate longer and longer keys than it is to test longer and longer keys. Once computers became widely available, the game was over.
In 1998 a team of private-sector computer experts built a special-purpose computer that could test 92 billion different key sequences per second in the widely used Data Encryption Standard system, a mainstay of encoding for commercial electronic traffic, such as bank transfers. It took them fifty-six hours to break a message that was encoded in a version of DES that chooses from some 72 quadrillion possible keys for enciphering each message. (The number of possible keys available in a computer-generated code is typically measured in terms of the length of the binary numeral required to specify which key sequence to use; fifty-six bits give about 72 quadrillion combinations, so this version is called 56-bit DES.) That feat was hailed as a great technological triumph, and it undoubtedly was one. It was also clearly intended to make a statement -- mainly, that DES, which the U.S. government had promulgated, was deliberately designed to keep ordinary code users from employing anything too hard for the NSA to break. But there was an utterly trivial fix that DES users could employ if they were worried about security: they could simply encrypt each message twice, turning 56-bit DES into 112-bit DES, and squaring the number of key sequences that a code breaker would have to try. Messages could even be encrypted thrice; and, indeed, many financial institutions at the time were already using "Triple DES."
Issued in 1977, DES was originally implemented in a computer chip, which made it possible at least in principle to control the spread of encryption technology through export restrictions. Huge increases in the processing power of PCs, however, subsequently made it easy to realize much more complex encryption schemes purely in software, and the Internet made it practically impossible to prevent the rapid spread of' such software to anyone who wanted it. Today most Web browsers use 128-bit encryption as the basic standard; a brute-force attack would take the world's fastest supercomputer something like a trillion years at present. If someone develops a supercomputer that is twice as fast, a code user need only start using 129-bit encryption to maintain the same relative advantage.
The standard e-mail encryption software, supplied with most computers, is the PGP ("pretty good privacy") system. In its latest version it is actually considerably better than pretty good. Users can select 2048-bit (equivalent to a little less than 128-bit DES) or even 4096-bit (equivalent to significantly more than 128-bit DES) keys.
Osama bin Laden's network is suspected of employing additional methods to veil its communications. Some reports suggest that a1 Qaeda not only used encrypted e-mail but also hid encrypted message texts within picture files or other data that could be downloaded from a Web site.
The implications of this fundamental shift in the balance of cryptologic power between the spies and the spied-upon are profound. Before World War II most Western governments, and their military officials looked on intelligence with considerable contempt if they paid attention to it at all. Information from paid spies has always been notoriously unreliable -- colored by ineptness, by a mercenary calculation of what the customer wants to hear, and sometimes by outright deceit. The explosion of intelligence from decoded enemy signals that took place during World War II, however, revolutionized both the profession of intelligence gathering and its impact. Signals intelligence was information coming unfiltered from the mouth of the enemy; its objectivity and authenticity were unparalleled. The proof was in the payoff. The victory at Midway, the sinking of scores of Japanese and German submarines, the rout of Rommel across North Africa, the success of D-Day -- all depended directly and crucially on intelligence from decoded Axis communications.
Signals intelligence is not completely dead, of course: bad guys make mistakes; they sometimes still use the phone or radio when they need to communicate in a hurry; and a surprising amount of useful intelligence can be gleaned from analyzing communication patterns even if the content of the communications is unreadable. Still, if encrypted-signals intelligence is to continue to provide information about enemy plans and organization, it must be accompanied by a significant increase in direct undercover operations. A hint of things to come emerged this past summer in the federal criminal trial of Nicodemo Scarfo Jr., who faces charges of running gambling and loan-sharking operations for the Gambino crime family. Federal agents, discovering that Scarfo kept records of his business in encrypted files on his PC, obtained a court order to surreptitiously install on his computer what was identified in court papers as a "key-logger system." The system (whether hardware or software is unclear) apparently recorded every keystroke typed into the computer, eventually enabling FBI agents to recover the password Scarfo used with his encryption software. Planting such electronic bugs directly in computers, or perhaps even sabotaging encryption software with a "back door" that code breakers could exploit, would generally require direct access to the machines. A plan proposed by the Clinton Administration would have obviated the need for direct access. But the plan, which would have required all American makers of encryption software to install a back door accessible by U.S. intelligence agencies acting with court approval, was abandoned, in part because of the argument that the requirement would not apply to foreign software makers, who are now perfectly capable of equaling the most sophisticated American-made commercial encryption software.
An effort in the Senate to revive that plan and include it in the anti-terrorism bill that was signed into law October 26 received little support and was withdrawn, and on much the same grounds -- that however powerful an intelligence tool code breaking was during its golden age, in World War II and the Cold War, the technical reality is that those days are gone. Code breaking simply cannot work the magic it once did.


Cryptome: Mr. Budiansky is a correspondent for The Atlantic Monthly, based in Leesburg, Virginia. His book on Allied codebreaking in World War II, Battle of Wits, was published in 2000 by The Free Press.
Mr. Budiansky is sufficiently knowledgeable about codebreaking to note that codebreakers never reveal their decrypting capabilities and will go to considerable lengths to hide them or promulgate disinformation so that code users will believe their systems are secure. There have been a fair number of articles promoting the notion of NSA's loss of codebreaking capabilities as public use of encryption increases. This would be consistent with a campaign of disinformation similar to that employed for earlier code-breaking deceptions. Professional cryptographers and computer security specialists remind that code-breaking today is not usually directed against the mathematical strengths of an encryption program but against the program's more vulnerable implementation -- such as the faults of a computer operating system, weaknesses in processor design, poorly chosen obvious passphrases or inadequately protected passphrases. Occasionally the articles report, as does Mr. Budiansky's here, alternative methods employed to bypass encryption (the Scarfo case repeatedly cited as if planned and publicized for that purpose), but not always.
It is probable that some of the methods described for bypassing encryption are disinformative, and disseminated to divert attention from true capabilities of decryption and/or burglary. For example, those used by the Special Collections Service (SCS), a covert unit operated by the CIA and NSA to burgle targeted facilities making use of encryption. The publicized feats of the SCS may be disinformation to conceal decryption capabilities. Sample article on SCS below.


Source: http://www.business20.com/articles/mag/print/0,1643,17511,FF.html
Business 2.0
November 2001

Weapons of the Secret War

By: Paul Kaihla
How the shadowy science of signals intelligence, honed in the drug wars, can help us fight terrorism.

The target never had a clue that he was in imminent danger. A high-ranking member of a Kashmiri terrorist group implicated in the World Trade Center attack, he had every reason to believe he had eluded the manhunt. He was lying low in a nondescript safe house on the outskirts of Peshawar in Pakistan's Khyber Pass region. He steered clear of phones and kept to himself. His sole contact with his global ring was through wireless e-mail transmitted by a high-frequency radio running on only eight flashlight batteries. Using that low-powered signal to send messages of only a few words at a time -- keeping transmissions to short bursts -- he was impossible to trace.
Or so he thought.
What the terrorist couldn't know was that signals intelligence operatives had been on his trail for months. His communications network relied on a base station hundreds of miles away in the Afghan desert; that device had been spotted by a robotic spy plane, a U.S. Air Force Predator, that was mapping radio traffic along the mountainous Afghan-Pakistani border from an altitude of 25,000 feet. Thereafter, each radio message he sent brought his fate closer, the final one pinpointed by members of the U.S. antiterrorism unit, Delta Force, who were sweeping his outpost with handheld direction finders. They staked out the house with local commandos and waited. When their man stepped out for some air, they made a visual confirmation and radioed the kill order to a Pakistani sniper team. From a quarter-mile away, a shooter took out the target with a single .50-caliber bullet.
In the shadowy war against the architects of the Sept. 11 atrocity, this is how victory may look. If you think it all sounds too much like a Tom Clancy novel to be true, you're mistaken: The hypothetical scenario above parallels almost exactly the real-life demise on Dec. 2, 1993, of public enemy number one in the U.S. war on drugs, Pablo Escobar. That manhunt ended in Medellmn, of course, not Peshawar, and the infinite justice was administered by Colombian, not Pakistani, commandos. Still, members of the U.S. intelligence community and military say the drug cartel raids of the 1990s are a model for antiterror strategists today. In both campaigns, U.S. special forces advise indigenous troops, who do the actual dirty work. And in both cases, American signals intelligence technology plays a crucial role.
Broadly speaking, signals intelligence (sigint) is the interception, exploitation, and jamming of electronic communication, whether it's radiated through the atmosphere and sea or through fixed lines like the telephone grid. In its 21st-century American application, it is a multibillion-dollar enterprise designed to eavesdrop on the conversations and data traffic of U.S. adversaries anywhere in the world. (However, the law prohibits blanket electronic monitoring of U.S. residents, one reason perhaps that intelligence agencies missed the hundreds of e-mails the Sept. 11 hijackers exchanged with each other from personal computers and public library kiosks.) The listening posts in this worldwide surveillance network range from simple radio antennas wired into sophisticated receivers to P-3 Orion spy planes operated by the U.S. Navy and Customs Service to nuclear submarines like the USSJimmy Carter, which can sit on the ocean floor for weeks at a time tapping undersea fiber-optic cables. The network even extends into space, where at least eight geosynchronous spy satellites vacuum up radio and other waves emanating from earth, beam the captured data to receivers on various continents, and then relay them to the mecca of sigint, the Fort Meade, Md., headquarters of the National Security Agency (NSA). Some of the above listening points feed data into the computers of a Cold War-inspired intelligence cooperative called Echelon, maintained by the United States, Canada, Britain, Australia, and New Zealand.
Behind the octopuslike network of listening posts is a technological arsenal that would stretch the imagination of Silicon Valley's best engineers. There are instruments known as spectrum analyzers, which are like MRI-scanners for all electromagnetic signals in an area. They not only can find a radio transmitter hidden in the mountains but will tell you its energy source. Data-mining software can comb through hundreds of millions of intercepted e-mail messages, faxes, and phone calls in a matter of minutes to find a single hot-button sequence -- say, the fax number of a suspected terrorist. Most mind-boggling of all is a system that can pick a single voice out of thousands of cell-phone conversations in an area, even if the speaker is constantly switching phones to avoid interception.
At the controls of all of this high-tech gear are specialists who number only a few hundred in the United States and perhaps only 2,000 in the entire world. Not surprisingly, they aren't particularly chatty about their occupation, but it's clear that they're in greater demand than ever. One of the handful of private contractors in the group (most are on the government payroll) told Business 2.0 that he was hired by a three-letter government agency the day of the attacks on New York and Washington, and has worked practically around the clock since. Of his latest assignment, all he will say is "I have to fly somewhere for this job tomorrow, and it won't be on a civilian aircraft."
Steve Uhrig [http://www.swssec.com] is another private sigint contractor, a onetime "spook" with U.S. Naval Intelligence who is now one of the most respected surveillance and technical countermeasure specialists in the world. In other words, he installs bugs and wiretaps, as well as conducts sweeps for them, and designs "black boxes" of spy gear for clients that have ranged from the NSA and the CIA to Tom Clancy himself. (Uhrig spent the summer wiring the author's 440-acre Maryland compound with state-of-the-art surveillance and security gear.) He has not yet been tapped for the war effort. But to the extent that the campaign against the Colombian drug cartels was a rehearsal for the coming showdown with terrorists, Uhrig has a unique perspective on how the new conflict might shape up. After all, the Colombian army is by far his largest customer. Among the surveillance systems he has set up in Colombia is a network of 100 "beeper busters," computer-driven receivers with decoders that can filter both pager numbers and content of interest to authorities in real time. Now the instant a suspected trafficker or money launderer receives a pager message, Colombian army intelligence has a copy of it.
The Escobar takedown shows how U.S. sigint can work with local forces to eliminate bad guys. In 1993 the CIA and a covert U.S. Army unit called Centra Spike spent months in Colombia monitoring Escobar's communications from both the ground and the air, finally pinpointing his location when he made a call from his cell phone. Colombian special forces commandos gunned down the Medellmn cartel leader as he ran barefoot across the rooftop of an apartment building.
Sigint's work against the cocaine cartels evolved into a game of high-tech cat-and-mouse, especially after Escobar's death taught traffickers the vulnerability of cell phones. One of the cartels' countermeasures is to "roll" cell phones to confuse wiretappers. Using scanners, they steal the identities of innocent bystanders' mobile phones and program the "cloned" numbers into their own handsets for a few days at a time. Authorities can't keep track of what phone numbers they should be tapping.
In response, authorities deployed a remarkable surveillance technology that operates over Colombia from spy planes. It uses a series of devices called IF-to-tape converters ("IF" stands for "intermediate frequency"), in conjunction with directional antennas, receivers, and wide-band recorders, to scoop up the major bands across the entire cellular spectrum. Loaded with the proper gear, one aircraft can record all of the cell traffic in a major city by circling it at a high altitude and exploiting the powerful microwave signals that form a handshake between cell sites in wireless networks. Back at the plane's base, a computer extracts audio files of actual conversations from the captured signals. The audio files are then filtered with sophisticated voice recognition software, allowing intelligence analysts to identify all of a suspect's conversations by his voice, no matter how many times he rolls his phones.
According to Uhrig, those kinds of vacuum cleaner technologies will not be as effective against Middle Eastern terrorists. For one thing, Afghanistan has no cellular service. For another, this year's successful prosecution of four terrorists implicated in the 1998 bombings of U.S. embassies in Africa relied heavily on NSA intercepts of cellular and satellite phone calls between terrorist leader Osama bin Laden and his al Qaeda network. All too aware that its phones were compromised, al Qaeda has reportedly curtailed its use of phones.
Sigint operatives will adapt by trying to move in closer to bin Laden. That delicate and dangerous task is the forte of an unacknowledged U.S. intelligence agency bearing the innocuous name of Special Collections Service (SCS). The agency, housed in Beltsville, Md., a short freeway ride from NSA headquarters, is jointly staffed by the NSA and the CIA. Operating under cover from U.S. embassies around the world, the agency is known for Mission Impossible-style operations -- most famously, hiding bugs on pigeons that perched on windowsills of the Soviet embassy in Washington, D.C. The SCS is currently working overtime, experts have told Business 2.0, eavesdropping on government communications in Middle East capitals and, where possible, setting up listening posts around figures close to bin Laden's network. "They'll be trying to build a case to show the Taliban's support for al Qaeda," says a retired U.S. special operations colonel who is still involved with the military.
If bin Laden or other suspects try to blend into a densely populated city, they might choose to talk on a radio frequency that they will "snuggle" next to a powerful signal like a local television transmitter. "If you're sweeping the area for a radio, you'll miss it unless you know exactly what you're looking for," says Uhrig, who was the technical consultant for the film Enemy of the State. "A receiver will lock on to the big transmitter." In that case, electronic espionage agents would likely do their hunting with a spectrum analyzer. This device shows a picture on a monitor of all signals, big and small, and can break them down into their component parts much like a chemical analysis of your drinking water.
If, as seems more likely, bin Laden remains holed up in his mountain hideouts, Uhrig surmises that the terrorist leader may use a low-powered high-frequency radio network, whose signals would be drowned in background noise such as that emitted by electronic car ignitions. But sigint doesn't need to capture a whole conversation to make life very tenuous for the broadcaster. In a manhunt, in fact, all it really needs to do is ascertain the coordinates of a target. Modern direction finders can get a bearing on a radio or a cell phone even if they capture a signal lasting as little as 20 milliseconds. In that scenario, a target may meet his end not with a sniper's bullet but with something much louder. Out in the Afghan mountains, says a high-ranking officer formerly in charge of counter-drug operations and surveillance in South America, "there is no reason to put our troops in danger and do a SWAT-style hard takedown. You would just put a high-tech weapon on him -- send a Tomahawk into his cave with a laser detonator."
No one in the military or intelligence communities thinks it will be easy to locate -- let alone stamp out -- the organizations responsible for the attacks on the nation's largest city and its capital. But no criminals in history have had so much electronic weaponry arrayed against them as bin Laden and his cohorts do today. "If bin Laden has anything that creates an RF signal, his ass is grass," says the private sigint specialist who was contracted for the manhunt. "If our boy has any brains at all, the only thing he has on him is his handy Kalishnikov and a copy of the Koran."

Tuesday, June 4, 2013

"Intercepted Messages Call for Al-Qaeda Attacks on Portugal"

"Threat rating: moderate, level 3." That's a non-European information service defines a jihadist communications intercepted on Wednesday that calls for "attacks on major ports [sea] and other Western targets in Portugal". The i confirmed that the July 20 services Portuguese were alerted by information services to foreign counterparts that have arisen at the site of a radical Islamic forum, a message (post) to encourage an "attack on port facilities, shipping lanes and tourists in Portugal."
The degree of elaboration and complexity of the plan described on the Internet, combined with other information and analysis of recent events, take the foreign service to consider that "hostile elements have the ability to hit the target and this action is within the reach of adversarial intent."
The evaluation of the information specialists in Islamic terrorism is that "an attack or action, is probably a priority and may even be prepared." In the message that was intercepted, Portugal is a major terrorist plot that you want to strike "a devastating blow on the economies Western "through attacks directed at" us "of" worldwide shipping routes. "
In the list of targets, Portugal is next to the Suez Canal, the Cape of Good Hope and the Straits of Hormuz. "In the seas and oceans are shipping routes for transport and tourism. If we attack commercial vessels, we can change the system naval routes and raise the cost of marine insurance or even halt the [shipping], especially tourism, "reads the first message written in Arabic intercepted by intelligence services.
A reply message to the first post says: "We should attack the Persian Gulf, is a strategic region, with all those oil tankers. It is very important that the Mujahideen are acting in this region because this will hasten the fall of the infidel states, whose economy will be severely affected obtained through oil in Arab countries. " Arousal Although Portugal and threatens to call specifically target potential terrorist attacks, "the alert level of national security is the same," says the i an expert in the area: "Also because such references to Portugal is not so rare, it happens almost every month. "
Another source close to intelligence services supports a different theory, and states that the "interception of messages with specific references to attacks and direct incentives in Portugal has not happened for some years." The message in question mentions "the Portuguese invaders who insulted Islam and Muslims so elusive." "This barbaric and savage Portugal. The brutality was unique in history. I wish that Al-Qaeda Deliver a sharp blow in Portugal. And I ask Allah to be merciful to al-Qaeda when she does." The current leader of Al-Qaeda, the Egyptian Al-Zawahiri, who happened to Osama bin Laden six weeks after the murder of the mentor of the terrorist organization in Pakistan, advocates a "global jihadist intifada" and has shown a growing interest in Algeria, the base of the former Group Salafist Preaching and Combat, which has become Al-Qaeda in the Islamic Maghreb. Since 2006, Zawahiri in Algeria aims to create a recessed base of al-Qaeda to launch attacks on Portugal, Spain and France.
The attacks against the United States and England use the base set back from Afghanistan and Pakistan. Threat detected the threat of Islamic terrorism is not new in Portugal. The Homeland Security Report 2010 shows that there is "evidence of a growing synergy between al-Qaeda in the Islamic Maghreb and criminal groups acting in the Sahel in Africa and submagrebina, particularly at the level of drug trafficking and illegal immigration What sets the increased threat to both Europe's interests, particularly the Portuguese, in the region, both on the European territory. " "It is considered that Portugal is not immune to development in its territory of activities related to the Islamist terrorism.
Among other factors, the presence of Portuguese military contingents in conflict zones such as Afghanistan, can be a motivating factor for cases of violent radicalization of individuals or for the selection of our country as a target for the realization of attacks " it said. Further, the report indicates the "subsistence risk projection for the country's terrorist implanted matrix / active spaces geographically close or where they come from foreign communities resident in Portugal, namely Europe, the Sahel, the Maghreb, or the Indian subcontinent. These risks are extended to the Portuguese communities living abroad and Portuguese foreign presence - of an economic, diplomatic and military

Satellite hacking Intel 1 (BACK@WAR CyberArmy friends let´s start Satellite GPS navigation hack IT WILL HV A PRICE)

  https://stackoverflow.com/questions/63010812/how-to-access-http-port-5001-from-public-internet