The Communist Party of Canada (Marxist-Leninist)
denounces the refusal of Italy, France, Spain and Portugal to permit
the Bolivian presidential aircraft to land or fly over their
territories on July 2. President Evo Morales was returning from Russia
where he attended the second summit of the Gas Exporting Countries
Forum. Short of fuel, the plane was forced to land in Vienna, Austria
where it was boarded and searched, using the pretext that the plane
could be transporting the former CIA agent, Edward Snowden. The U.S.
government has issued a warrant for Snowden’s arrest after the leak of
top secret information. The dangerous levels of anarchy and incoherence in
international affairs can also be seen in the fact that the European
Union is protesting U.S. spying on their official offices in Washington
and Brussels yet member countries are cooperating with the U.S. by
committing acts of piracy against the President of Bolivia, denying
lawful access to their airspace and boarding and searching his
presidential aircraft, which are all hostile acts in violation of
Bolivian sovereignty and international norms. These events prove that private interests have taken over the governments of these countries involved. They have usurped state power in pursuit of private agendas. The world is witness to degeneration in norms of diplomatic behaviour and the rule of law, as these private interests using state power adopt methods of revenge-seeking and settling scores using the dirtiest gangster methods. Might does not make right and never shall no matter how righteous the cause is deemed to be. Condemn the utter disregard for the sovereign rights of independent countries! Demand those European countries that participated in these acts of international hooliganism and piracy apologize and desist from such conduct in the future. Demand that the Government of Canada denounce these acts of international hooliganism against Evo Morales, President of the sovereign Plurinational State of Bolivia and issue an official statement to that effect. No
to Collaboration with the U.S. in the Use of Cochabamba Declaration by the Union of South American NationsGiven the situation that the President of the Plurinational State of Bolivia, Evo Morales, was subjected to by the governments of France, Portugal, Italy and Spain, we denounce before the international community and various international organizations: - The flagrant act that took place as a violation of international treaties governing peaceful coexistence, solidarity and cooperation between our states; an unusual, unfriendly and hostile act, constituting an unlawful act that affects the freedom of movement and a displacement of a head of state and his delegation. - The abuse and neocolonial practices that still exist on our planet in the 21st century. - The lack of transparency about the motivations of the political decisions that prevented transit for the Bolivian presidential aircraft and the President. - The injustice suffered by President Evo Morales, which offends not only the Bolivian people but all our nations. - The illegal spying practices that threaten the rights of citizens and friendly coexistence among nations. In view of these denunciations, we are convinced that the process of building the Patria Grande [Integrated Latin America] to which we are committed must be consolidated with full respect for the sovereignty and independence of our peoples, without interference from global hegemonic powers, and overcoming the old practices of imposing first and second class [status on] countries. The heads of state and governments of countries of the Union of South American Nations (UNASUR), gathered in Cochabamba on July 4, 2013: 1. We declare that the unacceptable restriction on the liberty of President Evo Morales, virtually making him a hostage, is a violation of the rights of not only the Bolivian people but of all countries and peoples of Latin America and sets a dangerous precedent for existing international law. 2. We reject the actions that clearly violate the norms and principles of international law and the inviolability of heads of state. 3. We call on the governments of France, Portugal, Italy and Spain to explain the reasons for the decision to prevent the presidential plane from the Plurinational State of Bolivia from overflying their airspace. 4. Similarly, we urge the governments of France, Portugal, Italy and Spain to present the corresponding public apologies for the serious incidents that occurred. 5. We support the complaint filed by the Plurinational State of Bolivia to the office of the UN High Commissioner for Human Rights for the serious violation of human rights and specific endangerment of the life of President Evo Morales; we also support the right of the Plurinational State of Bolivia to take all actions it deems necessary to the courts and relevant agencies. 6. We agreed to form a monitoring committee, entrusting the task to our foreign ministries to perform the actions necessary to shed light on the facts. Finally, in the spirit of the principles set forth in the treaty establishing UNASUR, we urge all the heads of state of the union to stand by [accompany] this declaration. Similarly, we call on the United Nations and regional organizations that have not done so yet, to make a pronouncement on this unjustifiable and arbitrary event. Cochabamba, July 4, 2013 (Translated by Censored News: Indigenous Peoples and Human Rights; edited slightly by TML.) Anarchy in International Relations Surveillance Programs Reveal U.S. Hypocrisy
In past years, the U.S. government has been blaming other countries for threatening cyber security. However, the recent leakage of the two top-secret U.S. surveillance programs of the National Security Agency (NSA) has smashed the image of the U.S. as a cyber liberty advocate and revealed its hypocrisy. Edward Snowden, a 29-year-old defense contractor, revealed last week that the NSA is monitoring a wide swath of telephone and Internet activity as part of its counterterrorism efforts. Snowden told the South China Morning Post in Hong Kong [June 12] that the United States is involved in extensive hacking operations directed against China. In an interview with the newspaper, Snowden said he wanted to demonstrate "the hypocrisy of the U.S. government when it claims that it does not target civilian infrastructure, unlike its adversaries." "We hack network backbones -- like huge Internet routers, basically -- that give us access to the communications of hundreds of thousands of computers without having to hack every single one," he said. "Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information becoming public." The revelations have renewed the debate over surveillance in the United States and overseas under the pretext of fighting terrorism. Civil liberties advocates describe the measures as "dangerous and unacceptable intrusions." "Americans' faith in the law is touching. In this instance, it is misplaced," read an article posted on the New Yorker on June 12. "Ever since 9/11 and the USA Patriot Act and the explosion of new security organizations, the American people have seen their liberties eroded." said Bob Beckel, a liberal Democratic strategist. And Cal Thomas, a USA Today columnist, shared Beckel's opinion when they discussed the impact of the leaks on citizens' liberty in his column. U.S. officials have argued the programs strike the correct balance between privacy and national security. Obama administration have attempted to justify the surveillance programs by pointing to the arrests and convictions of would- be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. However, court documents lodged in the U.S. and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programs played a relatively minor role in the interception of the two plots, according to a report of the Guardian. The New York Times also criticized that the U.S. government is "using a would-be subway bomber to justify sweeping surveillance." While the U.S. government is defending its own surveillance programs, it keeps accusing other countries including China of launching cyber attacks. For months now, the U.S. government has implicated Beijing in state-sponsored hacking. China has denied such attacks while defending itself as a victim of cyber crimes. Snowden's testimony now certainly adds a dose of conviction to the Chinese government's statements. According to the whistleblower, among some 61,000 reported targets of the NSA are thousands of computers in China -- which U.S. officials have increasingly criticized as the source of thousands of attacks on U.S. military and commercial networks. China's cyber security has come under increasingly severe threats amid a variety of safety risks, according to a report released in March by the National Computer Network Emergency Response Technical Team Coordination Center (CNCERT). Hackers have tampered with 16,388 web pages in China -- including 1,802 government websites -- in the past year, up 6.1 percent and 21.4 percent year on year respectively, the report said. In 2012, around 73,000 overseas Internet Protocol addresses were involved in hijacking nearly 14.2 million mainframes in China via Trojans [viruses] or Botnet,[1] with the United States being the largest source of such hacking activities. As the birthplace of the World Wide Web, the United States already has a matchless superiority and ability to launch cyber attacks around the globe. Currently, the U.S. military has established a significant cyber force, including the 780th Military Intelligence Brigade, which is a regular military unit tasked with carrying out cyber missions. Earlier media reports said Iran was once attacked by U.S. military intelligence agencies via the Internet, while, according to China's foreign ministry, a majority of the cyber attacks against China comes from the United States. As the aftershocks of NSA surveillance programs
continue, it's time for the U.S. government to make more
self-examination instead of pointing fingers at other nations. TML Note 1. A botnet is a group of computers controlled from a single source which run related software programs and scripts. The term usually refers to multiple computers that have been infected with malicious software. To create a malicious botnet, a hacker must first compromise several computers. (techterms.com) China Opposes Hacking Allegations2007 press conference held by U.S. Air Force where it announced the establishment of a cyber command to prepare for "victory in cyberspace." In the first week of February, the New York Times and Wall Street Journal claimed that cyber attacks from China-based hackers had been detected. This was promptly rejected by China's Ministry of Foreign Affairs whose spokesperson Hong Lei said allegations of Chinese hacker attacks are groundless. He reiterated his government's position on fighting cybercrime. The allegations the Chinese government calls baseless continue to circulate based on a report by U.S. security company Mandiant stating that the company had traced cyber attacks waged against U.S. companies and government agencies to a unit of the People's Liberation Army (PLA). On February 20, the Chinese news agency Xinhua published the following commentary which points out why the allegations are both baseless and revealing. Baseless and RevealingU.S. cybersecurity firm Mandiant on [February 18] claimed in a report that hackers related to the Chinese military attacked some U.S. websites, once again stirring up the "Chinese hackers threat." Mandiant put forward as its main evidence a claim that many of the cyber attacks were launched from IP addresses registered in the Chinese metropolis of Shanghai. However, one does not need to be a cybersecurity expert to know that professional hackers usually exploit what is called the botnet in other parts of the world as proxies for attacks, not their own computers. Thus, it is highly unlikely that both the origins of the hackers and the attacks they have launched can be located. That is why China's foreign ministry and defense ministry both described the firm's report as "amateurish" when they dismissed Mandiant's false accusations. However, it is beyond belief that a firm specialized in the field of cybersecurity could be so indiscreetly desperate as to jump to a conclusion so full of loopholes, unless it has a good reason. If one takes a closer look at Mandiant's report, it is not too difficult to find that it reeks of a commercial stunt. In a statement accompanying the firm's report, Kevin Mandia, founder and CEO of Mandiant, seems to do nothing but market the products and services of his company. "Given the sheer amount of data this particular group (the hackers) has stolen, we decided it was necessary to arm and prepare as many organizations as possible to prevent additional losses," he said. Next time, the CEO could simply say: "See the Chinese hackers? Hurry up, come and buy our cybersecurity services." Moreover, the much-hyped threat can also be attributed to some U.S. politicians and businessmen who always seek to use China to pursue their personal political and commercial interests, especially at a time when the U.S. Congress is about to approve a budget plan for the country's new fiscal year. Without targeting China as a "presumed enemy," they might run short of excuses to demand more money to build an even stronger cyber military force or buy cybersecurity hardware and services from a company whose CEO used to serve in the U.S. air force. As the birthplace of the World Wide Web, the United States already has a matchless superiority and ability to stage cyber attacks across the globe. Currently, the U.S. military has established a significant cyber force, including the 780th Military Intelligence Brigade, which is a regular military unit tasked with carrying out cyber missions. Earlier media reports said Iran was once attacked by U.S. military intelligence agencies through the Internet, while, according to China's foreign ministry, a majority of the cyber attacks against China come from the United States. In fact, the credibility of the United States has already been seriously questioned because of its government's habit of accusing other nations based on phony evidence. In 1993, the United States accused "Yinhe," a Chinese cargo ship, of carrying banned material for making chemical weapons to Iran. However, no suspected goods were found after a joint Chinese-Saudi inspection. Similarly, facts will eventually prove that the cyber attacks accusations are groundless and will only tarnish the image and reputation of the company making them, as well as that of the United States.
European Concerns over U.S. Spy ProgramMap of U.S. National Security Agency's spying activity. Countries range in colour from green, least spied on, to red for those countries the most spied on. Click to enlarge. News agencies report that Germany ranks as the most-spied-on European Union (EU) country by the U.S., according to a map of secret surveillance activities by the National Security Agency (NSA). They also report that Frankfurt is of particular interest because it is the country's banking and financial capital. German ministers expressed their outrage over the widesclale U.S. spy program, comparing U.S. methods to those of the former East Germany's (DDR) Ministry for State Security, or Stasi. The U.S. is using "American-style Stasi methods," said member of the European Parliament Markus Ferber. "I thought this era had ended when the DDR fell," he said. Justice Minister Sabine Leutheusser-Schnarrenberger said leaked reports indicate that U.S. intelligence services are able to track virtually all forms of Internet communication and demanded an explanation. "The more a society monitors, controls and observes its citizens, the less free it is," she wrote in a guest editorial for Spiegel Online. "The suspicion of excessive surveillance of communication is so alarming that it cannot be ignored. For that reason, openness and clarification by the U.S. administration itself is paramount at this point," she said. Peter Schaar, Germany's federal data protection commissioner, said the leaked intelligence was grounds for "massive concern" in Europe. "The problem is that we Europeans are not protected from what appears to be a very comprehensive surveillance program," he told the Handelsblatt newspaper. "Neither European nor German rules apply here, and American laws only protect Americans." Meanwhile, the European Commissioner for Justice and Fundamental Rights Vivian Reding wrote the U.S. Attorney General Eric Holder demanding an explanation for the collection of foreign nationals' data. In a letter seen by Reuters, the European Union's Chief Justice wrote: "I would request that you provide me with explanations and clarifications on the PRISM program, other U.S. programs involving data collection and search, and laws under which such programs may be authorized." Reding asked Holder to explain whether EU citizens were targeted under PRISM, how broad U.S. access to the data would have been and how EU companies and citizens can appeal against the monitoring of their private correspondence. Reuters reports that EU officials have for several years asked the United States to explain how laws such as the Patriot Act and the Foreign Intelligence Surveillance Amendment Act affect EU citizens and companies. "The European Parliament, in particular, has become vocal about limiting data sharing and protecting privacy. Reding has said she has asked U.S. authorities to use an agreed legal channel called the Mutual Legal Assistance Agreement to access any data, a method that requires judicial approval," writes Reuters. Since 2011 the EU has tried to negotiate a transatlantic data protection agreement that would limit U.S. access to European data. The talks have stalled partly over the issue of what rights EU citizens had on U.S. soil, a Commission official told Reuters. "EU officials are also debating whether data protection should be included in negotiations for an EU-U.S. free trade deal on which formal talks are expected to begin in July," Reuters states. The European business community "has warned that without legal certainty, technologies which rely on data protection such as cloud computing will not be able to grow in Europe," Reuters reports. Companies considering adopting cloud technology, where software and data are stored online on remote servers rather than locally on a person's individual computer, cite security as their biggest concern and "European officials say they are aware that Europe's cloud market hinges on privacy," states Reuters. "The storage of the data in foreign servers and related legal uncertainty constitutes a real impediment," a second Commission official said. "Lobby groups in Brussels say they need to know which set of laws -- EU or U.S. legislation -- they should follow," Reuters informs. U.S. Spying on European Union OfficesIn related news, on June 29, German magazine Spiegel reported that the NSA has been spying on offices of the EU in Europe and the U.S. Spiegel reports that "the U.S. placed bugs in the EU representation in Washington and infiltrated its computer network. Cyber attacks were also perpetrated against [EU offices] in New York and Washington." The report continues: "The information appears in secret documents obtained by whistleblower Edward Snowden that Spiegel has in part seen. A 'top secret' 2010 document describes how the secret service attacked the EU's diplomatic representation in Washington. The document suggests that in addition to installing bugs in the building in downtown Washington, DC, the European Union representation's computer network was also infiltrated. In this way, the Americans were able to access discussions in EU rooms as well as emails and internal documents on computers. "... It has also been revealed that the British intelligence service GCHQ operates a similar program under the name Tempora with which global telephone and Internet connections are monitored." Referring to the electronic eavesdropping operation in Brussels, Spiegel writes: "A little over five years ago, EU security experts noticed several telephone calls that were apparently targeting the remote maintenance system in the Justus Lipsius Building, where the EU Council of Ministers and the European Council are located. The calls were made to numbers that were very similar to the one used for the remote administration of the building's telephone system. "Security officials managed to track the calls to NATO headquarters in the Brussels suburb of Evere. A precise analysis showed that the attacks on the telecommunications system had originated from a building complex separated from the rest of the NATO headquarters that is used by NSA experts. "A review of the remote maintenance system showed that
it had been called and reached several times from precisely that NATO
complex. Every EU member state has rooms in the Justus Lipsius Building
that can be used by EU ministers. They also have telephone and Internet
connections at their disposal." In other related news, the Guardian reported that based on
information provided by Snowden, the U.S. secret services spy on
38 embassies, including those of France, Italy and Greece. If the
allegations are true, it would be a hard blow to the relations between
the EU and U.S., Martin Schulz, President of the European Parliament
said. Schulz spoke with U.S. Ambassador to the EU, William Kennard,
demanding prompt concrete information on the matter which was put for
debate in the European Parliament on July 3. Of specific concern are
bilateral relations between the U.S. and Europe, including negotiations
on a free trade agreement. (Reuters, June 18, June 29; Spiegel, June 29, 2013; Guardian)
U.S Involvement in Cyber Attack on IranNBC News and the Washington Post recently
informed that James Cartwright, formerly second in command at the
Pentagon and a four-star general, has become a target in the
investigation of a leak of classified information. The leak revealed
the central role of the U.S. in the 2010 cyber attack on Iran's nuclear
program using the Stuxnet computer worm. This attack temporarily
disabled 1,000 centrifuges used to enrich uranium at Iranian nuclear
facilities. The computer worm affected control systems built by the
German electronics giant Siemens by exploiting "vulnerabilities in the
Microsoft Windows operating system and quickly affected computers
around the world." Deutsche Welle reports. Graphic showing how the U.S. and Israel carried out the sabotage of Iran's nuclear program using the Stuxnet computer worm. Click to enlarge. Deutsche Welle informs that "Cartwright, who retired in 2011, was one of President Barack Obama's closest security advisers.He was later, however, mentioned as a suspect by the New York Times, which reported in 2012 that the virus had indeed been a U.S.-Israeli attack. "The New York Times pointed out that
Cartwright was one of the crucial advisers to President Obama when an
element of the program accidentally became public in 2010 because of a
programming error that allowed it to escape Iran's Natanz plant and get
out on the Internet. Republican politicians said senior administration
officials had leaked the details of the U.S. cyberattack on Iran to
bolster the president's national security credentials during the 2012
re-election campaign. Congressional leaders demanded a criminal probe
into who leaked the information. The investigation of the Stuxnet
cyberattack leak is one of a number of national security breach
investigations conducted by the Obama administration." (Agencies) Ecuador Rejects U.S. Intimidation over Asylum with Principled PositionOn June 26, Senator Robert Menendez (Democrat, New Jersey), head of the U.S. Senate's Foreign Relations Committee, threatened Ecuador that the U.S. would block renewal of the Andean Trade Promotion and Drug Eradication Act (ATPDEA) should Ecuador grant asylum to former CIA agent Edward Snowden. The Act reduces tariffs on hundreds of millions of dollars' worth of trade in products such as cut flowers, artichokes and broccoli. "Our government will not reward countries for bad behavior," Senator Menendez said in a statement. The government of Ecuador gave a firm and principled response to the U.S. threats. "It's unprecedented to try to make a state illegitimate for receiving an asylum request," Ecuadorian President Rafael Correa said. Ecuador does not accept pressure or threats from anyone, it does not trade its principles nor subject them to commercial interests, however important they may be, emphasized Correa. He reiterated Ecuador's unilateral and irrevocable waiver of preferential treatment under the ATPDEA. President Correa's defiance of the pressure and blackmail attempts by the U.S. has won wide support amongst the grassroots who re-elected him last February 17, as well as the media, Prensa Latina reports. It points out that this nationalist spirit in defence of sovereignty is what saw the removal of the U.S. military base in Manta. To deal with the effects of the U.S measures on Ecuadorian companies which export to the U.S., Correa announced that he will send an urgent economic bill to the National Assembly which will provide compensation of $23 million to offset the loss of U.S. tariff preferences. During a conversation with the national and foreign press, he said that a compensation mechanism for the business sector in Ecuador would include, among other things, the implementation of a tax credit certificate equivalent to that amount. "We will not leave the Ecuadorian export sector isolated," he said, and reiterated that, "While I am President I will not let this small but dignified and sovereign country be subject to any kind of blackmail or abuse, that certain U.S. political sectors have unsuccessfully tried." Ecuador, he clarified, will not submit to subjugation and indignity and "neither wants to demonstrate superiority against nor challenge anyone." He stressed Ecuador's willingness to maintain excellent relations with all countries in a framework of mutual respect. "We do not have the slightest intention of breaking diplomatic and trade relations with the United States. Not only that, the relations of the Ecuadorian people with the people of the United States will always be the best," he said. "If those tariff preferences meant aid amounting to $23 billion to Ecuadorian exporters, Ecuador is ready to offer to the United States a similar amount in order to provide training in human rights." It would be training, said Correa, that would help to avoid attacks on the privacy of individuals, torture, extrajudicial killings and other acts injurious to humankind, stressing that Ecuador is one of the seven countries who have signed all such human rights treaties. In related news, a group of U.S. artists and intellectuals has asked Ecuador to provide asylum to Edward Snowden, fearing U.S. reprisals against him. In a letter addressed to President Rafael Correa, they express doubts about an alleged speedy trial for Snowden should he be taken into U.S. custody. Of particular concern is that Snowden may suffer the same fate as soldier Bradley Manning, who was arrested three years ago for revealing evidence of U.S. war crimes. The letter condemns the administration of President Barack Obama for focusing its anger on Snowden, described as a "brave whistleblower" for informing the U.S. public about the constitutional violations they suffered. "We have seen this drama play out several times before under the Obama administration. The administration has charged more than twice as many whistle-blowers under the Espionage Act than all previous presidents combined. These have included Thomas Drake who also exposed wrongdoing at the NSA, and most notably Private Bradley Manning, who stands accused of providing Wikileaks with information that revealed U.S. war crimes, U.S. meddling in other countries' affairs, and other grave and troubling misdeeds. Manning was held for three years before his trial under conditions that a formal UN investigation found to be 'cruel, inhuman and degrading.'" The long list of signatories includes well-known artists, writers, activists and professors as well as former U.S. military and intelligence personnel, and others in Canada, the UK and elsewhere. To view the full letter and list of signatories, click here. (Prensa Latina, USA Today, Just Foreign Policy) Reference Material The National Security Industrial Complex and NSA Spying: The Revolving Doors Between State Agencies and Private ContractorsWhen Edward Snowden, an employee of Booz Allen Hamilton -- a military contractor based in McLean, Virginia -- blew the whistle on the extent of U.S. global electronic surveillance, he unexpectedly shone a light on the world of contractors that consume some 70 percent of the $52 billion U.S. intelligence budget. Some commentators have pounced on Snowden's disclosures to denounce the role of private contractors in the world of government and national security, arguing that such work is best left to public servants. But their criticism misses the point. It is no longer possible to determine the difference between employees of the U.S. National Security Agency (NSA) or the Central Intelligence Agency (CIA) and the employees of companies such as Booz Allen, who have integrated to the extent that they slip from one role in industry to another in government, cross-promoting each other and self-dealing in ways that make the fabled revolving door redundant, if not completely disorienting. Snowden, who was employed by Booz Allen as a contract systems administrator at the NSA's Threat Operations Centre in Hawaii for three months, had worked for the CIA and Dell before getting his most recent job. But his rather obscure role pales in comparison to those of others. Pushing for Expanded SurveillanceTo best understand this tale, one must first turn to R. James Woolsey, a former director of CIA, who appeared before the U.S. Congress in the summer of 2004 to promote the idea of integrating U.S. domestic and foreign spying efforts to track "terrorists." One month later, he appeared on MSNBC television, where he spoke of the urgent need to create a new U.S. intelligence czar to help expand the post-9/11 national surveillance apparatus. On neither occasion did Woolsey mention that he was employed as senior vice president for global strategic security at Booz Allen, a job he held from 2002 to 2008. "The source of information about vulnerabilities of and potential attacks on the homeland will not be dominated by foreign intelligence, as was the case in the Cold War. The terrorists understood us well, and so they lived and planned where we did not spy (inside the U.S.)," said Woolsey in prepared remarks before the U.S. House Select Committee on Homeland Security on June 24, 2004. In a prescient suggestion of what Snowden would later reveal, Woolsey went on to discuss expanding surveillance to cover domestic, as well as foreign sources. "One source will be our vulnerability assessments, based on our own judgments about weak links in our society's networks that can be exploited by terrorists," he said. "A second source will be domestic intelligence. How to deal with such information is an extraordinarily difficult issue in our free society." In late July 2004, Woolsey appeared on MSNBC's "Hardball", a news-talk show hosted by Chris Matthews, and told Matthews that the federal government needed a new high-level office -- a director of national intelligence -- to straddle domestic and foreign intelligence. Until then, the director of the CIA served as the head of the entire U.S. intelligence community. "The problem is that the intelligence community has grown so much since 1947, when the position of director of central intelligence was created, that it's (become) impossible to do both jobs, running the CIA and managing the community," he said. Both these suggestions would lead to influential jobs and lucrative sources of income for Woolsey's employer and colleagues. The Director of National IntelligenceFast forward to 2007. Vice Admiral Michael McConnell (retired), Booz Allen's then-senior vice president of policy, transformation, homeland security and intelligence analytics, was hired as the second czar of the new "Office of the Director of National Intelligence" which was coincidentally located just three kilometers from the company's corporate headquarters. Upon retiring as DNI, McConnell returned to Booz Allen in 2009, where he serves as vice chairman to this day. In August 2010, Lieutenant General James Clapper (retired), a former vice president for military intelligence at Booz Allen from 1997 to 1998, was hired as the fourth intelligence czar, a job he has held ever since. Indeed, one-time Booz Allen executives have filled the position five of the eight years of its existence. When these two men took charge of the national-security state, they helped expand and privatize it as never before. McConnell, for example, asked Congress to alter the Foreign Intelligence Surveillance Act to allow the NSA to spy on foreigners without a warrant if they were using Internet technology that routed through the United States. "The resulting changes in both law and legal interpretations (... and the) new technologies created a flood of new work for the intelligence agencies -- and huge opportunities for companies like Booz Allen," wrote David Sanger and Nicole Perlroth in a profile of McConnell published in the New York Times this weekend. Last week, Snowden revealed to the Guardian's Glenn Greenwald that the NSA had created a secret system called "Prism" that allowed the agency to spy on electronic data of ordinary citizens around the world, both within and outside the United States. Snowden's job at Booz Allen's offices in Hawaii was to maintain the NSA's information technology systems. While he did not specify his precise connection to Prism, he told the South China Morning Post newspaper that the NSA hacked "network backbones -- like huge Internet routers, basically -- that give us access to the communications of hundreds of thousands of computers without having to hack every single one." Indeed Woolsey had argued in favor of such surveillance following the disclosure of the NSA's warrantless wiretapping by the New York Times in December 2005. "Unlike the Cold War, our intelligence requirements are not just overseas," he told a Senate Judiciary Committee hearing on the NSA in February 2006. "Courts are not designed to deal with fast-moving battlefield electronic mapping in which an al Qaeda or a Hezbollah computer might be captured which contains a large number of email addresses and phone numbers which would have to be checked out very promptly." Propaganda PuppetsRoger Cressey, a senior vice president for cybersecurity and counter-terrorism at Booz Allen who is also a paid commentator for NBC News, went on air multiple times to explain how the government would pursue the Boston Marathon case in April 2013. "We always need to understand there are priority targets the counter-terrorism community is always looking at," he told the TV station. Cressey took a position "on one of the most controversial aspects of the government response to Boston that completely reflects the views of the government agencies -- such as the FBI and the CIA -- that their companies ultimately serve," wrote Tim Shorrock, author of Spies for Hire, on Salon. "Their views, in turn, convinces NBC hosts of the wisdom of the policy, a stance which could easily sway an uncertain public about the legitimacy of the new face of state power that has emerged in the post-9/11 period. That is influence, yet it is not fully disclosed by NBC." This was not the first time that Cressey had been caught at this when speaking to NBC News. Cressey failed to disclose that his former employer -- Good Harbor Consulting -- had been paid for advice by the government of Yemen, when he went on air to criticize democracy protests in Yemen in March 2011. (Cressey has just been hired by Booz Allen at the time) "What is not disclosed about Cressey in this segment where he scaremongers about a post-Saleh Yemen is that he has multiple conflicts of interest with the current regime there," wrote Zaid Jilani of ThinkProgress at the time. A Flood of New ContractsExactly what Booz Allen does for the NSA's electronic surveillance system revealed by Snowden is classified, but one can make an educated guess from similar contracts it has in this field -- a quarter of the company's $5.86 billion in annual income comes from intelligence agencies. The NSA, for example, hired Booz Allen in 2001 in an advisory role on the five-billion-dollar Project Groundbreaker to rebuild and operate the agency's "nonmission-critical" internal telephone and computer networking systems. Booz Allen also won a chunk of the Pentagon's infamous Total Information Awareness contract in 2001 to collect information on potential terrorists in America from phone records, credit card receipts and other databases -- a controversial program defunded by Congress in 2003 but whose spirit survived in Prism and other initiatives disclosed by Snowden. The CIA pays a Booz Allen team led by William Wansley, a former U.S. Army intelligence officer, for "strategic and business planning" for its National Clandestine Service, which conducts covert operations and recruits foreign spies. The company also provides a 120-person team, headed by a former U.S. Navy cryptology lieutenant commander and Booz Allen senior executive adviser Pamela Lentz, to support the National Reconnaissance Organization, the Pentagon agency that manages the nation's military spy satellites. In January, Booz Allen was one of 12 contractors to win a five-year contract with the Defense Intelligence Agency that could be worth up to $5.6 billion to focus on "computer network operations, emerging and disruptive technologies, and exercise and training activity." Last month, the U.S. Navy picked Booz Allen as part of a consortium to work on yet another billion-dollar project for "a new generation of intelligence, surveillance and combat operations." How does Booz Allen wins these contracts? Well, in addition to its connections with the DNI, the company boasts that half of its 25,000 employees are cleared for "top secret-sensitive compartmented intelligence" -- one of the highest possible security ratings. (One third of the 1.4 million people with such clearances work for the private sector.) A key figure at Booz Allen is Ralph Shrader, current chairman, CEO and president, who came to the company in 1974 after working at two telecommunications companies -- RCA, where he served in the company's government communications system division and Western Union, where he was national director of advanced systems planning. In the 1970s, RCA and Western Union both took part in a secret surveillance program known as Minaret, where they agreed to give the NSA all their clients' incoming and outgoing U.S. telephone calls and telegrams. In an interview with the Financial Times in 1998, Shrader noted that the most relevant background for his new position of chief executive at Booz Allen was his experience working for telecommunications clients and doing classified military work for the US government. Caught for Shoddy WorkHow much value for money is the government getting? A review of some of Booz Allen's public contracts suggests that much of this work has been of poor quality. In February 2012, the U.S. Air Force suspended Booz Allen from seeking government contracts after it discovered that Joselito Meneses, a former deputy chief of information technology for the air force, had given Booz Allen a hard drive with confidential information about a competitor's contracting on the first day that he went to work for the company in San Antonio, Texas. "Booz Allen did not uncover indications and signals of broader systemic ethical issues within the firm," wrote the U.S. Air Force legal counsel. "These events caused the Air Force to have serious concerns regarding the responsibility of Booz Allen, specifically, its San Antonio office, including its business integrity and honesty, compliance with government contracting requirements, and the adequacy of its ethics program." It should be noted that Booz Allen reacted swiftly to the government investigation of the conflict of interest. In April that year, the Air Force lifted the suspension -- but only after Booz Allen had accepted responsibility for the incident and fired Meneses, as well as agreeing to pay the air force $65,000 and reinforce the firm's ethics policy. Not everybody was convinced about the new regime. "Unethical behavior brought on by the revolving door created problems for Booz Allen, but now the revolving door may have come to the rescue," wrote Scott Amey of the Project on Government Oversight, noting that noting that Del Eulberg, vice-president of the Booz Allen's San Antonio office had served as chief engineer in the Air Force. "It couldn't hurt having (former Air Force people). Booz is likely exhaling a sigh of relief as it has received billions of dollars in air force contracts over the years." That very month, Booz Allen was hired to build a $10 million "Enhanced Secured Network" (ESN) for the U.S. Federal Communications Commission. An audit of the project released by the U.S. Government Accountability Office this past February showed that it was full of holes. The ESN "left software and systems put in place misconfigured -- even failing to take advantage of all the features of the malware protection the commission had selected, leaving its workstations still vulnerable to attack," wrote Sean Gallagher, a computer reporter at ArsTechnica. Booz Allen has also admitted to overbilling the National Aeronautics and Space Administration (NASA) "employees at higher job categories than would have been justified by their experience, inflating their monthly hours and submitting excessive billing at their off-site rate." The company repaid the government $325,000 in May 2009 to settle the charges. Nor was this the first time Booz Allen had been caught overbilling. In 2006, the company was one of four consulting firms that settled with the U.S. Department of Justice for fiddling expenses on an industrial scale. Booz Allen's share of the $15 million settlement of a lawsuit under the False Claims Act was more than $3.3 million. Incidentally, both the NASA and the Air Force incidents were brought to light by a company whistleblower who informed the government. Investigate Booz Allen, Not Edward SnowdenWhen Snowden revealed the extent of the U.S. national surveillance program earlier this month, he was denounced immediately by Booz Allen and their former associates who called for an investigation of his leaks. "For me, it is literally -- not figuratively -- literally gut-wrenching to see this happen because of the huge, grave damage it does to our intelligence capabilities," Clapper told NBC News's Andrea Mitchell. "This is someone who, for whatever reason, has chosen to violate a sacred trust for this country. I think we all feel profoundly offended by that." "News reports that this individual has claimed to have leaked classified information are shocking, and if accurate, this action represents a grave violation of the code of conduct and core values of our firm," Booz Allen said in a press statement. Yet instead of shooting the messenger, Edward Snowden, it might be worth investigating Shrader and his company's core values in the same way that the CIA and NSA were scrutinized for Minaret in the 1970s by the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, chaired by Frank Church of Idaho in 1975. Congress would also do well to investigate Clapper, Booz Allen's other famous former employee, for possible perjury when he replied: "No, sir" to Senator Ron Wyden of Oregon in March, when asked: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" * Excerpts of this piece appeared on the Guardian's Comment is Free and Inter Press Service. Jim Lobe contributed research.
Google & Facebook Discussed Secret Systems for
|