Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Government

Senate Report Says CIA Misled Government About Interrogation Methods 207

mrspoonsi sends this news from the Washington Post: "A report by the Senate Intelligence Committee concludes that the CIA misled the government and the public about aspects of its brutal interrogation program for years — concealing details about the severity of its methods, overstating the significance of plots and prisoners, and taking credit for critical pieces of intelligence that detainees had in fact surrendered before they were subjected to harsh techniques. The report, built around detailed chronologies of dozens of CIA detainees, documents a long-standing pattern of unsubstantiated claims as agency officials sought permission to use — and later tried to defend — excruciating interrogation methods that yielded little, if any, significant intelligence, according to U.S. officials who have reviewed the document. ... At the secret prison, Baluchi endured a regime that included being dunked in a tub filled with ice water. CIA interrogators forcibly kept his head under the water while he struggled to breathe and beat him repeatedly, hitting him with a truncheon-like object and smashing his head against a wall, officials said. As with Abu Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating."
Books

UK Bans Sending Books To Prisoners 220

Hugh Pickens DOT Com writes: "Alan Travis and Mark Tran report in The Guardian that new rules introduced by the justice secretary in the UK ban anyone sending in books to prisoners It's part of a new earned-incentives and privileges scheme, which allows better-behaved prisoners to get better access to funds to buy their own books. But members of Britain's literary establishment have combined to condemn Justice Secretary Chris Grayling's ban on sending books to prisoners. 'While we understand that prisons must be able to apply incentives to reward good behavior by prisoners, we do not believe that education and reading should be part of that policy,' says a letter signed by more than 80 leading authors. 'Books represent a lifeline behind bars, a way of nourishing the mind and filling the many hours that prisoners spend locked in their cells. In an environment with no internet access and only limited library facilities, books become all the more important.' Prime Minister David Cameron's official spokesman says the prime minister backs the ban on receiving books and entirely supports Grayling, whose department imposed the ban to preserve a rigid system of rewards and punishments for prisoners and said there was no need for prisoners to be sent books as prisoners could borrow from prison libraries and keep some reading material in their cells. However a former prisoner told the Guardian that although libraries existed, access could be severely restricted, particularly in closed prisons. 'I've been in places where prisoners only get 20 minutes a week to visit the library and change books.'"
Iphone

Tor Project: Fake Tor App Has Been In Apple's App Store For Months 78

itwbennett (1594911) writes "For the past several months Tor developers have unsuccessfully been trying to convince Apple to remove from its iOS App Store what they believe to be a fake and potentially malicious Tor Browser application. According to subsequent messages on the bug tracker, a complaint was filed with Apple on Dec. 26 with Apple reportedly responding on Jan. 3 saying it would give a chance to the app's developer to defend it. More than two months later, the Tor Browser app created by a developer named Ronen is available still in the App Store. The issue came into the public spotlight Wednesday when people involved in the Tor Project took to Twitter to make their concerns heard. Apple did not respond to IDG News Service's request for comment."
United States

Officials: NSA's PRISM Targets Email Addresses, Not Keywords 96

wiredmikey writes "The US government's PRISM Internet spying program exposed by Edward Snowden targets suspect email addresses and phone numbers but does not search for keywords like terrorism, officials said Wednesday. Top lawyers of the country's intelligence apparatus including the NSA and FBI participated Wednesday in a public hearing on the controversial US data-mining operations that intercept emails and other Internet communications including on social media networks like Facebook, Google or Skype. 'We figure out what we want and we get that specifically, that's why it's targeted collection rather than bulk collection,' Robert Litt, general counsel at the Office of the Director of National Intelligence, told the hearing. Under authority of the Foreign Intelligence Surveillance Act, the NSA asks Internet service providers to hand over messages sent from or received by certain accounts such as terrorist@google.com, the Justice Department's Brad Wiegmann said, using a hypothetical example."
IBM

IBM Distances Itself From the NSA and Its Spy Activities 61

An anonymous reader writes "NSA surveillance has raised concerns among customers globally about the safety of their data from U.S. government spying. More organizations, companies and countries are looking for ways to distant themselves from the NSA activities to safeguard the information of internet users. IBM is the latest to fall into the category of companies that do not want to be associated with the NSA spy activities."
Government

CIA Accused: Sen. Feinstein Sees Torture Probe Meddling 187

A reader writes with this news from the Washington Post: "In an extraordinary public accusation, the head of the Senate Intelligence Committee declared on Tuesday that the CIA interfered with and then tried to intimidate a congressional investigation into the agency's possible use of torture in terror probes during the Bush administration. The CIA clandestinely removed documents and searched a computer network set up for lawmakers, said Sen. Dianne Feinstein in a long and biting speech on the Senate floor. In an escalating dispute with an agency she has long supported, she said the CIA may well have violated criminal laws and the U.S. Constitution."
United States

US Intelligence Officials To Monitor Federal Employees With Security Clearances 186

First time accepted submitter Trachman writes in with news about a monitoring program designed to help stop future leaks of government documents. "U.S. intelligence officials are planning a sweeping system of electronic monitoring that would tap into government, financial and other databases to scan the behavior of many of the 5 million federal employees with secret clearances, current and former officials told The Associated Press. The system is intended to identify rogue agents, corrupt officials and leakers, and draws on a Defense Department model under development for more than a decade, according to officials and documents reviewed by the AP."
Privacy

White House "Privacy Tour" a Flop On Its First Leg At MIT 83

v3rgEz writes "After the Snowden revelations, President Obama promised greater transparency on how the federal government collects and uses data on its citizens, including a three-leg 'privacy tour' to discuss the balance between security and privacy. Well, the first leg of the tour is up and — surprise, surprise — it's not much of a conversation, with official dodging questions or, in one case, simply walking out of the conference." There's a video of the workshop at MIT, and the article says not all of it was spent watching politicians be politicians: "The review, led by White House counselor John Podesta ... is not confined to intelligence gathering but is meant also to examine how private entities collect and use mass quantities of personal information, such as health records and Internet browsing habits. On the latter subject, the conversation was robust. Experts from places like MIT, Harvard, Nielsen, and Koa Labs traded pros and cons, and proposed high-tech compromises that could allow people to contribute personal information to big data pools anonymously. "

An Anonymous reader also wrote in that "Outgoing National Security Agency boss General Keith Alexander says reporters lack the ability to properly analyze the NSA's broad surveillance powers and that forthcoming responses to the spying revelations may include 'media leaks legislation.' 'I think we are going to make headway over the next few weeks on media leaks. I am an optimist. I think if we make the right steps on the media leaks legislation, then cyber legislation will be a lot easier,' Alexander said."
The Military

Iran's Hacking of US Navy 'Extensive,' Repairs Took $10M and 4 Months 147

cold fjord sends news that Iran's breach of a computer network belonging to the U.S. Navy was more serious than originally thought. According to a Wall Street Journal report (paywalled, but summarized at The Verge), it took the Navy four months to secure its network after the breach, and the repair cost was approximately $10 million. From the article: "The hackers targeted the Navy Marine Corps Intranet, the unclassified network used by the Department of the Navy to host websites, store nonsensitive information and handle voice, video and data communications. The network has 800,000 users at 2,500 locations, according to the Navy. ... The intrusion into the Navy's system was the most recent in a series of Iranian cyberoffensives that have taken U.S. military and intelligence officials by surprise. In early 2012, top intelligence officials held the view that Iran wanted to execute a cyberattack but had little capability. Not long after, Iranian hackers began a series of major "denial-of-service" attacks on a growing number of U.S. bank websites, and they launched a virus on a Saudi oil company that immobilized 30,000 computers. ... Defense officials were surprised at the skills of the Iranian hackers. Previously, their tactics had been far cruder, usually involving so-called denial of service attacks that disrupt network operations but usually don't involve a penetration of network security."
The Military

Death By Metadata: The NSA's Secret Role In the US Drone Strike Program 202

Hugh Pickens DOT Com writes "Glenn Greenwald reports at his new independent news site 'The Intercept' that according to a former drone operator for the military's Joint Special Operations Command (JSOC), the NSA often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. In one tactic, the NSA 'geolocates' the SIM card or handset of a suspected terrorist's mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device. The technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against US forces in Afghanistan. But he also states that innocent people have 'absolutely' been killed as a result of the NSA's increasing reliance on the surveillance tactic. One problem is that targets are increasingly aware of the NSA's reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system while other top Taliban leaders, knowing of the NSA's targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 2,400 people in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. Greenwald's source says he has come to believe that the drone program amounts to little more than death by unreliable metadata. 'People get hung up that there's a targeted list of people. It's really like we're targeting a cell phone. We're not going after people – we're going after their phones, in the hopes that the person on the other end of that missile is the bad guy.' Whether or not Obama is fully aware of the errors built into the program of targeted assassination, he and his top advisers have repeatedly made clear that the president himself directly oversees the drone operation and takes full responsibility for it."
The Military

Do Hypersonic Missiles Make Defense Systems Obsolete? 365

An anonymous reader writes "The Diplomat's Zachary Keck wonders why the U.S. government is doubling down on missile defense systems even as hypersonic missiles threaten to render them obsolete. Keck notes that hypersonic missiles pose two distinct challenges to current missile defense systems. First, they travel far faster than the missiles the defense systems are designed to intercept. Second, they travel at lower altitudes and possess greater maneuverability than the missiles the current systems have been built to destroy. Nonetheless, the U.S. was planning on spending $2 billion a year on missile defense through 2017, and now the Pentagon is asking for an additional $4.5 billion over the next five years."

Slashdot Top Deals

With your bare hands?!?

Working...