Pages

Sunday, June 30, 2013

Anti-virus software shows Facebook app stole Android users’ phone numbers without their consent

from EndTheLie.com: The mobile anti-virus and anti-malware software produced by Norton discovered that the Facebook application for Android was secretly identifying users’ phone numbers and sending them to Facebook’s servers.

This news is especially interesting given Facebook’s role in the recently revealed National Security Agency (NSA) programs. Indeed, Martin Dempsey, chairman of the Joint Chiefs of Staff, reportedly met with Facebook executives to discuss the program.

Facebook also enjoys a cozy relationship with the intelligence community. The former chief security officer for Facebook left the internet giant for the NSA and the company quite clearly works with government as the latest leaks have shown.

A student group in Europe has also filed a complaint against Facebook over the handling of private data and last year a report revealed that Facebook was spying on smartphone users’ text messages.
In this latest instance of the violation of user privacy, Facebook’s Android application leaked the user’s phone number even before logging in.

This happened the first time the user launched the Facebook application and the number “will be sent over the Internet to Facebook servers.”

“You do not need to provide your phone number, log in, initiate a specific action, or even need a Facebook account for this to happen,” Norton said in an official post.

A “significant portion” of the hundreds of millions of people who have installed the Facebook application were affected, according to Norton, the makers of Symantec.

It’s worth noting that in the past, Symantec has published information on an intelligence gathering virus based on the U.S./Israeli-made Stuxnet worm and one Symantec researcher revealed that the U.S. targeted an Iranian nuclear research facility before it was built. However, last year Symantec also backed CISPA, a highly controversial piece of legislation.

Facebook told Norton that they “investigated the issue and will provide a fix in their next Facebook for Android release.”

“They stated they did not use or process the phone numbers and have deleted them from their servers,” Norton stated in the post.

Far more worrisome, however, is the fact that Norton says it is not the only application guilty of leaking private data.

“Unfortunately, the Facebook application is not the only application leaking private data or even the worst,” the company said. “We will continue to post information about risky applications to this blog in the upcoming weeks.”

Google Play has a quite abysmal privacy history. Earlier this year it was reported that Google was sending highly personal information to application developers without users consent or knowledge.
Just nine days ago, it was also reported that Facebook leaked the contact information of some six million users.

Voyager 1 Has Almost Left The Solar System

from forbes.com: Voyager 1 was launched in September of 1977 – and now nearly 36 years later, it’s on the cusp of being the first human-made object to ever leave our solar system. Scientists at NASA believe it’s currently in the last region of the solar system before entering interstellar space. The boundary line (well, less a line than a fuzzily defined region) is the edge of where charged particles carried by solar wind travel to.

“This strange, last region before interstellar space is coming into focus, thanks to Voyager 1, humankind’s most distant scout,” NASA researcher Ed Stone said in a press release.

Voyager 1 entered that last region, which NASA has referred to as a “magnetic highway,” in August of last year. In this part of space, the Sun’s magnetic field is intersecting with magnetic fields originating in interstellar space. This causes charged particles from the Sun to speed up and head out of our solar system, while charged particles from interstellar space speed up to zoom into our solar system. Some of what NASA has learned about the region so far has been published in this week’s edition of Science.

It’s not clear yet when Voyager 1 will leave the solar system – scientists won’t know for sure until it actually gets there. That could be anywhere from a few months to a few years away. It’s sister craft, Voyager 2, is also expected to enter interstellar space, but that will be some time later. Both probes have enough power to last to 2020, so we should learn quite a bit about interstellar space before they fall silent.

If either probe happens to meet any extraterrestrial intelligences while it’s out there, though, it won’t matter if they have power or not. Each probe is equipped with a gold record containing images, sounds and other information about us and the Earth. You can see an image of that below:


The contents of the records were selected by a committee led by the late scientist Carl Sagan. It contains music from different time periods and cultures, sounds from the Earth like the wind and surf, and 116 different images. It’s pretty unlikely that anyone will actually find either of the Voyager probes to play the record. But to Carl Sagan, that was part of the magic of the two records.

“The launching of this ‘bottle’ into the cosmic ‘ocean’ says something very hopeful about life on this planet,” he said at the time.

Three Potentially Habitable Planets Found Orbiting Gliese 667C

from universetoday.com: A closer look at the previously-studied nearby star Gliese 667C has revealed a treasure trove of planets – at least six – with three super-Earths in the habitable zone around the star. Gliese 667C is part of a triple star system (Gliese 667) and is just over one third of the mass of our Sun. Now that we know there are multiple planets in the so-called Goldilocks zone – a region where liquid water could exist — Gliese 667C might be the best candidate for harboring habitable exo-worlds.

“We knew that the star had three planets from previous studies, so we wanted to see whether there were any more,” said Mikko Tuomi from the University of Hertfordshire in the UK, one of the astronomers who led the new study of Gliese 667C. “By adding some new observations and revisiting existing data we were able to confirm these three and confidently reveal several more. Finding three low-mass planets in the star’s habitable zone is very exciting!”

Tuomi, along with Guillem Anglada-Escudé of the University of Göttingen, Germany looked at existing radial velocity data from the HARPS spectrograph at ESO’s 3.6-metre telescope in Chile. 

The team said they are extremely confident on the data on the first five planets, while the sixth is tentative, and a potential seventh planet even more tentative.
The team writes in their paper:

Up to seven periodic signals are detected in the Doppler measurements of GJ 667C data, being the last (seventh) signal very close to our detection threshold.
The significance of the signals is not affected by correlations with activity indices and we could not identify any strong wavelength dependence with any of them.
The first six signals are strongly present in subsamples of the data. Only the seventh signal is unconfirmed using half of the data only. Our analysis indicates that any of the six stronger signals would had been robustly spotted with half the available data if each had been orbiting alone around the host star.
If all seven planets are confirmed, the system would consist of three habitable-zone super-Earths, two hot planets further in, and two cooler planets further out. 

But the team said the three in the habitable zone are confirmed to be super-Earths. These are planets more massive than Earth, but less massive than planets like Uranus or Neptune. This is the first time that three such planets have been spotted orbiting in this zone in the same system.

“The number of potentially habitable planets in our galaxy is much greater if we can expect to find several of them around each low-mass star,” said co-author Rory Barnes from the University of Washington, “instead of looking at ten stars to look for a single potentially habitable planet, we now know we can look at just one star and find several of them.” 

Gliese 667 (a.k.a GJ 667) is 22 light-years away from Earth in the constellation of Scorpius.
The planets in the habitable zone and those closer to the star are expected to always have the same side facing the star, so that their day and year will be the same lengths, with one side in perpetual sunshine and the other always night.


The researchers say that the ‘f’ planet is “a prime candidate for habitability.”

“It likely absorbs less energy than the Earth, and hence habitability requires more greenhouse gases, like CO2 or CH4,” the team wrote in their paper. “Therefore a habitable version of this planet has to have a thicker atmosphere than the Earth, and we can assume a relatively uniform surface temperature.” 

The other stars in the triple system would provide a unique sunset: the two other suns would look like a pair of very bright stars visible in the daytime and at night they would provide as much illumination as the full Moon. 

Are there more planets to be found in this abundant system? Perhaps, but not in the habitable zone. The team said the new planets completely fill up the habitable zone of Gliese 667C, as there are no more stable orbits in which a planet could exist at the right distance to it.

Saturday, June 29, 2013

US reportedly bugged EU offices, computer networks

from spiegel.de: America's NSA intelligence service allegedly targeted the European Union with its spying activities. According to Der Spiegel information, the US placed bugs in the EU representation in Washington and infiltrated its computer network. Cyber attacks were also perpetrated against Brussels in New York and Washington. 

Information obtained by Der Spiegel shows that America's National Security Agency (NSA) not only conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions. The information appears in secret documents obtained by whistleblower Edward Snowden that Der Spiegel has in part seen. A "top secret" 2010 document describes how the secret service attacked the EU's diplomatic representation in Washington.

The document suggests that in addition to installing bugs in the building in downtown Washington, DC, the EU representation's computer network was also infiltrated. In this way, the Americans were able to access discussions in EU rooms as well as emails and internal documents on computers.  

The attacks on EU institutions show yet another level in the broad scope of the NSA's spying activities. For weeks now, new details about Prism and other surveillance programs have been emerging that had been compiled by whistleblower Snowden. Details have also emerged that the British intelligence service GCHQ operates a similar program under the name Tempora with which global telephone and Internet connections are monitored.


The documents Der Spiegel has seen indicate that the EU representation to the United Nations was attacked in a manner similar to the way surveillance was conducted against its offices in Washington. 

An NSU document dated September 2010 explicitly names the Europeans as a "location target".

The documents also indicate the US intelligence service was responsible for an electronic eavesdropping operation in Brussels. A little over five years ago, EU security experts noticed several telephone calls that were apparently targeting the remote maintenance system in the Justus Lipsius Building where the EU Council of Ministers and the European Council is located. The calls were made to numbers that were very close to the one used for the remote administration of the building's telephone system.

Security officials managed to track the calls to NATO headquarters in the Brussels suburb of Evere. A precise analysis showed that the attacks on the telecommunications system had originated from a building complex separated from the rest of the NATO headquarters that is used by NSA experts.

A review of the remote maintenance system showed that it had been called and reached several times from precisely that NATO complex. Every EU member state has rooms in the Justus Lipsius Building that can be used by EU ministers. They also have telephone and Internet connections at their disposal.

Simpsons did it...


Car Hacking Assassins


from PressForTruth.ca: George Orwell once said that "in a time of universal deceit telling the truth is a revolutionary act." Today activists, journalists and whistleblowers who are known for exposing corruption within our governments are finding themselves in the crosshairs of the information war. Many of the technologies at our disposal act as a double edged sword and can be used both to inform, empower and advance humanity but can also be used to control, enslave and even kill off those who pose a threat to the Orwellian system.

Friday, June 28, 2013

#FBI sued over secretive facial recognition program

from RT.com: Soon the FBI will be done building a database containing the photographs, fingerprints and other biometric data for millions of Americans, but the agency has been far from forthcoming with the details. A new lawsuit filed this week aims to change that.

The Electronic Frontier Foundation, a non-profit digital rights group based out of California, sued the United States Department of Justice this week for failing to comply with multiple Freedom of Information Act requests filed last year by the EFF. 

The Federal Bureau of Investigation received no fewer than three FOIA requests from the EFF last year for details about its state-of-the-art Next Generation Identification program, or NGI, a system that will store personally-identifiable data for millions of Americans and foreign nationals to act as what the FBI has called a "bigger, faster and better" version of what law enforcement already uses. But while the bureau has indeed already been using fingerprint information to track down potential terrorists and troublemakers for years, the EFF’s main concern revolves around what sort of space-age face recognition abilities NGI will be able to employ. 

The FBI previously acknowledged that NGI will “house multimodal biometrics records like palm prints and iris scans” in one master system, as well as facial imaging information and intelligence about scars, marks and tattoos. Eventually, the agency said, it hopes to incorporate technology to track down people using only their voice. For now, though, the EFF is interested in what the facial recognition infrastructure will be able to do, and is demanding the FBI fesses up. 

Related Video:

“NGI will change almost everything about how the FBI treats photograph submissions,” the complaint filed this week reads. Citing government documents, the EFF says that the system will allow “the increased capacity to retain photographic images, additional opportunities for agencies to submit photographic images and additional search capabilities, including automated searches.”

“The proposed new system would also allow law enforcement ‘to collect and retain other images (such as those obtained from crime scene security cameras’ and from family and friends) and would allow submission of ‘civil photographs along with civil fingerprint submissions that were collected for noncriminal purposes,’” the EFF continues. 

When all is said and done, the FBI will be able to use NGI to scan millions of entries in a single database to find someone based off of a single photograph, and the EFF fears that could send things down a slippery slope. 

“Governmental use of face recognition — and the potential for misuse — raises many privacy concerns,” the EFF says in the lawsuit. 

Using statements already made by the FBI about the program, the EFF presents an argument about why they should be worried that’s hard to counter. 

“The FBI has also stated in a public presentation given at a national biometrics conference that it wants to use its facial recognition system to 'identify unknown persons of interest from images' and 'identify subjects in public datasets,'” the complaint continues. “In the same presentation, the FBI included a graphic image that implied the Bureau wanted to use facial recognition to be able to track people from one political rally to another.” 

Another digital watchdog group, the Electronic Privacy Information Center, previously alleged that NGI system could be integrated with other surveillance technology in order to enable “real-time image-matching of live feeds from CCTV surveillance cameras.” 

Obtaining information about how the FBI will manage and operate this information has been a priority for the EFF for over a year now, and the failure to comply with those FOIA requests has finally prompted the organization to ask a court to intervene. 

"NGI will result in a massive expansion of government data collection for both criminal and noncriminal purposes," EFF Staff Attorney Jennifer Lynch said in a statement this week. "Biometrics programs present critical threats to civil liberties and privacy. Face-recognition technology is among the most alarming new developments, because Americans cannot easily take precautions against the covert, remote and mass capture of their images." 

The EFF is asking the court to enforce the FOIA requests sent last June and July, which could compel the FBI to disclose information about the face-recognition program and any plans to merge civilian and criminal records in a single database. They are also asking for the total number of face-recognition capable records currently in the database and an assessment of what number the agency expects to have when it rolls out the program in 2014. 

"Before the federal government decides to expand its surveillance powers, there needs to be a public debate," Lynch said. "But there can be no public debate until the details of the program are presented to the public." 

In a July 18, 2012 assessment, the FBI reported that the program was “on scope, on schedule, on cost and 60 percent deployed.” The program is being put together by contractors Lockheed Martin, who are expected to rake in $1 billion from the government by the time the NGI system is finally up and running. 

The FBI previously admitted that they found 7,380 records that were "potentially responsive” to one of the EFF’s request, but has yet to deliver actual information pursuant to any of the three FOIA submissions filed, prompting the nonprofit to allege the FBI is “dragging its feet."

"FBI has not explained to the public how NGI or IAFIS's system design would ensure that civil submissions are not 'tainted' by criminal submissions or explained why it is necessary to combine the two types of data," the EFF wrote in the complaint.

WikiLeaks Volunteer Was a Paid Informant for the FBI

from Wired.com: On an August workday in 2011, a cherubic 18-year-old Icelandic man named Sigurdur “Siggi” Thordarson walked through the stately doors of the U.S. embassy in Reykjavík, his jacket pocket concealing his calling card: a crumpled photocopy of an Australian passport. The passport photo showed a man with a unruly shock of platinum blonde hair and the name Julian Paul Assange.

Thordarson was long time volunteer for WikiLeaks with direct access to Assange and a key position as an organizer in the group. With his cold war-style embassy walk-in, he became something else: the first known FBI informant inside WikiLeaks. For the next three months, Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange, he says, for a total of about $5,000. The FBI flew him internationally four times for debriefings, including one trip to Washington D.C., and on the last meeting obtained from Thordarson eight hard drives packed with chat logs, video and other data from WikiLeaks.

The relationship provides a rare window into the U.S. law enforcement investigation into WikiLeaks, the transparency group newly thrust back into international prominence with its assistance to NSA whistleblower Edward Snowden. Thordarson’s double-life illustrates the lengths to which the government was willing to go in its pursuit of Julian Assange, approaching WikiLeaks with the tactics honed during the FBI’s work against organized crime and computer hacking — or, more darkly, the bureau’s Hoover-era infiltration of civil rights groups.

“It’s a sign that the FBI views WikiLeaks as a suspected criminal organization rather than a news organization,” says Stephen Aftergood of the Federation of American Scientists’ Project on Government Secrecy. “WikiLeaks was something new, so I think the FBI had to make a choice at some point as to how to evaluate it: Is this The New York Times, or is this something else? And they clearly decided it was something else.”

The FBI declined comment.


Thordarson was 17 years old and still in high school when he joined WikiLeaks in February 2010. He was one of a large contingent of Icelandic volunteers that flocked to Assange’s cause after WikiLeaks published internal bank documents pertaining to that country’s financial crisis.

When a staff revolt in September 2010 left the organization short-handed, Assange put Thordarson in charge of the WikiLeaks chat room, making Thordarson the first point of contact for new volunteers, journalists, potential sources, and outside groups clamoring to get in with WikiLeaks at the peak of its notoriety.

In that role, Thordarson was a middle man in the negotiations with the Bradley Manning Defense Fund that led to WikiLeaks donating $15,000 to the defense of its prime source. He greeted and handled a new volunteer who had begun downloading and organizing a vast trove of 1970s-era diplomatic cables from the National Archives and Record Administration, for what became WikiLeaks’ “Kissinger cables” collection last April. And he wrangled scores of volunteers and supporters who did everything from redesign WikiLeaks’ websites to shooting video homages to Assange.

He accumulated thousands of pages of chat logs from his time in WikiLeaks, which, he says, are now in the hands of the FBI.

Thordarson’s betrayal of WikiLeaks also was a personal betrayal of its founder, Julian Assange, who, former colleagues say, took Thordarson under his wing, and kept him around in the face of criticism and legal controversy.

“When Julian met him for the first or second time, I was there,” says Birgitta Jonsdottir, a member of Icelandic Parliament who worked with WikiLeaks on Collateral Murder, the Wikileaks release of footage of a US helicopter attack in Iraq. “And I warned Julian from day one, there’s something not right about this guy… I asked not to have him as part of the Collateral Murder team.”

In January 2011, Thordarson was implicated in a bizarre political scandal in which a mysterious “spy computer” laptop was found running unattended in an empty office in the parliament building. “If you did [it], don’t tell me,” Assange told Thordarson, according to unauthenticated chat logs provided by Thordarson.

“I will defend you against all accusations, ring [sic] and wrong, and stick by you, as I have done,” Assange told him in another chat the next month. “But I expect total loyalty in return.”

Instead, Thordarson used his proximity to Assange for his own purposes. The most consequential act came in June 2011, on his third visit to Ellingham Hall — the English mansion where Assange was then under house arrest while fighting extradition to Sweden.

For reasons that remain murky, Thordarson decided to approach members of the Lulzsec hacking gang and solicit them to hack Islandic government systems as a service to WikiLeaks. To establish his bona fides as a WikiLeaks representative, he shot and uploaded a 40-second cell phone video that opens on the IRC screen with the chat in progress, and then floats across the room to capture Asssange at work with an associate. (This exchange was first reported by Parmy Olson in her book on Anonymous).

CONTINUE READING...

Thursday, June 27, 2013

Ex-US general under investigation for leaks

Reports say former second-highest-ranking general at Pentagon is probed for leaks linked to Iran nuclear programme.

from AlJazeera.com: One of the highest ranking military officers in the US is under investigation for allegedly leaking top secret information about a cyber attack on Iran's nuclear programme, according to reports.

NBC news reported on Thursday that retired General James Cartwright, a former second-highest-ranking officer, is under investigation for leaking information on a covert computer virus, called Stuxnet.

The virus was used in 2010 to temporarily disable 1,000 centrifuges used for enriching uranium by Iran's nuclear facilities.

Cartright, who was the number two person in the joint chiefs of staff from 2007 to 2011, was instrumental in the development of Stuxnet, and his role was publicised in a New York Times article published last year.

The article exposed that the virus was the Obama administration's key weapon against Iran's nuclear weapons programme.

President Obama responded to the article sternly: "My attitude has been zero tolerance for these kinds of leaks. These are criminal acts when they release information like this."

Al Jazeera's Rosiland Jordan, reporting from Washington DC, said that there was ongoing speculation about Cartwright's motive behind the leaks.

"It's simply a stunning development when you consider that the Obama administration has always said that 'people who leak are going to be prosecuted if we figure out who they are."

Steve Aftergood, director of of the Federation of American Scientists, told NBC that "there are many reasons why people leak classified information".

"Sometimes to attack a program, sometimes to defend it, sometimes we don't ever know," he said.
According to NBC, Stuxnet is capable of both surveillance and harming computers, and was initally spread using infected removable drives.

Cartwright nor his lawyer responded to requests for comment, reported NBC.

Wednesday, June 26, 2013

Know Your History: What is Project #ECHELON?

from nsawatch.org:

Q - What is Project ECHELON?

ECHELON is the term popularly used for an automated global interception and relay system operated by the intelligence agencies in five nations: the United States, the United Kingdom, Canada, Australia and New Zealand (it is believed that ECHELON is the code name for the portion of the system that intercepts satellite-based communications).

While the United States National Security Agency (NSA) takes the lead, ECHELON works in conjunction with other intelligence agencies, including the Australian Defence Signals Directorate (DSD). It is believed that ECHELON also works with Britain's Government Communications Headquarters (GCHQ) and the agencies of other allies of the United States, pursuant to various treaties. (1)
 
These countries coordinate their activities pursuant to the UKUSA agreement, which dates back to 1947. The original ECHELON dates back to 1971. However, its capabilities and priorities have expanded greatly since its formation. According to reports, it is capable of intercepting and processing many types of transmissions, throughout the globe. In fact, it has been suggested that ECHELON may intercept as many as 3 billion communications everyday, including phone calls, e-mail messages, Internet downloads, satellite transmissions, and so on. (2) The ECHELON system gathers all of these transmissions indiscriminately, then distills the information that is most heavily desired through artificial intelligence programs. Some sources have claimed that ECHELON sifts through an estimated 90 percent of all traffic that flows through the Internet. (3)

Related:
Is 'The Five Eyes Alliance' Conspiring to Spy on You?


However, the exact capabilities and goals of ECHELON remain unclear. For example, it is unknown whether ECHELON actually targets domestic communications. Also, it is apparently very difficult for ECHELON to intercept certain types of transmissions, particularly fiber communications.

Q - How does ECHELON work?
 
ECHELON apparently collects data in several ways. Reports suggest it has massive ground based radio antennae to intercept satellite transmissions. In addition, some sites reputedly are tasked with tapping surface traffic. These antennae reportedly are in the United States, Italy, England, Turkey, New Zealand, Canada, Australia, and several other places. (4)
 
Similarly, it is believed that ECHELON uses numerous satellites to catch "spillover" data from transmissions between cities. These satellites then beam the information down to processing centers on the ground. The main centers are in the United States (near Denver), England (Menwith Hill), Australia, and Germany. (5)

According to various sources, ECHELON also routinely intercepts Internet transmissions. The organization allegedly has installed numerous "sniffer" devices. These "sniffers" collect information from data packets as they traverse the Internet via several key junctions. It also uses search software to scan for web sites that may be of interest. (6)
 
Furthermore, it is believed that ECHELON has even used special underwater devices which tap into cables that carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices on to the underwater cables. One of these taps was discovered in 1982, but other devices apparently continued to function undetected. (7)

It is not known at this point whether ECHELON has been able to tap fiber optic phone cables.

Finally, if the aforementioned methods fail to garner the desired information, there is another alternative. Apparently, the nations that are involved with ECHELON also train special agents to install a variety of special data collection devices. One of these devices is reputed to be an information processing kit that is the size of a suitcase. Another such item is a sophisticated radio receiver that is as small as a credit card. (8)

After capturing this raw data, ECHELON sifts through them using DICTIONARY. DICTIONARY is actually a special system of computers which finds pertinent information by searching for key words, addresses, etc. These search programs help pare down the voluminous quantity of transmissions which pass through the ECHELON network every day. These programs also seem to enable users to focus on any specific subject upon which information is desired. (9)

Q - If ECHELON is so powerful, why haven't I heard about it before?

The United States government has gone to extreme lengths to keep ECHELON a secret. To this day, the U.S. government refuses to admit that ECHELON even exists. We know it exists because both the governments of Australia (through its Defence Signals Directorate) and New Zealand have admitted to this fact. (10) However, even with this revelation, US officials have refused to comment. 

This "wall of silence" is beginning to erode. The first report on ECHELON was published in 1988. (11) In addition, besides the revelations from Australia, the Scientific and Technical Options Assessment program office (STOA) of the European Parliament commissioned two reports which describe ECHELON's activities. These reports unearthed a startling amount of evidence, which suggests that Echelon's powers may have been underestimated. The first report, entitled "An Appraisal of Technologies of Political Control," suggested that ECHELON primarily targeted civilians.

This report found that:

The ECHELON system forms part of the UKUSA system but unlike many of the electronic spy systems developed during the cold war, ECHELON is designed for primarily non-military targets: governments, organisations and businesses in virtually every country. The ECHELON system works by indiscriminately intercepting very large quantities of communications and then siphoning out what is valuable using artificial intelligence aids like Memex to find key words. Five nations share the results with the US as the senior partner under the UKUSA agreement of 1947, Britain, Canada, New Zealand and Australia are very much acting as subordinate information servicers. 

Each of the five centres supply "dictionaries" to the other four of keywords, phrases, people and places to "tag" and the tagged intercept is forwarded straight to the requesting country.

Whilst there is much information gathered about potential terrorists, there is a lot of economic intelligence, notably intensive monitoring of all the countries participating in the GATT negotiations.

But Hager found that by far the main priorities of this system continued to be military and political intelligence applicable to their wider interests. Hager quotes from a "highly placed intelligence operatives" who spoke to the Observer in London. "We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate." They gave as examples. GCHQ interception of three charities, including Amnesty International and Christian Aid. "At any time GCHQ is able to home in on their communications for a routine target request," the GCHQ source said. In the case of phone taps the procedure is known as Mantis. With telexes its called Mayfly. By keying in a code relating to third world aid, the source was able to demonstrate telex "fixes" on the three organisations. With no system of accountability, it is difficult to discover what criteria determine who is not a target. (12)
 
A more recent report, known as Interception Capabilities 2000, describes ECHELON capabilities in even more elaborate detail. (13) The release of the report sparked accusations from the French government that the United States was using ECHELON to give American companies an advantage over rival firms. (14) In response, R. James Woolsey, the former head of the US Central Intelligence Agency (CIA), charged that the French government was using bribes to get lucrative deals around the world, and that US surveillance networks were used simply to level the playing field. (15) However, experts have pointed out that Woolsey missed several key points. For example, Woolsey neglected to mention alleged instances of economic espionage (cited in Intelligence Capabilities 2000) that did not involve bribery. Furthermore, many observers expressed alarm with Woolsey's apparent assertion that isolated incidents of bribery could justify the wholesale interception of the world's communications. (16)

The European Parliament formed a temporary Committee of Enquiry to investigate ECHELON abuses. (17) In May 2001, members of this committee visited the United States in an attempt to discover more details about ECHELON. However, officials from both the NSA and the US Central Intelligence Agency (CIA) canceled meetings that they had previously scheduled with the European panel. The committee's chairman, Carlos Coelho, said that his group was "very disappointed" with the apparent rebuffs; in protest, the Parliamentary representatives returned home a day early. (18)

Afterwards, the committee published a report stating that ECHELON does indeed exist and that individuals should strongly consider encrypting their emails and other Internet messages. (19)

However, the panel was unable to confirm suspicions that ECHELON is used to conduct industrial espionage, due to a lack of evidence. (20) Ironically, the report also mentioned the idea that European government agents should be allowed greater powers to decrypt electronic communications, which was criticized by some observers (including several members of the committee) as giving further support to Europe's own ECHELON-type system. (21) The European Parliament approved the report, but despite the apparent need for further investigation, the committee was disbanded. (22)

Nevertheless, the European Commission plans to draft a "roadmap" for data protection that will address many of the concerns aired by the EP panel. (23)

Meanwhile, after years of denying the existence of ECHELON, the Dutch government issued a letter that stated: "Although the Dutch government does not have official confirmation of the existence of Echelon by the governments related to this system, it thinks it is plausible this network exists. The government believes not only the governments associated with Echelon are able to intercept communication systems, but that it is an activity of the investigative authorities and intelligence services of many countries with governments of different political signature." (24) These revelations worried Dutch legislators, who had convened a special hearing on the subject. During the hearing, several experts argued that there must be tougher oversight of government surveillance activities. There was also considerable criticism of Dutch government efforts to protect individual privacy, particularly the fact that no information had been made available relating to Dutch intelligence service's investigation of possible ECHELON abuses.(25)

In addition, an Italian government official has begun to investigate Echelon's intelligence-gathering efforts, based on the belief that the organization may be spying on European citizens in violation of Italian or international law. (26)

Events in the United States have also indicated that the "wall of silence" might not last much longer. 
Exercising their Constitutionally created oversight authority, members of the House Select Committee on Intelligence started asking questions about the legal basis for NSA's ECHELON activities. In particular, the Committee wanted to know if the communications of Americans were being intercepted and under what authority, since US law severely limits the ability of the intelligence agencies to engage in domestic surveillance. When asked about its legal authority, NSA invoked the attorney-client privilege and refused to disclose the legal standards by which ECHELON might have conducted its activities. (27)

President Clinton then signed into law a funding bill which required the NSA to report on the legal basis for ECHELON and similar activities. (28) However, the subsequent report (entitled Legal Standards for the Intelligence Community in Conducting Electronic Surveillance) gave few details about Echelon's operations and legality. (29)

However, during these proceedings, Rep. Bob Barr (R-GA), who has taken the lead in Congressional efforts to ferret out the truth about ECHELON, stated that he had arranged for the House Government Reform and Oversight Committee to hold its own oversight hearings.(30)
 
Finally, the Electronic Privacy Information Center has sued the US Government, hoping to obtain documents which would describe the legal standards by which ECHELON operates.(31)

Q - What is being done with the information that ECHELON collects?

The original purpose of ECHELON was to protect national security. That purpose continues today. For example, we know that ECHELON is gathering information on North Korea. Sources from Australia's DSD have disclosed this much because Australian officials help operate the facilities there which scan through transmissions, looking for pertinent material. (32) Similarly, the Spanish government has apparently signed a deal with the United States to receive information collected using ECHELON. The consummation of this agreement was confirmed by Spanish Foreign Minister Josep Pique, who tried to justify this arrangement on security grounds. (33)

However, national security is not Echelon's only concern. Reports have indicated that industrial espionage has become a part of Echelon's activities. While present information seems to suggest that only high-ranking government officials have direct control over Echelon's tasks, the information that is gained may be passed along at the discretion of these very same officials. As a result, much of this information has been given to American companies, in apparent attempts to give these companies an edge over their less knowledgeable counterparts. (34)

In addition, there are concerns that Echelon's actions may be used to stifle political dissent. Many of these concerns were voiced in a report commissioned by the European Parliament. What is more, there are no known safeguards to prevent such abuses of power. (35)

Q - Is there any evidence that ECHELON is doing anything improper or illegal with the spying resources at its disposal?

ECHELON is a highly classified operation, which is conducted with little or no oversight by national parliaments or courts. Most of what is known comes from whistleblowers and classified documents. The simple truth is that there is no way to know precisely what ECHELON is being used for.
But there is evidence, much of which is circumstantial, that ECHELON (along with its British counterpart) has been engaged in significant invasions of privacy. These alleged violations include secret surveillance of political organizations, such as Amnesty International. (36) It has also been reported that ECHELON has engaged in industrial espionage on various private companies such as Airbus Industries and Panavia, then has passed along the information to their American competitors. (37) It is unclear just how far Echelon's activities have harmed private individuals.

However, the most sensational revelation was that Diana, Princess of Wales may have come under ECHELON surveillance before she died. As reported in the Washington Post, the NSA admitted that they possessed files on the Princess, partly composed of intercepted phone conversations. While one official from the NSA claimed that the Princess was never a direct target, this disclosure seems to indicates the intrusive, yet surreptitious manner by which ECHELON operates. (38)
 
What is even more disquieting is that, if these allegations are proven to be true, the NSA and its compatriot organizations may have circumvented countless laws in numerous countries. Many nations have laws in place to prevent such invasions of privacy. However, there are suspicions that ECHELON has engaged in subterfuge to avoid these legal restrictions. For example, it is rumored that nations would not use their own agents to spy on their own citizens, but assign the task to agents from other countries. (39) In addition, as mentioned earlier, it is unclear just what legal standards ECHELON follows, if any actually exist. Thus, it is difficult to say what could prevent ECHELON from abusing its remarkable capabilities.

Q - Is everyone else doing what ECHELON does?

Maybe not everyone else, but there are plenty of other countries that engage in the type of intelligence gathering that ECHELON performs. These countries apparently include Russia, France, Israel, India, Pakistan and many others. (40) Indeed, the excesses of these ECHELON-like operations are rumored to be similar in form to their American equivalents, including digging up information for private companies to give them a commercial advantage.

However, it is also known that ECHELON system is the largest of its kind. What is more, its considerable powers are enhanced through the efforts of America's allies, including the United Kingdom, Canada, Australia, and New Zealand. Other countries don't have the resources to engage in the massive garnering of information that the United States is carrying out.



Notes
1. Development of Surveillance Technology and Risk of Abuse of Economic Information (An appraisal of technologies for political control), Part 4/4: The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to COMINT targeting and selection, including speech recognition, Ch. 1, para. 5, PE 168.184 / Part 4/4 (April 1999). See Duncan Campbell, Interception Capabilities 2000 (April 1999) (http://www.iptvreports.mcmail.com/stoa_cover.htm).
2. Kevin Poulsen, Echelon Revealed, ZDTV (June 9, 1999).
3. Greg Lindsay, The Government Is Reading Your E-Mail, TIME DIGITAL DAILY (June 24, 1999).
4. PE 168.184 / Part 4/4, supra note 1, Ch. 2, para. 32-34, 45-46.
5. Id. Ch. 2, para. 42.
6. Id. Ch. 2, para. 60.
7. Id. Ch. 2, para. 50.
8. Id. Ch. 2, para. 62-63.
9. An Appraisal of Technologies for Political Control, at 20, PE 166.499 (January 6, 1998). See Steve Wright, An Appraisal of Technologies for Political Control (January 6, 1998) (http://cryptome.org/stoa-atpc.htm).
10.Letter from Martin Brady, Director, Defence Signals Directorate, to Ross Coulhart, Reporter, Nine Network Australia 2 (Mar. 16, 1999) (on file with the author); see also Calls for inquiry into spy bases, ONE NEWS New Zealand (Dec. 28, 1999).
11. Duncan Campbell, Somebody's listening, NEW STATESMAN, 12 August 1988, Cover, pages 10-12. See Duncan Campbell, ECHELON: NSA's Global Electronic Interception, (last visited October 12, 1999) (http://jya.com/echelon-dc.htm).
12. PE 166.499, supra note 9, at 19-20.
13. PE 168.184 / Part 4/4, supra note 1.
14. David Ruppe, Snooping on Friends?, ABCNews.com (US) (Feb. 25, 2000) (http://abcnews.go.com/sections/world/dailynews/echelon000224.html).
15. R. James Woolsey, Why We Spy on Our Allies, WALL ST. J., March 17, 2000. See also CRYPTOME, Ex-CIA Head: Why We Spy on Our Allies (last visited April 11, 2000) (http://cryptome.org/echelon-cia2.htm).
16. Letter from Duncan Campbell to the Wall Street Journal (March 20, 2000) (on file with the author). See also Kevin Poulsen, Echelon Reporter answers Ex-CIA Chief, SecurityFocus.com (March 23, 2000) (http://www.securityfocus.com/news/6).
17. Duncan Campbell, Flaw in Human Rights Uncovered, HEISE TELEPOLIS, April 8, 2000. See also HEISE ONLINE, Flaw in Human Rights Uncovered (April 8, 2000) (http://www.heise.de/tp/english/inhalt/co/6724/1.html).
18.Angus Roxburgh, EU investigators 'snubbed' in US, BBC News, May 11, 2001 (http://news.bbc.co.uk/hi/english/world/europe/newsid_1325000/1325186.stm).
19.Report on the existence of a global system for intercepting private and commercial communications (ECHELON interception system), PE 305.391 (July 11, 2001) (available in PDF or Word format at http://www2.europarl.eu.int).
20. Id.; see also E-mail users warned over spy network, BBC News, May 29, 2001 (http://news.bbc.co.uk/hi/english/world/europe/newsid_1357000/1357264.stm).
21. Steve Kettman, Echelon Furor Ends in a Whimper, Wired News, July 3, 2001 (http://www.wired.com/news/print/0,1294,44984,00.html).
22. European Parliament resolution on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)), A5-0264/2001, PE 305.391/DEF (Sept. 5, 2001) (available at http://www3.europarl.eu.int); Christiane Schulzki-Haddouti, Europa-Parlament verabsciedet Echelon-Bericht, Heise Telepolis, Sept. 5, 2001 (available at http://www.heise.de/tp/); Steve Kettman, Echelon Panel Calls It a Day, Wired News, June 21, 2001 (http://www.wired.com/news/print/0,1294,44721,00.html).
23. European Commission member Erkki Liikanen, Speech regarding European Parliament motion for a resolution on the Echelon interception system (Sept. 5, 2001) (transcript available at http://europa.eu.int).
24. Jelle van Buuren, Dutch Government Says Echelon Exists, Heise Telepolis, Jan. 20, 2001 (available at http://www.heise.de/tp/).
25. Jelle van Buuren, Hearing On Echelon In Dutch Parliament, Heise Telepolis, Jan. 23, 2001 (available at http://www.heise.de/tp/).
26. Nicholas Rufford, Spy Station F83, SUNDAY TIMES (London), May 31, 1998. See Nicholas Rufford, Spy Station F83 (May 31, 1998) (http://www.sunday-times.co.uk/news/pages/sti/98/05/31/stifocnws01003.html?999).
27. H. Rep. No. 106-130 (1999). See Intelligence Authorization Act for Fiscal Year 2000, Additional Views of Chairman Porter J. Goss (http://www.echelonwatch.org/goss.htm).
28. Intelligence Authorization Act for Fiscal Year 2000, Pub. L. 106-120, Section 309, 113 Stat. 1605, 1613 (1999). See H.R. 1555 Intelligence Authorization Act for Fiscal Year 2000 (Enrolled Bill (Sent to President)) http://www.echelonwatch.org/hr1555c.htm).
29. UNITED STATES NATIONAL SECURITY AGENCY, LEGAL STANDARDS FOR THE INTELLIGENCE COMMUNITY IN CONDUCTING ELECTRONIC SURVEILLANCE (2000) (http://www.fas.org/irp/nsa/standards.html).
30. House Committee to Hold Privacy Hearings, (August 16, 1999) (http://www.house.gov/barr/p_081699.html).
31. ELECTRONIC PRIVACY INFORMATION CENTER, PRESS RELEASE: LAWSUIT SEEKS MEMOS ON SURVEILLANCE OF AMERICANS; EPIC LAUNCHES STUDY OF NSA INTERCEPTION ACTIVITIES (1999). See also Electronic Privacy Information Center, EPIC Sues for NSA Surveillance Memos (last visited December 17, 1999) (http://www.epic.org/open_gov/foia/nsa_suit_12_99.html).
32. Ross Coulhart, Echelon System: FAQs and website links, (May 23, 1999).
33. Isambard Wilkinson, US wins Spain's favour with offer to share spy network material, Sydney Morning Herald, June 18, 2001 (http://www.smh.com.au/news/0106/18/text/world11.html).
34. PE 168.184 / Part 4/4, supra note 1, Ch. 5, para. 101-103.
35. PE 166.499, supra note 9, at 20.
36. Id.
37. PE 168.184 / Part 4/4, supra note 1, Ch. 5, para. 101-102; Brian Dooks, EU vice-president to claim US site spies on European business, YORKSHIRE POST, Jan. 30, 2002 (available at http://yorkshirepost.co.uk).
38. Vernon Loeb, NSA Admits to Spying on Princess Diana, WASHINGTON POST, December 12, 1998, at A13. See Vernon Loeb, NSA Admits to Spying on Princess Diana, WASHINGTON POST, A13 (December 12, 1998) (http://www.washingtonpost.com/wp-srv/national/daily/dec98/diana12.htm).
39. Ross Coulhart, Big Brother is listening, (May 23, 1999).
40. PE 168.184 / Part 4/4, supra note 1, Ch. 1, para. 7.

Tuesday, June 25, 2013

Flashback: The 1960 Snowdens: #NSA Agents Who Showed Up in Moscow Bearing State Secrets

from motherboard.vice.com: Fifty-three years ago a pair of NSA agents pulled a Snowden - they told their bosses they were going on vacation, went to Mexico before slipping off to Havana en route to the Soviet Union, where they surfaced in September 1960. Unlike Snowden, they were deliberate defectors, eager to work for a new government, and to share what they knew.

William Hamilton Martin and Bernon F. Mitchell were cryptographers and chess fans, and after their defection they were portrayed as a couple of homosexual deviants who had been given too much access. By 1963 the NSA was reevaluating its hiring practices, proclaiming—from 2013 quite ironically—that, “no other event has had, or is likely to have in the future, a greater impact on the Agency's security program."

Like Snowden—and at 31 and 29 almost exactly the same age—while working for the NSA, Martin and Mitchell discovered that the American government was clandestinely doing things they found unconscionable—an ostensibly open democracy lurking in the shadows, “intercepting and deciphering of the secret communications of its own allies,” as they put it, as bad as what the Soviet Union was accused of.

Just as when Snowden emerged publicly, it would be an understatement to say that politicians were less than pleased with the cryptographers. President Eisenhower called them traitors and Harry Truman suggested they should be shot.

Francis E. Walter, chairman of the House Committee on Un-American Activities, said at least one of the pair was “a notorious homosexual.” The Los Angeles Times linked them to a “Lavender Scare,” accusing them of plotting to fill the federal government with gay turncoats. The 1950s were a simpler time for bigotry.  

Not that it actually affects anyone’s patriotism, but there was no evidence that Martin and Mitchell were actually gay. Both left girlfriends behind in America and married women in the Soviet Union. In their departing statement, they cited Soviet women as another upside to their move. “Talents of women are encouraged and utilized to a much greater extent in the Soviet Union than in the United States,” they said. “We feel that this enriches Soviet society and makes Soviet women more desirable as mates.”

Unlike Snowden, however, Martin and Mitchell were glad to leave the United States, and defected to Russia. While it was “a difficult and painful experience to leave [their] native country, family and friends” they claimed in a press conference that they would be “better accepted socially” in the Soviet Union.

At first, this was the case. The Soviet journalists erupted into applause when Martin snubbed an American reporter who asked what they were doing now that they were in the USSR.

The end of their story also sounds familiar: the Soviet Union didn’t live up to their expectations. Each tried to return to the United States, which wouldn’t have them. Martin died in 1987 in Tijuana and was buried in the US, while Mitchell died in St. Petersburg in 2001.

Sorry #NSA, Terrorists Don't Use Verizon...or Skype...or Gmail

from motherboard.vice.com: The NSA has to collect the metadata from all of our phone calls because terrorists, right? And the spy agency absolutely must intercept Skypes you conduct with folks out-of-state, or else terrorism. It must sift through your iCloud data and Facebook status updates too, because Al Qaeda.

Terrorists are everywhere, they are legion, they are dangerous, and, unfortunately, they don't really do any of the stuff described above. 

Even though the still-growing surveillance state that sprung up in the wake of 9/11 was enacted almost entirely to "fight terrorism," reports show that the modes of communication that agencies like the NSA are targeting are scarcely used by terrorists at all.

A recent Bloomberg piece points to a 2012 report on terrorism which found that most serious terrorists steer clear of the most obvious platforms—major cell networks, Google, Skype, Facebook, etc.

Or, as Bloomberg more bluntly puts it, the "infrastructure set up by the National Security Agency ... may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use."

And why would they? Post-911 warrantless wiretapping practices are well known, NSA-style data collection was well-rumored, and we all knew the Department of Homeland Security was already scanning emails for red-flag keywords. Of course terrorists would take precautions. Bloomberg elaborates:
In a January 2012 report titled “Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age,” the Dutch General Intelligence and Security Service drew a convincing picture of an Islamist Web underground centered around “core forums.” These websites are part of the Deep Web, or Undernet, the multitude of online resources not indexed by commonly used search engines.
In 2010, Google estimated that it had indexed just 0.004% of the internet—meaning the vast majority of the web is open for surreptitious message-sending business. Terrorists simply aren't dumb enough to discuss their secret plans over Skype or to email each other confidential information on Gmail.

So, essentially, the NSA is deeply compromising our privacy so that it can do an extremely shitty job of looking for terrorists. Nice.

#NSA takes surveillance fact sheets off website

from Politico.com: Following a complaint from two senators, the National Security Agency has removed from its website two fact sheets designed to shed light on and defend a pair of surveillance programs. Users now trying to access the documents detailing surveillance under legal authorities known as Section 215 and Section 702 receive an error message when they try to load the fact sheets.

On Monday, Sens. Ron Wyden (D-Ore.) and Mark Udall (D-Colo.) wrote to the head of the spy agency alleging that one of the documents was misleading and inaccurate. The senators claimed, without elaborating, that a fact sheet “contains an inaccurate statement about how the section 702 authority has been interpreted by the U.S. government.”

NSA Director Gen. Keith Alexander responded to the two lawmakers Tuesday, and while he didn't admit inaccuracy, he said the documents could have been clearer.

"After reviewing your letter, I agree that the fact sheet that the National Security Agency posted on its website on 18 June 2013 could have more precisely described the requirements for collection under Section 702 of the FISA Amendments Act," Alexander said in a letter of his own (posted here).
Separately Tuesday, another NSA official said the removal of the fact sheets and letter from the senators were unrelated.

"Given the intense interest from the media, the public, and Congress, we believe the precision of the source document (the statute) is the best possible representation of applicable authorities,” NSA spokesperson Judith Emmel said in a statement.

The documents, still available here, were published in the wake of revelations about the extent of the NSA’s surveillance programs. They sought to highlight the safeguards the NSA uses to make sure American communications aren’t caught up in its surveillance — or if they are, what the NSA does to remove identifying information about U.S. citizens. Wyden and Udall, both of whom sit on the Senate Intelligence Committee, have long called for more transparency on how the NSA protects Americans’ privacy -- but said the NSA's fact sheets gave the wrong impression.

“The Senator has received the letter and appreciates that the misleading fact sheet has been taken down," Wyden spokesman Tom Caiazza said.

The NSA procedures for targeting foreigners and minimizing American communications were further unveiled last Thursday when The Guardian and Washington Post posted detailed copies of the guidelines. Many privacy advocates were not satisfied with the procedures, arguing that they give the government too much leeway when determining if a potential target is foreign or American. Director of National Intelligence James Clapper had no comment on the procedures after they were disclosed.

Monday, June 24, 2013

Whistleblower: #NSA Wiretapped Obama, Petraeus, Alito & Others

from Boiling Frogs Post: Last week, during exclusive interviews with Boiling Frogs Post and Corbett Report, NSA whistleblower Russell Tice revealed first-time-ever shocking new details of the NSA spying scandal. In addition to detailing how the NSA is collecting and storing the content of all electronic communications passing through the United States, he also revealed for the first time some of the specific targets of past NSA wiretapping operations, including senior Congressional leaders, the former White House Press Secretary, high-ranking military generals, the entire Supreme Court, and even then-Senator from Illinois and future President, Barack Obama.

 

Listen to the full-length revelatory interview: Click Here

Listen to Sibel Edmonds’ commentary on Tice revelations and more: Click Here

Stay tuned for continuing coverage of the case this week on BoilingFrogsPost.com

‘Insider Threat’ program forces federal employees to spy on co-workers

from PressTV.ir: Government documents have revealed that the Obama administration is implementing a program that requires millions of federal employees to spy on their co-workers as part of a sweeping crackdown on security leaks across the U.S. government.

The program titled “Insider Threat” which has gone almost entirely unnoticed in the U.S. media also presses managers to punish employees who fail to report their suspicions, McClatchy reported Friday after obtaining the documents.

The program spans all federal agencies and mandates employees and their superiors to identify and report behaviors associated with someone who might leak sensitive government information.

Those who fail to expose “high-risk persons” face penalties that include criminal charges, according to the report.

The program was launched in October 2011 after Army Private Bradley Manning blew the whistle on U.S. war crimes, in the largest intelligence leak in U.S. history.

According to a Pentagon strategy dated June 1, 2012 and written for the Insider Threat Program, leaking sensitive documents is “tantamount to aiding the enemies of the United States.”

The government documents reviewed by McClatchy reveal that some federal agencies are using the unprecedented initiative to crack down on unauthorized disclosures of any information, not just classified documents.

As McClatchy reports, the Obama administration is expected to speed up the implementation of the program in the wake of a series of recent leaks by former National Security Agency contractor Edward Snowden who exposed the agency’s top-secret surveillance programs.


Snowden disclosed two major NSA spying programs, one for gathering data on phone calls made by Americans in and outside the U.S. and another, codenamed PRISM, for collecting information on people across the globe via major Internet companies.


President Barack Obama has defended the U.S. government’s spying programs as transparent and legal, even though the NSA was authorized to run the surveillance activities in secret.

Sunday, June 23, 2013

Summer Soltice CME Blast

Summer Soltice CME Blast
The Extinction Protocol: 2012 and Beyond reports recent Coronal Mass Ejection: "On June 20, 2013, at 11:24 p.m., the sun erupted with an Earth-directed coronal mass ejection or CME, a solar phenomenon that can send billions of tons of particles into space that can reach Earth one to three days later." The brief article reports fast rate of speed, ejection traveling at 1350 miles per second:  "... based on observations from NASA’s Solar Terrestrial Relations Observatory and ESA/NASA’s Solar and Heliospheric Observatory show that the CME left the sun at speeds of around 1350 miles per second, which is a fast speed for CMEs. Earth-directed CMEs can cause a space weather phenomenon called a geomagnetic storm, which occurs when they funnel energy into Earth’s magnetic envelope, the magnetosphere, for an extended period of time. The CME’s magnetic fields peel back the outermost layers of Earth’s fields changing their very shape. Magnetic storms can degrade communication signals and cause unexpected electrical surges in power grids. They also can cause aurora. Storms are rare during solar minimum, but as the sun’s activity ramps up every 11 years toward solar maximum – currently expected in late 2013 — large storms occur several times per year." Spaceweather.com reports: " For the second day in a row, a fast stream of solar wind is blowing around Earth. NOAA forecasters estimate a 30% chance of polar geomagnetic storms on June 23rd in response to the buffeting."