Showing posts with label Surveillance. Show all posts
Showing posts with label Surveillance. Show all posts

Wednesday, March 22, 2017

#PresidentTrump Vindicated on Surveillance Claims

Heh.

I've been saying this all along, and now here comes Rep. Devin Nunes, chairman of the House Intelligence Committee, indicating that some of President[-elect] Trump's communications were captured at Trump Tower during the transition.

At Bloomberg, "Nunes Says Trump Team Conversations Caught in Surveillance."


Tuesday, March 7, 2017

Massive WikiLeaks C.I.A. Hacking Dump Reveals Spy Secrets, Possible Espionage on Americans (VIDEO)

I just don't know what to think anymore.

Absolutely nothing is safe these days from cyberhacking, and what's worse, the C.I.A. may well have been involved in domestic espionage, which is prohibited by statute. Either that, or other operators using the same technology.

In any case, at the New York Times, "WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents":
WASHINGTON — WikiLeaks on Tuesday released thousands of documents that it said described sophisticated software tools used by the Central Intelligence Agency to break into smartphones, computers and even Internet-connected televisions.

If the documents are authentic, as appeared likely at first review, the release would be the latest coup for the anti-secrecy organization and a serious blow to the C.I.A., which maintains its own hacking capabilities to be used for espionage.

The initial release, which WikiLeaks said was only the first part of the document collection, included 7,818 web pages with 943 attachments, the group said. The entire archive of C.I.A. material consists of several hundred million lines of computer code, it said.

Among other disclosures that, if confirmed, would rock the technology world, the WikiLeaks release said that the C.I.A. and allied intelligence services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

The source of the documents was not named. WikiLeaks said the documents, which it called Vault 7, had been “circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

WikiLeaks said the source, in a statement, set out policy questions that “urgently need to be debated in public, including whether the C.I.A.’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.” The source, the group said, “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

The documents, from the C.I.A’s Center for Cyber Intelligence, are dated from 2013 to 2016, and WikiLeaks described them as “the largest ever publication of confidential documents on the agency.” One former intelligence officer who briefly reviewed the documents on Tuesday morning said some of the code names for C.I.A. programs, an organization chart and the description of a C.I.A. hacking base appeared to be genuine.

A C.I.A. spokesman, Dean Boyd, said, “We do not comment on the authenticity or content of purported intelligence documents.”

WikiLeaks, which has sometimes been accused of recklessly leaking information that could do harm, said it had redacted names and other identifying information from the collection. It said it was not releasing the computer code for actual, usable cyberweapons “until a consensus emerges on the technical and political nature of the C.I.A.’s program and how such ‘weapons’ should be analyzed, disarmed and published.”

Some of the details of the C.I.A. programs might have come from the plot of a spy novel for the cyberage, revealing numerous highly classified — and in some cases, exotic — hacking programs. One, code-named Weeping Angel, uses Samsung “smart” televisions as covert listening devices. According to the WikiLeaks news release, even when it appears to be turned off, the television “operates as a bug, recording conversations in the room and sending them over the internet to a covert C.I.A. server.”

The release said the program was developed in cooperation with British intelligence...
Keep reading.

And watch, at CNN:



Time to Shine Light on Obama Administration's Election Activities

From Professor Glenn Reynolds, at USA Today, "Did Obama spy on Trump?":
It isn't out of the question. The former president's administration wiretapped journalists and spied on Congress.

So President Trump set off a firestorm over the weekend with a series of tweets alleging that Obama had tapped Trump Tower. But getting hung up on imprecise language in the president's tweets isn't the right way to look at things. What seems to be at true is that the Obama administration spied on some of Trump's associates and we don't know exactly how much information was collected under what authority and who was targeted.

As former prosecutor Andrew McCarthy summarizes in National Review, the Obama Justice Department considered a criminal investigation aimed at a number of Trump’s associates. When they didn’t find anything criminal, they converted the investigation into an intelligence probe under the Foreign Intelligence Surveillance Act. Elements of that story have been confirmed by The New York Times, the BBC and McClatchy newspapers.

FISA surveillance has to be approved by a special court, which almost always allows the government to spy on people when asked. But when the Justice Department asked to spy on several of Trump's associates, the court refused permission, according to the BBC. As McCarthy writes, this is notable because “the FISA court is notoriously solicitous of government requests to conduct national security surveillance.”

Not taking no for an answer, the Obama administration came back during the final weeks of the election with a narrower request that didn’t specifically mention Trump. That narrower request was granted by the court, but reports from the Guardian and the BBC don't mention the tapping of phones..

Former Obama officials issued denials that the former president had anything to do with it, which McCarthy calls “disingenuous on several levels.” Others have characterized them as a "non-denial denial.”
Of course Obama spied on Trump.

It's a no brainer.

But keep reading.

PREVIOUSLY: "NSA Whistleblower Backs Trump Up on Wiretap Claims."

NSA Whistleblower Backs Trump Up on Wiretap Claims

At Instapundit, "BILL BINNEY’S NOT JUST ANY WHISTLEBLOWER: NSA Whistleblower Backs Trump Up on Wiretap Claims":
President Donald Trump is “absolutely right” to claim he was wiretapped and monitored, a former NSA official claimed Monday, adding that the administration risks falling victim to further leaks if it continues to run afoul of the intelligence community...
Keep reading.

Sunday, March 5, 2017

Leaks, Unnamed Sources in Far-Left Media Campaign to Destroy #PresidentTrump

From Michael Goodwin, at the New York Post:

Here a Russian story, there a Russian story, everywhere a Russian story — all based on leaks from anonymous sources. You don’t have to be a spook to spot the plan: Destroy Donald Trump by putting him in a bear hug.

To judge by their scattershot approach, the conspirators are fishing for a bombshell. The fallback goal is to inflict death by a thousand cuts.

Already they’ve gotten one scalp and part of another. Gen. Mike Flynn is gone, and Attorney General Jeff Sessions is wounded. Each made a mistake that obscured a larger truth: Somebody in the government has been spying on Trump’s team and giving top secret information to anti-Trump media outlets.

Our president is many things, but dumb he’s not. He recognized the stakes, so yesterday he struck back in a way that dramatically upped the ante in the war over his presidency.

Trump’s early-morning tweets accusing President Barack Obama of having wiretapped him at Trump Tower startled the world. It is a sensational claim, but in light of the tsunami of leaks from intelligence agencies, the president is right to suspect that he’s the target of a dirty game.

To start with, the unprecedented alliance against him clearly includes remnants of the Obama administration, and probably the former president himself. The recent New York Times report that Obama and his team dropped intelligence findings like bread crumbs so they would get wide readership and to prevent the Trump administration from burying them reveals an attempt to undermine if not subvert a legally elected president.

The Times report conveys suspicions that Trump would deep-six the findings if he could while giving a free pass to Obama’s leakers who may have committed crimes. The Times knows who in the Obama camp was involved and what they did. The paper has an ethical obligation to report it.

Yet here’s the rub: What exactly was in those findings? All the public knows is that intelligence officials said they investigated whether the Trump campaign had ties to Russia, and we only know that because it was leaked by anonymous sources.

But that knowledge, while sounding suspicious, raises more questions than it answers.

For example, did investigators looking at Trump’s campaign find anything substantive? The Times has said no but keeps suggesting the probes continue. Publicly, the FBI won’t confirm or deny anything and even Congress is frustrated by the bureau’s behavior.

Yet the fact that there are leaks reveals something important: The investigation involved monitoring phone calls and maybe computers and maybe physical surveillance...
Keep reading.

PREVIOUSLY: "#PresidentTrump Seeks Investigation Into Alleged Obama Administration Wiretapping."

#PresidentTrump Seeks Investigation Into Alleged Obama Administration Wiretapping

I haven't been blogging all this stuff, not because it's unimportant, but because I don't much care. Of course Obama bugged Trump Tower. It'd be nice to have evidence, but to me it's a no brainer.

In any case, here's NYT's headline, at Memeorandum, "Trump Seeks Inquiry Into Allegations That Obama Tapped His Phones." And at Althouse, "'FISA Is Not Law-Enforcement – It’s Not Interference with Justice Department Independence for White House to Ask for FISA Information'":
The invaluable legal analysis of Andrew M. McCarthy, checking the work of the NYT.
And see the roundup at Maggie's Farm, "The Political Warfare Continues."

BONUS: From Ed Driscoll, at Instapundit, "J. CHRISTIAN ADAMS: If It Happened, Trump Wiretapping Makes Watergate ‘Look Like a Joke’."

Monday, February 6, 2017

Mike Lofgren, The Deep State

*BUMPED.*

I picked up a copy.

Check it out, at Amazon, The Deep State: The Fall of the Constitution and the Rise of a Shadow Government.

Remember to always read widely and know your enemy. (Plus, you know me: I love all the crazy leftist theories these days. There's never a dull moment, lol.)

Mike Lofgren photo THE-DEEP-STATE-HC-HIGH-RES_zpswnbeu6qr.jpg

Tuesday, November 3, 2015

Paranoia and the Surveillance State

I'm generally not paranoid, but still.

Don't miss this chilling piece at the Atlantic, "If You’re Not Paranoid, You’re Crazy."

And flashback to last month, "Social Media Self-Defense."

Thursday, October 1, 2015

Monday, March 2, 2015

Quartering Spyware Troops in a Digital Age: Why Your Home Should Be Your Castle

From Glenn Reynolds, at USA Today, "Quartering spyware troops in the digital age":
In 1893, historian Frederick Jackson Turner published a famous paper on the closing of the American frontier. The last unsettled areas, he said, were being populated, and that meant the end of an era.

I think that something a bit like that is happening in my field of constitutional law. The last part of the Bill of Rights left almost untouched — the Third Amendment — is now becoming the subject of substantial academic commentary, with a symposium on the amendment, which I attended, this past weekend held by the Tennessee Law Review.

The Tennessee Law Review published the very first law review article on the Third Amendment back in 1949. But there weren't very many to follow: a handful, over many decades. Maybe that's because the Third Amendment just plain works. It provides: "No soldier shall, in time of peace be quartered in any house, without the consent of the owner, nor in time of war, but in a manner to be prescribed by law."

That doesn't happen much — The Onion ran a parody piece some years ago entitled "Third Amendment Rights Group Celebrates Another Successful Year" — and so it may just be that the Third Amendment is the only part of the Bill of Rights that really works. Except that it may not be working the way that we think.

The only Supreme Court case in which the Third Amendment did any heavy lifting is Griswold v. Connecticut, a case that's not about troop-quartering, but about birth control. The Supreme Court held that the Third Amendment's "penumbra" (a legal term that predates the Griswold case) extended to protecting the privacy of the home from government intrusions. "Would we," asked the court, "allow the police to search the sacred precincts of marital bedrooms for telltale signs of the use of contraceptives?" The very idea, said the court, was "repulsive."

Likewise, the U.S. Court of Appeals for the Second Circuit held in Engblom v. Carey that the Third Amendment protects a "fundamental right to privacy" in the home. Since then, courts haven't done much to flesh these holdings out, but I wonder if they should. In the 18th century, when the Third Amendment was drafted, "troop quartering" meant literally having troops move into your house to live at your expense and sleep in your beds. It destroyed any semblance of domestic privacy, opening up conversations, affection, even spats to the observation and participation of outsiders. It converted a home into an arena.

Today we don't have that, but we have numerous intrusions that didn't exist in James Madison's day: Government spying on phones, computers, and video — is spyware on your computer like having a tiny soldier quartered on your hard drive? — intrusive regulations on child-rearing and education, the threat of dangerous "no-knock" raids by soldierly SWAT teams that break down doors first and ask questions later.

The Third Amendment hasn't been invoked in these cases — well, actually, it has, in the case of a SWAT team in Henderson, Nev., that took over a family home so that it could position itself against a neighbor's house — but maybe it should be. At least, maybe we should go farther in recognizing a fundamental right of privacy in people's homes...
More.

Monday, January 19, 2015

New Edward Snowden Files Reveal Scope of NSA Plans for Cyberwarfare

At Der Spiegel, "The Digital Arms Race: NSA Preps America for Future Battle":
The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it's operated by the NSA's digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.

Potential interns are also told that research into third party computers might include plans to "remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware." Using a program called Passionatepolka, for example, they may be asked to "remotely brick network cards." With programs like Berserkr they would implant "persistent backdoors" and "parasitic drivers". Using another piece of software called Barnfire, they would "erase the BIOS on a brand of servers that act as a backbone to many rival governments."

An intern's tasks might also include remotely destroying the functionality of hard drives. Ultimately, the goal of the internship program was "developing an attacker's mindset."

The internship listing is eight years old, but the attacker's mindset has since become a kind of doctrine for the NSA's data spies. And the intelligence service isn't just trying to achieve mass surveillance of Internet communication, either. The digital spies of the Five Eyes alliance -- comprised of the United States, Britain, Canada, Australia and New Zealand -- want more.

The Birth of D Weapons

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It's no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country's leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

Surveillance only 'Phase 0'

From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation".

One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.

In recent years, malware has emerged that experts have attributed to the NSA and its Five Eyes alliance based on a number of indicators. They include programs like Stuxnet, used to attack the Iranian nuclear program. Or Regin, a powerful spyware trojan that created a furor in Germany after it infected the USB stick of a high-ranking staffer to Chancellor Angela Merkel. Agents also used Regin in attacks against the European Commission, the EU's executive, and Belgian telecoms company Belgacom in 2011.
Given that spies can routinely break through just about any security software, virtually all Internet users are at risk of a data attack.

The new documents shed some new light on other revelations as well. Although an attack called Quantuminsert has been widely reported by SPIEGEL and others, documentation shows that in reality it has a low success rate and it has likely been replaced by more reliable attacks such as Quantumdirk, which injects malicious content into chat services provided by websites such as Facebook and Yahoo. And computers infected with Straitbizarre can be turned into disposable and non-attributable "shooter" nodes. These nodes can then receive messages from the NSA's Quantum network, which is used for "command and control for very large scale active exploitation and attack." The secret agents were also able to breach mobile phones by exploiting a vulnerability in the Safari browser in order to obtain sensitive data and remotely implant malicious code.

In this guerilla war over data, little differentiation is made between soldiers and civilians, the Snowden documents show. Any Internet user could suffer damage to his or her data or computer. It also has the potential to create perils in the offline world as well. If, for example, a D weapon like Barnfire were to destroy or "brick" the control center of a hospital as a result of a programming error, people who don't even own a mobile phone could be affected.

Intelligence agencies have adopted "plausible deniability" as their guiding principle for Internet operations. To ensure their ability to do so, they seek to make it impossible to trace the author of the attack.

It's a stunning approach with which the digital spies deliberately undermine the very foundations of the rule of law around the globe. This approach threatens to transform the Internet into a lawless zone in which superpowers and their secret services operate according to their own whims with very few ways to hold them accountable for their actions.
Interesting.

And there's a whole lot more at the link.

Sunday, January 11, 2015

The Next Islamist Rampage

At the Wall Street Journal, "The West has to reinforce its terror defenses, including surveillance":
France’s terror rampage ended Friday as police killed three Islamists, but not before they had paralyzed much of the country, taken more hostages, and killed at least four more innocents. Europe and the U.S. had better brace for more such attacks, while reinforcing the antiterror defenses, moral and military, that have come under political assault in recent years.

***
The biggest question raised by Paris is whether it presages a new offensive by homegrown jihadists carrying European or U.S. passports who are inspired by al Qaeda or Islamic State. Officials say one of the killers was trained by the al Qaeda offshoot in Yemen, and we can expect other such links or sympathies.

It’s tempting but probably wrong to think that France has a unique jihadist problem because of its relatively large Muslim population (about 7.5% of the country) and the immigrant ghettoes where they congregate. These certainly are breeding grounds for radicalism. Yet the United Kingdom has Birmingham, the Islamist petri dish for the London subway bombers, and the U.S. sheltered the killer Tsarnaevs in Boston and the Somali immigrants in Minnesota who’ve gone to Syria.

America may have a better historical record of assimilating diverse peoples, but that was when the U.S. had a less fragmented national culture and an elite that was more confident in Western values. The Internet, for all its benefits, also makes it possible for young men in the West to be inspired or recruited by jihadist networks around the world.

The threat is compounded by America’s abdication in the Syrian civil war, which has become a Grand Central Station for global jihad. Thousands from the Muslim diaspora have flooded into Syria as they did in Iraq after the fall of Saddam Hussein. The difference is that in Iraq they were killed by the U.S.-Iraq counter-insurgency campaign.

In Syria they have had four years to develop safe havens and training camps. Hundreds of Europeans and Americans have joined the ranks of al-Nusrah, the al Qaeda branch in Syria, or Islamic State, which controls territory from Aleppo in Western Syria through the suburbs of Baghdad.

“A group of core al Qaeda terrorists in Syria is planning mass casualty attacks against the West,” said Andrew Parker, the director general of British security service MI5, in a speech Thursday. His timing was no accident. Mr. Parker said some 600 British citizens have traveled to Syria, many joining Islamic State. “We face a very serious level of threat that is complex to combat and unlikely to abate significantly for some time.”

How to respond? One necessity is to accelerate and intensify the campaign against Islamic State and its 30,000 recruits. Jihad is more attractive when it is succeeding, and Islamic State has infused militant Islam with a new charisma. All the more so after President Obama announced a campaign to destroy it, began bombing, and then—very little. The desultory offensive so far may be winning more recruits for Islamic State than it is inflicting casualties.

The West also needs to cease its political campaign against the most effective antiterror tools. This means surveillance in particular. The same left-libertarian media who have canonized Edward Snowden and Glenn Greenwald now claim solidarity with Charlie Hebdo. Sorry. You cannot favor antiterror disarmament and then claim shock at terror successes.

“My sharpest concern as director general of MI5 is the growing gap between the increasingly challenging threat and the decreasing availability of capabilities to address it,” Mr. Parker, the British security chief, also said this week. “The dark places from where those who wish us harm can plot and plan are increasing” and “we need to be able to access communications and obtain relevant data on those people when we have good reason.”

Surveillance by itself isn’t enough, given the many reports that French security had tracked this week’s killers. We’ll learn in the coming days if the French missed clues that the Kouachi brothers were ready to strike, but other countries have had similar oversights. The FBI was tipped off that Tamerlan Tsarnaev had visited the North Caucusus terrorist hotbed of Dagestan in 2012 but failed to act.

The West will have to consider more aggressive interventions, including arrest or exile, for citizens who visit terror regions and show signs of embracing jihad. Tracking Muslim student groups and clerics is also essential to preventing future attacks. The Associated Press campaign three years ago against the New York police for legal monitoring of Muslim groups looks more morally obtuse with each homegrown attack.
Oops. I suspect the WSJ's editors are a bit too lucid for the global leftist Islamo-coddlers.

And I just love that line on Assange and Greenwald: "Sorry. You cannot favor antiterror disarmament and then claim shock at terror successes." Indeed you cannot. And it means that the global left bears partial responsibility for the Paris attacks.

Still more at the link.

Friday, October 24, 2014

'Citizenfour'

So, I guess it's appropriate that Glenn Greenwald's mug flashed before my eyes this morning, after I got back from dropping off my kid at school, pulled out the L.A. Times, and sat down to take a dump. Yep, if there's ever a leftist piece of fecal refuse it's Greenwald.

Kenneth Turan has the review of the Laura Poitras documentary, "Review 'Citizenfour' a compelling look at Edward Snowden's actions."

 photo 005136ad-4ec0-4133-ae16-3e190129ee59_zps23d8aee6.jpg

Saturday, June 21, 2014

Russian Intel's Special War Against #Ukraine

Remember Victoria Nuland's remark about "pretty impressive statecraft."

Yeah, considering, this is quite reasonable.

From John Schindler, at XX Committee, "More Evidence Russian Intelligence is Waging Special War Against Ukraine":

For months it has been obvious to those who wish to see that Russian intelligence stands behind the campaign of espionage, terrorism, propaganda, and covert action (including raising and arming rebel militias), which I have termed Special War, that is being waged by Vladimir Putin against Ukraine. I’ve written about this murky matter several times. After the recent election of Petro Poroshenko as Ukraine’s president, the Kremlin’s efforts to terrorize and coerce its neighbor have only increased, and evidence of Russian intelligence involvement has mounted by the day.

Recently, U.S. officials have confirmed widespread rumors that the shadowy paramilitary boss Igor Girkin (AKA Strelkov), who has been a major figure in the campaign to destabilize Ukraine and serves as the defense minister of the self-proclaimed (and Moscow-backed) “Donetsk People’s Republic” in southeast Ukraine, is actually a Russian military intelligence (GRU) colonel. GRU special operators have been deeply involved in the seizure of Crimea and continuing efforts to terrorize and destabilize eastern Ukraine.

Today, in an interview with the Kyiv newspaper Den, Valentyn Nalyvaychenko, the director of Ukraine’s Security Service (SBU), elaborated just how large a role Russian intelligence, particularly the powerful Federal Security Service (FSB), is playing in Putin’s effort to destabilize and intimidate Kyiv into submission. Nalyvaychenko explained that the FSB stands behind Russia’s entire anti-Ukraine campaign, choosing the Kremlin’s strategy and operations, and the SBU has detained several Russian intelligence operatives in eastern Ukraine recently, including over ninety “terrorists and saboteurs,” among them thirteen Russian nationals – “mercenaries and professional intelligence officers, agents.” He said that the annexation of Crimea and Russia’s on-going Special War operations in eastern Ukraine were planned long before this spring, with the full collaboration of Ukraine’s previous government.

Although it has been widely known that, during the presidency of Viktor Yanukovych, the SBU was deeply penetrated by the FSB, with Russian officers actually holding positions inside Ukrainian intelligence, Nalyvaychenko stated that even he did not realize how bad the situation was until recently. There is a major hunt afoot now for pro-Kremlin agents inside the SBU since, the director explained, “from December 2013 until the end of February 2014, three groups of high-ranking FSB officers worked in the SBU. During these months, all modern arms, files, archives, everything that forms a basis for a professional intelligence service, were transferred to Simferopol” in Crimea...

Wednesday, April 23, 2014

'Brutally Tortured' Body of Ukrainian Deputy Vladimir Rybak Found Near Rebel-Held Slovyansk

Oh boy, this is getting ugly.

At Toronto's Globe and Mail, "Kiev moves against militants after politician tortured, slain." And Independent UK, "Ukraine crisis: Two bodies found 'brutally tortured by pro-Russian militants' in Slaviansk, says interim President Oleksander Turchinov":
Ukraine’s interim President Oleksander Turchinov has called for an anti-terrorist operation to be re-launched on Tuesday, after he claimed that two bodies were found "brutally tortured by pro-Russian" militants near the eastern city of Slaviansk.

Mr Turchinov said in a statement that one of the bodies was that of Volodymyr Rybak, a member of the ruling Batkivshchyna party, who had recently been abducted by “terrorists.”

Local media said Mr Rybak was kidnapped in Horlivka, a nearby locality, on Wednesday last week.

Police from the regional headquarters in Donetsk said that the body of a man who died a violent death had been found in the Seversky-Donets river and that it resembled Mr Rybak, a local councillor in the town of Horlivka, near Donetsk.

They added that formal identification would require further work...
Also at Telegraph UK, "Russia 'supported torture of Kiev politician’":
Ukraine’s acting president calls for 'anti-terrorist operation’ against pro-Moscow separatists after body of a murdered town councillor is found.

The acting Ukrainian president, Oleksandr Turchynov, said on Tuesday that Russia had supported the torture and murder of a local politician in the east of the country loyal to Kiev.

The president called for the re-launch of an “anti-terrorist operation” against pro-Moscow separatists that was suspended only last week.

The remains of Vladimir Rybak, a town councillor and member of Yulia Tymoshenko’s Our Ukraine Fatherland party, along with an unidentified body, were believed to have been found in separatist-held Slavyansk.

“These crimes are being carried out with the full support and indulgence of the Russian Federation,” said Mr Turchynov. “I call on the security agencies to re-launch and carry out effective anti-terrorist measures, with the aim of protecting Ukrainian citizens living in east [Ukraine] from terrorists.”

Ukraine’s security forces had largely suspended what was a fairly limited operation to respond to the takeover of the eastern town by pro-Russian separatists after an accord with Moscow last week to try to defuse the crisis...
Still more at NYT, "At Funeral, Expressions of Grief and Anger Toward Kiev Officials," and at the Times of Israel, "Ukraine relaunches operation after Biden leaves."