• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Quiet Sinners: Empire of Secrets: British Intelligence, the Cold War and the Twilight of Empire by Calder Walton

    It’s pretty obvious why British governments have been anxious to keep the history of their secret service secret for so long. In the case of decolonisation, which is the subject of Calder Walton’s book, revelations about dirty tricks even after fifty years might do irreparable damage to the myth carefully cultivated at the time: which was that for Britain, unlike France, say, or the Netherlands, or Belgium, the process was smooth and friendly. Britain, so the story went, was freely granting self-government to its colonies as the culmination of imperial rule, which had always had this as its ultimate aim – ‘Empire into Commonwealth’, as the history books used to put it. If for no other reason, the myth was needed in order to make ordinary Britons feel better.

    Letters

    Vol. 35 No. 7 · 11 April 2013

    From David Lea

    Referring to the controversy surrounding the death of Patrice Lumumba in1960, Bernard Porter quotes Calder Walton’s conclusion: ‘The question remains whether British plots to assassinate Lumumba … ever amounted to anything. At present, we do not know’ (LRB, 21 March). Actually, in this particular case, I can report that we do. It so happens that I was having a cup of tea with Daphne Park – we were colleagues from opposite sides of the Lords – a few months before she died in March 2010. She had been consul and first secretary in Leopoldville, now Kinshasa, from 1959 to 1961, which in practice (this was subsequently acknowledged) meant head of MI6 there. I mentioned the uproar surrounding Lumumba’s abduction and murder, and recalled the theory that MI6 might have had something to do with it. ‘We did,’ she replied, ‘I organised it.’

    We went on to discuss her contention that Lumumba would have handed over the whole lot to the Russians: the high-value Katangese uranium deposits as well as the diamonds and other important minerals largely located in the secessionist eastern state of Katanga. Against that, I put the point that I didn’t see how suspicion of Western involvement and of our motivation for Balkanising their country would be a happy augury for the new republic’s peaceful development.

    David Lea
    London SW1

    Bernard Porter
    Harper, 411 pp, £25.00, February, ISBN 978 0 00 745796 0
    [*] Cambridge, 449 pp., £25, December 2012, 978 1 107 00099 5.

    Find this story at 21 March 2013

    German spies accused of racism, Islamophobia

    Germany’s domestic intelligence agency is a hotbed of “institutional racism,” where Islamophobic, racist and offensive remarks are an everyday occurrence, a newspaper reported on Friday.
    Westerwelle slams media limits for neo-Nazi trial (10 Apr 13)
    Search for Nazi death camp guards widens (9 Apr 13)
    Radical German Muslims join fight in Syria (7 Apr 13)

    Germany’s security service the Verfassungsschutz is a hornet’s nest of conflict, envy, jealousy and inappropriate insults, wrote the Süddeutsche Zeitung, citing inside sources.

    And they aren’t just innocent office jokes. Employees of the department tasked with observing militant Islamists reportedly throw around deeply offensive, Nazi-affiliated words in private of the kind which would be unthinkable in a public setting.

    These range from Herrenrasse, the German for “master race” to Muselmann – originally a German word meaning “Muslim man” later used by the Nazis as a slang word for emaciated death camp inmates who had surrendered to their fate – to Ölauge, a derogatory name for “greasy” dark-eyed foreigners.

    In one case currently the subject of an internal investigation, an agency employee is said to have offended co-workers in his office by positioning a doll of a Teutonic Knight with his sword pointing at a miniature mosque, wrote the paper.

    The highly secretive intelligence agency declined to comment on the investigation into the doll incident, but the paper reported mixed views among internal sources.
    While some insisted the incident was an isolated, one-off occurrence, others told paper the issue of racism was not being dealt with at all within the agency.

    Published: 22 Mar 13 10:50 CET | Print version

    Find this story at 22 March 2013
    The Local/jlb

    Family of slain Spanish teen demand inquiry of far-right killer

    The family of a teenager whose murder by a far-right commando rocked Spain in 1980 called Friday for an official inquiry after a newspaper reported that her killer has worked for police as an advisor since his release from jail.

    Yolanda Gonzalez, a 19-year-old Socialist Party activist who had appeared in photographs at the head of student protest marches, was shot two times in the head at close range in a field near Madrid by a far-right commando who suspected her of belonging to the armed Basque separatist group ETA.

    Gonzalez’s murder shocked Spain, which at the time was going through a tumultuous transition to democracy following the death of right-wing dictator General Francisco Franco.

    The man who shot Gonzalez, Emilio Hellin Moro, a former member of the Grup 41 commando with ties to the far-right party Fuerza Nueva, changed his name to Luis Enrique Hellin after he was released from jail in 1996 after serving 14 years of a 43-year jail sentence, top-selling newspaper El Pais reported last month.

    According to the left-leaning paper, the 63-year-old expert on IT-related criminal investigations secured contracts under the changed name with Spain’s security forces, acting for years as an advisor to Spain’s top court and proving training courses to police on how to carry out electronic eavesdropping and comb computers and cellphones for evidence.

    Agence France-PresseMarch 8, 2013 17:30

    Find this story at 8 March 2013
    Copyright 2013 GlobalPost

    James Steele: America’s mystery man in Iraq – video

    A 15-month investigation by the Guardian and BBC Arabic reveals how retired US colonel James Steele, a veteran of American proxy wars in El Salvador and Nicaragua, played a key role in training and overseeing US-funded special police commandos who ran a network of torture centres in Iraq. Another special forces veteran, Colonel James Coffman, worked with Steele and reported directly to General David Petraeus, who had been sent into Iraq to organise the Iraqi security services

    • Watch a five-minute edited version of this film narrated by Dearbhla Molloy

    • Revealed: Pentagon’s link to Iraqi torture centres

    Find this story at 6 March 2013

    Revealed: Pentagon’s link to Iraqi torture centres

    Exclusive: General David Petraeus and ‘dirty wars’ veteran behind commando units implicated in detainee abuse

    The Pentagon sent a US veteran of the “dirty wars” in Central America to oversee sectarian police commando units in Iraq that set up secret detention and torture centres to get information from insurgents. These units conducted some of the worst acts of torture during the US occupation and accelerated the country’s descent into full-scale civil war.

    Colonel James Steele was a 58-year-old retired special forces veteran when he was nominated by Donald Rumsfeld to help organise the paramilitaries in an attempt to quell a Sunni insurgency, an investigation by the Guardian and BBC Arabic shows.

    After the Pentagon lifted a ban on Shia militias joining the security forces, the special police commando (SPC) membership was increasingly drawn from violent Shia groups such as the Badr brigades.

    A second special adviser, retired Colonel James H Coffman, worked alongside Steele in detention centres that were set up with millions of dollars of US funding.

    Coffman reported directly to General David Petraeus, sent to Iraq in June 2004 to organise and train the new Iraqi security forces. Steele, who was in Iraq from 2003 to 2005, and returned to the country in 2006, reported directly to Rumsfeld.

    The allegations, made by US and Iraqi witnesses in the Guardian/BBC documentary, implicate US advisers for the first time in the human rights abuses committed by the commandos. It is also the first time that Petraeus – who last November was forced to resign as director of the CIA after a sex scandal – has been linked through an adviser to this abuse.

    Coffman reported to Petraeus and described himself in an interview with the US military newspaper Stars and Stripes as Petraeus’s “eyes and ears out on the ground” in Iraq.

    “They worked hand in hand,” said General Muntadher al-Samari, who worked with Steele and Coffman for a year while the commandos were being set up. “I never saw them apart in the 40 or 50 times I saw them inside the detention centres. They knew everything that was going on there … the torture, the most horrible kinds of torture.”

    Additional Guardian reporting has confirmed more details of how the interrogation system worked. “Every single detention centre would have its own interrogation committee,” claimed Samari, talking for the first time in detail about the US role in the interrogation units.

    “Each one was made up of an intelligence officer and eight interrogators. This committee will use all means of torture to make the detainee confess like using electricity or hanging him upside down, pulling out their nails, and beating them on sensitive parts.”

    There is no evidence that Steele or Coffman tortured prisoners themselves, only that they were sometimes present in the detention centres where torture took place and were involved in the processing of thousands of detainees.

    The Guardian/BBC Arabic investigation was sparked by the release of classified US military logs on WikiLeaks that detailed hundreds of incidents where US soldiers came across tortured detainees in a network of detention centres run by the police commandos across Iraq. Private Bradley Manning, 25, is facing a prison sentence of up to 20 years after he pleaded guilty to leaking the documents.

    Samari claimed that torture was routine in the SPC-controlled detention centres. “I remember a 14-year-old who was tied to one of the library’s columns. And he was tied up, with his legs above his head. Tied up. His whole body was blue because of the impact of the cables with which he had been beaten.”

    Gilles Peress, a photographer, came across Steele when he was on assignment for the New York Times, visiting one of the commando centres in the same library, in Samarra. “We were in a room in the library interviewing Steele and I’m looking around I see blood everywhere.”

    The reporter Peter Maass was also there, working on the story with Peress. “And while this interview was going on with a Saudi jihadi with Jim Steele also in the room, there were these terrible screams, somebody shouting: ‘Allah, Allah, Allah!’ But it wasn’t kind of religious ecstasy or something like that, these were screams of pain and terror.”

    The pattern in Iraq provides an eerie parallel to the well-documented human rights abuses committed by US-advised and funded paramilitary squads in Central America in the 1980s. Steele was head of a US team of special military advisers that trained units of El Salvador’s security forces in counterinsurgency. Petraeus visited El Salvador in 1986 while Steele was there and became a major advocate of counterinsurgency methods.

    Steele has not responded to any questions from the Guardian and BBC Arabic about his role in El Salvador or Iraq. He has in the past denied any involvement in torture and said publicly he is “opposed to human rights abuses.” Coffman declined to comment.

    An official speaking for Petraeus said: “During the course of his years in Iraq, General Petraeus did learn of allegations of Iraqi forces torturing detainees. In each incident, he shared information immediately with the US military chain of command, the US ambassador in Baghdad … and the relevant Iraqi leaders.”

    The Guardian has learned that the SPC units’ involvement with torture entered the popular consciousness in Iraq when some of their victims were paraded in front of a TV audience on a programme called “Terrorism In The Hands of Justice.”

    SPC detention centres bought video cameras, funded by the US military, which they used to film detainees for the show. When the show began to outrage the Iraqi public, Samari remembers being in the home of General Adnan Thabit – head of the special commandos – when a call came from Petraeus’s office demanding that they stop showing tortured men on TV.

    “General Petraeus’s special translator, Sadi Othman, rang up to pass on a message from General Petraeus telling us not to show the prisoners on TV after they had been tortured,” said Samari. “Then 20 minutes later we got a call from the Iraqi ministry of interior telling us the same thing, that General Petraeus didn’t want the torture victims shown on TV.”

    Othman, who now lives in New York, confirmed that he made the phone call on behalf of Petraeus to the head of the SPC to ask him to stop showing the tortured prisoners. “But General Petraeus does not agree with torture,” he added. “To suggest he does support torture is horseshit.”

    Thabit is dismissive of the idea that the Americans he dealt with were unaware of what the commandos were doing. “Until I left, the Americans knew about everything I did; they knew what was going on in the interrogations and they knew the detainees. Even some of the intelligence about the detainees came to us from them – they are lying.”

    Just before Petraeus and Steele left Iraq in September 2005, Jabr al-Solagh was appointed as the new minister of the interior. Under Solagh, who was closely associated with the violent Badr Brigades militia, allegations of torture and brutality by the commandos soared. It was also widely believed that the units had evolved into death squads.

    The Guardian has learned that high-ranking Iraqis who worked with the US after the invasion warned Petraeus of the consequences of appointing Solagh but their pleas were ignored.

    The long-term impact of funding and arming this paramilitary force was to unleash a deadly sectarian militia that terrorised the Sunni community and helped germinate a civil war that claimed tens of thousands of lives. At the height of that sectarian conflict, 3,000 bodies a month were strewn on the streets of Iraq.
    CV: James Steele

    Vietnam

    Jim Steele’s first experience of war was in Vietnam, where from 1965 to 1975 US combat units were deployed against the communist North Vietnamese government and Viet Cong. 58,000 Americans were killed, dealing a blow to the nation’s self-esteem and leading to a change in military thinking for subsequent conflicts.

    El Salvador

    A 1979 military coup plunged the smallest country in Central America into civil war and drew in US training and funding on the side of the rightwing government. From 1984 to 1986 Steele – a “counterinsurgency specialist” – was head of the US MilGroup of US special forces advisers to frontline battalions of the Salvadorean military, which developed a fearsome international reputation for its death-squad activities. Prof Terry Karl, an expert at Stanford University on El Salvador’s civil war, said that Steele’s main aim was to shift the fight from so-called total war, which then meant the indiscriminate murder of thousands of civilians, to a more “discriminate” approach. One of his tasks was to put more emphasis on “human intelligence” and interrogation.

    Nicaragua

    Mona Mahmood, Maggie O’Kane, Chavala Madlena and Teresa Smith
    The Guardian, Wednesday 6 March 2013 20.04 GMT

    Find this story at 6 March 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Telecoms firm hails ‘significant victory’ as judge blocks FBI’s data demands

    Credo Mobile speaks out after judge orders US government to stop issuing ‘national security letters’ to access citizens’ data

    Judge Susan Illston declared the NSLs unconstitutional as they breached the first amendment rights of the parties being served the orders. Photograph: Frank Polich/Reuters

    The Californian telecoms company thought to be behind a stunning court victory that has blown a hole in the FBI’s highly secretive system for collecting US citizens’ private data has hailed the “significant” legal breakthrough.

    Credo, based in San Francisco, spoke out after a federal judge ordered the US government to stop issuing what are called “national security letters” – demands for data that contain in-built gagging clauses that prevent the recipients disclosing even the existence of the orders or their own identity.

    In a carefully worded release, the firm fell short of revealing itself as the instigator of the legal action that resulted in Friday’s development. But it is understood by the Guardian that the telecommunications firm was indeed the unnamed litigant behind the action.

    Michael Kieschnick, chief executive of Credo Mobile, hailed the judge’s order as “the most significant court victory for our constitutional rights since the dark day when George W Bush signed the Patriot Act”.

    It is extremely rare for a telecoms company to challenge the system of national security letters, or NSLs, which have mushroomed since 9/11 under the Patriot Act. Credo, a subsidiary of Working Assets Inc, that directs some of its profits to support civil liberties groups, has been a long-standing advocate for reform of the NSL.

    It is believed to be the company behind a May 2011 lawsuit in which the FBI was sued for breach of its rights after the company was served with a federal demand for private data belonging to its customers. The FBI shot back by counter-suing the company.

    The lawsuit was made anonymously, with the name of the company redacted from court papers made available to the media. But last July the Wall Street Journal conducted an analysis of the likely telecoms companies that could have brought the legal action, and concluded that the litigant was probably Credo.

    In her ruling, Judge Susan Illston declared the NSLs unconstitutional as they breached the first amendment rights of the parties being served the orders.

    Kieschnick said: “This decision is notable for its clarity and depth. From this day forward, the US government’s unconstitutional practice of using national security letters to obtain private information without court oversight and its denial of the first amendment rights of national security letter recipients have finally been stopped by our courts.”

    NSLs have been an increasingly important part of the US government’s approach to counter-terrorism, though their growing use has been matched by mounting unease on the party of civil libertarians.

    Last year the FBI sent out more than 16,000 of the letters relating to the private data – mainly financial, internet or phone records – of more than 7,000 Americans.

    Previous court action has led to the FBI being accused of abusing its powers under the NSL statute by issuing the letters far more extensively than in the limited counter-terrorism situations for which they were devised.

    The letters are among the most secretive tools of any deployed by the US state. The demand for data comes with a gagging order attached – meaning that the recipient of the NSL is not allowed even to discuss the letter in public.

    • This article has been amended since publication.

    Ed Pilkington in New York
    guardian.co.uk, Saturday 16 March 2013 19.30 GMT

    Find this story at 16 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Protester wins surveillance database fight

    John Catt, who has no criminal record, wins legal action to have records deleted from police database of suspected extremists

    An 88-year-old campaigner has won a landmark lawsuit against police chiefs who labelled him a “domestic extremist” and logged his political activities on a secret database.

    The ruling by three senior judges puts pressure on the police, already heavily criticised for running undercover operatives in political groups, to curtail their surveillance of law-abiding protesters.

    The judges decided police chiefs acted unlawfully by secretly keeping a detailed record of John Catt’s presence at more than 55 protests over a four-year period.

    The entries described Catt’s habit of drawing sketches of the demonstrations. Details of the surveillance, which recorded details of his appearance such as “clean-shaven” and slogans on his clothes, were revealed by the Guardian in 2010.

    The pensioner, who has no criminal record, is among thousands of political campaigners recorded on the database by the same covert unit that has been embedding spies such as Mark Kennedy – a police officer who infiltrated environmental protest groups – in political movements for more than a decade.

    On Thursday Lord Dyson, who is the Master of the Rolls, and two other appeal court judges ordered Bernard Hogan-Howe, the commissioner of the Metropolitan police, to delete Catt’s file from the database, ruling that the surveillance had significantly violated his human rights.

    The judges noted that the police could not explain why it was necessary to record Catt’s political activities in minute detail.

    Lawyers for the police had argued that the anti-war activist regularly attended demonstrations against a Brighton arms factory near his home, which had at times descended into disorder.

    The judges dismissed arguments from Adrian Tudway, the police chief then in charge of the covert unit, that police needed to monitor Catt because he “associates closely with violent” campaigners against the factory of the EDO arms firm.

    They said it was “striking” that Tudway had not said the records held on the pensioner had helped police in any way.

    “Mr Tudway states, in general terms, that it is valuable to have information about Mr Catt’s attendance at protests because he associates with those who have a propensity to violence and crime, but he does not explain why that is so, given that Mr Catt has been attending similar protests for many years without it being suggested that he indulges in criminal activity or actively encourages those that do.”

    The judges added that it appeared that officers had been recording “the names of any persons they can identify, regardless of the particular nature of their participation”.

    Catt said: “I hope this judgment will bring an end to the abusive and intimidatory monitoring of peaceful protesters by police forces nationwide.

    “Police surveillance of this kind only serves to undermine our democracy and deter lawful protest.”

    A similar court of appeal ruling four years ago forced the Met to remove 40% of photographs of campaigners held on another database.

    In a separate ruling, which also challenged the police’s practice of storing the public’s personal data on databases, the three judges ordered the Met to erase a warning that had been issued against an unnamed woman.

    Three years ago officers had warned the woman for allegedly making a homophobic comment about a neighbour. But she argued that police had treated her unfairly as she had not been given an opportunity to respond to the allegation.

    She took legal action to prevent the Met keeping a copy of the warning notice on their files for 12 years. She feared it could be disclosed to employers when they checked her criminal record.

    Rob Evans, Paul Lewis and Owen Bowcott
    The Guardian, Thursday 14 March 2013 16.46 GMT

    Find this story at 14 March 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Software that tracks people on social media created by defence firm

    Exclusive: Raytheon’s Riot program mines social network data like a ‘Google for spies’, drawing ire from civil rights groups

    A multinational security firm has secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.

    A video obtained by the Guardian reveals how an “extreme-scale analytics” system created by Raytheon, the world’s fifth largest defence contractor, can gather vast amounts of information about people from websites including Facebook, Twitter and Foursquare.

    Raytheon says it has not sold the software – named Riot, or Rapid Information Overlay Technology – to any clients.

    But the Massachusetts-based company has acknowledged the technology was shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing “trillions of entities” from cyberspace.

    The power of Riot to harness popular websites for surveillance offers a rare insight into controversial techniques that have attracted interest from intelligence and national security agencies, at the same time prompting civil liberties and online privacy concerns.

    The sophisticated technology demonstrates how the same social networks that helped propel the Arab Spring revolutions can be transformed into a “Google for spies” and tapped as a means of monitoring and control.

    Using Riot it is possible to gain an entire snapshot of a person’s life – their friends, the places they visit charted on a map – in little more than a few clicks of a button.

    In the video obtained by the Guardian, it is explained by Raytheon’s “principal investigator” Brian Urch that photographs users post on social networks sometimes contain latitude and longitude details – automatically embedded by smartphones within “exif header data.”

    Riot pulls out this information, showing not only the photographs posted onto social networks by individuals, but also the location at which the photographs were taken.

    “We’re going to track one of our own employees,” Urch says in the video, before bringing up pictures of “Nick,” a Raytheon staff member used as an example target. With information gathered from social networks, Riot quickly reveals Nick frequently visits Washington Nationals Park, where on one occasion he snapped a photograph of himself posing with a blonde haired woman.

    “We know where Nick’s going, we know what Nick looks like,” Urch explains, “now we want to try to predict where he may be in the future.”

    Riot can display on a spider diagram the associations and relationships between individuals online by looking at who they have communicated with over Twitter. It can also mine data from Facebook and sift GPS location information from Foursquare, a mobile phone app used by more than 25 million people to alert friends of their whereabouts. The Foursquare data can be used to display, in graph form, the top 10 places visited by tracked individuals and the times at which they visited them.

    The video shows that Nick, who posts his location regularly on Foursquare, visits a gym frequently at 6am early each week. Urch quips: “So if you ever did want to try to get hold of Nick, or maybe get hold of his laptop, you might want to visit the gym at 6am on a Monday.”

    Mining from public websites for law enforcement is considered legal in most countries. In February last year, for instance, the FBI requested help to develop a social-media mining application for monitoring “bad actors or groups”.

    However, Ginger McCall, an attorney at the Washington-based Electronic Privacy Information Centre, said the Raytheon technology raised concerns about how troves of user data could be covertly collected without oversight or regulation.

    “Social networking sites are often not transparent about what information is shared and how it is shared,” McCall said. “Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search.”

    Raytheon, which made sales worth an estimated $25bn (£16bn) in 2012, did not want its Riot demonstration video to be revealed on the grounds that it says it shows a “proof of concept” product that has not been sold to any clients.

    Jared Adams, a spokesman for Raytheon’s intelligence and information systems department, said in an email: “Riot is a big data analytics system design we are working on with industry, national labs and commercial partners to help turn massive amounts of data into useable information to help meet our nation’s rapidly changing security needs.

    Ryan Gallagher
    The Guardian, Sunday 10 February 2013 15.20 GMT

    Find this story at 10 February 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Raytheon’s “Riot” Social-Network Data Mining Software

    A video touting software created by Raytheon to mine data from social networks has been attracting an increasing amount of attention in the past few days, since it was uncovered by Ryan Gallagher at the Guardian.

    As best as I can tell from the video and Gallagher’s reporting, Raytheon’s “Riot” software gathers up only publicly available information from companies like Facebook, Twitter, and Foursquare. In that respect, it appears to be a conceptually unremarkable, fairly unimaginative piece of work. At the same time, by aspiring to carry out “large-scale analytics” on Americans’ social networking data—and to do so, apparently, on behalf of national security and law enforcement agencies—the project raises a number of red flags.

    In the video, we see a demonstration of how social networking data—such as Foursquare checkins—is used to predict the schedule of a sample subject, “Nick.” The host of the video concludes,

    Six a.m. appears to be the most frequently visited time at the gym. So if you ever did want to try to get ahold of Nick—or maybe get ahold of his laptop—you might want to visit the gym at 6:00 a.m. on Monday.

    (The reference to the laptop is certainly jarring. Remember, this is an application apparently targeted at law enforcement and national security agencies, not at ordinary individuals. Given this, it sounds to me like the video is suggesting that Riot could be used as a way to schedule a black-bag job to plant spyware on someone’s laptop.)

    At the end of the video, there’s also a brief visual showing how Riot can use such data to carry out a link analysis of a subject. In link analysis, people’s communications and other connections to each other are mapped out and analyzed. It first came to the attention of many people in and out of government via an influential 2002 slide presentation by data mining expert Jeff Jonas showing how the 9/11 hijackers might have easily been linked together had the government focused on the two who were already wanted by the authorities. As Jonas later emphasized in the face of attempts to make too much of this:

    Both Nawaf Alhamzi and Khalid Al-Midhar were already known to the US government to be very bad men. They should have never been let into the US, yet they were living in the US and were hiding in plain sight—using their real names…. The whole point of my 9/11 analysis was that the government did not need mounds of data, did not need new technology, and in fact did not need any new laws to unravel this event!

    Nevertheless, link analysis appears to have been wholeheartedly embraced by the national security establishment, especially the NSA, and to be justifying unconstitutionally large amounts of data collection on innocent people.

    We don’t know that Raytheon’s software will ever play any such role—it just appears to aspire to do so. As with any tool, everything depends on how it’s used. But the fact is, we’re living in an age where disparate pieces of information about us are being aggressively mined and aggregated to discover new things about us. When we post something online, it’s all too natural to feel as though our audience is just our friends—even when we know intellectually that it’s really the whole world. Various institutions are gleefully exploiting that gap between our felt and actual audiences (a gap that is all too often worsened by online companies that don’t make it clear enough to their users who the full audience for their information is). Individuals need to be aware of this and take steps to compensate, such as double-checking their privacy settings and being aware of the full ramifications of data that they post.

    At the same time, the government has no business rooting around people’s social network postings—even those that are voluntarily publicly posted—unless it has specific, individualized suspicion that a person is involved in wrongdoing. Among the many problems with government “large-scale analytics” of social network information is the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as Riot, or to target them for further invasions of privacy based on incorrect inferences. The chilling effects of such activities, while perhaps gradual, would be tremendous.

    Finally, let me just make the same point we’ve made with regards to privacy-invading technologies such as drones and cellphone and GPS tracking: these kinds of tools should be developed transparently. We don’t really know what Riot can do. And while we at the ACLU don’t think the government should be rummaging around individuals’ social network data without good reason, even a person who might disagree with us on that question could agree that it’s a question that should not be decided in secret. The balance between the intrusive potential of new technologies and government power is one that should be decided openly and democratically.

    By Jay Stanley, Senior Policy Analyst, ACLU Speech, Privacy and Technology Project at 2:08pm

    Find this story at 12 February 2013

    © ACLU

    ‘Google for spies’ software mines social networks to track users’ movements and could even predict what you’ll do next

    Raytheon’s Riot software sifts through data from suspects’ online accounts
    Critics say it will be used for monitoring citizens’ online lives
    Similar to Geotime software bought by London’s Met police two years ago

    New software which mines data from social networks to track people’s movements and even predict future behaviour poses a ‘very real threat to personal freedom’, civil rights groups warned today.

    Multinational defence contractor Raytheon has developed the ‘extreme-scale analytics’ software which can sift through vast quantities of data from services like Facebook, Twitter and Google.

    Critics have already dubbed it a ‘Google for spies’ and say it is likely to be used by governments as a means of monitoring and tracking people online to detect signs of dissent.

    ‘Google for spies’: A screengrab of a video demonstrating Raytheon’s Riot software, which mines the personal data from social networking websites to track people’s movements and even predict their future behaviour

    Raytheon claims it has not yet sold the software – known as Rapid Information Overlay Technology, or Riot – to any clients but admitted it had shared the technology with the U.S. government in 2010.

    However, it is similar to another social tracking software known as Geotime which the U.S. military already uses and was in recent years purchased for trials by London’s Metropolitan Police.

    Such tools are likely to form the backbone of future surveillance systems which will exploit the information we share online to automatically monitor citizens’ behaviour.

    Val Swain, from the Network for Police Monitoring, told MailOnline that police had already publicly indicated they want to use ‘advanced analytical software’ to keep tabs on social media.

    ‘The HMIC report ‘rules of engagement’ on the policing of the riots included a recommendation for the development of a ‘data-mining engine’ to scan across publicly available social media,’ she said.

    ‘Technologically advanced methods now exist that make this possible.

    ‘This [kind of] software is extremely powerful, able to identify and monitor people who are ‘of interest to the police”, even if they have committed no criminal activity.

    ‘The software identifies ‘people, organisations and concepts’ and even sentiments, as the software is able to automatically pick up on ’emotional states’.

    ‘It was also recommended that this software be used as part of a vast “intelligence hub” to be developed by the new National Crime Agency.’

    There’s nowhere to hide: The software aggregates data from suspects’ social media profiles to build a detailed picture of their movements, their current whereabouts and where they are likely to go next

    A restricted video put together by Raytheon as a ‘proof of concept’ demonstration to potential buyers was obtained by British daily the Guardian and published on its website today.

    It shows an executive for the security firm, Brian Urch, explaining how photos posted on social media from smartphones frequently contain metadata revealing the precise location where they were taken.

    As an example, Mr Urch demonstrates how this information can be used to track a Raytheon worker called ‘Nick’, whose social media profiles reveal he frequently visits Washington National Park.

    Nick is pictured on one occasion posing with a blonde woman, revealing to any agency using Riot what he looks like.

    ‘Now we want to predict where he may be in the future,’ Mr Urch said. He demonstrates how Riot can display a diagram of the relationships between individuals online by looking at their Twitter communications.

    We know your friends: As an example, the video shows how a Raytheon worker called Nick can be tracked. This is an image he posted onto a social network, which can be analysed to reveal the location it was taken

    The software is also able to mine information from Facebook and track GPS location data from Foursquare, which over 25million people use on their smartphones to share their whereabouts with friends.

    This Foursquare data can be analysed to show the top 10 locations visited by individuals using the service, and also at what times they went there.

    Nick, for example, frequently checks into Foursquare at a particular gym at 6am.

    ‘So if you ever did want to try to get hold of Nick, or maybe get hold of his laptop, you might want to visit the gym at 6am on a Monday,’ says Mr Urch.

    Riot’s features are similar to that of Geotime, which MailOnline revealed two years ago had been bought by the Met Police.

    Geotime aggregates information gathered from social networking sites, GPS devices like the iPhone, mobile phones, financial transactions and IP network logs to build a detailed picture of an individual’s movements.

    The Met, Britain’s largest police force, confirmed at the time that it had purchased the software and refused to rule out its use in investigating public order disturbances.

    Open book: This pie chart reveals the top 10 places that Nick has visited, as harvested from his Foursquare account

    How to find Nick: This graphic breaks down the details of the times and dates that Nick has visited the gym

    The effectiveness of both Riot and Geotime would be multiplied by plans by the UK government to install ‘black box’ spy devices on Britain’s internet and mobile infrastructure to track all communications traffic.

    Those plans, part of the Data Communications Bill, have been stalled by opposition from some Liberal Democrats, but an influential committee of MPs last week revealed that British spy agencies were keen for them to go ahead.

    The spy network would rely on a technology known as Deep Packet Inspection to log data from communications ranging from online services like Facebook and Twitter, Skype calls with family members and visits to pornographic websites.

    The government argues that swift access to communications data is critical to the fight against terrorism, paedophilia and other high-level crime, but it has been delayed after the Liberal Democrats dropped support for the bill.

    Already in use: Two years ago London’s Metropolitan Police confirmed it had purchased Geotime, another program with similar online tracking functions to that of Raytheon’s Riot software

    If it were to go ahead, such a spy network would offer a wealth of easily accessible data for software such as Riot and Geotime to work with.
    HOW RIOT COULD BE PART OF THE GOVERNMENT’S SPYING PLANS

    Social media tracking software like Riot and Geotime could have their effectiveness multiplied by plans to install ‘black box’ surveillance devices across the UK’s internet and mobile communications infrastructure.

    At the moment spy agencies rely on communications providers willingly revealing personal information from users’ accounts to investigate suspects’ communications.

    But a report by an influential committee of MPs has revealed such agencies are keen to implement a nationwide surveillance regime that would give them automatic access to the data.

    The network will rely on a technology known as Deep Packet Inspection to log data from communications ranging from online services like Facebook and Twitter, to Skype calls with family members and visits to pornographic websites.

    Authorities say swift access to communications is critical to the fight against terrorism and other high-level crime, but civil liberties have reacted with outrage, saying that the technology will give the government a greater surveillance capability than has ever been seen before.

    MI5 chief Jonathan Evans told the committee: ‘Access to communications data of one sort or another is very important indeed. It’s part of the backbone of the way in which we would approach investigations.

    ‘I think I would be accurate in saying there are no significant investigations that we undertake across the service that don’t use communications data because of its ability to tell you the who and the when and the where of your target’s activities.’

    A key part of security agencies’ plans is a ‘filter’ which would make the data collected easily searchable – a function that could be carried out by software like Riot.

    Jim Killock, executive director of the Open Rights Group, explained that this would work as a kind of search engine for everyone’s private data, linking it together from the various online and telecoms accounts people use to communicate.

    ‘This would put data from your mobile phone, email, web history and phones together, so the police can tell who your friends are, what your opinions are, where you’ve been and with who,’ he said.

    ‘It could make instant surveillance of everything you do possible at the click of a button.’

    Either program could form the backbone of the government’s planned ‘filter’, a kind of search engine for personal data described by the report from Parliament’s Intelligence and Security Committee published last week.

    Jim Killock, executive director of the Open Rights Group, which campaigns for freedom online, explained: ‘This would put data from your mobile phone, email, web history and phones together, so the police can tell who your friends are, what your opinions are, where you’ve been and with who.

    ‘It could make instant surveillance of everything you do possible at the click of a button.’

    Ms Swain revealed that Raytheon is just one company which is developing this kind of software for sale to governments and domestic spy agencies.

    ‘IBM are also marketing analytic software which has this functionality, and there are a number of others,’ she said.

    ‘It is being used by companies who want to identify, understand and influence existing and potential customers, and it is extremely expensive.

    ‘The police will use this, not just to investigate crime, but to identify and stop crime and disorder, even before it happens.

    ‘Some may consider that a good thing – but the level of social control involved poses a very real threat to individual freedom.

    ‘The software will inevitably be used to monitor political dissent and activity, as well as crime and disorder. Surveillance already exercises a ‘chilling effect’ over basic freedoms – this can only make things a great deal worse.’

    Her sentiments were echoed by Nick Pickles, director of privacy and civil liberties campaign group Big Brother Watch.

    He said: ‘Privacy as we know it is being slowly eroded and it’s not just our friends that are looking at what we share.

    ‘A wide range of companies are trying to develop tools that capture data online and analyse it in difference ways, exploiting the growing amount of information we share online and the wider opportunities to track us.

    ‘If the only barrier is the amount of computing power at your disposal, clearly Governments have the potential to use these tools to profile and analyse their populations in ways never before possible.

    ‘This kind of tool joins the dots of our online lives, exploiting data for whatever purpose the user wants.

    ‘The best way to protect yourself is to control the data you share, but Governments around the world need to be clear with their citizens how they are using these kinds of tools and if they are trying to search for criminals before they have committed a crime.’

    By Damien Gayle

    PUBLISHED: 10:19 GMT, 11 February 2013 | UPDATED: 12:13 GMT, 11 February 2013

    Find this story at 11 February 2013

    © Associated Newspapers Ltd

    Zero Dark Thirty director given ‘roadmap’ behind U.S. stealth mission to kill Osama bin Laden

    Kathryn Bigelow given classified information by high ranking official
    She was also briefed by CIA and military officials and Navy Seals
    Campaign group said the White House has acted improperly

    The director of an Oscar-nominated film about the killing of Osama bin Laden was given classified information about the operation by United States intelligence chiefs.

    Zero Dark Thirty director Kathryn Bigelow and her screenwriting partner Mark Boal were provided with a complete ‘roadmap’ of how the raid was planned during a 45 minute meeting with Michael Vickers – the country’s highest ranking civilian intelligence official.

    The filmmakers also received briefings from top CIA and military intelligence officers and Navy Seals who carried out Operation Neptune Spear – attacking bin Laden’s compound in Pakistan in May 2011.

    Secrecy: Zero Dark Thirty filmmakers Kathryn Bigelow and Mark Boal were given classified information

    The transcript of the interview, which took place three months after the terrorist leader’s death, has this week been published by the National Security Archive (NSA) at George Washington University in Washington.

    Classified: Intelligence chief Michale Vickers gave information to the filmmakers during an interview

    It follows a freedom of information request by campaign group Judicial Watch. Its president Tom Fitton had said the White House acted improperly by giving ‘politically-connected filmmakers extraordinary and secret access to bin Laden raid information’

    Following the raid, the White House and Pentagon held a series of contradictory briefings and the NSA argues that an authoritative account of the operation has never been published.

    The group accused the Obama administration of sharing the ‘intimate details’ to help the filmmakers release a movie ‘perfectly timed to give a home-stretch boost’ last year’s re-election campaign.

    The NSA said much of the operation in Abbottabad is still ‘shrouded in secrecy’, with many details of the raid having never been released.

    Chris Farrell, of Judicial Watch, told The Independent: ‘Either you admit you gave special excess to your pet film directors, or you make the information available to everyone.’

    A statement on the Judicial Watch website said that the film pushed the Obama narrative, and added: ‘Barack Obama comes off as a hero character.

    ‘We see him morally preening on a news program and hear him described as ‘thoughtful and analytical.’

    Oscar nominated: Navy SEALs prepare to breach a locked door in bin Laden’s compound in Dark Zero Thirty

    Raid: Pakistani security officials stand guard as workers demolish the compound in Abbottabad

    ‘Boal and Bigelow seemed to have gone out of their way (short of producing a two-hour campaign commercial) to project the Obama administration as ‘gutsy’ for ordering the raid.’

    Hunted: Bin Laden was killed by U.S. forces in May 2011

    An investigation into whether Mr Vickers broke any rules by briefing Ms Bigelow and Mr Boal has been launched by the Department of Defense.

    Mr Boal and Ms Bigelow, who spent several years working on the film, have insisted that they went through the proper official channels in the intelligence community and did not have access to any classified information.

    Zero Dark Thirty opened across the U.S. on January 11 and has been nominated for five Oscars including Best Picture, Best Actress for Jessica Chastain and Best Original Screenplay. It was nominated for four Golden Globes, with Chastain winning Best Actress.

    Mr Boal and Ms Bigelow have both won Oscars fro the Hurt Locker. Ms Bigelow has defended her latest film’s torture scene, saying criticism of the practices might be better directed towards government policymakers.

    After bin Laden – who was hunted by the US since the 9/11 terrorist attacks – was killed, the Obama administration said his body was buried at sea off the USS Carl Vinson in accordance with Islamic tradition.

    The raid was completed shortly after 1am local time when he was shot once in the chest and once in the head by a Navy Seal who announced, ‘For God and country Geronimo, Geronimo, Geronimo’, because Geronimo was the code-name given to the al-Qaeda leader.

    By Alex Gore

    PUBLISHED: 17:53 GMT, 19 January 2013 | UPDATED: 09:00 GMT, 20 January 2013

    Find this story at 19 January 2013

    © Associated Newspapers Ltd

    How did Bigelow access America’s secrets about torture and Bin Laden’s assassination for Zero Dark Thirty?

    Oscar contender is triggering growing criticism from US senators that the movie supports ‘waterboarding’

    It has received five Oscar nominations and created a buzz among movie fans around the world.

    But Kathryn Bigelow’s Zero Dark Thirty, which recounts the operation that traced and killed Osama bin Laden, is at the centre of growing controversy over the unprecedented access to classified information granted to the director and her screenwriter colleague, while most of these details remain unavailable to the general pubic.

    Documents collected, collated and published this week by the National Security Archive of George Washington University in Washington show that only a portion of information about Operation Neptune Spear, the codename for the CIA-led, decade-long hunt for Bin Laden, has so far been declassified.

    In contrast, Ms Bigelow and her colleague Mark Boal received briefings from high-ranking CIA and military intelligence officers, Navy SEALs who took part in the operation and other officials. A CIA spokeswoman said at the time, the agency had decided to support the director because “it makes sense to get behind a winning horse. Mark and Kathryn’s movie is going to be the first and the biggest”.

    The attacks of 9/11 on New York and Washington traumatised the US and led to various policy decisions whose ramifications are still being felt. The vow of then US President George Bush to capture the al-Qa’ida leader “dead or alive” led to the US and UK invasion of Afghanistan and a hunt for Bin Laden that concluded in May 2011 when US Special Forces raided a walled compound in the Pakistani town of Abbottabad where he had been hiding.

    In the hours and days after the raid, White House and Pentagon officials briefed the media about aspects of the raid. Yet there were a number of contradictions contained within those briefings, and more than 18 months later many details remain unknown. Photographs of Bin Laden, for instance, supposedly taken after he was shot dead and when his body was buried at sea from aboard the USS Carl Vinson have not been made public, and the Obama administration has refused media requests under the Freedom of Information Act to release them.

    Indeed, the National Security Archive said much of the operation was still “shrouded in secrecy”. It added: “The government’s recalcitrance over releasing information directly to the public about the 21 century’s most important intelligence search and military raid, and its decision instead to grant the film’s producers exclusive and unprecedented access to classified information about the operation, means that for the time being – for bad or good – Hollywood has become the public’s account of record for Operation Neptune Spear.”

    Even before its release, Ms Bigelow’s film had already created controversy because of a scenes showing torture that the film suggests were essential to obtaining information that led the CIA to the garrison town of Abbottabad.

    Such has been the furore that senior US senators Diane Feinstein and John McCain publicly complained the film was supporting the use of techniques such as “waterboarding”. Ms Bigelow has defended her film, recently telling the BBC: “It’s part of the story. To omit it would have been whitewashing history.”

    Yet others say, the issue of the access given to the 61-year-old director is equally controversial. Chris Farrell, of Judicial Watch, a Washington-based non-profit organisation, said it had been involved in extensive litigation with the authorities to obtain withheld documents. He claimed the government was trying to have it both ways. “Either you admit you gave special access to your pet film director, or else you make the information available to everyone,” he said.

    What has added to the perception that Ms Bigelow received special treatment are various moves by the authorities to halt other people releasing information about Operation Neptune Spear. The NSA said last November, seven US special forces soldiers involved in the Abbottabad operation were reprimanded for providing classified material to a video game manufacturer.

    Andrew Buncombe
    Friday, 18 January 2013

    Find this story at 18 January 2013

    © independent.co.uk

     

     

    U.S. Weighs Base for Spy Drones in North Africa

    WASHINGTON — The United States military is preparing to establish a drone base in northwest Africa so that it can increase surveillance missions on the local affiliate of Al Qaeda and other Islamist extremist groups that American and other Western officials say pose a growing menace to the region.

    For now, officials say they envision flying only unarmed surveillance drones from the base, though they have not ruled out conducting missile strikes at some point if the threat worsens.

    The move is an indication of the priority Africa has become in American antiterrorism efforts. The United States military has a limited presence in Africa, with only one permanent base, in the country of Djibouti, more than 3,000 miles from Mali, where French and Malian troops are now battling Qaeda-backed fighters who control the northern part of Mali.

    A new drone base in northwest Africa would join a constellation of small airstrips in recent years on the continent, including in Ethiopia, for surveillance missions flown by drones or turboprop planes designed to look like civilian aircraft.

    If the base is approved, the most likely location for it would be in Niger, a largely desert nation on the eastern border of Mali. The American military’s Africa Command, or Africom, is also discussing options for the base with other countries in the region, including Burkina Faso, officials said.

    The immediate impetus for a drone base in the region is to provide surveillance assistance to the French-led operation in Mali. “This is directly related to the Mali mission, but it could also give Africom a more enduring presence for I.S.R.,” one American military official said Sunday, referring to intelligence, surveillance and reconnaissance.

    A handful of unarmed Predator drones would carry out surveillance missions in the region and fill a desperate need for more detailed information on a range of regional threats, including militants in Mali and the unabated flow of fighters and weapons from Libya. American military commanders and intelligence analysts complain that such information has been sorely lacking.

    The Africa Command’s plan still needs approval from the Pentagon and eventually from the White House, as well as from officials in Niger. American military officials said that they were still working out some details, and that no final decision had been made. But in Niger on Monday, the two countries reached a status-of-forces agreement that clears the way for greater American military involvement in the country and provides legal protection to American troops there, including any who might deploy to a new drone base.

    The plan could face resistance from some in the White House who are wary of committing any additional American forces to a fight against a poorly understood web of extremist groups in North Africa.

    If approved, the base could ultimately have as many as 300 United States military and contractor personnel, but it would probably begin with far fewer people than that, military officials said.

    Some Africa specialists expressed concern that setting up a drone base in Niger or in a neighboring country, even if only to fly surveillance missions, could alienate local people who may associate the distinctive aircraft with deadly attacks in Pakistan, Somalia and Yemen.

    Officials from Niger did not respond to e-mails over the weekend about the plan, but its president, Mahamadou Issoufou, has expressed a willingness to establish what he called in a recent interview “a long-term strategic relationship with the U.S.”

    “What’s happening in northern Mali is a big concern for us because what’s happening in northern Mali can also happen to us,” Mr. Issoufou said in an interview at the presidential palace in Niamey, Niger’s capital, on Jan. 10, the day before French troops swept into Mali to blunt the militant advance.

    Gen. Carter F. Ham, the head of the Africa Command, who visited Niger this month to discuss expanding the country’s security cooperation with the United States, declined to comment on the proposed drone base, saying in an e-mail that the subject was “too operational for me to confirm or deny.”

    Discussions about the drone base come at a time when the French operation in Mali and a militant attack on a remote gas field in the Algerian desert that left at least 37 foreign hostages, including 3 Americans, dead have thrown a spotlight on Al Qaeda’s franchise in the region, Al Qaeda in the Islamic Maghreb, and forced Western governments and their allies in the region to accelerate efforts to combat it.

    Senator Dianne Feinstein, a California Democrat who is chairwoman of the Intelligence Committee, said on CBS’s “Face the Nation” on Sunday that in the wake of Osama bin Laden’s death and the turmoil of the Arab Spring, there was “an effort to establish a beachhead for terrorism, a joining together of terrorist organizations.”

    According to current and former American government officials, as well as classified government cables made public by the group WikiLeaks, the surveillance missions flown by American turboprop planes in northern Mali have had only a limited effect.

    Flown mainly from Ouagadougou, the capital of Burkina Faso, the missions have faced stiff challenges as militant leaders have taken greater precautions in using electronic communications and have taken more care not to disclose delicate information that could be monitored, like their precise locations.

    General Ham said in an interview on his visit to Niger that it had been difficult for American intelligence agencies to collect consistent, reliable intelligence about what was going on in northern Mali, as well as in other largely ungoverned parts of the sub-Saharan region.

    “It’s tough to penetrate,” he said. “It’s tough to get access for platforms that can collect. It’s an extraordinarily tough environment for human intelligence, not just ours but the neighboring countries as well.”

    January 28, 2013
    By ERIC SCHMITT

    Find this story at 28 January 2013

    © 2013 The New York Times Company

    Revealed: who can fly drones in UK airspace

    Missile manufacturer, police forces and golf video company among more than 130 groups licensed to use technology

    A surveillance drone used by Merseyside police, one of three forces that have permission to use UAVs. Photograph: John Giles/PA

    Defence firms, police forces and fire services are among more than 130 organisations that have permission to fly small drones in UK airspace, the Guardian can reveal.

    The Civil Aviation Authority list of companies and groups that have sought approval for the use of the unmanned aerial vehicles, UAVs, has not been published before – and it reflects the way the technology is now being used. The BBC, the National Grid and several universities are now certified to use them – as is Video Golf Marketing, which provides fly-over videos of golf courses.

    Including multiple or expired licences, the CAA has granted approval to fly small UAVs more than 160 times.

    “People are going to see more and more of these small vehicles operating around the country,” said John Moreland, general secretary of the Unmanned Aerial Vehicle Systems Association (UAVS), a trade body with more than 100 members. “There are any number of uses for them, and the technology is getting easier to use and cheaper all the time. These vehicles can operate anywhere in the UK, within reason.”

    However, privacy campaigners have grave concerns about the proliferation of the technology and want an urgent review of regulations. “The increasing use of drones by private companies and government bodies poses a unique set of problems,” said Eric King, head of research at campaign group Privacy International.

    “The CAA considers health and safety issues when deciding whether or not to grant licences to operate drone technology, but this is a very low bar. We need new regulation to ensure privacy and other civil liberties are also taken into account during the decision-making process.”

    In the last two years the CAA has required anyone who wants to fly a small UAV in British airspace to apply for permission. The aircraft must weigh less than 20kg and operators have to abide by certain rules. These include not flying them higher than 122 metres (400ft), or further away from the operator than 500 metres – this is deemed the pilot’s “line of sight”.

    The CAA list shows that three police forces, Merseyside, Staffordshire and Essex, have permission to use UAVs, as do three fire services, Dorset, West Midlands and Hampshire.

    Some of Europe’s biggest defence companies can also fly them, including BAE Systems, Qinetiq and missile manufacturer MBDA. A company that supplies UAVs and other equipment to the Ministry of Defence, Marlborough Communications, is also registered, along with crime-scene and counter-terrorism specialist GWR & Associates.

    Shane Knight, a spokesman for Marlborough, said: “If you can put these systems up in the sky, and they are safe, then they have many uses. If you are a police force, a fire or ambulance service, and, for instance, you are responding to a large fire, then you have a choice of sending out your people to do reconnaissance of an area, or you could use one of these small UAVs. Why put people in danger when you can use one of these systems? These UAVs are getting much better, and much smaller.”

    The National Grid uses them to inspect power lines, while the Scottish Environment Protection Agency wants one to patrol and photograph remote areas, said Susan Stevens, a scientist in the agency’s marine ecology department. “The UAV equipment is currently being trialled,” she said.

    “As an operational service it will have many uses, such as capturing aerial imagery of estuaries, wetlands and riverbanks, and to provide a snapshot of the environment before and after development work,” she said.

    Moreland said the unmanned systems suffered from the perception that they were all “killer robots” flying in the sky, but he thought this would diminish as the public got used to seeing them.

    “We are going to see all sorts of systems coming out over the years,” he said. “The operating bubble is going to expand like mad. Some of these systems will be able to look after themselves, and others will rely on the quality of the operators.

    “You don’t have to be a qualified pilot … The person could come from a modelling background, or he may be a video game player. There are plenty of people you could imagine being able to control these systems in a delicate way.”

    Gordon Slack, who owns Video Golf Marketing, said he had taught himself to use his UAV. “Once you know how to operate it, it is not too complicated. We’ve done six videos for golf courses, with a few more in the pipeline.”

    (Owner ID number/Company name)

    1 HoverCam

    2 Meggitt Defence Systems

    3 EagleEye (Aerial Photography) Ltd

    4 Remote Services Limited

    5 High Spy RC Aerial Photography

    6 Magsurvey Limited

    7 Pi In The Sky

    8 Qinetiq

    9 Eye In The Sky

    10 AngleCam

    11 Helicam Ltd

    12 Flying Minicameras Ltd

    13 S & C Thermofluids Ltd

    14 Remote Airworks (pty) Ltd

    15 National Grid

    16 Dragonfly Aerial Photography

    17 BlueBear Systems Research

    18 William Walker

    19 European UAV Systems Centre Ltd

    20 In-House Films Ltd

    21 MBDA UK Ltd

    22 European UAV Systems Centre

    23 Dorset Fire & Rescue Service

    24 Conocophillips Limited

    25 Hampshire Fire & Rescue Service

    26 West Midlands Fire Service

    27 Advanced Ceramics Research

    28 UA Systems Ltd (Swisscopter)

    29 Hybrid Air Vehicles Ltd

    30 Flight Refuelling Limited

    31 BAE Systems (Operations) Ltd

    32 Lindstrand Technologies Ltd

    33 Upper Cut Productions

    34 Cranfield University

    35 Peregrine Media Ltd

    36 Horizon Aerial Photography

    37 Rory Game

    38 Alan Stevens

    39 Helipix LLP

    40 Re-use*

    41 Mike Garner

    42 Cyberhawk Innovations Ltd

    43 Staffordshire Police TPU

    44 Merseyside Police

    45 Health and Safety Laboratory

    46 David Hogg

    47 MRL Ltd

    48 MRL Ltd

    49 Re-use*

    50 Dominic Blundell

    51 Re-use*

    52 Re-use*

    53 Skylens Aerial Photography

    54 Bonningtons Aerial Surveys

    55 Small UAV Enterprises

    56 British Technical Films

    57 CARVEC Systems Ltd

    58 Flying-Scots’Cam

    59 Pulse Corporation Ltd (t/a Overshoot Photography)

    60 Motor Bird Ltd

    61 Advanced Aerial Imagery

    62 AM-UAS Limited

    63 Re-use*

    64 Gatewing NV

    65 Questuav Ltd

    66 Advanced UAV Technology Ltd

    67 Air 2 Air

    68 MW Power Systems Limited

    69 Re-use*

    70 Roke Manor Research Ltd

    71 Re-use*

    72 NPIA

    73 Pete Ulrick

    74 Re-use*

    75 SSE Power Distribution

    76 University of Worcester

    77 Re-use*

    78 Rovision Ltd

    79 Callen-Lenz Associates Ltd (Gubua Group)

    80 SKM Studio

    81 GWR Associates

    82 Phoenix Model Aviation

    83 Copycat

    84 HD Skycam

    85 Re-use*

    86 Gary White

    87 Aerial Target Systems Ltd

    88 Aerial Target Systems

    89 Re-use*

    90 Video Golf Marketing Ltd

    91 Re-use*

    92 Helivisuals Ltd

    93 Essex Police

    94 Marlborough Comms Ltd

    95 Re-use*

    96 Siemans Wind Power A/S

    97 Altimeter UK Ltd t/a Visionair

    98 T/A Remote Imaging

    99 Re-use*

    100 Daniel Baker

    101 Sky Futures

    102 Aerovironment Inc

    103 Spherical Images Ltd

    104 Flying Camera Systems

    105 Highviz Photography

    106 ESDM Ltd

    107 Flying Camera Systems Limited

    108 Edward Martin

    109 Digital Mapping and Survey Ltd

    110 EDF NNB GenCo Ltd

    111 EDF

    112 Re-use*

    113 AerialVue Ltd

    114 Minerva NI Limited

    115 Flying Fern Films Ltd

    116 Out Filming Ltd

    117 Hexcam Ltd

    118 McKenzie Geospatial Surveys Ltd

    119 Resource UAS

    120 Plum Pictures

    121 Jonathan Malory

    122 Mas-UK Ltd

    123 Bailey Balloons Ltd

    124 David Bush

    125 Southampton University

    126 Helipov

    127 Costain Ltd

    128 Sky-Futures

    129 Jonathan Blaxill

    130 Roke Manor Research Ltd

    131 Colin Bailie

    132 British Broadcasting Corp

    133 Simon Hailey

    134 Re-use*

    135 Trimvale Aviation

    136 PSH Skypower Ltd

    137 Aerosight Ltd

    171 Re-use*

    173 Colin Bailie

    174 Simon Field

    175 Re-use*

    176 Aerial Graphical Services

    177 Think Aerial Photography

    178 Hedge Air Limited

    179 Scottish Environment Protection Agency

    180 Skypower Limited

    181 Elevation Images

    182 Universal Sky Pictures

    183 MBDA UK Ltd

    184 Helicammedia

    185 Oculus Systems Ltd

    186 MASA Ltd

    187 Doozee Aerial Systems Ltd

    188 Selex Galileo

    189 Whisperdrone

    190 Z-Axis

    191 Rotarama Ltd

    192 Re-use*

    193 BBC (Natural History Unit)

    194 Flying Camera Company

    195 Flying Camera Company

    * Short-term approval that was granted, but now no longer applies

    Source: CAA

    Nick Hopkins
    The Guardian, Friday 25 January 2013 20.02 GMT

    Find this story at 25 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    The incredible U.S. military spy drone that’s so powerful it can see what type of phone you’re carrying from 17,500ft

    The ARGUS-IS can view an area of 15 sq/miles in a single image
    Its zoom capability can detect an object as small as 6in on the ground
    Developed by BAE as part of a $18million DARPA project
    System works by stringing together 368 digital camera chips

    A sinister airborne surveillance camera gives the U.S. military the ability to track movements in an entire city like a real-time Google Street View.

    The ARGUS-IS array can be mounted on unmanned drones to capture an area of 15 sq/miles in an incredible 1,800MP – that’s 225 times more sensitive than an iPhone camera.

    From 17,500ft the remarkable surveillance system can capture objects as small as 6in on the ground and allows commanders to track movements across an entire battlefield in real time.

    Scroll down for video

    Beat that, Google: An image taken from 17,500ft by the U.S. military’s ARGUS-IS array, which can capture 1,800MP zoomable video feeds of an entire medium-sized city in real time

    ‘It is important for the public to know that some of these capabilities exist,’ said Yiannis Antoniades, the BAE engineer who designed the system, in a recent PBS broadcast.

    The aerospace and weapons company developed the ARGUS-IS array as part of a $18.5million project funded by the Pentagon’s Defense Advanced Research Projects Agency (Darpa).

    In Greek mythology, Argus Panoptes, guardian of the heifer-nymph Io and son of Arestor, was a primordial giant whose epithet, ‘Panoptes’, ‘all-seeing’, led to his being described with multiple, often one hundred, eyes.

    Like the Titan of myth, the Pentagon’s ARGUS-IS (a backronym standing for Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System) works by stringing together an array of 368 digital camera imaging chips.

    An airborne processor combines the video from these chips to create a single ultra-high definition mosaic video image which updates at up to 15 frames a second.

    All-seeing: This graphic illustrates how the U.S. military’s ARGUS-IS array links together images streamed from hundreds of digital camera sensors to watch over a huge expanse of terrain in real time

    What it looks like: The ARGUS-IS (a backronym standing for Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System) strings together an array of 368 digital camera imaging chips into a single unit

    That tremendous level of detail makes it sensitive enough to not only track people moving around on the ground thousands of feet below, but even to see what they are doing or carrying.

    The ARGUS array sends its live feed to the ground where it connects to a touch-screen command room interface.

    Using this, operators can zoom in to any area within the camera’s field of view, with up to 65 zoom windows open at once.

    Each video window is electronically steerable independent of the others, and can either provide continuous imagery of a fixed area on the ground or be designated to automatically keep a specified target in the window.

    Sinister: The system tracks all moving objects in its field of view, highlighting them with coloured boxes, allowing operators to track movements across an area as and when they happen

    The system automatically tracks any moving object it can see, including both vehicles and individuals on foot, highlighting them with coloured boxes so they can be easily identified.

    It also records everything, storing an approximate million terabytes of data a day – the equivalent of 5,000 hours of high-definition video footage.

    ‘So you can go back and say I’d like to see what happened at this particular location three days, two hours [and] four minutes ago, and it will actually show you what happened as if you were watching it live,’ said Mr Antoniades.

    iPad next? The feed from the ARGUS is transmitted to a touch-screen command and control interface

    Windows: Operators can open a window to zoom in to any area within the camera’s field of view, with up to 65 open and running at once

    Total surveillance: The view of Quantico, Virginia, highlighted in the PBS film

    For the PBS programme reporting the technology, Mr Antoniades showed reporters a feed over the city of Quantico, Virginia, that was recorded in 2009.

    By Damien Gayle

    PUBLISHED: 14:56 GMT, 28 January 2013 | UPDATED: 19:56 GMT, 28 January 2013

    Find this story at 28 January 2013

    © Associated Newspapers Ltd

    << oudere artikelen  nieuwere artikelen >>