The Global Social Network
Would #Turkey be justified in kidnapping or drone-killing #Gulen in #Pennsylvania? #TurkeyCoupAttempt http://interc.pt/29I2fC8 by @ggreenwald
TURKEY’S PRESIDENT RECEP Tayyip Erdogan places the blame for this weekend’s failed coup attempt on an Islamic preacher and one-time ally, Fethullah Gulen (above), who now resides in Pennsylvania with a green card. Erdogan is demanding the U.S. extradite Gulen, citing prior extraditions by the Turkish government of terror suspects demanded by the U.S.: “Now we’re saying deliver this guy who’s on our terrorist list to us.” Erdogan has been requesting Gulen’s extradition from the U.S. for at least two years, on the ground that he has been subverting the Turkish government while harbored by the U.S. Thus far, the U.S. is refusing, with Secretary of State John Kerry demanding of Turkey: “Give us the evidence, show us the evidence. We need a solid legal foundation that meets the standard of extradition.”
In light of the presence on U.S. soil of someone the Turkish government regards as a “terrorist” and a direct threat to its national security, would Turkey be justified in dispatching a weaponized drone over Pennsylvania to find and kill Gulen if the U.S. continues to refuse to turn him over, or sending covert operatives to kidnap him? That was the question posed yesterday by Col. Morris Davis, former chief prosecutor of Guantánamo’s military commissions who resigned in protest over the use of torture-obtained evidence:
That question, of course, is raised by the fact that the U.S. has spent many years now doing exactly this: employing various means — including but not limited to drones — to abduct and kill people in multiple countries whom it has unilaterally decided (with no legal process) are “terrorists” or who otherwise are alleged to pose a threat to its national security. Since it cannot possibly be the case that the U.S. possesses legal rights that no other country can claim — right? — the question naturally arises whether Turkey would be entitled to abduct or kill someone it regards as a terrorist when the U.S. is harboring him and refuses to turn him over.
The only viable objection to Turkey’s assertion of this authority would be to claim that the U.S. limits its operations to places where lawlessness prevails, something that is not true of Pennsylvania. But this is an inaccurate description of the U.S.’s asserted entitlement. In fact, after 9/11, the U.S. threatened Afghanistan with bombing and invasion unless the Taliban government immediately turned over Osama bin Laden, and the Taliban’s answer was strikingly similar to what the U.S. just told Turkey about Gulen:
#US #NSA used #malware to spy on #Pakistani civilian, military leadership. #Pakistan #NSAhack #Snowden
http://www.dawn.com/news/1279013/nsa-used-malware-to-spy-on-pakista...
The United States' clandestine National Security Agency (NSA) allegedly spied on top civil-military leadership in Pakistan using malware, The Intercept reported.
Malware SECONDDATE allegedly built by the NSA was used by agency hackers to breach "targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division", which contained documents pertaining to "the backbone of Pakistan’s Green Line communications network" used by "civilian and military leadership", according to an April 2013 presentation document obtained by The Intercept.
The file appears to be a 'top secret' presentation originating from the NSA's SigDev division.
SECONDDATE is described as a tool that intercepts web requests and redirects browsers on target computers to an NSA web server. The server then infects the web requests with malware.
The malware server, also known as FOXACID, has been described in earlier leaks made by former NSA contractor Edward Snowden.
SECONDDATE, however, is just one method the NSA allegedly uses to redirect a target's browser to the FOXACID server. Others involve exploiting bugs in commonly used email providers by sending spam or malicious links that lead to the server, The Intercept said.
Another document obtained by The Intercept, an NSA Special Source Operations division newsletter describes how agency software other than SECONDDATE was used to repeatedly direct targets in Pakistan to the FOXACID servers to infect target computers.
The Intercept confirmed the "authenticity" of the SECONDDATE malware by means of a data leak reportedly made by Snowden.
Snowden released a classified top-secret agency draft manual for implanting malware which instructs NSA operators to track their use of a malware programme through a 16-character string ─ the same string which appears in the SECONDDATE code leaked by a group called ShadowBrokers.
ShadowBrokers last week announced that SECONDDATE was part of a group of NSA-built 'cyber weapons' that it was auctioning off.
Although it is unclear how the code for the software leaked and was obtained by ShadowBrokers, The Intercept claims "the malware is covered with NSA's virtual fingerprints and clearly originates from the agency".
The ShadowBrokers auction of SECONDDATE is the first time any full copies of NSA software have been made available to the public.
"The person or persons who stole this information might have used them against us," Johns Hopkins University cryptographer Matthew Green said on the dangers of such software becoming available to the public.
Speaking to The Intercept, Green said that such exploits could be used to target anyone using a vulnerable router. "This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable."
The Intercept has in the past published a number of reports from documents released by Snowden. The site’s editors include Glenn Greenwald, who won a Pulitzer Prize for his work in reporting on the whistleblower’s revelations.
https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowden-docu...
Comment
South Asia Investor Review
Investor Information Blog
Haq's Musings
Riaz Haq's Current Affairs Blog
Pakistan has unveiled its PFX (Pakistan Fighter Experimental) program as a significant upgrade to its JF-17 joint program with China. The new upgrade will have a number of stealth features ranging from the use of radar-absorbing composite materials and diverterless supersonic inlets (DSI) to internal weapons bay (IWB) which will significantly reduce the aircraft's radar signature. It is targeted for completion by the end of this decade. In addition, the PFX's twin-engine design will improve…
ContinuePosted by Riaz Haq on January 20, 2025 at 1:00pm — 1 Comment
The Pakistan government is preparing to license three low-earth-orbit (LEO) satellite operators for space communication services in the country, according to media reports. The companies whose applications are pending include London-based OneWeb, China's Shanghai Spacecom and US headquartered Starlink. They operate tens of thousands of small mass-produced satellites in low orbits that communicate with designated (mobile and stationary) ground stations. Each LEO satellite circles the earth…
ContinuePosted by Riaz Haq on January 15, 2025 at 1:30pm — 2 Comments
© 2025 Created by Riaz Haq. Powered by
You need to be a member of PakAlumni Worldwide: The Global Social Network to add comments!
Join PakAlumni Worldwide: The Global Social Network