Share This

Thursday, 20 March 2014

Flight MH370: two satellite objects spotted in southern Indian Ocean

A satellite image shows possible debris from the missing Malaysian plane 



Australia's prime minister has announced that two objects possibly related to the missing Malaysia Airlines flight have been spotted on satellite imagery and an air force aircraft had been diverted to the area to try to locate them.

The Orion aircraft was expected to arrive in the area oon Thursday afternoon, Prime Minister Tony Abott told Parliament in Canberra. Three additional aircraft are expected to follow for a more intensive search, he said.

Royal Australian Air Force pilot, Flight Lieutenant Russell Adams from the tenth Squadron, piolts his AP-3C Orion over the Southern Indian Ocean
 
"New and credible information has come to light in relation to the search ... in the south Indian Ocean," he said. "The Australian Maritime Safety Authority (AMSA) has received information based on satellite imagery of objects possibly related to the search."

"Following specialist analysis of this satellite imagery, two possible objects related to the search have been identified," he said.

Mr Abbott said he had already spoken with his Malaysian counterpart Najib Razak and cautioned that the objects had yet to be identified.

"The task of locating these objects will be extremely difficult and it may turn out they are not related to the search for MH370," he said.


An Australian Maritime Safety Authority (AMSA) graphic shows the search areas for the Malaysia Airlines (AP)
 
No confirmed wreckage from Malaysia Airlines Flight MH370 has been found since it vanished from air traffic control screens off Malaysia's east coast early on March 8, less than an hour after taking off.

The search for the plane was yesterday narrowed down to an area in the southern Indian Ocean off the coast of west Australia.


Australian Prime Minister Tony Abbott tells parliament in Canberra that satellite imagery has found two objects possibly related to the search for missing Malaysia Airlines flight MH370
 
Investigators believe that someone with detailed knowledge of both the Boeing 777-200ER and commercial aviation navigation switched off the plane's communications systems before diverting it thousands of miles off its scheduled course from Kuala Lumpur to Beijing.

Exhaustive background checks of the passengers and crew aboard have not yielded anything that might explain why.

Relatives of passengers of the missing Malaysia Airlines plane are gathered at a television viewing room in Beijing, China (AFP/GETTY)

The FBI is helping Malaysian authorities analyse data from a flight simulator belonging to the captain of the missing plane, after initial examination showed some data logs had been deleted early last month.

- The Telegraph

Expert: Missing plane more likely found in southern corridor (Video)

An aviation expert believes there's a high possibility that the missing plane could be found in the southern search corridor. But he added, it’s unlikely that the plane would have found a runway to safely land on.


"Plane unlikely to avoid radar detection in Northern corridor...also zero possibility for the plane to land in a temporary airport, technically it works, but it’s very hard, requires geological conditions, and people on board will suffer heavy injuries." Armartya De, Sr. Aviation Consultant of Frost & Sullivan, said.

Related posts:

Wednesday, 19 March 2014

NSA's secret MYSTIC system is capable recording 100% of foreign country's telephone calls



WASHINGTON, D.C. – The United States National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine – one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

 http://wapo.st/1gyqVaz

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

No other NSA program disclosed to date has swallowed a nation’s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA’s practice of “bulk collection” abroad.

Bulk methods capture massive data flows “without the use of discriminants,” as President Barack Obama put it in January. By design, they vacuum up all the data they touch – meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.

In the view of U.S. officials, however, the capability is highly valuable.

In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on “specific alleged intelligence activities.” Speaking generally, she said “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.”

NSA spokeswoman Vanee Vines, in an emailed statement, said that “continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.”

Some of the documents provided by Snowden suggest that high-volume eavesdropping may soon be extended to other countries, if it has not been already. The RETRO tool was built three years ago as a “unique one-off capability,” but last year’s secret intelligence budget named five more countries for which the MYSTIC program provides “comprehensive metadata access and content,” with a sixth expected to be in place by last October.

The budget did not say whether the NSA now records calls in quantity in those countries, or expects to do so. A separate document placed high priority on planning “for MYSTIC accesses against projected new mission requirements,” including “voice.”

Ubiquitous voice surveillance, even overseas, pulls in a great deal of content from U.S. citizens who telephone, visit and work in the target country. It may also be seen as inconsistent with Obama’s Jan. 17 pledge “that the United States is not spying on ordinary people who don’t threaten our national security,” regardless of nationality, “and that we take their privacy concerns into account.”

In a presidential policy directive, Obama instructed the NSA and other agencies that bulk acquisition may be used only to gather intelligence on one of six specified threats, including nuclear proliferation and terrorism. The directive, however, also noted that limits on bulk collection “do not apply to signals intelligence data that is temporarily acquired to facilitate targeted collection.”

The emblem of the MYSTIC program depicts a cartoon wizard with a telephone-headed staff. Among the agency’s bulk collection programs disclosed over the past year, its focus on the spoken word is unique. Most of the programs have involved the bulk collection of either metadata – which does not include content – or text, such as email address books.

Telephone calls are often thought to be more ephemeral and less suited than text for processing, storage and search. Indeed, there are indications that the call-recording program has been hindered by the NSA’s limited capacity to store and transmit bulky voice files.

In the first year of its deployment, a program officer wrote that the project “has long since reached the point where it was collecting and sending home far more than the bandwidth could handle.”

Because of similar capacity limits across a range of collection programs, the NSA is leaping forward with cloud-based collection systems and a gargantuan new “mission data repository” in Utah. According to its overview briefing, the Utah facility is designed “to cope with the vast increases in digital data that have accompanied the rise of the global network.”

Christopher Soghoian, the principal technologist for the American Civil Liberties Union, said history suggests that “over the next couple of years they will expand to more countries, retain data longer and expand the secondary uses.”

Spokesmen for the NSA and the Office of Director of National Intelligence James Clapper declined to confirm or deny expansion plans or discuss the criteria for any change.

Based on RETRO’s internal reviews, the NSA has strong motive to deploy it elsewhere. In the documents and interviews, U.S. officials said RETRO is uniquely valuable when an analyst first uncovers a new name or telephone number of interest.

With up to 30 days of recorded conversations in hand, the NSA can pull an instant history of the subject’s movements, associates and plans. Some other U.S. intelligence agencies also have access to RETRO.

Highly classified briefings cite examples in which the tool offered high-stakes intelligence that would not have existed under traditional surveillance programs in which subjects were identified for targeting in advance. Unlike most of the government’s public claims about the value of controversial programs, the briefings supply names, dates, locations and fragments of intercepted calls in convincing detail.

Present and former U.S. officials, speaking on the condition of anonymity to provide context for a classified program, acknowledged that large numbers of conversations involving U.S. citizens would be gathered from the country where RETRO operates.

The NSA does not attempt to filter out their calls, defining them as communications “acquired incidentally as a result of collection directed against appropriate foreign intelligence targets.”

Until about 20 years ago, such incidental collection was unusual unless a U.S. citizen was communicating directly with a foreign intelligence target. In bulk collection systems, which are exponentially more capable than the ones in use throughout the Cold War, calls and other data from U.S. citizens and permanent residents are regularly ingested by the millions.

Under the NSA’s internal “minimization rules,” those intercepted communications “may be retained and processed” and included in intelligence reports. The agency generally removes the names of U.S. callers, but there are several broadly worded exceptions.

An independent group tasked by the White House to review U.S. surveillance policies recommended that incidentally collected U.S. calls and emails – including those obtained overseas – should nearly always “be purged upon detection.” Obama did not accept that recommendation.

Vines, in her statement, said the NSA’s work is “strictly conducted under the rule of law.”

RETRO and MYSTIC are carried out under Executive Order 12333, the traditional grant of presidential authority to intelligence agencies for operations outside the United States.

Since August, Sen. Dianne Feinstein, D-Calif., the chairman of the Senate Intelligence Committee, and others on that panel have been working on plans to assert a greater oversight role for intelligence gathering abroad. Some legislators are now considering whether Congress should also draft new laws to govern those operations.

Experts say there is not much legislation that governs overseas intelligence work.

“Much of the U.S. government’s intelligence collection is not regulated by any statute passed by Congress,” said Timothy H. Edgar, the former director of privacy and civil liberties on Obama’s national security staff. “There’s a lot of focus on the Foreign Intelligence Surveillance Act, which is understandable, but that’s only a slice of what the intelligence community does.”

All surveillance must be properly authorized for a legitimate intelligence purpose, he said, but that “still leaves a gap for activities that otherwise basically aren’t regulated by law because they’re not covered by FISA.”

Beginning in 2007, Congress loosened 40-year-old restrictions on domestic surveillance because so much foreign data crossed U.S. territory. There were no comparable changes to protect the privacy of U.S. citizens and residents whose calls and emails now routinely cross international borders.

Vines noted that the NSA’s job is to “identify threats within the large and complex system of modern global communications,” where ordinary people share fiber-optic cables with legitimate intelligence targets.

For Peter Swire, a member of the president’s review group, the fact that U.S. citizens and foreigners use the same devices, software and networks calls for greater care to safeguard privacy.

“It’s important to have institutional protections so that advanced capabilities used overseas don’t get turned against our democracy at home,” he said.

© 2014, The Washington Post/http://www.ticotimes.net

 Related post:

Tuesday, 18 March 2014

If MH370 was a hijack bid, it was a terrorism motivated; China deploys 21 satellites and 11 ships search aid

It is increasingly common for terrorist groups not to claim responsibility for their actions, a leading expert says, amid heightened speculation one or both of the pilots may have been involved in diverting Malaysia Airlines flight MH370.

Greg Barton, the international director of the global terrorism research centre at Monash University, said there were several reasons a terrorist group might remain silent about hijacking the flight.

''Perhaps this operation was only partially successful, and that the plan had been to turn back and crash into the Petronas Towers in Kuala Lumpur,'' Professor Barton said. ''Perhaps the pilots foiled the plan, we will never know.

''But that would be a motive for a group not to claim it, as they may want to try it again,'' he said.
  Conjecture over pilot involvement in the plane's disappearance was fuelled on Sunday by a new timeline suggesting the flight's signalling system was disabled before a pilot spoke to air traffic control without mentioning any trouble.

But whether it was an act of terrorism remains a question that may not be answered unless the black box flight recorders are found.

Professor Barton cited the 1988 Lockerbie disaster, in which Pan Am flight 103 was destroyed by a bomb over a Scottish town, killing 270 people, as an example of an attack no one admitted ordering.

''It also took quite a while for al-Qaeda to claim responsibility for 9/11,'' Professor Barton said. ''And in the November 2008 attacks at several Mumbai hotels, Lashkar- e- Taiba was blamed but never actually claimed it,'' he said.

Clive Williams, a visiting professor at the Australian National University's centre for military and security law and an adjunct professor at Macquarie University's centre for policing, intelligence and counter terrorism said while terrorism could not be ruled out, it seemed less likely than other possibilities.

''Terrorism is by definition politically motivated with a strategic outcome in mind. If terrorism was the motivation you would expect that the perpetrators would have already used the plane as a weapon against a possible target, such as Mumbai or Colombo, would have made political demands, or would have tried to put pressure on a target government.''

Since 2000 there have been only 18 hijacks or attempted hijacks of large passenger aircraft. Of these, seven were by passengers wanting to get to a destination to seek asylum, one was criminally motivated to steal the cargo, six were by mentally ill persons, and four were politically motivated (counting September 11 as one incident), Professor Williams said.

By Anne Davies The Sydney Morning Herald

11 Chinese ships team up in Singapore for search mission

It has been 11 days since the Malaysian flight MH370 went missing. 239 passengers were on board the ... 

China deploys 21 satellites to assist hunt for MH370

Related posts: