5 November 2012

Total Page:16

File Type:pdf, Size:1020Kb

5 November 2012 5 November 2012 THOUGHT FOR THE DAY THE PTSS DAILY began as a means of keeping PTSS FLASH POINTS Marshall Center Alumni abreast of news related to TOP HEADLINES terrorism. THE PTSS DAILY is neither an academic journal nor the effort of a research directorate or a large SPECIAL: EUROPE SHOULD LABEL HEZBOLLAH A TERRORIST GROUP, U.S. URGES staff. Early each morning, articles that are cited in THE COUNTERTERRORISM NEWS BY NATION & REGION PTSS DAILY are culled from hundreds of sources with AFGHANISTAN the intent of providing you with the most current news, ALGERIA discussions and commentary on terrorism and related BURMA issues such as piracy or narco-terrorism. These articles, CANADA COLOMBIA curated from news media, academic and international EGYPT sources or submitted by many of you, give our growing FRANCE network a snapshot of this pernicious threat. GERMANY Every effort is made to ensure that credible articles are INDIA HE AILY INDONESIA chosen, but the intent of T PTSS D is to deliver IRAN wide coverage. You – the professional – must be the ISRAEL final discriminator on the merit of a particular article and JORDAN its value to your profession. To ensure that THE PTSS KENYA DAILY is both relevant and valuable to the reader, we LEBANON welcome and highly encourage comments from you. LIBYA MALAYSIA MOROCCO GEORGE C. MARSHALL NIGERIA EUROPEAN CENTER FOR SECURITY STUDIES NORWAY PALESTINIAN AUTHORITY LTG (Ret.) Keith W. Dayton, Director PAKISTAN/AFPAK Dr. Robert Brannon, Dean, College of International RUSSIA Security Studies SOMALIA SWEDEN PTSS DAILY EDITORIAL STAFF SYRIA TUNISIA Col (Ret.) Professor Nick Pratt, Executive Editor TURKEY Mrs. Brenadine C. Humphrey, Managing Editor UGANDA UNITED KINGDOM/NORTHERN IRELAND SUBSCRIPTIONS UNITED STATES OF AMERICA GENERAL COUNTERTERRORISM NEWS To subscribe, unsubscribe, submit comments or news items, please e-mail: [email protected]. AL QA’IDA & AFFILIATES COMMENTARY & OPINION CYBER WARFARE LEGAL ASPECTS & LAWFARE NARCO-TERRORISM NETWORK NOTES CIENCE ECHNOLOGY S & T This is a Curated News Aggregation service. All material is TERRORIST FINANCING copyrighted. For reuse, please contact original copyright holder. Contributor Comments and Reader Comments are copyrighted by TRANSPORTATION SECURITY individuals. Contact the PTSS Daily for reuse permissions. WMD TERRORISM BOOKS, PAPERS AND REVIEWS Thought for the Day | back to top | “A moderate Islamist is as fantastical a notion as a moderate Nazi. Every member of this barbaric movement is a potential totalitarian thug. Western governments should neither accept nor work with the one or the other. (moderate and extremist Islamists)” ~Dr. Daniel Pipes, National Review Online October 30, 2012 Read more at: http://www.danielpipes.org/12103/islamism-unity Flash Points | back to top | Pakistan Media Houses Relocate Over Taliban Threat Pakistan Press Foundation 4 November 2012 Offices of several media organizations including those of Jang and The News have moved out of Badshah Towers over security fears. JournalismPakistan.com correspondent in Peshawar says that Geo TV are currently in the process of packing up from the building. The News, Jang and Nai Baat newspapers have shifted to Deans Trade Centre a short distance away, a location considered quite secure. The banned Tehrik-e-Taliban Pakistan (TTP) warned last month they would attack media houses and journalists for criticizing them in the wake of child education activist Malala Yousufzai’s shooting by the Taliban. Read more at: http://www.pakistanpressfoundation.org/latest-news/59336 JTIC Flashpoints JTIC 5 November 2012 SYRIA: Forty soldiers were killed and an unknown number of others were wounded or captured when militants from the Jaffar al-Tayar Brigade – members of the Deir ez Zour Revolutionary Military Council – assaulted and seized control of the Al-Ward oil field east of the city of Al-Mayadin in Deir ez Zour governorate on 4 November. (BBC/Associated Press) PAKISTAN: Eighteen people were killed when unidentified militants riding two motorcycles opened fire on a bus at a petrol station in the Khuzdar area of Balochistan province late on 2 November. The small-arms attack ignited fuel at the petrol station, causing a large fire which killed all 16 people on the bus and two people in a nearby vehicle. (Associated Press/Reuters) SUDAN: Thirteen people were killed and an unknown number of others were wounded or kidnapped when unidentified armed gunmen raided the village of Sigili, 40km southeast of the city of El Fasher, in North Darfur State on 2 November. The Minni Minnawi faction of the Sudan Liberation Movement/Army (SLM/A-Minnawi) claimed the attack had been carried out by military forces and pro-government militiamen, and UNAMID issued a statement on 3 November confirming that the military had prevented a verification team from reaching the area. (Sudan Tribune/Radio Dabanga) PHILIPPINES: Four off-duty and unarmed soldiers were killed when suspected New People’s Army (NPA) militants opened fire on them as they were travelling to a market on the outskirts of Davao City in Mindanao on 4 November. (Philippine Daily Inquirer) THAILAND: Three people were killed and six others were wounded in a vehicle-borne improvised explosive device (VBIED) attack by suspected southern separatist militants outside a police station in the Reu Soh district of Narathiwat province late on 3 November. (Asian News Network/Bangkok Post) EGYPT: Three police officers were killed and another was wounded when suspected Islamist militants in a truck opened fire on their vehicle in the town of El Arish in North Sinai Governorate on 3 November. (Maan News Agency/Reuters/Associated Press) TURKEY: A civilian was killed and 18 others were wounded when a VBIED was detonated targeting a police special forces vehicle in the town of Semdinli in Hakkari province on 4 November. Officials attributed the attack to the Partiya Karkerên Kurdistan (PKK). (Reuters/Al-Arabiya) SOMALIA: A security guard and a civilian were killed when two suicide bombers detonated their explosives outside the Village restaurant in the Hodan district of the capital Mogadishu on 3 November. The bombers were reportedly trying to enter the restaurant but the security guard opened fire on them, forcing them to detonate their explosives outside. Unverified reports attributed the attack to the Shabab. (Al-Jazeera/Shabelle Media Network) AFGHANISTAN: The district police chief in the Dand district of Kandahar province, Rahmatullah Khan, was killed in an improvised explosive device (IED) attack targeting his vehicle in the district on 3 November. One of Khan’s bodyguards was wounded in the attack. Khan was travelling to a police checkpoint in the district which was under attack at the time. (Al-Jazeera/Associated Press) COLOMBIA: Two civilians were killed and two others were wounded when unidentified militants opened fire on them in the Timbiqui area of Cauca department on 2 November. Local police attributed the attack to the Fuerzas Armadas Revolucionarias de Colombia (FARC). (Colombia Reports) FURTHER READING: Ceding Ground - Shabab's Loss Of Territory In Somalia (JTIM) Flashpoints courtesy of JTIC. Top Headlines | back to top | Karachi Turning Into Taliban Stronghold: Malik Dawn 4 November 2012 Interior Minister Rehman Malik said on Saturday that the government would move in accordance with the interim order of the Supreme Court on the law and order situation in Karachi and take action against the Taliban in the city. Talking to reporters, he said Karachi was turning into a stronghold of the Taliban and some measures against them had already been initiated. He said the government would address the apex court’s reservations on the situation in Karachi but added that some aspects of the reasons behind the law and order problem would also be brought to its notice. Read more at: http://dawn.com/2012/11/04/karachi-turning-into-taliban-stronghold-malik/ Gunmen Attack Nigerian Police Station; Kill 2 Cops CNN News 5 November 2012 Story Highlights Two police officers die in the attack Militant Islamist group Boko Haram is blamed The group wants to impose a strict version of Sharia law Gunmen attacked a police station in northeast Nigeria early Sunday, killing two officers, the head of the police force in Yobe State said. The attackers, believed to be connected to the militant Islamist group Boko Haram, fired a rocket into the police station near the state capital, said police Commissioner Patrick Egbuniwe. One of the officers was killed by the blast, the other came under fire while responding to the attack. Read more at: http://edition.cnn.com/2012/11/04/world/africa/nigeria-violence/index.html?hpt=hp_t3 BOKO HARAM: We Won’t Negotiate Under Conditions – FG Vanguard 5 November 2012 The Federal Government said, yesterday, that it will not negotiate with Islamic sect, Boko Haram under conditions, even as mixed reactions have trailed the declaration by the sect of its readiness for dialogue to end series of suicide bomb attacks in many parts of the north. While some urged government to go ahead with the dialogue, others cautioned against the idea saying it would be counter-productive. However, the Presidency said it would discuss with the group without preconditions as demanded by the sect. This came as the group denied killing General Mohammed Shuwa and others who were killed in Maiduguri, weekend. Among those who okayed dialogue with Boko Haram are House of Representatives Speaker, Hon Aminu Tambuwal; Second Republic Governor of old Kaduna State, Alhaji Balarabe Musa; Member of the House of Representatives, Mr. Daniel Reyenieju; Arewa Youths and Founder of the Oodua Peoples Congress, OPC, Dr. Frederick Fasehun, who however, cautioned President Goodluck Jonathan against involving former Military Head of State and Presidential candidate of the Congress for Progressive Change (CPC), General Buhari in the negotiation. Those opposed to the move include Second Republic Governor of Plateau State, Chief Solomon Lar and National Leader of National Action Council, NAC, Dr Olopade Agoro.
Recommended publications
  • The Financial Intelligence Unit Annual Report 2019
    The Financial Intelligence Unit Annual Report 2019 Swedish Police Authority Content Preface ....................................................................................................3 The tasks and activities of the Financial Intelligence Unit ...4 The Financial Intelligence Unit in 2019 ........................................5 Money laundering ..............................................................................6 Characteristic modi operandi in 2019 .............................................8 BEC .......................................................................................................9 Vishing ................................................................................................10 Money laundering via online gambling accounts .......................11 Money laundering via real estate ...................................................11 Commercial money laundering ......................................................12 Cryptocurrency exchange agents ..........................................12 Commercial money laundering using a real estate agent’s escrow account ........................................13 Terrorist financing ............................................................................14 What constitutes terrorist offences and terrorist financing? .....14 What does terrorist financing look like? .......................................14 Cooperation ......................................................................................15 The international work of the Financial
    [Show full text]
  • Security Service Yearbook 2018
    1 Swedish Security Service Swedish 2018 2 Xx 3 Contents Preface 2018 - Reflections by the Head of the Security Service 4–5 2018 - Reflections Remit 4 by the Head of the The Swedish Security Service 6–7 Security Service in brief The cooperation International cooperation 8–9 The future Trends and tendencies 10–11 The elections 12 The elections Protecting the elections 12–15 Strategic cooperation for Sweden’s security 1 6 – 1 7 Threats The grey area 18–23 Strategic 16 cooperation Protective security Sweden’s security: stricter legislation in place 24–25 Protective security explained 26–27 Dignitary protection explained 2 8 – 3 0 The new Extremism Protective 24 Security Act Extreme unit 31–35 The drop that hollows the stone 36–37 Ideologically motivated crime 38–39 Reduction Counter-proliferation 40 Aliens cases 41 31 Extreme unit Contents 4 Klas Friberg The intelligence threat is also a security threat The world is changing faster than ever. Political developments in the Baltic Sea region as well as in the rest of Europe, the Middle East and China have an impact also on Sweden’s national security. In 2018, there were several incidents that put the ability of the Security Service to protect Sweden and our democratic form of government to the test. he threats to our country are threats and security is large and as cyber operations, strategic pur- more substantial than they ever-growing. chases and certain diplomatic initia- Thave been in many years. They In the past few years, we have tives, state actors seek to gain an are also broader and have taken on noted that Russia in particular has advantage that could be used to new forms.
    [Show full text]
  • A Unified Swedish Police Service (SOU 2012:13)
    Summary Our remit The remit of the Police Organisation Committee is to analyse whether the current organisation of the police constitutes an obstacle to the Government’s requirements for higher quality, increased cost-effectiveness, increased flexibility and a substantial improvement in police performance. If the Committee considers that the organisation constitutes an obstacle in these respects a new organisation is to be proposed. The remit can be seen in the light of the considerable additional resources the police service has received. During the period 2000– 2010 the police service appropriation increased by more than 40 per cent to SEK 19 billion for 2010. At the same time the number of police service employees increased by 26 per cent to 28 000, of whom 20 300 were police officers, making the Police Service the largest state-controlled activity in Sweden. The Government´s assessment is that the increased resources are not reflected in police performance. Organisation of the Swedish Police Service The Swedish Police Service is a state service consisting of 21 police authorities with geographical areas of responsibility that follow the county boundaries, the National Police Board and the National Laboratory of Forensic Science. The National Police Board is the superordinate authority for the National Laboratory of Forensic Science. The National Criminal Police and the Swedish Security Service are constituent parts of the National Police Board, alt- hough the Swedish Security Service in practice functions as an independent authority. 37 Summary SOU 2012:13 The National Police Board is the central administrative agency for police services and has a supervisory function.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Adapting to Compete in the Gray Zone
    AUGUST 2019 A REPORT OF THE CSIS INTERNATIONAL SECURITY PROGRAM PART II: ADAPTING TO BY COMPETE IN THE GRAY ZONE OTHER MEANS PROJECT DIRECTORS Kathleen H. Hicks Melissa Dalton AUTHORS Melissa Dalton Kathleen H. Hicks Megan Donahoe Lindsey Sheppard Alice Hunt Friend Michael Matlaga Joseph Federici Matthew Conklin Joseph Kiernan The views, opinions, and/or findings contained in this report are those of the authors and should not be construed as an official Department of Defense position, policy, or decision. AUGUST 2019 A REPORT OF THE CSIS INTERNATIONAL SECURITY PROGRAM PART II: ADAPTING TO BY COMPETE IN THE GRAY ZONE OTHER MEANS PROJECT DIRECTORS Kathleen H. Hicks Melissa Dalton AUTHORS Melissa Dalton Kathleen H. Hicks Megan Donahoe Lindsey Sheppard Alice Hunt Friend Michael Matlaga Joseph Federici Matthew Conklin Joseph Kiernan Lanham • Boulder • New York • London About CSIS Established in Washington, D.C., over 50 years ago, the Center for Strategic and In- ternational Studies (CSIS) is a bipartisan, nonprofit policy research organization dedicated to providing strategic insights and policy solutions to help decisionmakers chart a course toward a better world. In late 2015, Thomas J. Pritzker was named chairman of the CSIS Board of Trustees. Mr. Pritzker succeeded former U.S. senator Sam Nunn (D-GA), who chaired the CSIS Board of Trustees from 1999 to 2015. CSIS is led by John J. Hamre, who has served as president and chief executive officer since 2000. Founded in 1962 by David M. Abshire and Admiral Arleigh Burke, CSIS is one of the world’s preeminent international policy institutions focused on defense and security; regional study; and transnational challenges ranging from energy and trade to global development and economic integration.
    [Show full text]
  • 13510/04 EXT 1 Gvdb/Nt DG H II COUNCIL of the EUROPEAN
    COUNCIL OF Brussels, 28 October 2011 THE EUROPEAN UNION 13510/04 EXT 1 ENFOPOL 138 PARTIAL DECLASSIFICATION of document: 13510/04 RESTREINT UE dated: 4 November 2011 new status: Public Subject: Evaluation of National Anti-Terrorist Arrangements Report about Sweden, 24-27 February 2004 Delegations will find attached the partially declassified version of the above-mentioned document. ________________________ 13510/04 EXT 1 GvdB/nt DG H II EN ANNEX COUNCIL OF Brussels, 4 November 2004 THE EUROPEAN UNION 13510/04 EXT 1 (28.10.2011) ENFOPOL 138 NOTE from : General Secretariat to : Working Party on Terrorism Subject : Evaluation of National Anti-Terrorist Arrangements Report about Sweden, 24-27 February 2004 13510/04 EXT 1 GvdB/nt 1 ANNEX DG H II EN Evaluation of Sweden, 24 - 27 February 2004 SUMMARY 1.Terrorism Situation ...............................................................................................................3 1.1. DomesticTerrorism.......................................................................................3 1.2. International Terrorism ................................................................................4 1.2.1 Vulnerability of Modern Societies........................................................4 1.2.2.Counter-Terrorism ...............................................................................5 2. Structure of Authorities..........................................................................................6 2.1. General Situation...........................................................................................6
    [Show full text]
  • Sweden and on Swedish Interests
    COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) PROFILES ON COUNTER-TERRORISM CAPACITY SSWWEEDDEENN April 2014 www.coe.int/terrorism NATIONAL POLICY Swedish Security Service and other agencies concerned, this means that counter-terrorism is a In February 2012 the Government adopted an task that is given high priority. updated National counter-terrorism strategy in a communication to the Riksdag (the Swedish The Swedish Security Service is responsible for Parliament) Responsibility and commitment – a countering terrorist crime and for pursuing attacks in national counter-terrorism strategy (Govt. Com. Sweden and on Swedish interests. Terrorist crime 2011/12:73). In the Communication the Government can be detected, investigated and prosecuted presents a national strategy to prevent the through the combined capability of the justice emergence of terrorism, to pursue terrorist attacks system and the intelligence services. and to prepare for the eventuality of a terrorist attack occurring nevertheless. In the strategy the The Government has successively increased the Government sets out its view of the starting points, financial resources of the Swedish Security Service objectives and direction of Swedish counter- and other parts of the Swedish Police. This funding terrorism. Also, the Government gives an overview has been provided in order to increase the impact of of the measures already taken, started or planned to law enforcement work in general but also specifically address future challenges. to improve the capability to pursue terrorist attacks. In addition, the Security Service has undergone an The national counter-terrorism strategy adopts a organisational transformation so as to be able to broad approach and covers a range of government discharge more effectively its task of protecting agencies and other parts of society.
    [Show full text]
  • Countering Violent Extremism the Counter Narrative Study
    ! COUNTERING VIOLENT EXTREMISM THE COUNTER NARRATIVE STUDY “Countering the Narratives of Violent Extremism FOREWORD The Achilles’ heel of our strategy against terrorism and violent extremism has been the failure to counter the narratives that groups use to recruit. As long as groups attract a steady stream of new members, the terrorism and violence will continue. This is why the strategy known as Countering Violent Extremism (CVE) is so important, and must be used as a counterterrorism tool alongside military, intelligence, and law enforcement operations. Through our partnership with the Qatar International Academy for Security Studies (QIASS), we offer critical guidance to those wishing to counter the narratives of violence and extremism. “Countering Violent Extremism: The Counter-Narrative Study” is the result of a year- long research project conducted by our team of former top law enforcement, intelligence, and counterterrorism officials. We traveled around the world, from Malaysia to Kenya to Norway to Northern Ireland to the United States, studying extremist and terrorist groups and interviewing their members, as well as those in government and other important stakeholders responsible for tackling the problem. As you will see from our “Findings,” we’ve put together some essential lessons. One of the most important takeaways is understanding the pattern(s) behind group recruitment. Terrorist and extremist groups first prey on local grievances—exploiting feelings of anger, humiliation, resentment, or lack of purpose. They then incorporate, into their violent pronouncements, conspiratorial messages that blame those they are targeting. Self-proclaimed religious groups use distorted religious edicts in their narratives. Recruiters achieve success by providing both answers and a sense of purpose to vulnerable individuals.
    [Show full text]
  • White Paper – Cloud Services in Sustaining Societal Functions
    White Paper Cloud Services in Sustaining Societal Functions – Risks, Appropriateness and the Way Forward White Paper – Cloud Services in Sustaining Societal Functions – Risks, Appropriateness and the Way Forward; Swedish Social Insurance Agency reference number: 013428-2019 Version: 1.0 Date: 18-11-2019 Like many other governmental agencies, the Swedish Social Insurance Agency offers easier access to information and services and streamlines internal processes with the aid of digital services. Cloud services offer good functionality, operational reliability and technological security at a reasonable cost. It is desirable and to a certain extent necessary for the public sector to be able to benefit from this. At the same time, we cannot ignore the increasing vulnerability that digitalisation of sustaining societal services entails. Sweden's digital sovereignty must be ensured and the public administration must retain or take back control of sustaining societal digital services and data. The decisions that are taken now will set the boundaries for our room to manoeuvre for the foreseeable future and influence Sweden's capacity to meet future challenges. The choice of IT services in sustaining societal activities will have consequences for citizens, individual agencies and the government administration as a whole, as well as Sweden as a state. The Swedish Social Insurance Agency's increasing dependency on secure, user- friendly and robust digital services requires the agency to determine if and when it is appropriate and feasible to use public cloud services that are offered by private suppliers. This decision is based on our responsibility and obligation to frequently handle highly sensitive confidential data about private individuals as securely as possible.
    [Show full text]
  • A National Cyber Security Strategy, Skr. 2016/17:213
    A national cyber security strategy Skr. 2016/17:213 Regeringens skrivelse 2016/17:213 Skr. A national cyber security strategy 2016/17:213 The Government hereby submits this Communication to the Riksdag. Stockholm 22/06/2017 Morgan Johansson Anders Ygeman (Ministry of Justice) Main contents of the communication There is a great need to develop cyber security in Sweden. This national cyber security strategy is an expression of the Government’s overarching priorities and is intended to constitute a platform for Sweden’s continued development work within the area. The main aims of the strategy are to help to create the long-term conditions for all stakeholders in society to work effectively on cyber security, and raise the level of awareness and knowledge throughout society. By means of the strategy, the Government also wants to support the efforts and engagement that already exist in society for enhancing cyber security. The strategy thus encompasses the whole of society, that is to say central government authorities, municipalities and county councils, companies, organisations and private individuals. 1 Skr. 2016/17:213 Table of contents 1 A comprehensive cyber security strategy ......................................... 3 1.1 The need for a strategy ....................................................... 3 1.2 Starting points for Sweden’s cyber security ....................... 4 2 Strategic priorities ............................................................................. 8 2.1 Securing a systematic and comprehensive approach in cyber security efforts .......................................................... 8 2.2 Enhancing network, product and system security ............ 12 2.3 Enhancing capability to prevent, detect and manage cyberattacks and other IT incidents .................................. 16 2.4 Increasing the possibility of preventing and combating cybercrime ........................................................................ 18 2.5 Increasing knowledge and promoting expertise ..............
    [Show full text]
  • Submarine Intrusions in Swedish Waters During the 1980S by Bengt Gustafsson
    Parallel History Project on Cooperative Security (PHP) January 2011 E-Dossier, Submarine Intrusions in Swedish Waters During the 1980s www.php.isn.ethz.ch By Bengt Gustafsson Submarine Intrusions in Swedish Waters During the 1980s By Bengt Gustafsson The Truth is in the Eye of the Beholder Conspiracy theories, alternative explanations, and urban legends frequently play important roles in shaping public perceptions of high-profile events in history. Such alternative views are sometimes based on ideological preconceptions, the failure to appreciate the complexity of issues, or specific preconceptions about individuals, occupations, or institutions. In Sweden, the reception of what is known as ‘the submarine issue’ is a prominent example of such dynamics. The Swedish armed forces assert that from the middle of the 1970s until autumn 1992, foreign submarines repeatedly conducted intrusions far into Swedish territorial waters, including in the direction of the country’s naval bases. There was only one occasion on which the nation responsible for the incursion was successfully identified – when a Soviet Whiskey class submarine was discovered to have run aground in a bay just east of Karlskrona Naval Base in southern Sweden and was found on the morning of 28 October 1981. Journalists covered the event under headlines such as ‘Whiskey on the Rocks’. In Sweden, this event is known as the ‘U-137-incidenten’ *‘U-137 Incident’+ after the temporary designation given to submarine S-363 by the Soviet Union for the operation. In September of the previous year, the last Swedish destroyer in service, HMS Halland, had been deployed against a pair of submarines that were discovered in the outer Stockholm archipelago.
    [Show full text]
  • Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2016 Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications JOAKIM UDDHOLM KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND COMMUNICATION Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications JOAKIM HJALMARSSON UDDHOLM Master’s Thesis at NADA Supervisor: Sonja Buchegger, Daniel Bosk Examiner: Johan Håstad Abstract In recent years, whistleblowing has lead to big headlines around the world. This thesis looks at whistleblower systems, which are systems specifically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system as to maximize the anonymity for the whistleblower whilst at the same time remain usable. The thesis evaluates existing implementations for the whistle- blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service. I suggest a new system that tries to improve on existing sys- tems. New features includes the introduction of JavaScript cryp- tography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these fea- tures and the viability to address threats against JavaScript in- tegrity by use of cover traffic. The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful.
    [Show full text]