<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cubadebate (English) &#187; Cyberwar</title>
	<atom:link href="http://en.cubadebate.cu/tag/cyberwar/feed/" rel="self" type="application/rss+xml" />
	<link>http://en.cubadebate.cu</link>
	<description>Cubadebate, Against Terrorism in the Media</description>
	<lastBuildDate>Fri, 08 Sep 2023 16:15:30 +0000</lastBuildDate>
	<language>es-ES</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.1</generator>
	<item>
		<title>5 Unexpected Places You Can Be Tracked With Facial Recognition Technology</title>
<link>http://en.cubadebate.cu/news/2011/09/03/5-unexpected-places-you-can-be-tracked-with-facial-recognition-technology/</link>
		<comments>http://en.cubadebate.cu/news/2011/09/03/5-unexpected-places-you-can-be-tracked-with-facial-recognition-technology/#comments</comments>
		<pubDate>Sat, 03 Sep 2011 12:09:59 +0000</pubDate>
<dc:creator>Cubadebate</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[USA]]></category>

		<guid isPermaLink="false">http://en.cubadebate.cu/?p=1982</guid>
		<description><![CDATA[Post-9/11, many airports and a few cities rushed to install cameras hooked to facial recognition technology, a futuristic apparatus that promised to pick out terrorists and criminals from milling crowds by matching their faces to biometric data in large databases. Many programs were abandoned a few years later, when it became clear they accomplished little beyond creeping people out. ]]></description>
				<content:encoded><![CDATA[<p><strong><img class="alignleft size-full wp-image-1983" src="/files/2011/09/storyimages_picture11_1278114207.jpg_310x220.jpeg" alt="" width="300" height="250" />By Tana Ganeva</strong><br />
<strong> <a href="http://www.alternet.org/story/152231/5_unexpected_places_you_can_be_tracked_with_facial_recognition_technology"  rel="nofollow"  target="_blank">AlterNet</a></strong></p>
<p>Earlier this summer Facebook rolled out <a href="http://www.pcworld.com/article/229742/why_facebooks_facial_recognition_is_creepy.html"  rel="nofollow"  target="_blank">facial recognition software</a> that identifies users even when they appear in untagged photos. Like every other time the social networking site has introduced a creepy, invasive new feature, they made it the default setting without telling anyone.</p>
<p>Once people realized that Facebook was basically harvesting biometric data, the usual uproar over the site&#8217;s relentless corrosion of privacy ensued. Germany even threatened to sue Facebook for violating German and EU <a href="http://www.pcmag.com/article2/0,2817,2390440,00.asp"  rel="nofollow"  target="_blank">data protection laws</a> and a few other countries are investigating. But facial recognition technology is hardly confined to Facebook &#8212; and unlike the social networking site, there&#8217;s no &#8220;opt-out&#8221; of leaving your house.</p>
<p>Post-9/11, many airports and a few cities rushed to install cameras hooked to facial recognition technology, a futuristic apparatus that promised to pick out terrorists and criminals from milling crowds by matching their faces to biometric data in large databases.</p>
<p>Many programs were abandoned a few years later, when it became clear they accomplished little beyond creeping people out. Boston&#8217;s Logan Airport scrapped face recognition surveillance after two separate tests showed only a <a href="http://epic.org/privacy/facerecognition/"  rel="nofollow"  target="_blank">61.4 percent success rate.</a> When the city of Tampa tried to keep tabs on revelers in the city&#8217;s night-club district, the sophisticated technology was bested by people wearing masks and flicking off the cameras.</p>
<p>Human ingenuity aside, most facial recognition software could also be foiled by eyewear, a bad angle or somebody making a weird face. But nothing drives innovation like the promise of government contracts! In the past few years, face recognition technology has advanced substantially, moving <a href="http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition2.htm"  rel="nofollow"  target="_blank">from 2-d to 3-d scanning</a> that can capture identifying information about faces even in profile. Another great leap forward, courtesy of Identex (now L-1 Identity Solutions, Inc.), combines geometric face scanning and &#8220;<a href="http://www.i-secure.sg/Products/documents/FaceIt%20G6%20Brochure_0904.pdf"  rel="nofollow"  target="_blank">skinprint&#8221; technology</a> that maps pores, skin texture, scars and other identifying facial marks captured in high-resolution photos.</p>
<p>As face recognition and other biometrics advance, the technology has begun to proliferate in two predictable realms: law enforcement and commerce. Here are 5 places besides Facebook you might encounter face recognition and other biometric technology &#8212; not that, for the most part, you would know it if you did.</p>
<p><strong>1. The streets of America</strong></p>
<p>In the fall, police officers from 40 departments will hit the streets armed with the Mobile Offender Recognition and Information System (MORIS) device. The gadget, which attaches to an iPhone, can take an iris scan from 6 inches away, a measure of a person&#8217;s face from 5 feet away, or electronic fingerprints, according to <a href="http://computervisioncentral.com/content/moris-biometric-device-aids-police01739"  rel="nofollow"  target="_blank">Computer vision central.</a> This biometric information can be matched to any database of pictures, including, potentially, one of the largest collections of tagged photos in existence: Facebook. The process is almost instant, so no time for a suspect to opt out of supplying law enforcement with a record of their biometric data.</p>
<p>Lee Tien of the Electronic Frontier Foundation told AlterNet that while it&#8217;s unclear how individual departments will use the technology, there are two obvious ways it tempts abuse. Since officers don&#8217;t have to haul in an unidentified suspect to get their fingerprints, they have more incentive to pull people over, increasing the likelihood of racial profiling. The second danger lurks in the creation and growth of personal information databases. Biometric information is basically worthless to law enforcement unless, for example, the pattern of someone&#8217;s iris can be run against a big database full of many people&#8217;s irises.</p>
<p>In an extensive report on the MORIS device, <a href="http://english.aljazeera.net/indepth/features/2011/07/20117258145965608.html"  rel="nofollow"  target="_blank">Al-Jazeera&#8217;s D. Parvaz </a>asked the president of a company that develops facial recognition software how he feels about equipping the government and law enforcement with the technology. He replied (chillingly) &#8221;I&#8217;m counting on our government being honest, whether it&#8217;s law enforcement or the military, trying to find people who threaten our lives.&#8221;</p>
<p>But the article highlights an inherent legal problem in the MORIS device, regardless of the no doubt uniformally angelic intentions of law enforcement officials. The 4th Amendment guards against unreasonable searches, including fingerprints. Like a fingerprint, an iris scan reveals identifying information that can&#8217;t be gleaned from mere observation. Parvaz&#8217; interview with a member of the Plymouth County Sheriff&#8217;s office seems to show that addressing the civil liberties hazards of MORIS are not at the top of law enforcement&#8217;s priorities:</p>
<blockquote><p>John Birtwell, the director of public information and technology at the Plymouth County Sheriff&#8217;s Department told Al Jazeera that the county will get &#8220;more than a handful … at least three&#8221; of the devices.</p>
<p>But that&#8217;s just about all the certainty Birtwell had to offer on the topic, as he seemed unclear as to whether officers would inform suspects of their Fourth Amendment rights to refuse to undergo impromptu fingerprinting and iris scanning.</p>
<p>He also seemed unsure as to what the protocol would be in the even that a suspect declined to be processed in such a manner.</p>
<p>&#8220;I&#8217;m dancing on the head of a pin here because I&#8217;m not a constitutional scholar,&#8221; said Birtwell.</p></blockquote>
<p>Other law enforcement officials have more clearly articulated ambitions for the technology &#8212; like hunting down undocumented immigrants.</p>
<p>In a June &#8220;Fox and Friends&#8221; segment on the MORIS device, Sheriff Paul Babeu of Pinal County, Arizona explained his enthusiasm for the new technology. &#8220;In Arizona, the illegal immigration issue &#8212; we have people from foreign countries, hundreds and hundreds of thousands of them that deliberately have very good documents that are fake, fraudulent, and we need to find out who they are, not only for the safety of my deputies but for the protection of our citizens all across America.&#8221;</p>
<p>(&#8220;We&#8217;ve all heard of racial profiling. Now get ready for what some are calling &#8216;facial profiling,&#8217;&#8221; deadpanned &#8220;Fox and Friends&#8221; host Steve Doocey at the start of the show, completely inadvertently making a very good point.)</p>
<p>It&#8217;s important to note that the military has used similar technology in Afghanistan and Iraq for years. One of 20 people in Afghanistan is registered in biometric databases (one of six men of fighting age), according to recent reporting by the <a href="http://www.nytimes.com/2011/07/14/world/asia/14identity.html?_r=1&amp;hpw"  rel="nofollow"  target="_blank">New York Times.</a> It&#8217;s one in 14 in Iraq (and one in four men of fighting age).</p>
<p>The technology is also being put to use in the aftermath of the London riots, both by law enforcement and an online group assembled to hunt down people involved in the riots by using social networking sites. (London is one of the most heavily surveilled cities in the world.)</p>
<p><strong>2. The DMV</strong></p>
<p>Slightly fewer than half of the DMVs in the US have the capacity to run your picture through biometric databases. Ostensibly, these searches are intended to catch people trying to collect multiple IDs from different states. Fair enough. But as EFF&#8217;s Lee Tien told AlterNet, the DMV can also log into and run a person&#8217;s face against any government database, including ones that hold criminal records. Last August, former New York Gov. David Paterson and DMV commissioner David Swartz held a triumphant <a href="http://www.silive.com/news/index.ssf/2010/08/dmvs_facial_recognition_softwa.html"  rel="nofollow"  target="_blank">news conference</a> where they announced that more than 100 felony arrests were made through the DMV&#8217;s facial recognition program.</p>
<p>In the past, the FBI has applied facial recognition technology to the DMV&#8217;s vast database of photo images in pursuit of suspects, according to <a href="http://www.usatoday.com/tech/news/2009-10-13-fbi-dmv-facial-recognition_N.htm"  rel="nofollow"  target="_blank">the AP.</a></p>
<p>When the California DMV tried to acquire facial recognition technology in 2009, privacy and consumer advocates fought the agency on the grounds that such a massive shift in private data handling required public debate (the DMV had been trying to stealthily strike a deal with the vendor). As <a href="http://www.securityinfowatch.com/root+level/1309694?pageNum=1"  rel="nofollow"  target="_blank">SecurityInfoWatch reported at the time</a>, privacy advocates argued that there was no way to ensure the technology would not also be used to track and monitor anyone:</p>
<blockquote><p>&#8220;&#8230;. the five-year contract, which is being fast-tracked and could be approved as early as next month, is drawing objections from privacy advocates who fear state and local authorities could use the biometric technology to monitor the movements of &#8216;innocent people&#8217; &#8212; for instance, spectators at a sporting event or an anti-war rally.</p>
<p>&#8216;We see this as sort of creeping Big Brother government, an invasion of people&#8217;s privacy,&#8217; said Richard Holober, executive director of the San Mateo-based Consumer Federation of California.&#8221;</p></blockquote>
<p>If facial recognition technology in the hands of the DMV sounds like the makings of someone&#8217;s mistaken-identity, Kaftaesque nightmare, it is. The unlucky John H. Gass of Massachusetts had to spend 10 days proving to the Massachusetts DMV that he had not committed ID fraud after facial recognition technology mistakenly <a href="http://articles.boston.com/2011-07-17/news/29784761_1_fight-identity-fraud-facial-recognition-system-license"  rel="nofollow"  target="_blank">flagged his photo</a> because he resembled another man.</p>
<p><strong>3. Las Vegas casinos, and Kraft and Adidas stores</strong></p>
<p>For years Las Vegas casinos have used various forms of facial recognition to identify card-counters. Now, Vegas is at the forefront of efforts to adapt facial recognition to more efficiently suck money out of visitors.</p>
<p>The <a href="http://articles.latimes.com/2011/aug/21/business/la-fi-facial-recognition-20110821"  rel="nofollow"  target="_blank">LA Times reported</a> last week that the Venetian hotel and casino has installed basic facial recognition software in advertisements. A camera captures an image of a person passing by and an algorithm determines their gender and rough age. The advertisement can then present them with products most likely to appeal to their demographic.</p>
<p>Targeted ads are the holy grail of marketing. If you&#8217;re an advertiser, you don&#8217;t want to waste the priceless real-estate of a teen boy&#8217;s brain with an ad for, say, tampons, so advertisers are constantly trying to figure out new ways to deliver the right ads to the right people. Thanks to tools that let companies track web surfing history and the detailed personal information featured on certain giant social networking sites, the digital world provides the best venue for targeted ads.</p>
<p><em>LA Times</em> reporters Shan Li and David Sarno also got Kraft and Adidas to go on the record about their future plans to install the technology in ads and store kiosks:</p>
<blockquote><p>&#8220;If a retailer can offer the right products quickly, people are more likely to buy something,&#8221; said Chris Aubrey, vice president of global retail marketing for Adidas.</p>
<p>Kraft said it’s in talks with a supermarket chain, which it would not identify, to test face-scanning kiosks.</p>
<p>&#8220;If it recognizes that there is a female between 25 to 29 standing there, it may surmise that you are more likely to have minor children at home and give suggestions on how to spice up Kraft Macaroni &amp; Cheese for the kids,&#8221; said Donald King, the company’s vice president of retail experience.</p></blockquote>
<p>While these tools divulge very basic personal information, their potential seems limitless. Really, how tough would it be for more sophisticated technology to match a photo to someone&#8217;s public Facebook profile, and determine in the process their marriage status, sexuality, hometown, politics, religious beliefs and any number of personality signifiers compiled online, thrusting their digital lives into physical space?</p>
<p><strong>4. Bars </strong></p>
<p>Inevitably, facial recognition software is also being deployed for the purpose of getting people laid. SceneTap, an app developed by a Chicago company uses information from facial recognition cameras planted in bars to determine the ratio of women to men and the average age of customers. As of June, 200 bars across the country had signed up to take part, <a href="http://www.forbes.com/sites/kashmirhill/2011/06/28/using-facial-recognition-technology-to-choose-which-bar-to-go-to/"  rel="nofollow"  target="_blank">according to Forbes</a>.</p>
<p>SceneTap developers assured reporters that the cameras they&#8217;re installing in bars do not capture high-enough-quality images to match them up to databases or Facebook profiles.</p>
<p>Meanwhile, the <a href="http://www.eastbayexpress.com/ebx/smile-youre-on-barspace/Content?oid=2917119"  rel="nofollow"  target="_blank">East Bay Express</a> reported that bars throughout the Bay Area were actually streaming video to an app called &#8220;BarSpace&#8221; that lets people check out the bar in real time &#8211; so presumably anyone with an iPhone could easily check where you are and who you&#8217;re drunkenly flirting with without you knowing it. The investigation found that most bar patrons are not aware they&#8217;re being filmed. Is an app wedding SceneTap&#8217;s face recognition technology to BarSpace coming down the pike?</p>
<p>This is not the first time biometric tools have invaded bars. In 2006, a program called BioBouncer let bouncers take pictures of incoming patrons and scan them against a database to pick out troublemakers. Bar owners shared a large database of information. According to the company behind the technology, information about law-abiding bar patrons would get dumped at the end of the night, <a href="http://www.wired.com/science/discoveries/news/2006/02/70265"  rel="nofollow"  target="_blank">reported Wired.</a> Of course, there was no way to guarantee that indefinitely. Or guarantee that bar owners wouldn&#8217;t share the info with the police, or with private investigators, or with data collection companies, as security expert Bob Schneier <a href="http://www.schneier.com/blog/archives/2006/02/face_recognitio.html"  rel="nofollow"  target="_blank">pointed out at the time.</a></p>
<p><strong>5. All of Japan</strong></p>
<p>As far as commercial uses of facial recognition technology, Japan is way ahead of the curve. So here are some things we may be looking forward to:</p>
<blockquote><p>a) Vending machines: Japanese vending machines suggest soft drinks based on stereotypes based on your gender and age (and the weather).</p>
<p>b) Billboards: Japanese billboards contain technology that figures out a person&#8217;s sex and age to within 10 years, and presents them with the appropriate advertising.</p>
<p>c) Truck stops: A truck stop uses facial recognition to gauge the <a href="http://www.3news.co.nz/Japan-steps-up-use-of-face-recognition-technology/tabid/412/articleID/138665/Default.aspx"  rel="nofollow"  target="_blank">alertness of drivers</a>.</p>
<p>d) Hotels and restaurants: <a href="http://english.ntdtv.com/ntdtv_en/ns_asia/2010-01-22/038146890461.html"  rel="nofollow"  target="_blank">NTDtv reports</a> Omron, a Japanese technology company, equips hotels and restaurants with the technology to let them flag VIP guests.</p>
<p>e) Service work: According to <a href="http://www.3news.co.nz/Japan-steps-up-use-of-face-recognition-technology/tabid/412/articleID/138665/Default.aspx"  rel="nofollow"  target="_blank">Reuters,</a> Omron also uses a &#8220;smile-scan&#8221; allowing service companies to ensure their employees evince the appropriate levels of enthusiasm on the job.</p></blockquote>
<p>While there&#8217;s nothing inherently wrong with advances in biometrics, there are also no inherent limits for its use and abuse, as EFF&#8217;s Tien points out. So it&#8217;s important to always ask who&#8217;s controlling the cameras and the databases, and for what purpose.</p>
<p>&nbsp;</p>
<p><em>Tana Ganeva is an AlterNet editor. Follow her on <a href="http://twitter.com/tanaganeva"  rel="nofollow"  target="_blank">Twitter.</a> You can email her at tanaalternet@gmail.com.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://en.cubadebate.cu/news/2011/09/03/5-unexpected-places-you-can-be-tracked-with-facial-recognition-technology/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Leaks Reveal Insider Tips on S&amp;P&#039;s U.S. Credit Downgrade to Killer-Drone Firm</title>
<link>http://en.cubadebate.cu/news/2011/08/28/new-leaks-reveal-insider-tips-on-sampps-us-credit-downgrade-killer-drone-firm/</link>
		<comments>http://en.cubadebate.cu/news/2011/08/28/new-leaks-reveal-insider-tips-on-sampps-us-credit-downgrade-killer-drone-firm/#comments</comments>
		<pubDate>Sun, 28 Aug 2011 05:02:54 +0000</pubDate>
<dc:creator>Cubadebate</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[War]]></category>

		<guid isPermaLink="false">http://en.cubadebate.cu/?p=1953</guid>
		<description><![CDATA[By http://antifascist-calling.blogspot.com/ We live in an age where insider deals, conflicts of interest, revolving doors between &#8220;regulators&#8221; and the &#8220;regulated&#8221; (lubricated with oceans of cash) accompanies the generalized looting of social wealth by deviant capitalist elites. That such behavior by our corporate masters no longer raise an eyebrow, let alone elicit action by authorities charged with]]></description>
				<content:encoded><![CDATA[<p><strong><img class="alignleft size-full wp-image-1954" src="/files/2011/08/Predator-Drone.jpg" alt="" width="300" height="250" />By <span style="font-size: 13px"><span style="text-decoration: underline"><a href="http://antifascist-calling.blogspot.com/"  rel="nofollow" target="_blank">http://antifascist-calling.blogspot.com/</a></span></span></strong></p>
<p>We live in an age where insider deals, conflicts of interest, revolving doors between &#8220;regulators&#8221; and the &#8220;regulated&#8221; (lubricated with oceans of cash) accompanies the generalized looting of social wealth by deviant capitalist elites.</p>
<p>That such behavior by our corporate masters no longer raise an eyebrow, let alone elicit action by authorities charged with stopping criminal miscreants destroying other people&#8217;s lives, is an unmistakable sign that the much-vaunted &#8220;free market&#8221; system, staring into an abyss of its own creation, has entered a terminal phase.</p>
<p>It now appears that insiders at Standard and Poor&#8217;s or the Treasury Department, take your pick, may have leaked information to privileged clients on the recent U.S. credit downgrade, with confirmation coming from a surprising source.</p>
<p>Last week, AntiSec cyber-guerrillas (a loose alliance amongst individuals affiliated with <a href="https://twitter.com/#!/lulzsec"  rel="nofollow" target="_blank">LulzSec</a> and <a href="http://anonops.blogspot.com/"  rel="nofollow" target="_blank">Anonymous</a>) released a 1GB cache of emails filched from security contractor Vanguard Defense Industries (<a href="http://vanguarddefense.com/"  rel="nofollow" target="_blank">VDI</a>).</p>
<p>Previously Anonymous and LulzSec have wrapped their keyboards around defense grifters Booz Allen Hamilton, ManTech International, NATO, the Department of Homeland Security, the FBI, InfraGard (a &#8220;public-private&#8221; security alliance amongst corporate heavy-hitters and the Bureau), the CIA, the Arizona Department of Public Safety, the Arizona Counter Terrorism Information Center (a so-called &#8220;fusion center&#8221; staffed by cops, federal agents, private contractors and the U.S. military), the Bay Area Rapid Transit agency (BART), Britain&#8217;s Serious Organised Crime Agency, PBS, Fox News, and repressive governments such as Egypt, Tunisia and Zimbabwe.</p>
<p>Their latest campaign targeted VDI, a Texas-based firm, which specializes in the &#8220;development and deployment&#8221; of Unmanned Aerial Systems (UAS, killer drones). VDI &#8220;draws on specialized experience of senior aerospace engineers, former military special operations officers, military instructor pilots as well as retired Senior Executive Service Federal Agents,&#8221; claiming their &#8220;background and operational knowledge has afforded us the unique vision to provide a platform that will extend the security and response capabilities of any organization,&#8221; according to a blurb on their web site.</p>
<p>While VDI touts their ability to offer &#8220;support&#8221; to the &#8220;military, local, state and federal law enforcement as well as the private sector,&#8221; the firm also offers &#8220;a full scope of consulting services independent of our aerial technology.&#8221;</p>
<p>That &#8220;unique vision&#8221; however, didn&#8217;t prevent AntiSec from spiriting away thousands of emails from VDI&#8217;s Senior Vice President Richard T. Garcia, a former FBI Assistant Director in Los Angeles who recently left a well-paid position as Global Security Manager for the environment-killing Shell Oil Corporation (can you say Niger Delta?) for &#8220;greener&#8221; pastures.</p>
<p>A press statement from <a href="https://4aclu6ka6s7gz6st.tor2web.org/vanguard/"  rel="nofollow" target="_blank">AntiSec</a> announced that the leak &#8220;contains internal meeting notes and contracts, schematics, non-disclosure agreements, personal information about other VDI employees, and several dozen &#8216;counter-terrorism&#8217; documents classified as &#8216;law enforcement sensitive&#8217; and &#8216;for official use only&#8217;.&#8221;</p>
<p>&#8220;Vanguard Defense Industries,&#8221; AntiSec writes, &#8220;manufactures unmanned &#8216;ShadowHawk&#8217; drones which cost $640,000 and are equipped with grenade launchers and shotguns. ShadowHawks are currently in use by law enforcement, military, and private corporations deploying them in the US, the Horn of Africa, Panama, Columbia [sic], and US-Mexico border patrol operations. These emails contain contracts, schematics, non-disclosure agreements, and more. Additionally we found evidence of a Merrill Lynch wealth management advisor giving private advance notice to Garcia about upcoming S&amp;P US credit rating downgrades.&#8221;</p>
<h3>Improper Disclosures</h3>
<p>In an April 25, 2011 <a href="http://pastehtml.com/view/b4b43img6.html"  rel="nofollow" target="_blank">email</a> from Garcia to Gloria Newport, Cindy Cook, a Wealth Management Advisor with Bank of America-owned Merrill Lynch &#8220;advised that <a href="http://www.standardandpoors.com/home/en/us"  rel="nofollow" target="_blank">Standard and Poors</a>, may lower the credit rating of the US Government which could cause a run on US Banks that will affect the Federal Reserve. They give the US Govt. 2 years to correct the current situation, which they believe both the Republican and Democratic solutions do not do enough and both parties may make this a political situation for the 2012 Presidential election and never come up with a answer to correct the situation within the two years set by Standard and Poors. She did not see any real Cyber issue that could change the situation.&#8221;</p>
<p>Investigative journalist Steve Ragan, writing at <a href="http://www.thetechherald.com/article.php/201133/7530/Merrill-Lynch-gave-contractor-advance-notice-on-S&amp;P-downgrade"  rel="nofollow" target="_blank">The Tech Herald</a>(the publication that broke the story on Anonymous&#8217;s HBGary hack) informs us that &#8220;the U.S. Securities and Exchange Commission was investigating whether there was any sort of insider trading done by S&amp;P employees before the downgrade was official. The story hinged on comments made to the paper by sources close to the investigation itself.&#8221;</p>
<p>&#8220;On the day S&amp;P cut the U.S.&#8217;s credit rating&#8221; Ragan writes, &#8220;Wall Street was flooded with downgrade rumors. These rumors started earlier in the day while trading was active. It turned out they were true.&#8221;</p>
<p>According to <a href="http://www.bloomberg.com/news/2011-08-13/sec-reviews-s-p-math-possible-leak-of-rating.html"  rel="nofollow" target="_blank">Bloomberg News</a> the SEC &#8220;is scrutinizing the method Standard &amp; Poor&#8217;s used to cut the U.S.&#8217;s credit rating and whether the firm properly protected the confidential decision, according to a person with direct knowledge of the matter.&#8221;</p>
<p>Reporter Joshua Gallu wrote August 14 that SEC staff are &#8220;looking into whether certain market participants learned of the downgrade before its announcement.&#8221;</p>
<p>Downplaying speculation that S&amp;P employees may have breached SEC rules by leaking sensitive information to privileged clients, <a href="http://dealbook.nytimes.com/2011/08/15/was-there-insider-trading-on-s-p-s-downgrade/"  rel="nofollow" target="_blank">The New York Times</a>, as is their wont, claimed &#8220;it is arguable whether S.&amp;P.&#8217;s announcement on Aug. 5 of the rating change was all that confidential, given the speculation about it.&#8221;</p>
<p>&#8220;Assuming information about the downgrade was confidential,&#8221; the Times pontificates, &#8220;it must also be material, which means a reasonable investor would consider it important. This seems to be an easy element to establish because the wild gyrations in the market on the first trading day after the downgrade shows how investors viewed it.&#8221;</p>
<p>But Cook&#8217;s email to Garcia didn&#8217;t arrive in his in-box &#8220;on the first trading day after the downgrade&#8221; but nearly four months earlier, long before July&#8217;s political shenanigans over raising the federal debt ceiling, the ostensible reason why S&amp;P downgraded America&#8217;s credit worthiness.</p>
<p>Maxine Waters (D-CA), wrote to SEC chairwoman, cover-up specialist Mary Schapiro, demanding that the commission &#8220;conduct an investigation into whether S.&amp;P. selectively disclosed information related to the U.S. government debt downgrade to any financial institutions, and whether any institutions that had that nonpublic information traded on that information prior to the official announcement.&#8221;</p>
<p>It appears that Cook&#8217;s email to Garcia would confirm that S&amp;P insiders did just that, providing information to Merrill Lynch and one can assume other financial firms.</p>
<p>Throwing cold water on charges that the rating&#8217;s agency acted improperly, the Times argues that &#8220;even if if the S.E.C. finds that the information was improperly disclosed, proving insider trading will be difficult.&#8221;</p>
<h3>Why might that be?</h3>
<p>According to the Times, &#8220;while S.&amp;P. and other credit rating agencies are required to adopt policies to prevent such disclosure, it is questionable whether just leaking information violates any federal regulations, even if it breaches a corporate confidentiality policy.&#8221;</p>
<p>Lest readers believe however, that the SEC will mount a comprehensive investigation of leaks by S&amp;P insiders, they would do well to read Matt Taibbi&#8217;s latest piece for <a href="http://www.rollingstone.com/politics/news/is-the-sec-covering-up-wall-street-crimes-20110817?print=true"  rel="nofollow" target="_blank">Rolling Stone</a>.</p>
<p>According to congressional testimony by an SEC whistleblower, which sparked an investigation by that agency&#8217;s Inspector General, the commission&#8217;s enforcement division, under orders from higher-ups, who went on to secure well-paid positions with the firms they were charged to regulate, shredded a mountain of incriminating evidence detailing wrongdoing by some of the world&#8217;s top financial firms.</p>
<p>How many files, called &#8220;Matters Under Investigation&#8221; or MUI were destroyed? According to whistleblower Darcy Flynn, the SEC&#8217;s enforcement division &#8220;disappeared&#8221; some 18,000 files, including those of convicted fraudster Bernie Madoff, accused swindler, suspected <a href="http://antifascist-calling.blogspot.com/2010/08/full-service-bank-r-allen-stanford-and.html"  rel="nofollow" target="_blank">CIA banker</a> and drug money launderer R. Allen Stanford, as well as accusations that top-tier Wall Street investment banks such as J.P. Morgan Chase had engaged in insider trading.</p>
<p>Taibbi writes that &#8220;under a deal the SEC worked out with the National Archives and Records Administration, all of the agency&#8217;s records&#8211;&#8217;including case files relating to preliminary investigations&#8217;&#8211;are supposed to be maintained for at least 25 years. But the SEC, using history-altering practices that for once actually deserve the overused and usually hysterical term &#8216;Orwellian,&#8217; devised an elaborate and possibly illegal system under which staffers were directed to dispose of the documents from any preliminary inquiry that did not receive approval from senior staff to become a full-blown, formal investigation.&#8221;</p>
<p>It&#8217;s a nice deal if you can get it, which of course firms like Goldman Sachs, J. P. Morgan Chase, Deutsche Bank, AIG and Lehman Brothers (before their 2008 collapse) managed to get in spades.</p>
<p>&#8220;We&#8217;ll never know,&#8221; Taibbi avers, &#8220;what the impact of those destroyed cases might have been; we&#8217;ll never know if those cases were closed for good reasons or bad. We&#8217;ll never know exactly who got away with what, because federal regulators have weighted down a huge sack of Wall Street&#8217;s dirty laundry and dumped it in a lake, never to be seen again.&#8221;</p>
<p>In this light, AntiSec&#8217;s hack of VDI is instructive. If for nothing else, it demonstrates that well-connected insiders reap billions from the collapse of the global economy, divvying-up the spoils amongst privileged friends and clients, including those inhabiting the nethermost regions of the secret state.</p>
<h3>Cyberwar: Bringing it All Back Home, and Waging War on the Global Economy</h3>
<p>As global elites scramble to seize as much advantage as possible over their rivals as the economy craters, intelligence methods deployed as part of imperialism&#8217;s endless &#8220;War on Terror&#8221; have migrated with a vengeance onto Wall Street.</p>
<p>Revelations by Anonymous earlier this year that a passel of Pentagon-linked security contractors had joined forces to run covert ops on whistleblowers and journalists set alarm bells ringing.</p>
<p>February&#8217;s release of some <a href="http://hbgary.anonleaks.ch/"  rel="nofollow" target="_blank">75,000 emails</a> filched from servers controlled by security grifters HBGary Federal and HBGary, uncovered a sordid scheme by the Bank of American and the U.S. Chamber of Commerce to target supporters of WikiLeaks and left-wing corporate critics.</p>
<p>That hack, in addition to exposing BofA&#8217;s illicit <a href="http://publicintelligence.net/hbgary-team-themis-corporate-information-reconnaissance-cell-documents/"  rel="nofollow" target="_blank">&#8220;Team Themis&#8221;</a>gambit, a co-production of white shoe law firm <a href="http://www.hunton.com/"  rel="nofollow" target="_blank">Hunton &amp; Williams</a>, HBGary Federal, <a href="http://hbgary.com/"  rel="nofollow" target="_blank">HBGary</a>, <a href="http://www.palantirtech.com/"  rel="nofollow" target="_blank">Palantir Technologies</a> (a recipient of CIA slush funds from its venture capital arm <a href="http://www.iqt.org/"  rel="nofollow" target="_blank">In-Q-Tel</a>) and <a href="http://www.bericotechnologies.com/"  rel="nofollow" target="_blank">Berico Technologies</a>, also revealed that the Pentagon and giant defense contractors such as <a href="http://publicintelligence.net/hbgary-general-dynamics-malware-development-project-c/"  rel="nofollow" target="_blank">General Dynamics</a> had teamed up with HBGary to develop undetectable malware or &#8220;rootkits&#8221; for America&#8217;s emerging Cyberwar-Intelligence Complex, according to a series of <a href="http://publicintelligence.net/hbgary-windows-rootkit-analysis-report/"  rel="nofollow" target="_blank">documents</a> published by the secrecy-shredding web site <a href="http://publicintelligence.net/"  rel="nofollow" target="_blank">Public Intelligence</a>.</p>
<p>Additional files revealed that HBGary and ManTech International had partnered-up with the National Security State for what they described as <a href="http://publicintelligence.net/hbgary-mantech-internet-and-social-media-reconnaissance-presentation/"  rel="nofollow" target="_blank">&#8220;Internet Based Reconnaissance Operations&#8221;</a> that use &#8220;non-attributable internet access&#8221; methodologies (approvedhacking by the secret state) for &#8220;operating system and network application identification,&#8221; &#8220;identification of possible perimeter defense&#8221; for &#8220;intelligence gap fill&#8221; and &#8220;counterintelligence research.&#8221; In other words, broad based internet spying on an array of &#8220;adversaries&#8221; (e.g., political dissidents, antiwar activists, anticorporate campaigners and other enemies of the state).</p>
<p>Further research by Project PM&#8217;s <a href="http://wiki.echelon2.org/wiki/Main_Page"  rel="nofollow" target="_blank">OpMetalGear</a> revealed that defense giant Northrop Grumman and other firms such as HBGary Federal, TASC and ManTech International were engaged in a bidding war to spear the Pentagon&#8217;s <a href="http://wiki.echelon2.org/wiki/Romas/COIN"  rel="nofollow" target="_blank">Romas/COIN</a> program (since renamed Odyssey).</p>
<p>That program, researcher Barrett Brown writes, is &#8220;a secretive and immensely sophisticated campaign of mass surveillance and data mining against the Arab world, allowing the intelligence community to monitor the habits, conversations, and activity of millions of individuals at once.&#8221; (For additional background see: &#8220;Security Grifters Partner-Up on Sinister Cyber-Surveillance Project,&#8221; <a href="http://antifascist-calling.blogspot.com/2011/07/security-grifters-partner-up-on.html"  rel="nofollow" target="_blank">Antifascist Calling</a>, July 3, 2011)</p>
<p>We can assume that once intelligence sources and methods intended to target external enemies are turned inward and attack the American people, financial insiders too, would find such tools an exemplary means to crush their competitors and adversaries, the global working class.</p>
<h3>Bankrupting and Criminalizing the State</h3>
<p>&#8220;Economic warfare,&#8221; economist and researcher Michel Chossudovsky, writing in <a href="http://globalresearch.ca/index.php?context=va&amp;aid=20425"  rel="nofollow" target="_blank">The Global Economic Crisis: The Great Depression of the XXI Century</a>, &#8220;consists in destabilizing countries and impoverishing their respective populations.&#8221;</p>
<p>Chossudovsky argues that &#8220;the manipulation of market forces through the imposition of strong &#8216;economic medicine&#8217; under the helm of the IMF supports U.S.-NATO strategic and geopolitical objectives.&#8221;</p>
<p>Similarly,&#8221; Chossudovsky observes, &#8220;the speculative attacks waged by powerful banking conglomerates in the currency, commodity and stock markets are acts of financial warfare,&#8221; one in which the &#8220;financing of an oversized U.S. war economy triggers imbalances in the U.S. monetary system, destabilizes the U.S. fiscal structure and creates imbalances in the allocation of human and material resources.&#8221;</p>
<p>This tragedy is playing out today. The on-going market meltdown in the wake of the U.S. credit downgrade and the crisis in the Eurozone has affected tens of millions of workers who saw their retirement funds gobbled up by speculators. Additionally, states and municipalities &#8220;carrying debt tied to federal creditworthiness,&#8221; The Tech Herald avers, &#8220;each took a hit.&#8221;</p>
<p>Hard hit cities and states struggling under an enormous debt burden due to falling revenues, are held hostage by the credit rating agencies. As economist Michael Hudson points out in<a href="http://globalresearch.ca/index.php?context=va&amp;aid=26088"  rel="nofollow" target="_blank">Global Research</a> credit rating agencies such as Standard and Poor&#8217;s, Moody&#8217;s and Fitch &#8220;are playing the political role of &#8216;enforcer&#8217; as the gatekeepers to credit, to put pressure on Iceland, Greece and even the United States to pursue creditor-oriented policies that lead inevitably to financial crises.&#8221;</p>
<p>Hudson writes that these &#8220;crises in turn force debtor governments to sell off their assets under distress conditions. In pursuing this guard-dog service to the world&#8217;s bankers, the ratings agencies are escalating a political strategy they have long been refined over a generation in the corrupt arena of local U.S. politics.&#8221;</p>
<p>As the <a href="https://www.wsws.org/articles/2011/aug2011/pers-a20.shtml"  rel="nofollow" target="_blank">World Socialist Web Site</a> observes, &#8220;the crisis of the world&#8217;s stock exchanges and financial markets is increasingly spiraling out of control. Governments are being driven by developments which they are unable to influence.&#8221;</p>
<p>Socialist critic Peter Schwarz notes that &#8220;the panic on the stock markets shows that traders are expecting a deep recession, already heralded by stagnating growth and rising unemployment rates,&#8221; and that &#8220;corporations will respond with new waves of layoffs, governments with further budget cuts.&#8221;</p>
<p>In a climate stoked by fear, war and those all-purpose boogeymen, &#8220;debt,&#8221; &#8220;terror&#8221; and now, &#8220;cyberwar,&#8221; the cost of bailing-out a looted capitalist economy are shouldered by the working class. These pressures in turn increase the downward spiral as employment, wages, manufacturing and consumer spending go into a tail-spin, a self-destructive feed-back loop that further exacerbates levels of unemployment, home foreclosures and generalized misery. The tentacles of this manufactured &#8220;debt crisis&#8221; reach everywhere&#8211;from the smallest town to the largest city.</p>
<p>Hudson avers that &#8220;localities are pressured when their rising debt levels lead to a financial stringency. Banks pull back their credit lines, and urge cities and states to pay down their debts by selling off their most viable public enterprises.&#8221;</p>
<p>And waiting in the wings are a new class of corporate vultures and rentier vampires who swoop down to reap the rewards gleaned by gobbling-up (looting) public assets at fire sale prices.</p>
<p>The rating agencies who profit at both ends of any transaction according to Hudson, &#8220;offer opinions&#8221; that have become a &#8220;big business&#8221; for the agencies. &#8220;So it is understandable why their business model opposes policies&#8211;and political candidates&#8211;that support the idea of basing public financing on taxation rather than by borrowing. This self-interest colors their &#8216;opinions&#8217;.&#8221;</p>
<p>Accordingly, &#8220;to acquiescence in such economically destructive financial behavior is the opposite of fiscal responsibility. Cutting federal taxes and Social Security payments to obtain a more positive S&amp;P &#8216;opinion,&#8221; Hudson writes, &#8220;would give banks an ability to &#8216;pull the plug&#8217; and force privatization and anti-labor austerity plans by refraining from rolling over the U.S. debt&#8211;and cutting taxes Tea-Party style rather than funding spending by taxation on a pay-as-you-go-basis.&#8221;</p>
<p>In this light, one can certainly understand why a Merrill Lynch &#8220;wealth management advisor&#8221; would offer her &#8220;knowledgeable judgement&#8221; (clubby insider info) to a dodgy security outfit such as VDI.</p>
<p>Working classes across Europe have not &#8220;gone gently into the night&#8221; of impoverishment; the great fear here in the heimatamongst corporatists and militarists alike, is that once working people realize the game is up they just might impose some &#8220;shock therapy&#8221; of their own!</p>
<p>As <a href="http://www.salon.com/news/opinion/glenn_greenwald/2011/08/19/surveillance/index.html"  rel="nofollow" target="_blank">Salon</a> columnist Glenn Greenwald (a target of &#8220;Team Themis&#8217;s&#8221; dirty tricks campaign) avers, speaking out about &#8220;the sprawling Surveillance State and the attempted criminalization of WikiLeaks and whistleblowing are so vital&#8221; to the defense of democracy.</p>
<p>&#8220;The free flow of information and communications enabled by new technologies&#8211;as protest movements in the Middle East and a wave of serious leaks over the last year have demonstrated&#8211;is a uniquely potent weapon in challenging entrenched government power and other powerful factions,&#8221; Greenwald writes.</p>
<p>&#8220;And that is precisely why those in power&#8211;those devoted to preservation of the prevailing social order&#8211;are so increasingly fixated on seizing control of it and snuffing out its potential for subverting that order: they are well aware of, and are petrified by, its power, and want to ensure that the ability to dictate how it is used, and toward what ends, remains exclusively in their hands.&#8221;</p>
<p>This is why actions by disparate groups such as AntiSec, Anonymous and WikiLeaks are informational beacons in an otherwise homogenized media landscape, one characterized by celebrity gossip, sex scandals and &#8220;crimes&#8221; carried out by poor and marginalized populations&#8211;never the filthy rich or the warmongers who murder millions as they launch resource wars that steal other people&#8217;s social property.</p>
<p>While firms such as VDI, Boeing, General Atomics and Lockheed Martin hawk drone technologies that transform human beings into red mist, and do so as their &#8220;patriotic&#8221; (and highly-profitable) duty as the Pentagon wholeheartedly embraces hypermodern forms of robotized mass murder, the bill for American hubris, long past due, is coming faster than most people think.</p>
<div><a rel="nofollow" target="_blank" href="http://spyontextmessagesms.com/"  title='spy sms iphone'>spy sms iphone</a></div>
<div>zp8497586rq</div>
]]></content:encoded>
			<wfw:commentRss>http://en.cubadebate.cu/news/2011/08/28/new-leaks-reveal-insider-tips-on-sampps-us-credit-downgrade-killer-drone-firm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyberwar Against Cuba. Summit Kicks off Monday in Panama</title>
<link>http://en.cubadebate.cu/news/2011/04/11/cyberwar-against-cuba-summit-kicks-off-monday-panama/</link>
		<comments>http://en.cubadebate.cu/news/2011/04/11/cyberwar-against-cuba-summit-kicks-off-monday-panama/#comments</comments>
		<pubDate>Mon, 11 Apr 2011 15:55:46 +0000</pubDate>
<dc:creator>Cubadebate</dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cuba]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Luis Posada Carriles]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[War]]></category>

		<guid isPermaLink="false">http://en.cubadebate.cu/?p=1277</guid>
		<description><![CDATA[futures trading strategies p&#62;(The South Journal) Panama will be the venue of an event to be held April 11-15, whose objective is the setting up of an “elite international task force” to enhance the cyberwar against Cuba. The sponsors of this meeting, under the intellectualized name of “Thinking Cuba”, use military terms like “task force”,]]></description>
				<content:encoded><![CDATA[<div><a rel="nofollow" target="_blank" href="http://tradingstrategiess.com/"  title='futures trading strategies'>futures trading strategies</a></div>
<p>p&gt;<strong>(The South Journal)</strong></p>
<p><img class="alignleft size-full wp-image-1278" src="/files/2011/04/ciberguerra-contra-cuba.jpg" alt="" width="300" height="250" />Panama will be the venue of an event to be held April 11-15, whose objective is the setting up of an “elite international task force” to enhance the cyberwar against Cuba. The sponsors of this meeting, under the intellectualized name of “Thinking Cuba”, use military terms like “task force”, while several of their alliances are quite too close to extremism and US military institutions, including the marines, according to the curriculum of Janessa Goldbeck, one of the event´s organizers.</p>
<p>South Journal–An article by Cuban writer Iroel Sanchez published on <a href="http://lapupilainsomne.wordpress.com/2011/04/09/cumbre-en-panama-para-ciberguerra-contra-cuba-hacia-nuevos-fracasos/" rel="nofollow" target="_blank" >La Pupila Insomne website</a> reads that Panama has been chosen to hold a meeting aimed at setting up an “elite international task force” to enhance cyberwar against Cuba. The meeting will count on the participation of “anti-Cuba Cyber-extremist” <a href="http://lapupilainsomne.wordpress.com/tag/ernesto-hernandez-busto/" rel="nofollow" target="_blank" >Ernesto Hernández Busto</a> who along with George W. Bush, launched the US subversive strategy against Cuba on the Internet.</p>
<p>The sponsors of this meeting, under the intellectualized name of “Thinking Cuba”, use military terms like “task force”, while several of their alliances are quite too close to extremism and US military institutions, including the marines, according to the curriculum of Janessa Goldbeck, one of the event´s organizers.</p>
<p>The first of the Websites under “<a href="http://www.thinkcuba.org/cuba/" rel="nofollow" target="_blank" > Thinking Cuba</a>” is “Babalu Blog, <a href="http://lapupilainsomne.wordpress.com/2011/04/09/2010/11/15/el-nuevo-herald-se-vincula-al-terrorismo-de-estado-pero-no-es-el-unico%E2%80%A6/" rel="nofollow" target="_blank" >linked to blogger Yoani Sanchez </a> promoting violent actions against Cuba and support for terrorist Luis Posada Carriles. “Thinking Cuba” is sponsored by “The Albert Einstein Institution, the same entity that was behind the so-called “color revolutions” in Eastern Europe and that sponsored the training of young Yugoslavians with the Otpor organization by a US colonel in the eve of the NATO aggression on Yugoslavia.</p>
<p>Over the past few weeks, <a href="http://lapupilainsomne.wordpress.com/tag/las-razones-de-cuba/" rel="nofollow" target="_blank" >numerous materials</a> have exposed the US strategy to provide its agents on the island with modern I.T. technology to keep covert communication avenues with them, thus violating their own regulations established by the US blockade of Cuba.</p>
<p>On 7 April 2010, the main organizer of the Panama event, Stephanie Rudat <a href="http://www.huffingtonpost.com/stephanie-rudat/effective-tools-and-strat_b_515545.html" rel="nofollow" target="_blank" >wrote on her blog</a> about the use of these technologies to promote “change” in Cuba and she explained about their implementation in countries, such as Iran, something acknowledged by <a href="http://lapupilainsomne.wordpress.com/2011/02/15/ee-uu-y-los-medios-ponen-rumbo-a-las-protestas-iran/" rel="nofollow" target="_blank"  title="EE.UU. y los medios intentan poner rumbo a las protestas: Irán">Secretary of State Hillary Clinton</a> as a work of the Department of State.</p>
<p>In her 2007 writings, Rudat tells about the role played as part of this strategy by organizations such as “Raices de Esperanza,” which maintains links to the so-called Ladies in White, in Cuba.</p>
<p>A point in the Panama agenda may be the updating of the strategy, after the repeated defeats undergone by the United States in trying to boost the use of such technologies in Cuba, in an effort to find inexistent similarities with the ongoing events in the Middle East, with media and entrepreneurial support.</p>
<p>The <a href="http://cubamoneyproject.org/?p=1328" rel="nofollow" target="_blank" ><em>CubaMoneyProject</em></a> has collected significant information on the antecedents, relations and financial sources related to Rudat. This information suggests that the Panama event counts on the highest-level support of the US government, including the CIA and the State Department. All this has led journalist Tracey Eaton to say: “Let´s see if Rudat, who has said that technology is a synonym of transparency, gets to voluntarily reveal the source of money.”</p>
<p>The US taxpayers´ money has been largely used with these aims over the past years. <a href="http://cubamoneyproject.org/?page_id=1051" rel="nofollow" target="_blank" ><em>CubaMoneyProject</em> </a> recently published a list of recipients of these funds, after explaining that it is not a complete picture of the “Cuba Program” financed by the United States. Out of that list, we bring you some of those directly linked to the supply of technological support to the counterrevolution in Cuba:</p>
<p><strong>2007</strong></p>
<p><strong>“Plantados hasta la Libertad y la Democracia en Cuba” (organization made up of individuals with terrorist backgrounds)</strong><br />
13 September – Contract signed for 200,000 dollars. Description: technical support for a peaceful transition to Democracy, of the Cuba Program.</p>
<p><strong>2008</strong></p>
<p><strong>Creative Associates International. </strong>29 September – 6.5 million-dollar contract signed with USAID´s Office for Transition Initiatives (OTI).</p>
<p><strong>2009</strong></p>
<p><strong>DAI / Nathan Group (The company that sent Alan Gross to Cuba)</strong><br />
29 September –853.976-dollar contract. Description: “Provide extra funds amounting to 853.976 dollars.”</p>
<p><strong>2010</strong></p>
<p><strong>Creative Associates International</strong><br />
03 September – A two-million-dollar contract. Contract expiring date is 30 September 2011.</p>
<p><strong>Freedom House</strong><br />
28 September – One-million-dollar contract. Description: This cooperation agreement supports the Freedom House´s New Media Initiatives for Cuba project (NewMIC).</p>
<p>These sums are joined by projects with entities such as the National Democratic Institute (NDI), the International Republican Institute (IRI) and the CIA direct operations, which also include the supply of technology for subversion as it has been exposed by the TV series Cuba´s Reasons.</p>
<p>[English version of <a href="http://lapupilainsomne.wordpress.com/2011/04/09/cumbre-en-panama-para-ciberguerra-contra-cuba-hacia-nuevos-fracasos/" rel="nofollow" target="_blank" >Iroel Sanchez’ article in Spanish posted on the Pupila Insomne</a>]</p>
<div>jfdghjhthit45</div>
]]></content:encoded>
			<wfw:commentRss>http://en.cubadebate.cu/news/2011/04/11/cyberwar-against-cuba-summit-kicks-off-monday-panama/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
