Piracy Lawsuit Could Ground CIA’s Deadly Predator Drones FastCompany on October 19, 2010 at 10:00 AM
Al Qaeda and the Taliban haven’t been able to bring down the CIA’s Predator drones. But a new lawsuit alleging parts of their targeting software are pirated (and faulty) could.
On December 7, 2010, Massachusetts Superior Court Judge Margaret Hinkle is expected to issue a decision on a complicated contract and intellectual property-related lawsuit that could ground the CIA’s Predator drones.
Intelligent Integration Systems (IISi), a small Boston-based software development firm, alleges that their Geospatial Toolkit and Extended SQL Toolkit were pirated by Massachusetts-based Netezza for use by a government client. Subsequent evidence and court proceedings revealed that the “government client” seeking assistance with Predator drones was none other than the Central Intelligence Agency.
Lawsuit claims CIA uses pirate software in drone assassinations Posted on September 28, 2010
In a court deposition, Richard Zimmerman, IISi’s senior technology officer, described his “amazement” that the CIA “want to kill people with my software that doesn’t work”. The CIA’s unmanned drone assassinations in Afghanistan and Pakistan are part of one of the agency’s most controversial covert programs in recent years. Last May, speaking before the National Security and Foreign Affairs subcommittee of the US House Committee on Oversight and Government Reform, a number of prominent American legal scholars warned that the killings may constitute war crimes. IntelNews regulars will know that this website has consistently questioned the legality of such extrajudicial assassinations. intelligencenews.wordpress.com/2010/09/28/01-570/
Lawsuit over Drones in Pakistan forces CIA Station Chief to Flee
Posted on 12/18/2010 by Juan
The Guardian reports that a lawsuit brought by a Pakistani journalist over wrongful deaths in drone strikes has forced the CIA station chief in Islamabad to flee the country. The official’s identity was discovered by the journalist, Karim Khan of North Waziristan from other journalists or possibly from disgruntled elements in the Pakistani military. It was alleged that the station chief had entered the country on a tourist visa and so had no diplomatic immunity.
The episode demonstrates the miseries of postmodern warfare, wherein President Obama is treating Pakistan the way Henry Kissinger treated Cambodia. If the US is going to conduct military operations in a country, it should be in the terms of a Status of Forces Agreement, and should be carried out by the Department of Defense. To have the CIA just lob missiles onto civilian villages in another country is wrong for all kinds of reasons. CIA operations are covert and US officials cannot even talk about them in public. There therefore can be no public debate or scrutiny of the policy. And, the whole operation breaks US law, since it is essentially a mass assassination campaign, not a war.
Lawsuit Over Flawed CIA Drone Code Is Deep Sixed by Settlement Posted by Bill Conroy - November 19, 2010 at 8:20 pm
Terms of Agreement “To Remain Confidential”
An explosive lawsuit alleging that Boston-area tech company Netezza Corp. sold computer hardware loaded with “hacked,” faulty software to the CIA for use in the agency’s Predator Drone program has now disappear from public view.
The parties to the lawsuit, which include Netezza and software developer Intelligent Integration Systems Inc. (IISI), announced last week that they had reached a settlement in the case. A day after that announcement, corporate giant IBM closed on a $1.7 billion deal to purchase Netezza.
The breach-of-contract lawsuit, initiated in Suffolk County Superior Court in Massachusetts in November 2009, revolved around a series of claims and counterclaims related to a sophisticated, analytical software program, known as Geospatial, that was developed by Boston-based IISI. The software is capable of integrating at high speeds spatial data, such as maps and visual images, with non-visual data, such as names and phone numbers.
Netezza, in its pleadings, claimed that IISI, per contract, was required to upgrade the Geospatial software code to make it work on Netezza’s new data-warehouse computer platform, called the TwinFin. IISI argued, and the court ultimately agreed, that it was under no such obligation. IISI officials also indicated that such an upgrade effort would be quite challenging and costly.
In the wake of IISI refusing to adapt the Geospatial software to the TwinFin on Netezza’s timeline, IISI asserted in court pleadings that Netezza proceeded to develop a re-engineered, flawed version of the software that was loaded on the TwinFin platform that Netezza allegedly sold to the CIA.
The released details of the lawsuit settlement between Netezza and IISI are vague, and do not clearly address whether the allegedly flawed Geospatial software acquired by the CIA will be fixed or replaced.
Virus attacks military drones, exposes vulnerabilities October 11, 2011, 6:00 AM PDT
A couple weeks ago, a computer virus was discovered recording sensitive information being sent to military attack drones, an incident that will almost certainly lead to heightened concerns over the use of unmanned weapons in the war against furor.
Police use military drones to arrest U.S. citizens December 13, 2011, 5:53 AM PST
It’s been the year of the drone...
A recent news report revealed that, back on June 24th, local police in North Dakota made the first ever arrest of U.S. citizens with the assistance of unarmed predator drones. And oddly enough, the incident didn’t involve terrorism or narcotics, but rather a search for missing cows on a remote stretch of farmland.
Here’s a brief synposis of what transpired on a late summer evening as reported by Stars and Stripes, a military news publication. Sheriff Kelly Janke of the Nelson County Police Department had entered the 3,000 acre Brossart family farm looking for six cows that were reported missing when three men with brandishing riffles men chased him off the property. Upon retreating to safety, he immediately called for backup, which included a SWAT team, a bomb squad and a Predator B drone.
Post by anti radar paint on Apr 23, 2012 13:28:31 GMT -8
Iran says is building copy of captured US drone Sun, Apr 22, 2012
Tehran says it brought down the RQ-170 Sentinel, a top-secret surveillance drone with stealth technology, and has flaunted the capture as a victory for Iran and a defeat for the United States. The U.S. says the drone malfunctioned and downplayed any suggestion that Iran could mine the aircraft for sensitive information because of measures taken to limit the intelligence value of drones operating over hostile territory... One area where there is concern is whether Iran or other states could reverse-engineer the chemical composition of the drone's radar-deflecting paint or the aircraft's sophisticated optics technology that allows operators to positively identify terror suspects from tens of thousands of feet in the air.
The secrecy in the crashes and burns of drone warfare Posted on January 25, 2012
An account of the spectacular end of that nearly US$4 million drone in November 2007 is contained in a collection of air force accident investigation documents recently examined by TomDispatch. They catalog more than 70 catastrophic air force drone mishaps since 2000, each resulting in the loss of an aircraft or property damage of $2 million or more.
(A recent McClatchy report revealed that it takes nearly 170 people to keep a single Predator in the air for 24 hours.)
Canadian Centre for Unmanned Vehicle Systems 2007-2010 CCUVS: CANADIAN CENTRE FOR UNMANNED VEHICLE SYSTEMS Centre Canadien des Systèmes de Véhicules Télépilotés Facilitating sustained, profitable growth in the Canadian unmanned systems sector
4, 49 Viscount Avenue, Medicine Hat, Alberta, T1A 5G4, Canada t: +1 403 488 7208; e: email@example.com: w: www.ccuvs.com The incorporation of the Canadian Centre for Unmanned Vehicle Systems (CCUVS) in April 2007 was a significant innovation initiative by Alberta, in co-operation with Western Economic Diversification, and was the culmination of many years of work by several highly dedicated and visionary individuals They believe, as I do, that the time has now come to address the full civil and commercial exploitation of unmanned systems and robotics. This requires the commercialization of many new and innovative combinations of technologies. Technology commercialization programmes are not just about technology; there are a multitude of issues to be addressed including standards and regulations, public and corporate awareness, education, workforce skills training, preparation of financial and insurance markets, supporting research and development and test and evaluation. www.albertacanada.com/documents/AERO-AIS_CCUVS-overview.pdf
How the Gov’t Talks About a Drone Program it Won’t Acknowledge Exists Sept. 13, 2012, 1:14 p.m.
The government refuses to formally acknowledge that the CIA even has a drone program, let alone discuss its thornier elements, like how many civilians have been killed, or how the CIA chooses targets.
Officials have given speeches on the legal rationale for targeted killing and the use of drones in broad terms. The administration has also acknowledged “military operations” outside the “hot” battlefields of Iraq and Afghanistan, but again, details have remained under wraps.
The American Civil Liberties Union and the New York Times have both filed multiple Freedom of Information Act requests for documents relating to the CIA’s drones. The agency has responded by saying that it can “neither confirm nor deny the existence of records.”
September 25, 2012 Do Drone Attacks Do More Harm Than Good?
A new study found that because of the many unintended civilian casualties, U.S. drone attacks against terrorist targets in Pakistan have been an effective recruiting tool for extremists, but have not been effective in killing terrorist leaders.
For the U.S., is the damage the attacks in Pakistan and Yemen have caused Al Qaeda worth the cost?
Sen. McCain Blasts Secret Legislation on Drone Policy - prohibited the transfer of CIA drone operations to the Department of Defense.
The term “secret law” is most often used to refer to executive branch actions that mandate national policy without public notice, or that reinterpret existing statutes in dubious or counterintuitive ways that are not disclosed to the public. But in this case, an important national policy measure was literally written into law by Congress in secret.
moabiter: If you log in or register, please check your Profile settings.
Sept 17, 2013 8:24:45 GMT -8
KS Chua: I noticed someone was waiting in the dark for me on my way home tonight. I believe someone is trying to kill me. -kok SeNg chUA
Nov 17, 2013 13:35:49 GMT -8
Mark Iannicelli: The perps used an acoustic device projecting noise and pretended tobe mafia hitmen and I broke a windshield to get in jail and be safe . I was surgically implanted in New York Long Island's Nassau County jail. Perps hate for you to yell and threaten them.
Dec 13, 2013 18:04:49 GMT -8
Mark Iannicelli: I have had probes surgically implanted and V2K and nobody helps me because these lowlifes pay everyone off or use counterintelligence to disinform the people who try to help me. The perps are Meriwether from Brunswick, Georgia U.S.A. and a Joe Moody
Dec 13, 2013 18:07:32 GMT -8
Mark Iannicelli: The money from the torture and murder that these rednecks are getting here in the United States is from the Dept. of Defense's Office off Ssience and Technolgy, the Dept. of Justice Office of Science and Tecnology, the Dept. of Commerce Office of Science
Dec 13, 2013 18:10:43 GMT -8
Mark Iannicelli: BIuS
Dec 13, 2013 18:11:19 GMT -8
Mark Iannicelli: dEPT. OF cOMMERCE oFFICE OF sCIENCE AND tECHNOLOGY
Dec 13, 2013 18:12:01 GMT -8
Mark Iannicelli: Senator Shelby a Republican from Alabama has appropriated Defense spending for victims to be violated inhumanely with probes that itch , burn, shock and some have Global Positioning Systems (GPS)from companies like Positive I.D..
Dec 13, 2013 18:15:47 GMT -8
Mark Iannicelli: Di HAVE BEEN A v2k VICTIM FOR 23 YEARS AND HAVE TRAVELED THE WORLD WOTH LOWLIFES THAT GET MONEY FOR RESEARCH IN THE FORM OF GRANTS FOLLOWING ME AND TELLING PEOPLE I AM, A COMMUNIST TERRORIST WITH ALQAIDA, HOMOSEXUAL THAT MUTILATES HIMSELF , HITMAN AN MAFIA
Dec 13, 2013 18:18:07 GMT -8
Mark Iannicelli: The United States Constitution is suppose to protect us citizens but in reality it is not woth the ink that it is written in unless you are a millionaire.
Dec 13, 2013 18:19:23 GMT -8
Mark Iannicelli: I will visit you the next time I am in England if you can get the V2K out of my head.You all need to form a V2K Victim Security Task Force and post security at the hospital generators , fire alarms, inside and outside the operating and recovery rooms.
Dec 13, 2013 18:22:51 GMT -8
Mark Iannicelli: In direct conflict with christian ideology I am an advocate of assasinating the doctors and their accomplices that implant victims involuntarily with V2K because I have been tortured for 23 years.
Dec 13, 2013 18:24:23 GMT -8
Mark Iannicelli: The lowlifes when they travel abroad get help from the U.S. State Dept. with diplomatic passports and they always try to get next to the [police with an offer to train them in neighborhood watch and vehicular surveillance and pursuit.
Dec 13, 2013 18:26:34 GMT -8
Mark Iannicelli: Please check out the book The COINTELPRO PAPERS for an understanding how the F.B.I. conducts counterintelligence operations. Can you help me get the V2K out of my head?
Dec 13, 2013 18:28:11 GMT -8