A curious development in 2015 related to Sussmann indictment and Alfa Bank saga

As so often: Interesting timing.

A story from September 2014 carried by ZDNet was recirculated on Twitter a few days ago.  The story, by Zack Whittaker for Zero Day, was about “Trusted Third Party” companies, which provide legal compliance services for Internet and communications service providers presented with surveillance subpoenas from law enforcement agencies.

The fundamental basis for this model of compliance operations goes back to the Communications Assistance for Law Enforcement Act (CALEA) of 1994.  CALEA was implemented before most instant communications over the Internet – things like text messaging and voice-over-IP – existed, and after 9/11 was updated (in 2004) to keep up with technology and the new imperative for security-focused surveillance.

There are a lot of details to master for a full understanding of what CALEA does, and I recommend starting with Whittaker’s article and perusing this summary and FAQ posted by the Electronic Frontier Foundation (EFF).

For our purposes, here’s a short summary of what matters. Continue reading “A curious development in 2015 related to Sussmann indictment and Alfa Bank saga”

Durham’s ‘Clues’: Pentagon contractors, CrowdStrike, Georgia, and the IP addresses

Outlines of connections emerge.

Paul Sperry had an article at Real Clear Investigations on 7 October in which he reported that John Durham’s investigation of the federal government’s handling of “Russiagate” is focusing on Pentagon contractors.  Like the “speaking indictment” of Michael Sussmann, this framing of where Durham’s headed functions to shift perceptions somewhat, shedding new light on old information.

Like so much of the “new light,” the investigative pathways prompted by what has recently come out cause us to look further back and see the fresh likelihood of connections between the familiar events of Spygate/Russiagate and earlier events.

This treatment will not be at all comprehensive.  It’s a collection of such potential links, assembled in the last few weeks and presented in complete sentences as a marker, rather than as a finished analysis or theory.  Basically, these are research notes.  I want to get them out there as a service.

Rather than attempting to weave them as a story, I’m trusting readers to know the basic outline and recognize why dates and events are significant.  There has been prior work on all of the points here:  nothing is entirely new, as I think dedicated followers of the problem set are aware.  Hyperlinks will take you to more extended discussions and analyses.

Here is the grab-bag of interesting points, in no particular order. Continue reading “Durham’s ‘Clues’: Pentagon contractors, CrowdStrike, Georgia, and the IP addresses”