24 September 2011
Double Crossing Dual-Use Technologies
Date: Fri, 23 Sep 2011 17:51:06 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
To: tscm-l2006[at]googlegroups.com
Subject: [TSCM-L] {5661} Warning - ITAR 121.1 (The weather at GITMO)
Greetings,
Folks this is really serious, and I need you attention for a few minutes,
so please read the following, ruminate on it, do your own research, and then
call or E-Mail the PM/DDTC on the matter on Monday morning.
I would like to urge list member to use EXTREME caution when purchasing TSCM
equipment, especially if it might be crossing any international borders or
boundaries at any time it's life.
If you are outside of a country and you bring it in you could have a problem,
if you are inside a country and you are shipping it out you could have a
problem.
If it belongs to you and you carry it with you and you cross a border you
can have problems, even if the equipment has belonged to you for years,
and you have previously imported and exported and you now merely carry
your own property, you STILL have to get clearance each time it crosses an
international boundary, even if it does not leave you possession.
Also, any and all technical manuals for TSCM equipment, all course note,
course textbooks, and anything at all, without exception used to teach TSCM
is considered a "defense technical information" and you have to obtain government
approval to move the technical book or text book across any international
borders.
Yes, yes, I know the school is telling you that this is not true, and that
the company that makes the gear is claiming what I am saying is not true,
and yes, I know that previously there has not been a problem moving you
suitcases, but nonetheless, you STILL have to get a license, period, and
it is not a matter where someone can utter soem weasel-words and then permit
you to smuggle arms.
Indeed, ALL TSCM EQUIPMENT WITHOUT EXCEPTION, and ALL TECHNICAL MANUALS,
ALL SOFTWARE, ALL DRIVERS, ALL TSCM TOOLS, and anything remotely involved
in looking for bugs requires a license from the U.S. State Department, without
exception, period. It does not matter at all what the technical parameters
are of the equipment, merely that it is for TSCM renders it restricted.
So that there can be no misunderstanding I have attached a copy of the U.S.
State Department Telephone Directory, and I woudl urge... no insist that
you reach out to the PM/DDTC office and speak to them directly right away,
and in particular ask to speak to Robert S. Kovac, who is the department
head, and he and his staff can help you clear up and "misunderstandings foisted
by manufactures, publishers, or schools"
The person to whom you wish to speak is named Robert S. Kovac and he may
be reached at (202) 647-9023, and he would be more then happy to clarify
this matter as it applied to ITAR 121.1. I have attached to this E-Mail the
U.S. State Department Phone Directory, he can be found on page 95.
If you are about to purchase TSCM equipment you need to immediately do an
immediate stop and speak to PM/DDTC and request an opinion from them in writing.
If you have TSCM equipment you need to get an opinion from them in writing,
and if you have previously possessed equipment you need to contact them and
get an opinion in writing, and when you do get that opinion and speak to
them, you ned to be sitting down, and you may need a stiff drink.
Also if you attended a TSCM course in the United States and you are
not a U.S. Citizen, you could be arrested the next time you try to come to
the United States, and in some countries you could be charged with arm smuggling
for being trained in the United States on TSCM equipment and methods when
you can not legally be trained in TSCM (unless you have a State Department
license in advance of the training), nor can you possess TSCM technical manuals
or training materials.
I have been preaching on this issue or many years, but people do not seem
to quite get the picture.
All TSCM, TEMPEST, SIGINT, and related equipment without exception is all
covered by "The United States Munitions List" under ITAR 121.1, Category
XI(b) as Military and Space Electronics, as "electronic systems or equipment
designed or modified to counteract electronic surveillance or monitoring."
In fact, most TSCM gear is considered a Tier 1 device, but some simpler devices
can be considered a Tier 2 device.
It is actually both a matter of U.S. Law, and international treaty.
http://frwebgate.access.gpo.gov/cgi-bin/get-cfr.cgi?TITLE=22PART=121&SECTION=
1&YEAR=2002&TYPE=TEXT
You still have to have a license from the State Department, it does not matter
what the factory tells you.
Yes, you can purchase and own TSCM gear made in the United States or abroad,
and you can own technical manuals, and obtain training, but as soon as the
manuals, equipment, or foreigners cross the U.S. Border all kinds of very
serious legal issues start coming into play. Again, it is OK to buy it and
own it, and export it, and so on, but be supremely careful, and trust nothing
in the form of hard information unless it come directly from the law or directly
from a government official in the form of a written document.
Please call or E-Mail Mr. Kovac, he will be of great value in you getting
to the reality of what the law says.
He may be reached at: "Robert S. Kovac, PM/DDTC, U.S. State Department"
<KovacRS[at]state.gov> or you can reach him by phone at (202) 647-9023,
but plan to have a stiff drink after the call, and relay to this list and
to me what he has to say on the matter.
If you are on other lists (TSCM Lists, Security Lists, Technical Lists, etc)
I would ask that you repost this warning to those other lists, so that this
warning is quickly circulated, to hopefully limit your and others massive
exposure. If you have a website, feel free to post this warning to
that website.
There is nothing quite like flying to the United States from Italy to attended
a one week stress-free TSCM course only to find yourself snatched up and
shipped off to GITMO as an arms smuggler and you and your wife being the
other end of a orifice probing and formal water-boarding merely because you
did not get a State Department license to attend the course (or for that
matter a conference), and Saints help you if your are carrying books or manuals
with you, or worse yet any reference or records of equipment purchases wherein
you did not obtain a license first.
The weather in Cuba is nice most of the year, and the facility where you
will learn about these things (ITAR 121.1, Section XI(b) compliance) does
have a nice view of the ocean, but you might not like the flight, or the
check-in protocols for the visit, or appreciate the finer aspects of
begin able to breath water. Seriously folks, I am not kidding, you MUST obtain
your license before you do anything else, and plan for the approval to take
a solid six months or more (current published State Department statistics
say 153 days, but you can usually drop this to under 45 days if you get
pre-approvals in place in advance).
Give Robert a call, and feel free to mention that I referred you to his office.
If you woudl like legitimate equipment, in a legitimate transaction, from
a legitimate company that has been around longer (seriously) way longer then
any other TSCM company in the United Stated (I not kidding) then please give
us a call. But we play no games, shoot straight, and any and all exports
of TSCM gear, manuals, or software, and and all training of anybody who is
not a U.S. Citizen will not take place unless *** YOU *** first get permission
from the U.S. State Department, and then they (the PM/DDTC) grant Granite
Island Group a license to provide the equipment, manuals, software, or training
to the foreigner. We also will not deal with middlemen, dealers, or brokers,
only the actual end users who will be using the gear without exception.
If you are a U.S. citizen, we are happy to provide training with no restrictions,
but do not be surprised if you are required to cough-up your passport when
you show up for the first day, or when you register for the course.
-jma
--
James M. Atkinson
President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
Granite Island
Group
jmatk[at]tscm.com
http://www.tscm.com/
(978) 546-3803
Date: Sat, 24 Sep 2011 05:48:16 +0200 (CEST)
From: Thomas Shaddack <tscm-l[at]shaddack.mauriceward.com>
To: "tscm-l2006[at]googlegroups.com"
<tscm-l2006[at]googlegroups.com>
Subject: Re: [TSCM-L] {5666} Warning - ITAR 121.1 (The weather at GITMO)
That's an entire barrel of worms. The 55-gal sized one. Especially when we
count in the dual-usefulness of many many technologies and the similarity
of fields.
Where is the line between TSCM and non-TSCM? How can one figure out if a
piece of equipment he himself modified will qualify or not, especially when
all the mod needed can be apparently some scripting code and an
ATmega-microcontroller enhancement for a radio receiver?
This is especially thorny question in the world of software-defined radio,
where the difference between hardware and software is not certain anymore.
Which could be quite a nightmare for the bureaucrats, as a perfectly civilian
piece of gear can gain entirely different set of capabilities just by reflashing
the firmware. And a civilian device can get its capabilities enhanced often
by just a slight hardware mod.
I assume a lot of TSCM techniques is overlapping with the standard industry
fields; case in point is electromagnetic compatibility and interference.
Finding the cause of interference in an industrial system seems to be somewhat
similar to finding a clandestine transmitter. Therefore either an engineer
can get in trouble for hauling in their test equipment, or alternatively
a rogue TSCMer can avoid trouble by traveling under pretense of resolving
a company's EMI issue while intending to do a sweep of the CEO's office.
Finding a bug is just a very special kind of finding a source of electromagnetic
signal and isolating it from the mess of other signals in the background.
Similar for telco equipment; TDRs are used for locating all sorts of anomalies
in wiring, not just for finding bugs. Phone tap is just a specific kind of
anomaly.
The TEMPEST issues are overlapping not just with EMC/EMI, but also with
countering side-channel attacks on smartcards. The techniques to counter
differential power analysis seem to me to be usable for reducing the EM
signatures, as the signatures are nothing but differential-power issues,
except that they are radiated out instead of directly captured from the wires.
http://en.wikipedia.org/wiki/Power_analysis
With continuing computerization of everything, computer security may overlap
into this area. A lot can be done by breaking into a CEO's laptop and then
using its microphone and wifi or bluetooth transmitter as a remote bug.
Smartphone security is increasingly relevant here as well, as the devices
are now full-fledged computers.
There are some oddities in the ITAR text file. Just some for laugh and/or
head-scratching:
XIII e), paints for e.g. reducing radiated thermal signature. But that can
be achievable with infrared-reflecting paints, which are used not only for
thermal camo but also in civilian segment for reducing thermal load on buildings
and vehicles by solar radiation.
XIII i), metal embrittling agents. Therefore it is illegal to export/import
mercury and gallium? What about galinstan alloy in (for) thermometers?
For fun, two videos included, of mercury and gallium attack of aluminium:
http://www.youtube.com/watch?v=FaMWxLCGY0U
http://www.youtube.com/watch?v=Z7Ilxsu-JlY
XIV c), detectors of biological agents. WHAT??? That includes systems for
rapid identification of any airborne or surface-adsorbed germs, as any system
for detecting generic "civilian" germs can be used to detect the much smaller
range of weaponizable agents. Same for identification of chemical contaminants,
as a generic gas chromatography-mass spectrometry rig or chemical imaging
system can be used for industrial pollution sampling as well as for
detection/analysis of a chemical warfare agent, as the spectra of the things
are commonly available in spectrum libraries.
http://en.wikipedia.org/wiki/Chemical_imaging
This section could be interpreted as indirectly endangering non-US civilians
worldwide.
XIV d), milspec radiation detectors. Does that include Russian Geiger tubes
from sovtube.com? Because some of the Soviet military tubes are pretty common
on e.g. eBay, of a nicely robust design, and the price is usually right.
(And the sellers often declare them as "diodes" or "used audio tube", because
they are reasonable and want to avoid customs trouble for the customers.
Guess what? It works!)
On a related thought, some time ago I read about the Tactical Laser. From
the power and beam divergence stated in the article I calculated power per
square meter at a distance. The figure, according to firefighting literature
available via Google Books, was in the same ballpark as heat flux per square
meter from a nearby structure fire, and the same passive firefighting measures
used to protect against radiated heat, e.g. intumescent paints, could therefore
likely be used to increase survivability of a vehicle or a facility against
such kind of an attack.
(Another thought, less related. The rail guns being tested for Navy, how
will their EM signature of projectile launch be handled? That sort of power
is not something that could be shielded easily and the pulse will be heard
wide and far. Its spatial characteristics, obtainable by correlation of signal
from several shore-located receivers, could then reveal the direction of
the gun and therefore the projectile, providing the crucial several seconds
of advance warning.)
(Yet another thought, about lasers. I assume an adaptive laser mirror and
the algorithms for correction for atmospheric turbulence for a weapon-grade
laser would be restricted - but the same technology is already available
from astronomers, who use it for their telescopes.)
There is apparently no clear difference between civilian and military. Everything
is potentially dual-use. And a lot of apparently "restricted" information
is already in public domain and out there for everybody, just find it in
its specific industrial field and apply it where you need it. A solid
understanding of underlying physics, electronics, and sometimes chemistry
is helpful here.
Where is a line between what will and will not anger the bureaucrats? As
seen above, the rules often do not make much sense in wider context, especially
as the technological development marches forward.
To: tscm-l2006[at]googlegroups.com
Re: [TSCM-L] {5666} Warning - ITAR 121.1 (The weather at GITMO)
Date: 24 September 2011
Cryptome:
Dual-use technologies are a challenge for countries to regulate. In addition
to each countries export-import laws, munitions lists and prohibitions, there
are several ongoing international treaty endeavors to blend national controls
while still advancing the highly lucrative arms trade that all the major
countries avidly promote, lie about and betray each other.
A principal international munitions control treaty is called the Wassenaar
Arrangement which is updated as technologies evolve, evasions determined,
deceptions exchanged, investigations launched, and deals set to favor the
treaty's parties over those outside.
Breaking munitions treaties and laws and secrecy agreements is obligatory
by every nation to advance its political and economic interests. That's a
prime purpose of spies, their contractors and willing individuals, and the
technology spy and counterspy industry is particularly active these days
due to the rise in dual use technologies and the very aspects Thomas alludes
to.
Some cynics claim it is far more profitable to break munitions treaties than
to abide them. That the treaties increase the price of prohibited technologies
and fees for peddling and distributing them on the black market -- spies
the most deep-pocketed purchasers, swappers, snitches and black job burglaries.
Dual-use, as might be expected, applies to governments, producers and security
professionals, for it is a rare opportunity to play both sides at the same
time: to enforce laws as well as break them, to promote law enforcement as
well as covertly inform on miscreants (run stings, rat, trick, lie, business
as usual), to warn of high penalties for law-breaking while earning fees
to show how to do just that and get away with -- the prime way to make out
like a bandit on the outside after being on the inside, to be sure, maintaining
close ties with those still inside. I, too, am a professional state-licensed
to protect you while keeping you dependent. Gitmos are us.
No spy is ever an ex-spy unless you understand that an ex-spy is a spy still
at work, work that is always dual-use, or as they say in fiction, double-cross.
Dual-use as a term was invented to lightly cloak perfidy, like sterling
reputation or virginity. Simply presenting a human face to a scheming beast
out to eat your vitals.
BTW, beware getting in the database of an official, not that there is any
way to avoid that, particularly if you are dumb enough to communicate by
"secure means." To officials there are no innocents. To ex-officials there
are only customers to scare into submission.
_______
Cryptome follow-up, 24 September 2011:
What is diabolical is that government officials authorize the breaking of
laws governments are established and empowered by citizens to enforce.
This is done in secret thus unchecked by the citizens.
State secrets are an abomination inherited from royalty blessed by godspeak.
Laws governing secrecy are themselves secret in part or in whole in some
instances, as are their implementation. This is a system which perpetuates
itself secretly, thus cannot be challenged by those without access to the
secrets. The few who have access and try to revise the system are systematically
attacked, imprisoned, destroyed, partly in the open, but mostly in secret
by enforcement of secrecy provisions not in the public domain.
This is done in secret thus mostly unknown by the citizens except for misleading
public accounts.
Governments are far from alone using these practices, and may pose less of
a threat to the public than anti-governmental practitioners inside and outside
governments who eagerly abuse governments as tools, as cover and as
scapegoat.
Swinish ex-government officials are prime candidates for recruiters of
anti-government secrecy abusers. And vice-versa. The few resisters are
silenced by throttling of perks and exemplar prosecutions.
|