Archive for the ‘Articles’ Category
FLINT, MI – Federal agents claim they discovered drugs, guns and counter-surveillance equipment when they executed search warrants at four Southeast Michigan buildings believed to be used for drug trafficking.
Agents with the Drug Enforcement Administration executed a search warrant at 6:55 a.m. on Oct. 19 at a Flint commercial building investigators say is being used for drug trafficking, according to search warrants filed Oct. 25 in Detroit U.S. District Court.
The warehouse at 3711 Gorey Ave., near Center Road and Robert T. Longway Boulevard, had a “Diverse Business Center” sign on the front, a six-foot fence around the parking lot and “private property” signs on the fence.
The building is located almost at the very end of Gorey Avenue off of Center Road.
A phone number listed for the facility was disconnected.
Federal authorities executed search warrants Oct. 19 at three other locations in Metro Detroit they believed were associated with the investigation. All of the searches were done within 10 minutes of each other.
Names of individuals associated with the investigation are not being released because they have not been charged with a crime related to the searches. The case is currently filed under seal in Detroit U.S. District Court.
Court records show officials believe a man targeted in the investigation was using the Flint building as part of a drug trafficking organization, particularly using it to store drugs, drug paraphernalia and assets purchased with drug proceeds.
Agents seized four bags with suspected marijuana, an ammunition magazine for a .40-caliber handgun and miscellaneous documents from the building, court documents said.
Federal drug agents also searched a home in Southfield and two in Detroit believed to be used by the same suspect.
A home on Negaunee Street in Southfield was believed to be the man’s primary residence, court records claim.
DEA agents seized seven bags and a dozen smaller baggies of suspected marijuana, four handguns, three rifles, ammunition, miscellaneous medical marijuana cards, multiple cell phones and other electronics, a Rolex watch and other assorted jewelry, according to court records.
Agents also searched a home on Greydale Avenue in Detroit that investigators believed the man used to traffic drugs.
Investigators claim they found more marijuana, various pills and and packages of an unknown brown substance in the home.
Court records claim they also discovered a portable bug detector, a fake iPhone recording device, a hidden camera locator, shotgun, suspected ledgers, money counter, scales and more cellphones.
DEA agents allegedly discovered 340 suspected marijuana plants when they searched the fourth location, a home on Westbrook St. in Detroit.
MLive-The Flint Journal could not reach DEA officials for comment.
Published 18 October
The revelations about the NSA surveillance programs has prompted what some see as high-tech civil disobedience: a growing number of products and applications aiming to limit the NSA’s ability to access encrypted e-mails, obtain phone records, and listen to phone conversations.
The cyberdefense agencies of other countries and terrorist organizations have been busy for a while in efforts to evade the intrusive surveillance practices of the National Security Agency (NSA). Edward Snowden’s revelations about NSA surveillance programs, which appeared to compromise the privacy rights of American citizens, have triggered a growing interest by other parties in counter-surveillance initiatives. Entrepreneurs eager to cash in on privacy concerns, policy makers, privacy advocates, software engineers, and even criminals are working on developing ways to limit the NSA’s ability to access encrypted e-mails, obtain phone records, and listen to phone conversations.
“Until this summer, people didn’t know anything about the NSA,” Amy Zegart, co-director of the Center for International Security and Cooperation at Stanford University, told Yahoo News.. “Their own secrecy has come back to bite them.”
The revelations have created a global market for services and products which attempt to restrict access to information by unintended parties. Developer Jeff Lyon created Flagger, a computer program which adds red flag terms like “blow up” and “bomb making” to Web addresses in order to confuse intelligence agencies such as the NSA with false leads. The program has so far been installed by 2,000 users. “The goal here is to get a critical mass of people flooding the Internet with noise and make a statement of civil disobedience,” Lyon says. He hopes the program will generate social awareness of privacy issues.
Programmer Kristin Fiskerstrand reported that the downloading rate of Pretty Good Privacy (PGP), a free encryption program, have increased from 600 times a day before Snowden’s revelations to 1,380 times a day two months after the first round of leaks.
Andrew Lewman, executive director of TOR, short for The Onion Router, said that the organization has seen an increased interest in the encryption software. The U.S. government has invested in TOR development in order to help political dissidents in authoritarian countries communicate with each other safely. The documents Snowden leaked show that the NSA tried to crack TOR because it suspected that not only dissidents, but terrorists as well, were using the software.
University of Auckland associate professor Gehan Gunasekara toldthe Yahoo News that he has received “overwhelming support” for his proposal to “lead the spooks in a merry dance,” visiting radical Web sites, setting up multiple online identities, and making up hypothetical “friends.” “Pretty soon everyone in New Zealand will have to be under surveillance,” he said.
Researchers at Carnegie Mellon University have published SafeSlinger, a smartphone app which encrypts text messages to escape surveillance by cell carriers, Internet providers, employers, or any other interested party. Activists have begun to host events with titles like CryptoParties, in which attendees bring their digital devices and learn how to download and use encrypted e-mail and secure Internet browsers. “This whole field has been made exponentially more mainstream,” said Cryptocat private instant messaging developer Nadim Kobeis.
Steven Aftergood, security and privacy expert at the Federation of American Scientists, told Yahoo News that limits to surveillance must be clearly defined – and that the time to do so is now.
“Are we setting ourselves up for a total surveillance system that may be beyond the possibility of reversal once it is in place?” he asked. “We may be on a road where we don’t want to go. I think people are correct to raise an alarm now and not when we’re facing a fait accompli.”