"In a time of universal deceit telling the truth is a revolutionary act." -George Orwell

Posts Tagged ‘Surveilance State’

Big Brother Is Prism: NSA Is Watching All Communications Over Phones, Facebook Google, Apple, Yahoo, Microsoft, Skype, Pal Talk, AOL & You Tube

In Uncategorized on June 7, 2013 at 8:01 pm

Prism Oldspeak:”It is a massive surveillance state of exactly the kind that the Church Committee warned was being constructed 35 years ago… the idea that the PATRIOT Act enables bulk collection, mass collection of the records of hundreds of millions of Americans, so that the government can store that and know what it is that we’re doing at all times, even when there’s no reason to believe that we’ve done anything wrong, that is ludicrous“. -Glenn Grunwald

If Someone want’s to know why their government has decided to go on fishing expedition through every personal record or private document – through library books they’ve read and phone calls they’ve made – this legislation gives people no rights to appeal the need for such a search in a court of law. No judge will hear their plea, no jury will hear their case. This is just plain wrong.” -Senator Barack Obama, 2005, On The USA Patriot Act.

I came in with a healthy skeptcism about these programs. My team evaluated them, we scrubbed them thoroughly, we actually expanded the oversight. But my assessment… was that they help us prevent terrorist attacks. And the modest encroachment… on privacy in getting phone numbers and durations without a name attached, and looking at content that – [I decided] net, it was worth us doing. Some other folks may have a different assessment. I think it’s important to recognize you can’t have 100 percent security and also 100 percent privacy, and also zero inconvenience. We’re going to have to make some choices as a society….In the abstract you can complain about Big Brother and how this is a program run amok, but when you actually look at the details, I think we’ve struck the right balance.” -President Barack Obama, 2013 

AHAHA! HA! My man went from “This is just plain wrong.” to “we scrubbed them throughly” and…decided it was worth doing.” My people Big Brother is OFFICIALLY watching you.  Obama was nice enough to scrub it down and balance it out for you, placing some of the burdens for surveillance on government and some on oligarchical collectivist corporations. We are living in the age of the painless concentration camp. Assume all your digital communications are insecure. I wonder though, when was it that society made these choices? When did “society” choose to be systematically surveilled during an endless war? To do away with, privacy safeguards, transparency, freedom of the press, freedom of speech, freedom of assembly, freedom from unlawful search & seizure, summary execution and indefinite detention? I think when Obama said “society” he meant the elites and the imperial institutions they control. If you look at what he said that way, it makes a lot more sense, as I’m fairly certain most of the people who live and suffer in this society did not make those “tough choices”.  The good news about this though is there are more and more leaks springing in the secret U.S. Government. This is the third whisleblower to speak the truth about Big Brother. Thomas Drake and Willam Binney preceded him. Hopefully, conscientious patriots will continue to expose the lies, illegality and anti-democratic actions of the Secret Corporatocracy. “

Related Stories:

A Massive Surveillance State”: Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails

We Don’t Live in a Free Country”: Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance”

By Glenn Grunwald @ The U.K. Guardian:

Prism

A slide depicting the top-secret PRISM program.

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of Prism.

The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.It also opens the possibility of communications made entirely within the US being collected without warrants.

Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

Collectively, the companies cover the vast majority of online email, search, video and communications networks.

Prism

The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users’ communications under US law, but the Prism program allows the intelligence services direct access to the companies’ servers. The NSA document notes the operations have “assistance of communications providers in the US”.

The revelation also supports concerns raised by several US senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.

PRISM slide crop
The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.

The Prism program allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.

With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.

The presentation claims Prism was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.

“Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.”

The new measures introduced in the FAA redefines “electronic surveillance” to exclude anyone “reasonably believed” to be outside the USA – a technical change which reduces the bar to initiating surveillance.

The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities’ requests.

In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.

The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming “access is 100% dependent on ISP provisioning”.

In the document, the NSA hails the Prism program as “one of the most valuable, unique and productive accesses for NSA”.

It boasts of what it calls “strong growth” in its use of the Prism program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype”. There was also a 131% increase in requests for Facebook data, and 63% for Google.

The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers”.

The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired.

Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.

“The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.

“The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can’t say and average Americans can’t know.”

Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.

When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report”. According to the NSA, “over 2,000 Prism-based reports” are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.

In total, more than 77,000 intelligence reports have cited the PRISM program.

Jameel Jaffer, director of the ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.

“It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.

“This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.”

A senior administration official said in a statement: “The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.

“The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.

“This program was recently reauthorized by Congress after extensive hearings and debate.

“Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.

“The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target.”

Additional reporting by James Ball and Dominic Rushe

The New Propaganda Is Liberal; The New Slavery Is Digital

In Uncategorized on March 22, 2013 at 3:38 pm

Oldspeak:Today, we prefer to believe…..”Choice” is ubiquitous. Phones are “platforms” that launch every half-thought. There is Google from outer space if you need it. Caressed like rosary beads, the precious devices are borne heads-down, relentlessly monitored and prioritized. Their dominant theme is the self. Me. My needs….today’s digital slavery. Edward Said described this wired state in his book Culture and Imperialism as taking imperialism where navies could never reach. It is the ultimate means of social control because it is voluntary, addictive and shrouded in illusions of personal freedom.”  -John Pilger 
“In a would-be free and open society and especially in a society that aspires to be a democracy, propaganda and thought-control are crucial to the formation of public attitudes. In a nominal democracy, such as exists today in the United States, shaping the opinions of the masses is crucial to the appearance of legitimacy for the ruling elite. The public must be guided and persuaded to ratify the policies favored by the wealthy and well-connected, while insuring that the general public does not actually interfere with the policies and profits of the corporate rulers.” -Dr. Gary Allen Scott
Ever notice how all transactions, commerce, social interaction, work, play, research, learning, entertainment are being driven to digital networks and devices? Constantly encouraged to “Like us on Facebook” or “Tell us what you think on Facebook” or “Follow us on Twitter”Soliciting opinion via text message or internet . To share everything, all the time is seen as perfect, unlimited. Digitally reporting every piece of information about yourself is seen as cool. Face to face contact is devalued and constantly interrupted by beloved devices. Social atomization is self-directed and digital. Convenience, customization, personalization are all attributes we’re told will improve our lives increasing our personal freedom. These seductive appeals to our narcissism are  all part of “ultimate means of social control because it is voluntary, addictive and shrouded in illusions of personal freedom“.  All activity can and is effortlessly monitored in secret.  We are gleeful and willing slaves to beloved devices that watch and listen to us. The range of acceptable opinion is further shaped & narrowed in a subtle but insidious way. Concision.  Concision of thought via instagram/facebook & twitter. Concision does not lend itself to critical thought or analysis.  And it is a highly desirable trait in a thought controlled society. “Propaganda always wins if you allow it” -Leni Riefenstahl Don’t let it win. Take steps to liberate yourselves from the propaganda.  Take an intellectual self-defense course.

By John Pilger @ Truthout:

What is modern propaganda? For many, it is the lies of a totalitarian state. In the 1970s, I met Leni Riefenstahl and asked her about her epic films that glorified the Nazis. Using revolutionary camera and lighting techniques, she produced a documentary form that mesmerized Germans; her Triumph of the Will cast Hitler’s spell.

She told me that the “messages” of her films were dependent not on “orders from above” but on the “submissive void” of the German public. Did that include the liberal, educated bourgeoisie? “Everyone,” she said.

Today, we prefer to believe that there is no submissive void. “Choice” is ubiquitous. Phones are “platforms” that launch every half-thought. There is Google from outer space if you need it. Caressed like rosary beads, the precious devices are borne heads-down, relentlessly monitored and prioritized. Their dominant theme is the self. Me. My needs. Riefenstahl’s submissive void is today’s digital slavery.

Edward Said described this wired state in his book Culture and Imperialism as taking imperialism where navies could never reach. It is the ultimate means of social control because it is voluntary, addictive and shrouded in illusions of personal freedom.

Today’s “message” of grotesque inequality, social injustice and war is the propaganda of liberal democracies. By any measure of human behavior, this is extremism. When Hugo Chavez challenged it, he was abused in bad faith; and his successor will be subverted by the same zealots of the American Enterprise Institute, Harvard’s Kennedy School and the “human rights” organizations that have appropriated American liberalism and underpin its propaganda. Historian Norman Pollack calls this “liberal fascism.” He wrote, “All is normality on display. For [Nazi] goose-steppers, substitute the seemingly more innocuous militarization of the total culture. And for the bombastic leader, we have the reformer manque, blithely at work [in the White House], planning and executing assassination, smiling all the while.”

Whereas a generation ago, dissent and biting satire were allowed in the “mainstream,” today their counterfeits are acceptable and a fake moral zeitgeist rules. “Identity” is all, mutating feminism and declaring class obsolete. Just as collateral damage covers for mass murder, “austerity” has become an acceptable lie. Beneath the veneer of consumerism, a quarter of Greater Manchester is reported to be living in “extreme poverty.”

The militarist violence perpetrated against hundreds of thousands of nameless men, women and children by “our” governments is never a crime against humanity. Interviewing Tony Blair ten years on from his criminal invasion of Iraq, the BBC’s Kirsty Wark gifted him a moment he could only dream of. She allowed Blair to agonize over his “difficult” decision rather than call him to account for the monumental lies and bloodbath he launched. One is reminded of Albert Speer.

Hollywood has returned to its Cold War role, led by liberals. Ben Affleck’s Oscar-winning Argo is the first feature film so integrated into the propaganda system that its subliminal warning of Iran’s “threat” is offered as Obama is preparing, yet again, to attack Iran. That Affleck’s “true story” of good-guys-vs-bad-Muslims is as much a fabrication as Obama’s justification for his war plans is lost in PR-managed plaudits. As the independent critic Andrew O’Hehir points out, Argo is “a propaganda movie in the truest sense, one that claims to be innocent of all ideology.” That is, it debases the art of film-making to reflect an image of the power it serves.

The true story is that, for 34 years, the US foreign policy elite have seethed with revenge for the loss of the Shah of Iran, their beloved tyrant, and his CIA-designed state of torture. When Iranian students occupied the US embassy in Tehran in 1979, they found a trove of incriminating documents, which revealed that an Israeli spy network was operating inside the US, stealing top scientific and military secrets. Today, the duplicitous Zionist ally – not Iran – is the one and only nuclear threat in the Middle East.

In 1977, Carl Bernstein, famed for his Watergate reporting, disclosed that more than 400 journalists and executives of mostly liberal US media organizations had worked for the CIA in the past 25 years. They included journalists from The New York Times, Time, and the big TV broadcasters. These days, such a formal nefarious workforce is quite unnecessary. In 2010, The New York Times made no secret of its collusion with the White House in censoring the WikiLeaks war logs. The CIA has an “entertainment industry liaison office” that helps producers and directors remake its image from that of a lawless gang that assassinates, overthrows governments and runs drugs. As Obama’s CIA commits multiple murders by drone, Affleck lauds the “clandestine service … that is making sacrifices on behalf of Americans every day … I want to thank them very much.” The 2010 Oscar-winner Kathryn Bigelow’s Zero Dark Thirty, a torture-apology, was all but licensed by the Pentagon.

The US market share of cinema box-office takings in Britain often reaches 80 percent, and the small UK share is mainly for US co-productions. Films from Europe and the rest of the world account for a tiny fraction of those we are allowed to see. In my own film-making career, I have never known a time when dissenting voices in the visual arts are so few and so silent.

For all the hand-wringing induced by the Leveson inquiry, the “Murdoch mold” remains intact. Phone-hacking was always a distraction, a misdemeanor compared to the media-wide drumbeat for criminal wars. According to Gallup, 99 percent of Americans believe Iran is a threat to them, just as the majority believed Iraq was responsible for the 9/11 attacks. “Propaganda always wins,” said Leni Riefenstahl, “if you allow it.”

John Pilger

John Pilger, Australian-born, London-based journalist, film-maker and author. For his foreign and war reporting, ranging from Vietnam and Cambodia to the Middle East, he has twice won Britain’s highest award for journalism. For his documentary films, he won a British Academy Award and an American Emmy. In 2009, he was awarded Australia’s human rights prize, the Sydney Peace Prize. His latest film is “The War on Democracy.”

Facebook Censors Prominent Political Critics; Deactivated Accounts In Coordinated Purge

In Uncategorized on December 29, 2012 at 6:42 pm

8316464299 f197dba5e3 b Facebook Even Censors ART

Oldspeak:”The smart way to keep people passive and obedient is to strictly limit the spectrum of acceptable opinion, but allow very lively debate within that spectrum” -Noam Chomsky Facebook is the incarnation of Chomsky’s statement. This is hardly surprising. Meanwhile the rays of sunlight between the U.S. with its inverted totalitarian kleptocracy, and overt, hardcore totalitarian regimes grow fainter and fainter. It seems to be just as NSA Whistleblower William Binney said  says as he holds his thumb and forefinger close together,  “We are, like, that far from a turnkey totalitarian state.” Private, terms governed, electronic social networks, masquerading as public, free, all sharing democratic spaces. While we are constantly encouraged to share our feelings and everything else about ourselves on facebook, only a very narrow range of reality control approved feelings and things are acceptable. All others are removed. This is genius of this variant of Big Brother. It’s not something to fear or avoid. You love it. You tell it everything. You share everything gleefully. Where you are, who you’re with, when, why, how, how long, etc, etc, etc…. It’s the perfect narcissism cultivating surveillance tool. It is your friend.  Big Brother is your friend. “Ignorance Is Strength”

Update: Facebook Yields to Pressure: Reactivates Political Critics’ Accounts

By Washington’s Blog:

We’ve previously documented that the largest social media websites censor government criticism.

For example, Facebook pays low-wage foreign workers to delete certain content based upon a censorship list. For instance, Facebook deletes accounts created by any Palestinian resistance groups.

Today, Facebook deactivated the Facebook accounts of some of the leading American political critics.

For example, former diplomat and U.C. Berkeley Professor Emeritus Peter Dale Scott told us that his Facebook account was suddenly deactivated today without any justification.

So did Richard Gage, founder of Architects and Engineers for 9/11 Truth.

And Michael Rivero, owner of the popular website What Really Happened.

Infowars – one of the world’s most popular alternative media sites – confirms that accounts for the following political commentators have been shut down:

  • Kurt Nimmo, writer for Infowars.com and formerly Counterpunch
  • Aaron Dykes of Infowars
  • Jason from Infowars
  • Infowar Artist

Indeed, Facebook told an Infowars reporter last year not to post anything political:

Be careful making about making political statements on facebook … facebook is about building relationships not a platform for your political viewpoint. Don’t antagonize your base. Be careful and congnizat (sic) of what you are preaching.

And Infowars also confirms that the Facebook account for Natural News – one of the most popular alternative health sites – has been shut down.

Reports are that the Facebook accounts of a number of other political critics were suspended or deactivated today as well, including:

  • Robert M. Bowman, former director of the “Star Wars” defense program under President Ronald Reagan
  • Anthony J. Hilder, popular radio host
  • William Lewis
  • Wacboston
  • Michael Murphy
  • Mike Skuthan
  • Packy Savvenas
  • Sean Wright and Katherine Albrect

 

Wikileaks: Internal Report Indicates U.S. Department Of Homeland Security Monitoring Occupy Wall Street Protests

In Uncategorized on March 1, 2012 at 8:16 pm

Oldspeak:” ‘The internal DHS report emphasizes the need to “control protesters”, They talk about threats to ‘critical infrastructure’ and this fear that these protests are going to…make commerce difficult and people are going to start losing money. There is a kind of bottom line in analysis to what they’re talking about. There isn’t an emphasis on public safety in a way one would expect from a department that’s supposed to protect the homeland. It’s this sort of sense that they’re protecting somebody’s homeland, and they’re the folks who generally make all the money.Michael Hastings COINTELPRO lives on. New Department, same ole shit. Still more evidence that your government does not represent you. It represents those folks who ‘generally make all the money.’ The financial services, and myriad of other anational corporations who gamble with other people’s money, homes and livelihoods; they profit  handsomely as billions of others struggle with debt, poverty, hunger, sickness, homelessness and joblessness. The vast majority of Americans are de-politicized, minimally informed & apathetic, with has paved the way for replacement of often heralded democratic ideals with inverted totalitarianism. Democracy has been subverted by men with million-dollar smiles, and the unwitting masses clamoring for more divestment from their liberties. “

Related Stories:

Obama Administration Coordinated Local Police Crackdowns On Occupy Encampments Nationwide

Occupy Wall Street “Counterinsurgency” Has Infiltrated Protests; Seeks To Diffuse Message

FBI To Expand Domestic Surveillance Powers As Details Emerge Of Its Spy Campaign Targeting American Activists

By Allison Kilkenny @ In These Times:

Rolling Stone’s Michael Hastings last night posted a story on an internal DHS report entitled “SPECIAL COVERAGE: Occupy Wall Street,” dated October of last year. The five-page report, part of five million newly leaked documents obtained by Wikileaks, sums up the history of the movement and assesses its “impact” on the financial services and government facilities.

In an interview on Citizen Radio, Hastings talked about the monitoring by DHS and also the leaked emails from Stratfor, a leading private intelligence firm Hastings describes as the “shadow CIA.”

The process of combing through the huge amount of leaked documents has only just begun, but Hastings considers the revelation that the government was keeping tabs on OWS to be the biggest news so far to come out of the latest dump.

The monitoring, or spying (depending on how generous one is feeling), process included DHS scouring OWS-related Twitter feeds.

“[DHS] was following all of the social networking activity that was going on among Occupy Wall Street,” says Hastings. “Now, I’m sure this is going to be spun tomorrow as this continues to grow that, oh, it’s just benign, DHS just used open source material to do this, and that’s true, but the question is: why is a large government bureaucracy who’s mandated to protect the homeland…monitoring very closely a peaceful political protest movement? They’re not monitoring the Democratic National Committee, they’re not monitoring Young Republican meetings. They’re monitoring Occupy Wall Street.”

The report emphasizes the need to “control protesters,” terminology Hastings finds troubling, along with DHS’s assertion that OWS will likely become more violent. Hastings calls that prediction “quite a leap,” as there is no evidence so far that the overwhelmingly peaceful movement is prone to become violent.

“[The report] names all the sort of groups [DHS is] worried about, one being Anonymous, this hacktivist group, but it also names the other people in Occupy Wall Street: labor unions, student groups,” Hastings says.

One might expect to read some hand-wringing over public safety concerns in a government document, and yet the DHS document appears to be more concerned with protecting the mechanisms of the financial sector than in ensuring the safety of citizens who are exercising their First Amendment rights.

“They talk about threats to ‘critical infrastructure’ and this fear that these protests are going to…make commerce difficult and people are going to start losing money. There is a kind of bottom line in analysis to what they’re talking about. There isn’t an emphasis on public safety in a way one would expect from a department that’s supposed to protect the homeland. It’s this sort of sense that they’re protecting somebody’s homeland, and they’re the folks who generally make all the money.”

This same business-over-people bias is present in the second major leak involving the Stratfor emails. “When you go look at the back-and-forth, it’s all about, well, we have to protect lower Manhattan so the bankers can get to work on time.”

Hastings talks about two troubling tracks: In the DHS case, the U.S. government monitoring activist groups, and in the Stratfor case, large corporations paying a private intelligence firm to monitor other activist groups.

Dow Chemicals had Stratfor analyze the activities of Bhopal activists such as the Yes Men, who famously pranked the company by impersonating a Dow Chemical executive and publicly apologizing on the BBC for the Bhopal disaster that killed 8,000 people.

The list of Stratfor’s corporate clients is an impressive one, including Dow Chemicals and Coca-Cola. Clients are willing to pay the firm $40,000 for a subscription to Stratfor’s services (and additional huge sums of money for more services,) because the company bills itself as a private CIA, privy to high-level intelligence access.

“You have the DOW Chemicals situation, you have Coca-Cola hiring Stratfor to go after animal rights activists, to sort of keep tabs on them, and then also the question is: why would Stratfor have this Department of Homeland Security document, right? And the answer to that is Stratfor’s clients, or clearly Stratfor saw a business opportunity in keeping track, and figuring out how to handle protesters. In fact, in the email record…they’re talking about different tactics in lower Manhattan about, well, the streets are narrow down there, so if they push the protesters this way, or that way, that’s a better way to catch them. They’re drilling down into the best ways to kind of protect the financial services who are some of their clients.”

On Jan. 26, 2011, Fred Burton, the vice president of Stratfor, fired off an excited email to his colleagues: “Text Not for Pub. We have a sealed indictment on Assange. Pls protect.”

The question was: who did Burton mean by “we”?

“It’s like the Big Lebowski, right? The royal We,” says Hastings.

What Burton meant by “we” was the U.S. government.

“We know that the Department of Justice had been investigating Assange, and playing this game of oftentimes not explicitly saying what they were doing, but sort of threatening they would be doing this espionage investigation. We know that they’ve interviewed people in a grand jury, and then a few weeks ago with the Bradley Manning pre-trial that they were actually trying to make this espionage case against Assange,” says Hastings. “Burton claims that there in fact a secret U.S. indictment against Assange related, essentially, to espionage. That’s pretty big news.”

Hastings is braced for all of the typically condescending and dismissive remarks to come rolling in from the beltway in the wake of these latest leaks. In fact, the derision has already begun. One editor at The Atlantic called Wikileaks “a joke,” and dismissed the Stratfor emails out of hand.

Hastings expects others to say there’s no difference between a private intelligence firm and a newspaper or news bureau.

“I think that’s totally wrong. Journalists have sources and informants, but also our mission is to share that information with the public so the citizenry can make more informed decisions. Stratfor’s mission is to gather information so it can sell it to the highest bidder so corporations can essentially make more profit and get a competitive edge on their opponents,” he says.

That kind of knee-jerk dismissiveness strikes of bad journalism, according to Hastings. While no cheerleader for Wikileaks – during the interview, Hastings admitted there’s a lot of stuff one can criticize Wikileaks about, particularly the practice of releasing large amounts of data that hasn’t been reviewed very carefully – he still finds the overall work done by the group extremely newsworthy.

“What news organization has had a bigger impact than Wikileaks? Iraq war logs, Afghan war logs, the Cablegate. These are important stories. This is news. DHS was monitoring Occupy Wall Street. That’s a story, and it’s a significant story. We’re talking about Occupy Wall Street: one of the biggest grassroots, political movements that we’ve seen in a generation and the government’s response to that.”

One of the most worrying aspects to the Stratfor story is the privatizing of yet another typically goverment-only function. Like Blackwater, here is another shadowy private agency doing the work usually done by the U.S. government, a recipe, as we’ve learned time and time again, for unaccountability and disaster.

Also, Stratfor is ripe for the revolving door effect.

“It’s a chance for people who worked in government in these various intelligence agencies to, once they leave, to have lucrative positions where they’re able to — in the same way some politicians become lobbyists to ply off their old contacts — to have these great, well-paying positions where they can use their former intelligence contacts and sell their services in the corporate world,” says Hastings.

To naysayers claiming there’s nothing wrong with former government officials capitalizing on their particular skill sets, Hastings responds, “Once you start spying on activists, and peaceful protesters, then I would say that’s very troubling.”

Pentagon Working With FAA To Open U.S. Airspace To Combat Drones

In Uncategorized on February 15, 2012 at 4:10 pm

Oldspeak:”The FAA is working on proposed rules for integrating these drones, which are being eyed by law enforcement and private business to provide aerial surveillance.” Yes because, law enforcement  and ‘private businesses’ need “Global Hawks”, “Reapers”, and “Predator” drones to perpetually surveil anything, anyone and anywhere they like. The Pentagon gets paid to rent out its front-line, state of the art, military-grade surveillance and targeted assassination drones to local law enforcement and private corporations.  When you understand that the national crime rate is at its lowest rate since the 1970s, and at the same time America locks up more of its citizens than any nation on earth, you have to wonder: WHY? Why does the Corporatocracy get to surveil us with combat drones when ever they want for as long as they want, without our knowledge?  There has been no act of congress or provision in the constitution made for this. Thus it is blatant violation of the Posse Comitatus Act, yet it passes as with barely a stir in corporate media. Meanwhile propaganda campaigns have succeeded in normalizing and generating favorable opinions of drone strike on American citizens. When you consider the fact that nearly 80% of Americans “think the use of targeted killing against American citizens abroad who are suspected of terrorism is justified.” You see how frighteningly effective propaganda is with asserting control over the public mind. One only has to be SUSPECTED of terrorism, no substantiated evidence need be provided. Suspicion suffices. O_0 80% of Americans have been lulled into meekly relinquishing their civil liberties: due process, trial by jury, freedom of speech, right to petition, freedom of the press, freedom of assembly, freedom from unreasonable search and seizure. All as a result of a concentrated and relentless campaign of fear of the current “Emmanuel Goldstein”; “Muslim Extremists/Terrorists”. That fear is also being directed at “Domestic Extremists/Terrorists” as well.  Basically, we’re supposed to accept as true everyone that doesn’t assent to a “Western Style” Globo-imperialistic Cultural, Political, and Economic, and Environmental Hegemony based-system, is ostensibly a threat. And as we’ve seen with Daniel Manning, Julian Assange, Anwar Al-Alaki, and countless other ‘undesirables’ you’ve probably never heard of, the corporocrats have a myriad of ways to eliminate threats, up to and including summary execution. These drones continue to kill untold numbers of rarely mentioned civilians in a number of foreign countries around the world prosecuting the bogus “War On Terror”. What is there really to keep them from being turned on civilians in this country? The Ministry of Truth is in rare form.” “Ignorance Is Strength.” “War Is Peace.” “Freedom Is Slavery.”

The Terminator: The Skynet Funding Bill is passed. The system goes on-line August 4th, 1997. Human decisions are removed from strategic defense. Skynet begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time, August 29th. In a panic, they try to pull the plug…

15 years late, but no less precient….

Related Stories:

Unmanned Drones Fly Through Congress To Patrol U.S. Skies

America’s Secret Empire Of Drone Bases: Its Full Extent Revealed For The First Time

U.S. Conducts Targeted Killings With Predator Drones In Somalia

Obama Activates Robot Army: U.S. Flying Armed Predator Drones Over Libya

Obama’s Predator joke—no laughing matter: Faisal Shahzad witnessed drone strikes in Pakistan

The Terminator: The Skynet Funding Bill is passed. The system goes on-line August 4th, 1997. Human decisions are removed from strategic defense. Skynet begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time, August 29th. In a panic, they try to pull the plug.

By W.J. Hennigan @ Los Angeles Times

With a growing fleet of combat drones in its arsenal, the Pentagon is working with the Federal Aviation Administration to open U.S. airspace to its robotic aircraft.

As the wars in Iraq and Afghanistan wind down, the military says the drones that it has spent the last decade accruing need to return to the United States. When the nation first went to war after the Sept. 11, 2001, terrorist attacks, the military had around 50 drones. Now it owns nearly 7,500.

These flying robots need to be shipped home at some point, and the military then hopes to station them at various military bases and use them for many purposes. But the FAA doesn’t allow drones in national airspace without a special certificate.

These aircraft would be used to help train and retrain the pilots who fly the drones remotely, but they also are likely to find new roles at home in emergencies, helping firefighters see hot spots during wildfires or possibly even dropping water to combat the blaze.

At a recent conference about robotic technology in Washington, D.C., a number of military members spoke about the importance of integrating drones along with manned aircraft.

“The stuff from Afghanistan is going to come back,” Steve Pennington, the Air Force’s director of ranges, bases and airspace, said at the conference. The Department of Defense “doesn’t want a segregated environment. We want a fully integrated environment.”

That means the Pentagon wants the same rules for drones as any other military aircraft in the U.S. today.

Robotic technology was the focus of the Assn. for Unmanned Vehicle Systems International’s annual program review conference in Washington last week. For three days, a crowd made up of more than 500 military contractors, military personnel and industry insiders packed the Omni Shoreham Hotel to listen to the foremost experts on robots in the air, on the ground and in the sea.

Once the stuff of science-fiction novels, robotic technology now plays a major role day-to-day life. Automated machines help farmers gather crops. Robotic submarines scour the ocean floor for signs of oil beds. Flying drones have become crucial in hunting suspected terrorists in the Middle East.

Drones such as the jet-powered, high-flying RQ-4 Global Hawk made by Northrop Grumman Corp. have also been successful in providing aerial coverage of recent catastrophic events like the tsunami in Japan and earthquake in Haiti.

The FAA has said that remotely piloted aircraft aren’t allowed in national airspace on a wide scale because they don’t have an adequate “detect, sense and avoid” technology to prevent midair collisions.

The FAA does allow exceptions. Unarmed Predator drones are used to patrol the nation’s borders through special certifications. The FAA said it issued 313 such certificates last year.

The vast majority of the military’s drones are small — similar to hobby aircraft. The FAA is working on proposed rules for integrating these drones, which are being eyed by law enforcement and private business to provide aerial surveillance. The FAA expects to release the proposal on small drones this spring.

But the Pentagon is concerned about flying hundreds of larger drones, including Global Hawks as well as MQ-1 Predators and MQ-9 Reapers, both made by General Atomics Aeronautical Systems Inc. in Poway.

And last week Congress approved legislation that requires the FAA to have a plan to integrate drones of all kinds into national airspace on a wide scale by 2015.

The Army will conduct a demonstration this summer at its Dugway Proving Ground in Utah, testing ground-based radars and other sense-and-avoid technology, Mary Ottman, deputy product director with the Army, said at the conference.

These first steps are crucial, said Rep. Henry Cuellar (D-Texas), who co-chairs a bipartisan drone caucus with Rep. Howard P. “Buck” McKeon (R-Santa Clarita). Officially known as the Congressional Unmanned Systems Caucus, the panel was formed in 2009 to inform members of Congress on the far-reaching applications of drone technology.

McKeon also said he was in favor of moving along the process of integrating drones into civil airspace. This came before he was abruptly interrupted by an anti-drone female protester during a speech.

“These drones are playing God,” she said, carrying a banner that read “Stop Killer Drones.” She was part of a group that wants the end of drone strikes.

Within seconds, hotel security personnel surrounded the woman. She was carried out chanting, “Stop killer drones.”

McKeon, who stood silent throughout the brief protest, went on with his speech.

william.hennigan@latimes.com

Western Justice And The Refusal To Provide Transparency

In Uncategorized on January 25, 2012 at 6:20 pm

Anwar Awlaki and Barack Obama

Oldspeak:”In totalitarian states, government sanctioned extrajudicial killing passes with barely a stir. “On Saturday in Somalia, the U.S. fired missiles from a drone and killed the 27-year-old Lebanon-born, ex-British citizen Bilal el-Berjawi. His wife had given birth 24 hours earlier and the speculation is that the U.S. located him when his wife called to give him the news.” This is how the U.S. does business now. Judge, jury and executioner, while refusing to reveal alleged evidence justifying ‘targeted assassination’ of ‘terrorists’. Charging people with terrorism and making it impossible for them to contest charges, because doing so could precipitate their deaths. This policy, this assassination program, perfectly illustrates the barbarically low value Americans place on the lives of “others”. This policy purports that a 27 year old man, who just had a baby, is incapable of change. Once labeled a terrorist, this man has can never be anything else, and he must be utterly destroyed, expeditiously.  This policy allows to go unexamined, the conditions that exist in the globalized scarcity/austerity/cruelty dominated world that drive desperate and disenfranchised people to turn to terrorism to force their participation in the world community. Ten years ago, a neocon Bush Ambassador to Israel said “The United States government is very clearly on the record as against targeted assassinations. They are extrajudicial killings, and we do not support that.” 9/11 was the moment we went to the dark side, as illustrated in a scene out of the 1999 film the “The Siege” God help us if we don’t find our way back.

By Glenn Grunwald @ Salon:

On Saturday in Somalia, the U.S. fired missiles from a drone and killed the 27-year-old Lebanon-born, ex-British citizen Bilal el-Berjawi. His wife had given birth 24 hours earlier and the speculation is that the U.S. located him when his wife called to give him the news. Roughly one year ago, El-Berjawi was stripped of his British citizenship, obtained when his family moved to that country when he was an infant, through the use of a 2006 British anti-Terrorism law — passed after the London subway bombing — that the current government is using with increasing frequency to strip alleged Terrorists with dual nationality of their British citizenship (while providing no explanation for that act). El-Berjawi’s family vehemently denies that he is involved with Terrorism, but he was never able to appeal the decree against him for this reason:

Berjawi is understood to have sought to appeal against the order, but lawyers representing his family were unable to take instructions from him amid concerns that any telephone contact could precipitate a drone attack.

Obviously, those concerns were valid. So first the U.S. tries to assassinate people, then it causes legal rulings against them to be issued because the individuals, fearing for their life, are unable to defend themselves. Meanwhile, no explanation or evidence is provided for either the adverse government act or the assassination: it is simply secretly decreed and thus shall it be.

Exactly the same thing happened with U.S. citizen Anwar Awlaki. When the ACLU and CCR, representing Awlaki’s father, sued President Obama asking a federal court to enjoin the President from killing his American son without a trial, the Obama DOJ insisted (and the court ultimately accepted) that Awlaki himself must sue on his own behalf. Obviously, that was impossible given that the Obama administration was admittedly trying to kill him and surely would have done so the minute he stuck his head up to contact lawyers (indeed, the U.S. tried to kill him each time they thought they had located him, and then finally succeeded). So again in the Awlaki case: the U.S. targets someone for death, and then their inability to defend themselves is used as a weapon to deny their legal rights.

The refusal to provide transparency is also the same. Ever since Awlaki was assassinated, the Obama administration has steadfastly refused to disclose not only any evidence to justify the accusations of Terrorism against him, but also the legal theories it is using to assert the power to target U.S. citizens for death with no charges. A secret legal memo authorizing the Awlaki assassination, authored by Obama lawyers David Baron and Marty Lederman, remains secret. During the Bush years, Democratic lawyers vehemently decried the Bush DOJ’s refusal to release even OLC legal memoranda as tyrannical “secret law.” One of the lawyers most vocal during the Bush years about the evils of “secret law,” Dawn Johnsen (the never-confirmed Obama appointee to be chief of the OLC) told me back in October: “I absolutely do not support the concealment of OLC’s Awlaki memo . . . .The Obama administration should release either any existing OLC memo explaining why it believes it has the authority for the targeted killings or a comparably detailed legal analysis of its claimed authorities.”

Daily Beast report today says that the Obama administration “is finally going to break its silence” on the Awlaki killing, but here’s what they will and will not disclose:

In the coming weeks, according to four participants in the debate, Attorney General Eric Holder Jr. is planning to make a major address on the administration’s national-security record. Embedded in the speech will be a carefully worded but firm defense of its right to target U.S. citizens. . . .

An early draft of Holder’s speech identified Awlaki by name, but in a concession to concerns from the intelligence community, all references to the al Qaeda leader were removed. As currently written, the speech makes no overt mention of the Awlaki operation, and reveals none of the intelligence the administration relied on in carrying out his killing. 

In other words, they’re going to dispatch Eric Holder to assert that the U.S. Government has the power to target U.S. citizens for assassination by-CIA-drone, but will not even describe a single piece of evidence to justify the claim that Awlaki was guilty of anything. In fact, they will not even mention his name. As Marcy Wheeler said today:

This is simply an asinine compromise. We all know the Administration killed Awlaki. We all know the Administration used a drone strike to do so. . . .

The problem–the problem that strikes at the very heart of democratic accountability–is that the Administration plans to keep secret the details that would prove (or not) that Awlaki was what the Administration happily claims he is under the veil of anonymity, all while claiming that precisely that information is a state secret.

The Administration seems to be planning on making a big speech on counterterrorism–hey! it’s another opportunity to brag again about offing Osama bin Laden!–without revealing precisely those details necessary to distinguish this killing, and this country, from that of an unaccountable dictator.

The CIA seems to have dictated to our democratically elected President that he can’t provide the kind of transparency necessary to remain a democracy. We can kill you–they appear to be planning to say–and we’ll never have to prove that doing so was just. You’ll just have to trust us!

That, of course, is the heart and soul of this administration’s mentality when it comes to such matters, and why not? Between Republicans who always cheer on the killing of Muslims with or without any explanation or transparency, and Democrats who do so when their leader is the assassin, there is little political pressure to explain themselves. If anything, this planned “disclosure” makes the problem worse, since we will now have the spectacle of Eric Holder, wallowing in pomp and legal self-righteousness, finally defending the power that Obama already has seized — to assassinate U.S. citizens in secret and with no checks — but concealing what is most needed: evidence that Awlaki was what the U.S. Government claims he is. That simply serves to reinforce the message this Government repeatedly sends: as Marcy puts it, “We can kill you and we’ll never have to prove that doing so was just. You’ll just have to trust us!”The Yemen expert Gregory Johnsen added: “The US legal opinion on Awlaki is one thing, but it rests on assumptions made by the intelligence community, which won’t be revealed.”

This no longer seems radical to many — it has become normalized — because it’s been going on for so long now and, more important, it is now fully bipartisan consensus. But to see how extreme this all really is, to understand what a radical departure it is, just consider what George Bush’s neocon Ambassador to Israel, Martin Indyk, told the Israelis in 2001, as flagged by this Guardian Op-Ed by Mary Ellen O’Connell comparing Obama’s assassinations to Bush’s torture program:

The United States government is very clearly on the record as against targeted assassinations. They are extrajudicial killings, and we do not support that.

What George Bush’s Ambassador condemned to the Israelis’ face just a decade ago as something the nation was steadfastly against has now become a staple of government policy: aimed even at its own citizens, and carried out with complete secrecy. And those who spent years mocking the notion that “9/11 Changed Everything” will have no choice but to invoke that propagandistic mantra in order to defend this: what else is there to say?

Fake Terror Plots Using Paid Informants: The Tactics Of FBI ‘Entrapment’ Questioned

In Uncategorized on November 21, 2011 at 1:32 pm

Oldspeak:” Something to keep in mind, with news of the latest “foiled” terrorist plot. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.’-Trevor Aaronson  In the latest episode of “Emmanuel Goldstein Presents: All Fear, All The Time” “Same story, new patsy. A ‘lone wolf’ American citizen  Jose Pimentel becomes radicalized on the Internet, a paid “informant” escorts him to buy bomb-making material, and authorities arrest him in the nick of time to save us from a dangerous terrorist plot. This is all part of a disturbing pattern of behavior  by American law enforcement.  Manufacturing terrorism to coerce the  populace into relinquishing more and more of their civil and privacy rights. “Ignorance Is Strength”

Related Stories:

The Informants: How The FBI’s Massive Informant Network Actually Created Most Terrorist Plots “Foiled” In U.S. Since 9/11

FBI Counterterrorism Operations Scrutinizing Political Activists 

FBI To Expand Domestic Surveillance Powers As Details Emerge Of Its Spy Campaign Targeting American Activists 

Deserving Neither Liberty Nor Safety: The Patriot Act & The FBI’s Long-Term Assault on Civil Liberties In America 

By Paul Harris @ The Guardian UK:

David Williams did not have an easy life. He moved to Newburgh, a gritty, impoverished town on the banks of the Hudson an hour or so north of New York, at just 10 years old. For a young, black American boy with a father in jail, trouble was everywhere.

Williams also made bad choices. He ended up going to jail for dealing drugs. When he came out in 2007 he tried to go straight, but money was tight and his brother, Lord, needed cash for a liver transplant. Life is hard in Newburgh if you are poor, have a drug rap and need cash quickly.

His aunt, Alicia McWilliams, was honest about the tough streets her nephew was dealing with. “Newburgh is a hard place,” she said. So it was perhaps no surprise that in May, 2009, David Williams was arrested again and hit with a 25-year jail sentence. But it was not for drugs offences. Or any other common crime. Instead Williams and three other struggling local men beset by drug, criminal and mental health issues were convicted of an Islamic terrorist plot to blow up Jewish synagogues and shoot down military jets with missiles.

Even more shocking was that the organisation, money, weapons and motivation for this plot did not come from real Islamic terrorists. It came from the FBI, and an informant paid to pose as a terrorist mastermind paying big bucks for help in carrying out an attack. For McWilliams, her own government had actually cajoled and paid her beloved nephew into being a terrorist, created a fake plot and then jailed him for it. “I feel like I am in the Twilight Zone,” she told the Guardian.

Lawyers for the so-called Newburgh Four have now launched an appeal that will be held early next year. Advocates hope the case offers the best chance of exposing the issue of FBI “entrapment” in terror cases. “We have as close to a legal entrapment case as I have ever seen,” said Susanne Brody, who represents another Newburgh defendant, Onta Williams.

Some experts agree. “The target, the motive, the ideology and the plot were all led by the FBI,” said Karen Greenberg, a law professor at Fordham University in New York, who specialises in studying the new FBI tactics.

But the issue is one that stretches far beyond Newburgh. Critics say the FBI is running a sting operation across America, targeting – to a large extent – the Muslim community by luring people into fake terror plots. FBI bureaux send informants to trawl through Muslim communities, hang out in mosques and community centres, and talk of radical Islam in order to identify possible targets sympathetic to such ideals. Or they will respond to the most bizarre of tip-offs, including, in one case, a man who claimed to have seen terror chief Ayman al-Zawahiri living in northern California in the late 1990s.

That tipster was quickly hired as a well-paid informant. If suitable suspects are identified, FBI agents then run a sting, often creating a fake terror plot in which it helps supply weapons and targets. Then, dramatic arrests are made, press conferences held and lengthy convictions secured.

But what is not clear is if many real, actual terrorists are involved.

Fort Dix FiveThe homes of the Fort Dix Five were raided by the FBI. Photograph: Joseph Kaczmarek/AP

Another “entrapment” case is on the radar too. The Fort Dix Five – accused of plotting to attack a New Jersey army base – have also appealed against their convictions. That case too involved dubious use of paid informants, an apparent over-reach of evidence and a plot that seemed suggested by the government.

Burim Duka, whose three brothers were jailed for life for their part in the scheme, insists they did not know they were part of a terror plot and were just buying guns for shooting holidays in a deal arranged by a friend. The “friend” was an informant who had persuaded another man of a desire to attack Fort Dix.

Duka is convinced his brothers’ appeal has a good chance. “I am hopeful,” he told the Guardian.

But things may not be that easy. At issue is the word “entrapment”, which has two definitions. There is the common usage, where a citizen might see FBI operations as deliberate traps manipulating unwary people who otherwise were unlikely to become terrorists. Then there is the legal definition of entrapment, where the prosecution merely has to show a subject was predisposed to carry out the actions they later are accused of.

Theoretically, a simple expression, like support for jihad, might suffice, and in post-9/11 America neither judges nor juries tend to be nuanced in terror trials. “Legally, you have to use the word entrapment very carefully. It is a very strict legal term,” said Greenberg.

But in its commonly understood usage, FBI entrapment is a widespread tactic. Within days of the 9/11 terror attacks, FBI director Robert Mueller issued a memo on a new policy of “forward leaning – preventative – prosecutions”.

Central to that is a growing informant network. The FBI is not choosy about the people it uses. Some have criminal records, including attempted murder or drug dealing or fraud. They are often paid six-figure sums, which critics say creates a motivation to entrap targets. Some are motivated by the promise of debts forgiven or immigration violations wiped clean. There has also been a relaxing of rules on what criteria the FBI needs to launch an investigation.

Often they just seem to be “fishing expeditions”. In the Newburgh case, the men involved met FBI informant Shahed Hussain simply because he happened to infiltrate their mosque. In southern California, FBI informant Craig Monteilh trawled mosques posing as a Muslim and tried to act as a magnet for potential radicals.

Monteilh, who bugged scores of people, is a convicted felon with serious drug charges to his name. His operation turned up nothing. But Monteilh’s professed terrorist sympathy so unnerved his Muslim targets that they got a restraining order against him and alerted the FBI, not realising Monteilh was actually working on the bureau’s behalf.

Muslim civil rights groups have warned of a feeling of being hounded and threatened by the FBI, triggering a natural fear of the authorities among people that should be a vital defence against real terror attacks. But FBI tactics could now be putting off many people from reporting tip-offs or suspicious individuals.

“They are making mosques suspicious of anybody. They are putting fear into these communities,” said Greenberg. Civil liberties groups are also concerned, seeing some FBI tactics as using terrorism to justify more power. “We are still seeing an expansion of these tools. It is a terrible prospect,” said Mike German, an expert at the American Civil Liberties Union and a former FBI agent who has worked in counter-terrorism.

German said suspects convicted of plotting terror attacks in some recent FBI cases bore little resemblance to the profile of most terrorist cells. “Most of these suspect terrorists had no access to weapons unless the government provided them. I would say that showed they were not the biggest threat to the US,” German said.

“Most terrorists have links to foreign terrorist groups and have trained in terrorism training camps. Perhaps FBI resources should be spent finding those guys.”

Also, some of the most serious terrorist attacks carried out in the US since 9/11 have revolved around “lone wolf” actions, not the sort of conspiracy plots the FBI have been striving to combat. The 2010 Times Square bomber, Faisal Shahzad, only came to light after his car bomb failed to go off properly. The Fort Hood killer Nidal Malik Hasan, who shot dead 13 people on a Texas army base in 2009, was only discovered after he started firing. Both evaded the radar of an FBI expending resources setting up fictional crimes and then prosecuting those involved.

Yet, as advocates for those caught up in “entrapment” cases discover, there is little public or judicial sympathy for them. Even in cases where judges have admitted FBI tactics have raised serious questions, there has been no hesitation in returning guilty verdicts, handing down lengthy sentences and dismissing appeals.

The Liberty City Seven are a case in point. The 2006 case involved an informant, Elie Assaad, with a dubious past (he was once arrested, but not charged, for beating his pregnant wife). Assaad was let loose with another informant on a group of men in Liberty City, a poor, predominantly black, suburb of Miami. The targets were followers of a cult-like group called The Seas of David, led by former Guardian Angel Narseal Batiste.

The group was, perhaps, not even Muslim, as its religious practices involved Bible study and wearing the Star of David. Yet Assaad posed as an Al-Qaida operative, and got members of the group to swear allegiance. Transcripts of the “oath-taking” ceremony are almost farcical. Batiste repeatedly queries the idea and appears bullied into it. In effect, defence lawyers argued, the men were confused, impoverished members of an obscure cult.

Yet targets the group supposedly entertained attacking included the Sears Tower in Chicago, Hollywood movie studios and the Empire State Building. Even zealous prosecutors, painting a picture of dedicated Islamic terrorists, admitted any potential plots were “aspirational”, given the group had no means to carry them out.

Nonetheless, they were charged with seeking to wage war against America, plotting to destroy buildings and supporting terrorism. Five of them got long jail sentences. Assaad, who was recently arrested in Texas for attempting to run over a policeman, was paid $85,000 for his work.

This year the jailed Liberty City men launched an appeal and last week judgment was handed down. They lost, and officially remain Islamic terrorists hell-bent on destroying America. Not that their supporters see it that way.

“Our country is no safer as a result of the prosecution of these seven impoverished young men from Liberty City,” said Batiste’s lawyer, Ana Jhones.

“This prosecution came at great financial cost to our government, and at a terrible emotional cost to these defendants and their families. It is my sincere belief that our country is less safe as a result of the government’s actions in this case.”

Federal Reserve Bank Plans “Social Listening Platform” To Identify “Key Bloggers”, Monitor Billions Of Conversations Online Via Social Media

In Uncategorized on October 3, 2011 at 8:24 pm

Oldspeak:”A few short months after the Pentagon requested proposals to help it “get better at both detecting and conducting propaganda campaigns on social mediamonitoring the internet via its  Social Media in Strategic Communication (SMISC) program, The Federal Reserve is following suit, requesting proposals to allow it to develop a “Social Listening Platform” whose function is to “gather data from various social media outlets and news sources.” It will “monitor billions of conversations and generate text analytics based on predefined criteria.”The Fed’s desired product should be able to “determine the sentiment [ED:LOL] of a speaker or writer with respect to some topic or document”… “The solution must be able to gather data from the primary social media platforms – Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.” Most importantly, the “Listening Platform” should be able to “Handle crisis situations, Continuously monitor conversations, and Identify and reach out to key bloggers and influencers.”  Why does this a bank need monitor conversations on the internet? I can sorta understand why the Pentagon would need to, but a bank needs to know the “sentiment” of speakers and writers?”

By Washington’s Blog:

The Federal Reserve Bank of the United States, … in a Request for Proposals filed to companies that are Fed vendors, is requesting the creation of a “Social Listening Platform” whose function is to “gather data from various social media outlets and news sources.” It will “monitor billions of conversations and generate text analytics based on predefined criteria.”The Fed’s desired product should be able to “determine the sentiment [ED:LOL] of a speaker or writer with respect to some topic or document”… “The solution must be able to gather data from the primary social media platforms – Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.” Most importantly, the “Listening Platform” should be able to “Handle crisis situations, Continuously monitor conversations, and Identify and reach out to key bloggers and influencers.” Said otherwise, the Fed has just entered the counterespionage era and will be monitoring everything written about it anywhere in the world.

***

From the key section of the RFP, presented in its entirety below:

I. Introduction

Social media platforms are changing the way organizations are communicating to the public Conversations are happening all the time and everywhere.
There is need for the Communications Group to be timely and proactively aware of the reactions and opinions expressed by the general public as it relates to the Federal Reserve and its actions on a variety of subjects.

II. Social Listening Platforms

Social media listening platforms are solutions that gather data from various social media outlets and news sources. They monitor billions of conversations and generate text analytics based on predefined criteria. They can also determine the sentiment of a speaker or writer with respect to some topic or document.
The information gathered can guide the organizations public relations group in assessing the effectiveness of communication strategies.

Here are some of the services it can offer:

o Track reach and spread of your messages and press releases 
o Handle crisis situations 
o Continuously monitor conversations 
o Identify and reach out to key bloggers and influencers 
o Spot emerging trends, discussions themes and topics

A. Geographic scope of social media sites

The solution must support content coming from different countries and geographical regions. It should also support multiple languages.

B. Content and Data Types

The solution must be able to gather data from the primary social media platforms –Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.

C. Reports and Metrics

The solution must provide real-time monitoring of relevant conversations. It should provide sentiment analysis (positive, negative or neutral) around key conversational topics.

It must be able to provide summaries or high level overviews of a specific set of topics. It should have a configurable dashboard that can easily be accessed by internal analysts or management. The dashboard must support customization by user or group access.

The solution should provide an alerting mechanism that automatically sends out reports or notifications based a predefined trigger.

D. FRBNY Technology Integration

The solution must be able to integrate with existing FRBNY technologies such as: Google Search appliance, Lotus notes suite and web trends.It must have support for single sign on or windows integrated authentication.

E. Cost Structure

The solution should offer a flexible pricing structure that can support multiple user licensing. It should also have the option to base pricing on content volume and usage. Supplier acknowledges an understanding of and agrees to comply with the above minimum solutions requirements.

Full RFP:

Frbny Social Media Rfp 

The Federal Reserve Plans To Identify “Key Bloggers” And Monitor Billions Of Conversations About The Fed On Facebook, Twitter, Forums And Blogs

By The Economic Collapse:

The Federal Reserve wants to know what you are saying about it.  In fact, the Federal Reserve has announced plans to identify “key bloggers” and to monitor “billions of conversations” about the Fed on Facebook, Twitter, forums and blogs.  This is yet another sign that the alternative media is having a dramatic impact.  As first reported on Zero Hedge, the Federal Reserve Bank of New York has issued a “Request for Proposal” to suppliers who may be interested in participating in the development of a “Sentiment Analysis And Social Media Monitoring Solution”.  In other words, the Federal Reserve wants to develop a highly sophisticated system that will gather everything that you and I say about the Federal Reserve on the Internet and that will analyze what our feelings about the Fed are.  Obviously, any “positive” feelings about the Fed would not be a problem.  What they really want to do is to gather information on everyone that views the Federal Reserve negatively.  It is unclear how they plan to use this information once they have it, but considering how many alternative media sources have been shut down lately, this is obviously a very troubling sign.

You can read this “Request for Proposal” right here.  Posted below are some of the key quotes from the document (in bold) with some of my own commentary in between the quotes….

“The intent is to establish a fair and equitable partnership with a market leader who will who gather data from various social media outlets and news sources and provide applicable reporting to FRBNY. This Request for Proposal (“RFP”) was created in an effort to support FRBNY’s Social Media Listening Platforms initiative.”

A system like this is not cheap.  Apparently the Federal Reserve Bank of New York believes that gathering all of this information is very important.  In recent years, criticism of the Federal Reserve has become very intense, and most of this criticism has been coming from the Internet.  It has gotten to the point where the Federal Reserve Bank of New York has decided that it had better listen to what is being said and find out who is saying it.

“Social media listening platforms are solutions that gather data from various social media outlets and news sources.  They monitor billions of conversations and generate text analytics based on predefined criteria.  They can also determine the sentiment of a speaker or writer with respect to some topic or document.”

The Federal Reserve Bank of New York intends to listen in on “billions of conversations” and to actually determine the “sentiment” of those that are participating in those conversations.

Of course it will be those conversations that are “negative” about the Federal Reserve that will be setting off the alarm bells.

“Identify and reach out to key bloggers and influencers”

Uh oh.  So they plan to “identify” key bloggers and influencers?

What exactly do they plan to do once they “identify” them?

“The solution must be able to gather data from the primary social media platforms –Facebook, Twitter, Blogs, Forums and YouTube.”

Hopefully you understand this already, but nothing posted on the Internet is ever anonymous.  Everything on the Internet is gathered by a vast host of organizations and is used for a wide variety of purposes.  Data mining has become a billion dollar industry, and it is only going to keep growing.

You may think that you are “anonymous” when you criticize organizations like the Fed, but the truth is that if you are loud enough they will see it and they will make a record of it.

“The solution must provide real-time monitoring of relevant conversations.  It should provide sentiment analysis (positive, negative or neutral) around key conversational topics.”

Why do they need to perform “sentiment analysis”?

If someone is identified as being overly “negative” about the Fed, what will they do about it?

“The solution should provide an alerting mechanism that automatically sends out reports or notifications based a predefined trigger.”

This sounds very much like the kind of “keyword” intelligence gathering systems that are currently in use by major governments around the globe.

Very, very creepy stuff.

Are you disturbed yet?

For those of us that write about the Federal Reserve a lot, this is very sobering news.

I wonder what the Fed will think about the following articles that I have posted on this site….

*Unelected, Unaccountable, Unrepentant: The Federal Reserve Is Using Your Money To Bail Out European Commercial Banks Once Again

*Celebrating Independence Yet Enslaved To Debt

*19 Reasons Why The Federal Reserve Is At The Heart Of Our Economic Problems

*Is Ben Bernanke A Liar, A Lunatic Or Is He Just Completely And Totally Incompetent?

*10 Things That Would Be Different If The Federal Reserve Had Never Been Created

What is their “Social Media Monitoring Solution” going to think about those articles?

Unfortunately, this is all part of a very disturbing trend.

Recently, a very creepy website known as “Attack Watch” was launched to gather information on those saying “negative” things about Barack Obama.

Suddenly, everyone seems obsessed with what you and I are saying.

This just shows how the power of the alternative media is growing.

Not only that, but it seems as though the government also wants to gather as much information on all of us as possible.

For example, a new rule is being proposed by the Department of Health and Human Services that would force health insurance companies to submit detailed health care information about all of their customers to the federal government.

Every single day our privacy is being stripped away a little bit more.

But now it is often not just enough for them to know what we are doing and saying.  Instead, the “authorities” are increasingly stepping in to silence important voices.

One of the most recent examples of this was when Activistpost was taken downby Google.  We are still awaiting word on why this was done.

Sadly, the silencing of Activistpost is far from an isolated incident.

Hordes of YouTube accounts have been shut down for their political viewpoints.

Quite a few very prominent alternative media websites have been censored or attacked because of what they stand for.

So why is this happening?  Well, it turns out that the power of the alternative media is growing.  According to a new survey by the Pew Research Center for The People & The Press, 43 percent of Americans say that they get their news on national and international issues from the Internet.  Back in 1999, that figure was sitting at just 6 percent.

The American people are sick and tired of getting “canned news”, and they are increasingly turning to the Internet in a search for the truth.

As I have written about previously, the mainstream media in this country is overwhelmingly dominated by just 6 very powerful corporations….

Today, ownership of the news media has been concentrated in the hands of just six incredibly powerful media corporations.  These corporate behemoths control most of what we watch, hear and read every single day.  They own television networks, cable channels, movie studios, newspapers, magazines, publishing houses, music labels and even many of our favorite websites. Sadly, most Americans don’t even stop to think about who is feeding them the endless hours of news and entertainment that they constantly ingest.  Most Americans don’t really seem to care about who owns the media.  But they should.  The truth is that each of us is deeply influenced by the messages that are constantly being pounded into our heads by the mainstream media.  The average American watches 153 hours of television a month.  In fact, most Americans begin to feel physically uncomfortable if they go too long without watching or listening to something.  Sadly, most Americans have become absolutely addicted to news and entertainment and the ownership of all that news and entertainment that we crave is being concentrated in fewer and fewer hands each year.

The “news” that we get from various mainstream sources seems to always be so similar.  It is as if nearly all mainstream news organizations are reading from the same script.  The American people know that they are not getting the whole truth and they have been increasingly looking to alternative sources.

The monopoly over the news that the mainstream media once possessed has been broken.  The alternative media is now creating some huge problems for organizations that were once very closely protected by the mainstream media.

The American people are starting to wake up and they are starting to get very upset about a lot of the corruption that has been going on in our society.

But it turns out that the “authorities” don’t like it too much when Americans try to actually exercise free speech in America today.  For example, you can see recent video of female protesters in New York City being penned in by police and then brutally maced right here.

Are you sickened by that?

You should be.

What the “authorities” want is for us to shut up, sit in our homes and act as if nothing wrong is happening.

Meanwhile, they seem determined to watch us more closely than ever.

So are you going to be afraid to talk negatively about the Federal Reserve now that you know that they are going to be watching what you say on the Internet?

 

 

 

 

 

 

 

 

 

J.P. Morgan Chase Makes Largest Ever Donation Of $4.6 Million To NYPD Foundation

In Uncategorized on October 3, 2011 at 1:59 pm


Oldspeak
: How bout that. The money will go to more ‘security monitoring software”. The corporatocracy is funding the expansion and strengthening of the police state just in time to literally arrest dissenters protesting its practices; who demand real accountability for precipitating & contributing to the collapse of the global economy.  This coming on the heels J.P. Morgan Chase back in March purchasing a 4oo million dollar stake in Twitter Inc. Curiously, there have been reports of censorship of occupy wall street protests by Twitter since then. We are witnessing consolidation of control over security and communications apparatus in this rapidly expanding and insidiously stealthy totalitarian state. The avenues for dissent and resistance are being constricted and cut off ahead of the soon to come collapse. “The Way Forward” indeed.

By Eric Allen Bell @ EricAllenBell.org: 

JPMorgan Chase recently donated an unprecedented $4.6 million to the New York City Police Foundation.
The gift was the largest in the history of the foundation and will enable the New York City Police Department to strengthen security in the Big Apple. The money will pay for 1,000 new patrol car laptops, as well as security monitoring software in the NYPD’s main data center.
New York City Police Commissioner Raymond Kelly sent CEO and Chairman Jamie Dimon a note expressing “profound gratitude” for the company’s donation.
“These officers put their lives on the line every day to keep us safe,” Dimon said. “We’re incredibly proud to help them build this program and let them know how much we value their hard work.”

Facebook Tracks You Online, Even After You Log Out

In Uncategorized on September 29, 2011 at 2:48 pm

Oldspeak:Whenever you visit a web page that contains a Facebook button or widget, your browser is still sending details of your movements back to Facebook. Even if you are logged out, Facebook still knows and can track every page you visit. When you log out of Facebook, rather than deleting its tracking cookies, the site merely modifies them, maintaining account information and other unique tokens that can be used to identify you. …the only solution is to delete every Facebook cookie in your browser, or to use a separate browser for Facebook interactions.” -Nik Cubrilovic  The surveillance state as indispensable social network. Just a FYI.

By Asher Moses @ The Sunday Morning Herald:

Facebook cookie collection 'could be dangerous' (Video Thumbnail)

Click to play video

More video Replay video

An Australian technologist has caused a global stir after discovering Facebook tracks the websites its users visit even when they are logged out of the social networking site.

Separately, Facebook’s new Timeline feature, launched last week, has been inadvertently accessed by users early, revealing a feature that allows people to see who removed them from their friends’ lists.

Facebook’s changes – which turn profiles into a chronological scrapbook of the user’s life – are designed to let its 800 million members share what they are reading, listening to or watching in real-time. But they have been met with alarm by some who fear over-sharing.

Causing a stir ... Nik Cubrilovic.

Causing a stir … Australian Nik Cubrilovic first spotted the tracking issuePhoto: Flickr.com/e27singapore

Of course, Facebook’s bottom line improves the more users decide to share. Reports suggest that Facebook staff refer internally to “Zuck’s law“, which describes Facebook founder Mark Zuckerberg’s belief that every year people share twice as much online – a trend that has caused Facebook’s valuation to skyrocket towards $US100 billion.

“Facebook is a lot more than a social network and ultimately wants to be the premier platform on which people experience, organise and share digital entertainment,” said Ovum analyst Eden Zoller.

But in alarming new revelations, Wollongong-based Nik Cubrilovic conducted tests, which revealed that when you log out of Facebook, rather than deleting its tracking cookies, the site merely modifies them, maintaining account information and other unique tokens that can be used to identify you.

Facebook founder shows off the new Facebook profiles at the F8 conference last week.Facebook founder Mark Zuckerberg shows off the new Facebook profiles at the F8 conference last week. Photo: AFP

Whenever you visit a web page that contains a Facebook button or widget, your browser is still sending details of your movements back to Facebook, Cubrilovic says.

“Even if you are logged out, Facebook still knows and can track every page you visit,” Cubrilovic wrote in a blog post.

“The only solution is to delete every Facebook cookie in your browser, or to use a separate browser for Facebook interactions.”

Facebook's new Timelines feature creates a chronological scrapbook of major events in your life.Facebook’s new Timelines feature creates a chronological scrapbook of major events in your life. Photo: AFP

Cubrilovic is working on a new unnamed start-up but has previously been involved with large technology blog TechCrunch and online storage company Omnidrive.

He backed up his claims with detailed technical information. His post was picked up by technology news sites around the world but Facebook has yet to provide a response to Fairfax Media and others.

David Vaile, executive director of UNSW’s Cyberspace Law and Policy Centre, said Facebook’s changes were a ”breathtaking and audacious grab for whole life data”. In an email interview he accused the social networking site of attempting to ”normalise gross and unsafe overexposure”.

”While initially opt-in, the default then seems to be expose everything, and Facebook have form in the past for lowering protection after people get used to a certain level of initial protection – bait and switch,” he said.

Stephen Collins, spokesman for the online users’ lobby group Electronic Frontiers Australia, said he did not believe Cubrilovic’s revelations would see people turn away from the site in droves but he hoped users became more engaged with the issue.

”Facebook, once again, are doing things that are beyond most users’ capacity to understand while reducing their privacy. That’s just not cool. I’d go so far as to say it’s specifically unethical,” he said.

Collins said the only reason he still uses Facebook is to help his 14-year-old daughter on the site. He said it took him an hour to lock down his profile to his satisfaction following the recent changes.

”It’s just not good enough. The default setting for any site should be ‘reveal nothing about me unless I make a specific choice otherwise’,” he said.

Others have compared Facebook’s changes to Bentham’s panopticon – a design for a prison where the guards can see all inmates but where the inmates never know whether they’re being watched. The result, applied to Facebook, is that real-time sharing means we always feel like we’re being watched and this then influences our behaviour.

Cubrilovic said he tried to contact Facebook to inform it of his discovery but did not get a reply. He said there were significant risks to the privacy of users, particularly those using public terminals to access Facebook.

“Facebook are front-and-centre in the new privacy debate just as Microsoft were with security issues a decade ago,” Cubrilovic said.

“The question is what it will take for Facebook to address privacy issues and to give their users the tools required to manage their privacy and to implement clear policies – not pages and pages of confusing legal documentation, and ‘logout’ not really meaning ‘logout’.”

The Australian Privacy Commissioner, Timothy Pilgrim, would not comment specifically on Cubrilovic’s findings but said generally social networking sites need to clearly spell out when browsing information is being collected, the purposes for which it may be used and whether it will be disclosed to other organisations.

“Good practice would also be to allow for users to opt out of having it collected,” said Pilgrim.

The findings come after technology industry observer Dave Winer declared Facebook was scaring him because the new interface for third-party developers allows them to post items to your Facebook feed without your intervention. This has been dubbed “frictionless sharing”.

Meanwhile, Facebook’s Timeline feature, which shows users a timeline of their activity on the site throughout the years, has not officially been switched on but many are using it already. Instructions can be found here.

But inadvertently or by design, the Timeline feature also lets people see which users had “unfriended” them by following a few simple steps:

1. Enable the new Timeline feature.
2. Pick a year in the timeline and locate the Friends box.
3. Click on “Made X New Friends”.
4. Scroll through the list and when you see an “Add Friend” box, those are the people either you have unfriended or vice-versa.

However, it appears Facebook has now disabled this function, describing it to gadget blog Gizmodo as a “bug”.

Finally, security researchers were quick to hose down a hoax that spread through the social network, claiming that Facebook was planning to start charging users for the new features.

twitter This reporter is on Twitter: @ashermoses

 

 

Follow

Get every new post delivered to your Inbox.

Join 405 other followers