"In a time of universal deceit telling the truth is a revolutionary act." -George Orwell

Posts Tagged ‘Twitter’

UPSTREAM, They Know Much More About You Than You Think

In Uncategorized on August 1, 2013 at 8:18 pm
bamford_1-081513.jpg

The headquarters of the National Security Agency, Fort Meade, Maryland

Oldspeak: “Within days of Snowden’s documents appearing in The Guardian and The Washington Post, revealing several of the National Security Agency’s extensive domestic surveillance programs, bookstores reported a sudden spike in the sales of George Orwell’s classic dystopian novel 1984. On Amazon.com, the book made the “Movers & Shakers” list and skyrocketed 6,021 percent in a single day. Written sixty-five years ago, it described a fictitious totalitarian society where a shadowy leader known as “Big Brother” controls his population through invasive surveillance. “The telescreens,” Orwell wrote, “have hidden microphones and cameras. These devices, alongside informers, permit the Thought Police to spy upon everyone….” -James Bamford

“The most awesome and near omniscient surveillance network ever created by man has been revealed in much of its grotesquely invasive corptalitarian horror. And what was American’s response? CONSUME.  Sales of the script to the horror show we are currently living Orwell’s “1984″ exploded 6,000 PERCENT. No critical thoughts given to the personal telescreens/tracking device/listening device/thought recorder/microwave radiation emitter a.k.a. smart phones. Sheeple literally responded to news that all their actions on the internet are being watched, stored and analyzed, by buying a dystopian novel on the internet. All those people should consider themselves a “selector”. :-)  More and more I’m seeing all these hip sexy cool invitations to “share everything” via your telescreen. Incessant exhortations to use your telescreen to buy everything, check things, secure things, pay things, scan things, tweet things, like things, post things, photograph things, record things, ask things, watch things, play things, listen to things, control devices, read, get medical advice, report crime, inform on others, etc, etc, etc…. Never mind that your ever expanding constellation of ever more convenient and personalizable apps are watching youSoon, your televisions, dvr’s and video games will watch you too. Keep consuming, keep providing free content, that make it ever easier to target more marketing at you to buy more shit you don’t need. When will we wake from our hyperconsumptive soma coma?. I’ll tell you one thing though, somebody is making an ass ton of money collecting and analyzing this exponentially expanding flow of digital content. ” -OSJ

By James Bamford @ The New York Review Of Books:

In mid-May, Edward Snowden, an American in his late twenties, walked through the onyx entrance of the Mira Hotel on Nathan Road in Hong Kong and checked in. He was pulling a small black travel bag and had a number of laptop cases draped over his shoulders. Inside those cases were four computers packed with some of his country’s most closely held secrets.

Within days of Snowden’s documents appearing in The Guardian and The Washington Post, revealing several of the National Security Agency’s extensive domestic surveillance programs, bookstores reported a sudden spike in the sales of George Orwell’s classic dystopian novel 1984. On Amazon.com, the book made the “Movers & Shakers” list and skyrocketed 6,021 percent in a single day. Written sixty-five years ago, it described a fictitious totalitarian society where a shadowy leader known as “Big Brother” controls his population through invasive surveillance. “The telescreens,” Orwell wrote, “have hidden microphones and cameras. These devices, alongside informers, permit the Thought Police to spy upon everyone….”

Today, as the Snowden documents make clear, it is the NSA that keeps track of phone calls, monitors communications, and analyzes people’s thoughts through data mining of Google searches and other online activity. “Any sound that Winston made, above the level of a very low whisper, would be picked up by it,” Orwell wrote about his protagonist, Winston Smith.

There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.

Of course the US is not a totalitarian society, and no equivalent of Big Brother runs it, as the widespread reporting of Snowden’s information shows. We know little about what uses the NSA makes of most information available to it—it claims to have exposed a number of terrorist plots—and it has yet to be shown what effects its activities may have on the lives of most American citizens. Congressional committees and a special federal court are charged with overseeing its work, although they are committed to secrecy, and the court can hear appeals only from the government.

Still, the US intelligence agencies also seem to have adopted Orwell’s idea of doublethink—“to be conscious of complete truthfulness,” he wrote, “while telling carefully constructed lies.” For example, James Clapper, the director of national intelligence, was asked at a Senate hearing in March whether “the NSA collect[s] any type of data at all on millions or hundreds of millions of Americans.” Clapper’s answer: “No, sir…. Not wittingly.”

Three months later, following the revelations of the phone-log program in which the NSA collects telephone data—the numbers of both callers and the length of the calls—on hundreds of millions of Americans, Clapper switched to doublethink. He said that his previous answer was not a lie; he just chose to respond in the “least untruthful manner.” With such an Orwellian concept of the truth now being used, it is useful to take a look at what the government has been telling the public about its surveillance activities over the years, and compare it with what we know now as a result of the top secret documents and other information released by, among others, the former NSA contract employee Edward Snowden.

Looking back, the NSA and its predecessors have been gaining secret, illegal access to the communications of Americans for nearly a century. On July 1, 1920, a slim balding man in his early thirties moved into a four-story townhouse at 141 East 37th Street in Manhattan. This was the birth of the Black Chamber, the NSA’s earliest predecessor, and it would be hidden in the nondescript brownstone. But its chief, Herbert O. Yardley, had a problem. To gather intelligence for Woodrow Wilson’s government, he needed access to the telegrams entering, leaving, and passing through the country, but because of an early version of the Radio Communications Act, such access was illegal. With the shake of a hand, however, Yardley convinced Newcomb Carlton, the president of Western Union, to grant the Black Chamber secret access on a daily basis to the private messages passing over his wires—the Internet of the day.

For much of the next century, the solution would be the same: the NSA and its predecessors would enter into secret illegal agreements with the telecom companies to gain access to communications. Eventually codenamed Project Shamrock, the program finally came to a crashing halt in 1975 when a Senate committee that was investigating intelligence agency abuses discovered it. Senator Frank Church, the committee chairman, labeled the NSA program “probably the largest governmental interception program affecting Americans ever undertaken.”

As a result of the decades of illegal surveillance by the NSA, in 1978 the Foreign Intelligence Surveillance Act (FISA) was signed into law and the Foreign Intelligence Surveillance Court (FISC) came into existence. Its purpose was, for the first time, to require the NSA to get judicial approval for eavesdropping on Americans. Although the court seldom turned down a request for a warrant, or an order as it’s called, it nevertheless served as a reasonable safeguard, protecting the American public from an agency with a troubling past and a tendency to push the bounds of spying unless checked.

For a quarter of a century, the rules were followed and the NSA stayed out of trouble, but following the September 11 attacks, the Bush administration decided to illegally bypass the court and began its program of warrantless wiretapping. “Basically all rules were thrown out the window and they would use any excuse to justify a waiver to spy on Americans,” I was told by Adrienne J. Kinne, who in 2001 was a twenty-four-year-old voice intercept operator who conducted some of the eavesdropping. She or her superiors did not have to get a warrant for each interception. “It was incredibly uncomfortable to be listening to private personal conversations of Americans,” she said. “And it’s almost like going through and stumbling and finding somebody’s diary and reading it.”

All during this time, however, the Bush administration was telling the American public the opposite: that a warrant was obtained whenever an American was targeted. “Anytime you hear the United States government talking about a wiretap, it requires—a wiretap requires a court order,” President George W. Bush told a crowd in 2004. “Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so.” After exposure of the operation by The New York Times in 2005, however, rather than strengthen the controls governing the NSA’s spying, Congress instead voted to weaken them, largely by codifying into the amendment to FISA what had previously been illegal.

At the same time, rather than calling for prosecution of the telecom officials for their role in illegally cooperating in the eavesdropping program, or at least a clear public accounting, Congress simply granted them immunity not only from prosecution but also from civil suits. Thus, for nearly a century, telecom companies have been allowed to violate the privacy of millions of Americans with impunity.

With the arrival of the Obama administration, the NSA’s powers continued to expand at the same time that administration officials and the NSA continued to deceive the American public on the extent of the spying. In addition to the denial I have mentioned by James Clapper, General Keith Alexander, the NSA director, also blatantly denied that his agency was keeping records on millions of Americans. In March 2012, Wired magazine published a cover story I wrote on the new one-million-square-foot NSA data center being built in Bluffdale, Utah. In the article, I interviewed William Binney, a former high-ranking NSA official who was largely responsible for automating the agency’s worldwide eavesdropping network. He quit the agency in 2001 in protest after he saw the system designed mainly for intelligence about foreign threats turned inward on the American public. In the interview, he told how the agency was tapping into the country’s communications and Internet networks. He revealed that it also was secretly obtaining warrantless access to billions of phone records of Americans, including those of both AT&T and Verizon. “They’re storing everything they gather,” he said.

In the months afterward, General Alexander repeatedly denied Binney’s charges. “No…we don’t hold data on US citizens,” he told Fox News, and at an Aspen Institute conference he said, “To think we’re collecting on every US person…that would be against the law.” He added, “The fact is we’re a foreign intelligence agency.”

But the documents released by Edward Snowden show that the NSA does have a large-scale program to gather the telephone records of every Verizon customer, including local calls, and presumably a similar agreement with AT&T and other companies. These are records of who called whom and when, not of the content of the conversations, although the NSA has, by other methods, access to the content of conversations as well. But the NSA has, on a daily basis, access to virtually everyone’s phone records, whether cell or landline, and can store, data-mine, and keep them indefinitely. Snowden’s documents describing the PRISM program show that the agency is also accessing the Internet data of the nine major Internet companies in the US, including Google and Yahoo.

Snowden’s documents and statements add greatly to an understanding of just how the NSA goes about conducting its eavesdropping and data-mining programs, and just how deceptive the NSA and the Obama administration have been in describing the agency’s activities to the American public. In a video interview conducted in his room in the Mira Hotel, Snowden elaborated on the extent of the NSA’s capabilities. “Any analyst at any time can target anyone, any selector, anywhere,” he said.

Where those communications will be picked up depends on the range of the sensor networks and the authorities that that analyst is empowered with. Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authorities to wiretap anyone, from you or your accountant to a federal judge to even the president, if I had a personal e-mail [address].

What Snowden was discussing was the way in which analysts at the NSA can place such things as names, phone numbers, and e-mail addresses on target lists, thus causing communications containing those “selectors” to be intercepted. He seemed to be indicating—although this remains to be officially confirmed—that while under FISA, a court order would be required to enter an American on a target list, analysts have the capability to unilaterally bypass the procedure by simply listing a name or e-mail address on the target list. To understand what Snowden is saying, it is necessary to elaborate a bit on the way the NSA conducts its eavesdropping.

Bamford_2-081513.jpgEdward Gorey Charitable Trust

Drawing by Edward Gorey

During the past decade, the NSA has secretly worked to gain access to virtually all communications entering, leaving, or going through the country. A key reason, according to the draft of a top secret NSA inspector general’s report leaked by Snowden, is that approximately one third of all international telephone calls in the world enter, leave, or transit the United States. “Most international telephone calls are routed through a small number of switches or ‘chokepoints’ in the international telephone switching system en route to their final destination,” says the report. “The United States is a major crossroads for international switched telephone traffic.” At the same time, according to the 2009 report, virtually all Internet communications in the world pass through the US. For example, the report notes that during 2002, less than one percent of worldwide Internet bandwidth—i.e., the international link between the Internet and computers—“was between two regions that did not include the United States.”

Accessing this data is possible through a combination of techniques. Through the most effective of them, the NSA can gain direct access to the fiber-optic cables that now carry most kinds of communications data. According to a slide released by Snowden, the cable-tapping operation is codenamed “UPSTREAM” and it is described as the “collection of communications on fiber cables and infrastructure as data flows past.” It also appears to be both far more secret and far more invasive than the PRISM program revealed by Snowden. Although PRISM gives the NSA access to data from the individual Internet companies, such as Yahoo, Google, and Microsoft, the companies claim that they don’t give the agency direct access to their servers. Through UPSTREAM, however, the agency does get direct access to fiber-optic cables and the supporting infrastructure that carries nearly all the Internet and telephone traffic in the country.

As part of its cable-tapping program, the NSA has secretly installed what amount to computerized filters on the telecommunications infrastructure throughout the country. According to the leaked inspector general’s report, the agency has secret cooperative agreements with the top three telephone companies in the country. Although the report disguises their names, they are likely AT&T, Verizon, and Sprint:

NSA determined that under the Authorization it could gain access to approximately 81% of the international calls into and out of the United States through three corporate partners: Company A had access to 39%, Company B 28%, and Company C 14%.

The filters are placed at key junction points known as switches. For example, much of the communications—telephone and Internet—to and from the northwestern United States pass through a nearly windowless nine-story building at 611 Folsom Street in San Francisco. This is AT&T’s regional switching center. In 2003, the NSA built a secret room in the facility and filled it with computers and software from a company called Narus. Established in Israel by Israelis, and now owned by Boeing, Narus specializes in spyware, equipment that examines both the metadata—the names and addresses of people communicating on the Internet—and the content of digital traffic such as e-mail as it zooms past at the speed of light.

The agency also has access to the telephone metadata—the numbers called and calling and other details—of all Americans. Phone calls from telephone numbers that have been selected as targets can be routed directly to the agency and recorded. According to William Binney, the former NSA senior official, the NSA has established between ten and twenty of these secret rooms at telecom company switches around the country.

It is this daily access to the telephone metadata of all Americans without FISA warrants that the NSA and the Office of National Intelligence tried to hide when they falsely denied that the agency had surveillance records on millions of Americans. For years, the agency also had a nationwide bulk e-mail and Internet metadata collection and storage program, although that was ended in 2011 for “operational and resource reasons,” according to the director of national intelligence.

But according to a joint statement issued on July 2 by senators Ron Wyden and Mark Udall, the real reason the program was shut down was that the NSA was “unable” to prove the usefulness of the operation. “We were very concerned about this program’s impact on Americans’ civil liberties and privacy rights,” they said, “and we spent a significant portion of 2011 pressing intelligence officials to provide evidence of its effectiveness. They were unable to do so, and the program was shut down that year.” The senators added, “It is also important to note that intelligence agencies made statements to both Congress and the [FISA court] that significantly exaggerated this program’s effectiveness. This experience demonstrates to us that intelligence agencies’ assessment of the usefulness of particular collection program—even significant ones—are not always accurate.”

Speaking on Meet the Press, Glenn Greenwald, a lawyer and journalist who wrote the story about the NSA’s collection of phone data for The Guardian, also mentioned a still-secret eighty-page FISA court opinion that, he said, criticized the NSA for violation of both the Fourth Amendment and the FISA statute. According to Greenwald, “it specifically said that they are collecting bulk transmissions, multiple conversations from millions of Americans…and that this is illegal.” The NSA, he said, “planned to try to accommodate that ruling.” On the same program, Representative Mike Rogers, Republican chairman of the House Intelligence Committee, confirmed that the FISA court had issued a critical opinion and said that the NSA had “figured out how to correct that.”

According to The Economist of June 29, “the NSA provided congressional intelligence committees with what it said were over 50 cases in which the programmes disclosed by Mr. Snowden had contributed to the ‘understanding and, in many cases, disruption’ of terrorist plots in America, and over 20 other countries.” In a recent New York Review blog post, Kenneth Roth, director of Human Rights Watch and a former federal prosecutor, commented that “upon scrutiny” many of the plots referred to by the NSA

appear in fact to have been uncovered not because of the mass collection of our metadata but through more traditional surveillance of particular phone numbers or e-mail addresses—the kinds of targeted inquiries that easily would have justified a judicial order allowing review of records kept by communications companies or even monitoring the content of those communications.

At the AT&T facility on Folsom Street and the other locations, fiber-optic cables containing millions of communications enter the building and go into what’s known as a beam-splitter. This is a prism-type device that produces a duplicate, mirror image of the original communications. The original beams, containing Internet data, continue on to wherever they were originally destined. The duplicate beam goes into Room 641A, the NSA’s secret room one floor below, a discovery made by another whistleblower, AT&T technician Mark Klein. There the Narus equipment scans all the Internet traffic for “selectors”—names, e-mail address, words, phrases, or other indicators that the NSA wants to know about. Any message containing a selector is then retransmitted in full to the NSA for further analysis, as are the contents of phone calls selected. With regard to targeted phone numbers, the agency supplies them to the company, which then gives the NSA access to monitor them.

The selectors are inserted by remote control into the Narus equipment by NSA analysts sitting at their desks at the agency’s headquarters at Fort Meade in Maryland or at dozens of locations around the world. What Snowden seemed to be saying in his interview is that as long as certain analysts have an e-mail address, for example, they can simply enter that information into the system and retrieve the content of the e-mails sent from and to that address. There are, by his account, no judicial checks and balances to assure that the targeting of an American has been approved by a FISA court order and not just by NSA employees. These claims by Snowden, and other revelations from the documents he released, should be investigated by either a select committee of Congress, such as the Church Committee, or an independent body, like the 9/11 Commission.

While UPSTREAM captures most of the telecommunications—about 80 percent according to Binney—there are still gaps in the coverage. That is where the PRISM program comes in. With PRISM, the NSA is able to go directly to the communications industry, including the major Internet companies, to get whatever they miss from UPSTREAM. According to the top secret inspector general’s report, the “NSA maintains relationships with over 100 US companies,” adding that the US has the “home field advantage as the primary hub for worldwide telecommunications.”

According to a recent slide released by Snowden, the NSA on April 5, 2013, had 117,675 active surveillance targets in the program and was able to access real-time data on live voice, text, e-mail, or Internet chat services, in addition to analyzing stored data.

In the end, both UPSTREAM and PRISM may be only the tips of a much larger system. Another new document released by Snowden says that on New Year’s Eve, 2012, SHELLTRUMPET, a metadata program targeting international communications, had just “processed its One Trillionth metadata record.” Started five years ago, it noted that half of that trillion was added in 2012. It also noted that two more new programs, MOONLIGHTPATH and SPINNERET, “are planned to be added by September 2013.”

One man who was prescient enough to see what was coming was Senator Frank Church, the first outsider to peer into the dark recesses of the NSA. In 1975, when the NSA posed merely a fraction of the threat to privacy it poses today with UPSTREAM, PRISM, and thousands of other collection and data-mining programs, Church issued a stark warning:

That capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology…. I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.

Church sounds as if he had absorbed the lessons of 1984. From the recent evidence, they are still to be learned.

—July 12, 2013

DHS Is Searching Your Facebook/Twitter For Words Like “Home”, “Cloud”, “Excercise” & “Social Media”

In Uncategorized on March 5, 2012 at 11:51 am

Oldspeak:The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest”. That’s catchy, in a Orwellian kinna way. “Items Of Interest” really? “Cloud” is an “item of interest? Consider the irony. In an era of unprecedented safety in the U.S., under the guise of ‘national security’, the U.S. is prosecuting a perpetual and nebulous “War On Terror”, Numerous civil liberties have been shredded via the “USA Patriot Act” and secretly negotiated treaties like ACTA, while Americans are being surveiled and spied on more than ever. We’re being encouraged to “Go Digital” and transition most of our lives from the physical world to a ‘more convenient’ virtual world, that is easier to monitor and control.  We’ve created a culture of fear unmatched since the days of the “Red Scare”. While words like “freedom” and “democracy” and “liberty” and flung about like so much red white and blue confetti. It is the insidious brilliance of inverted totalitarianism. You’re taught to love your farm, while you’re kept, spiritually, mentally and nutritionally deprived. Perpetually generating revenue for the corporocratic elite. Entertained in a world of screens, constantly bombarded with messages from a formidable propaganda system, telling you what to buy, think, eat, feel and know. We can only be kept in the cages we do not see. And we’re taught to love our cages. “To See The Farm Is To Leave It.”

Related Video:

The Story Of Your Enslavement

By Joel Johnson @ Animal New York:

The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports. (Although the released PDF is generally all reader-selectable text, the list of names was curiously embedded as an image of text, preventing simple indexing. We’ve fixed that below.)

To be fair, the DHS does have an internal privacy policy that attempts to strip your “PII”–Personally Identifiable Information–from the aggregated tweets and status updates, with some broad exceptions:

1) U.S. and foreign individuals in extremis situations involving potential life or death circumstances; (this is no change)
2) Senior U.S. and foreign government officials who make public statements or provide public updates;
3) U.S. and foreign government spokespersons who make public statements or provide public updates;
4) U.S. and foreign private sector officials and spokespersons who make public statements or provide public updates;
5) Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed;
6) Current and former public officials who are victims of incidents or activities related to Homeland Security; and
7) Terrorists, drug cartel leaders or other persons known to have been involved in major crimes of Homeland Security interest, (e.g., mass shooters such as those at Virginia Tech or Ft. Hood) who are killed or found dead.

In addition, the Media Monitoring Capability team can transmit personal information to the DHS National Operations Center over the phone as deemed necessary.

The MMC watch may provide the name, position, or other information considered to be PII to the NOC over the telephone when approved by the appropriate DHS OPS authority. But that information must not be stored in a database that could be searched by an individual’s PII.

In addition to the following list of terms, the DHS can also add additional search terms circumstantially as deemed necessary.

DHS Media Monitoring Terms

2.13 Key Words & Search TermsThis is a current list of terms that will be used by the NOC when monitoring social media sites to provide situational awareness and establish a common operating picture. As natural or manmade disasters occur, new search terms may be added.

The new search terms will not use PII in searching for relevant
mission-related information.

DHS & Other Agencies

  • Department of Homeland Security (DHS)
  • Federal Emergency Management Agency (FEMA)
  • Coast Guard (USCG)
  • Customs and Border Protection (CBP)
  • Border Patrol
  • Secret Service (USSS)
  • National Operations Center (NOC)
  • Homeland Defense
  • Immigration Customs Enforcement (ICE)
  • Agent
  • Task Force
  • Central Intelligence Agency (CIA)
  • Fusion Center
  • Drug Enforcement Agency (DEA)
  • Secure Border Initiative (SBI)
  • Federal Bureau of Investigation (FBI)
  • Alcohol Tobacco and Firearms (ATF)
  • U.S. Citizenship and Immigration Services (CIS)
  • Federal Air Marshal Service (FAMS)
  • Transportation Security Administration (TSA)
  • Air Marshal
  • Federal Aviation Administration (FAA)
  • National Guard
  • Red Cross
  • United Nations (UN)

Domestic Security

  • Assassination
  • Attack
  • Domestic security
  • Drill
  • Exercise
  • Cops
  • Law enforcement
  • Authorities
  • Disaster assistance
  • Disaster management
  • DNDO (Domestic Nuclear Detection Office)
  • National preparedness
  • Mitigation
  • Prevention
  • Response
  • Recovery
  • Dirty Bomb
  • Domestic nuclear detection
  • Emergency management
  • Emergency response
  • First responder
  • Homeland security
  • Maritime domain awareness (MDA)
  • National preparedness initiative
  • Militia
  • Shooting
  • Shots fired
  • Evacuation
  • Deaths
  • Hostage
  • Explosion (explosive)
  • Police
  • Disaster medical assistance team (DMAT)
  • Organized crime
  • Gangs
  • National security
  • State of emergency
  • Security
  • Breach
  • Threat
  • Standoff
  • SWAT
  • Screening
  • Lockdown
  • Bomb (squad or threat)
  • Crash
  • Looting
  • Riot
  • Emergency Landing
  • Pipe bomb
  • Incident
  • Facility

HAZMAT & Nuclear

  • Hazmat
  • Nuclear
  • Chemical Spill
  • Suspicious package/device
  • Toxic
  • National laboratory
  • Nuclear facility
  • Nuclear threat
  • Cloud
  • Plume
  • Radiation
  • Radioactive
  • Leak
  • Biological infection (or event)
  • Chemical
  • Chemical burn
  • Biological
  • Epidemic
  • Hazardous
  • Hazardous material incident
  • Industrial spill
  • Infection
  • Powder (white)
  • Gas
  • Spillover
  • Anthrax
  • Blister agent
  • Exposure
  • Burn
  • Nerve agent
  • Ricin
  • Sarin
  • North Korea

Health Concern + H1N1

  • Outbreak
  • Contamination
  • Exposure
  • Virus
  • Evacuation
  • Bacteria
  • Recall
  • Ebola
  • Food Poisoning
  • Foot and Mouth (FMD)
  • H5N1
  • Avian
  • Flu
  • Salmonella
  • Small Pox
  • Plague
  • Human to human
  • Human to ANIMAL
  • Influenza
  • Center for Disease Control (CDC)
  • Drug Administration (FDA)
  • Public Health
  • Toxic
  • Agro Terror
  • Tuberculosis (TB)
  • Agriculture
  • Listeria
  • Symptoms
  • Mutation
  • Resistant
  • Antiviral
  • Wave
  • Pandemic
  • Infection
  • Water/air borne
  • Sick
  • Swine
  • Pork
  • Strain
  • Quarantine
  • H1N1
  • Vaccine
  • Tamiflu
  • Norvo Virus
  • Epidemic
  • World Health Organization (WHO and components)
  • Viral Hemorrhagic Fever
  • E. Coli

Infrastructure Security

  • Infrastructure security
  • Airport
  • CIKR (Critical Infrastructure & Key Resources)
  • AMTRAK
  • Collapse
  • Computer infrastructure
  • Communications infrastructure
  • Telecommunications
  • Critical infrastructure
  • National infrastructure
  • Metro
  • WMATA
  • Airplane (and derivatives)
  • Chemical fire
  • Subway
  • BART
  • MARTA
  • Port Authority
  • NBIC (National Biosurveillance Integration Center)
  • Transportation security
  • Grid
  • Power
  • Smart
  • Body scanner
  • Electric
  • Failure or outage
  • Black out
  • Brown out
  • Port
  • Dock
  • Bridge
  • Canceled
  • Delays
  • Service disruption
  • Power lines

Southwest Border Violence

  • Drug cartel
  • Violence
  • Gang
  • Drug
  • Narcotics
  • Cocaine
  • Marijuana
  • Heroin
  • Border
  • Mexico
  • Cartel
  • Southwest
  • Juarez
  • Sinaloa
  • Tijuana
  • Torreon
  • Yuma
  • Tucson
  • Decapitated
  • U.S. Consulate
  • Consular
  • El Paso
  • Fort Hancock
  • San Diego
  • Ciudad Juarez
  • Nogales
  • Sonora
  • Colombia
  • Mara salvatrucha
  • MS13 or MS-13
  • Drug war
  • Mexican army
  • Methamphetamine
  • Cartel de Golfo
  • Gulf Cartel
  • La Familia
  • Reynose
  • Nuevo Leon
  • Narcos
  • Narco banners (Spanish equivalents)
  • Los Zetas
  • Shootout
  • Execution
  • Gunfight
  • Trafficking
  • Kidnap
  • Calderon
  • Reyosa
  • Bust
  • Tamaulipas
  • Meth Lab
  • Drug trade
  • Illegal immigrants
  • Smuggling (smugglers)
  • Matamoros
  • Michoacana
  • Guzman
  • Arellano-Felix
  • Beltran-Leyva
  • Barrio Azteca
  • Artistics Assassins
  • Mexicles
  • New Federation

Terrorism

  • Terrorism
  • Al Queda (all spellings)
  • Terror
  • Attack
  • Iraq
  • Afghanistan
  • Iran
  • Pakistan
  • Agro
  • Environmental terrorist
  • Eco terrorism
  • Conventional weapon
  • Target
  • Weapons grade
  • Dirty bomb
  • Enriched
  • Nuclear
  • Chemical weapon
  • Biological weapon
  • Ammonium nitrate
  • Improvised explosive device
  • IED (Improvised Explosive Device)
  • Abu Sayyaf
  • Hamas
  • FARC (Armed Revolutionary Forces Colombia)
  • IRA (Irish Republican Army)
  • ETA (Euskadi ta Askatasuna)
  • Basque Separatists
  • Hezbollah
  • Tamil Tiger
  • PLF (Palestine Liberation Front)
  • PLO (Palestine Libration Organization)
  • Car bomb
  • Jihad
  • Taliban
  • Weapons cache
  • Suicide bomber
  • Suicide attack
  • Suspicious substance
  • AQAP (Al Qaeda Arabian Peninsula)
  • AQIM (Al Qaeda in the Islamic Maghreb)
  • TTP (Tehrik-i-Taliban Pakistan)
  • Yemen
  • Pirates
  • Extremism
  • Somalia
  • Nigeria
  • Radicals
  • Al-Shabaab
  • Home grown
  • Plot
  • Nationalist
  • Recruitment
  • Fundamentalism
  • Islamist

Weather/Disaster/Emergency

  • Emergency
  • Hurricane
  • Tornado
  • Twister
  • Tsunami
  • Earthquake
  • Tremor
  • Flood
  • Storm
  • Crest
  • Temblor
  • Extreme weather
  • Forest fire
  • Brush fire
  • Ice
  • Stranded/Stuck
  • Help
  • Hail
  • Wildfire
  • Tsunami Warning Center
  • Magnitude
  • Avalanche
  • Typhoon
  • Shelter-in-place
  • Disaster
  • Snow
  • Blizzard
  • Sleet
  • Mud slide or Mudslide
  • Erosion
  • Power outage
  • Brown out
  • Warning
  • Watch
  • Lightening
  • Aid
  • Relief
  • Closure
  • Interstate
  • Burst
  • Emergency Broadcast System

Cyber Security

  • Cyber security
  • Botnet
  • DDOS (dedicated denial of service)
  • Denial of service
  • Malware
  • Virus
  • Trojan
  • Keylogger
  • Cyber Command
  • 2600
  • Spammer
  • Phishing
  • Rootkit
  • Phreaking
  • Cain and abel
  • Brute forcing
  • Mysql injection
  • Cyber attack
  • Cyber terror
  • Hacker
  • China
  • Conficker
  • Worm
  • Scammers
  • Social media

Yes, the Department of Homeland Security is searching social media for…”social media”.

Federal Reserve Bank Plans “Social Listening Platform” To Identify “Key Bloggers”, Monitor Billions Of Conversations Online Via Social Media

In Uncategorized on October 3, 2011 at 8:24 pm

Oldspeak:”A few short months after the Pentagon requested proposals to help it “get better at both detecting and conducting propaganda campaigns on social mediamonitoring the internet via its  Social Media in Strategic Communication (SMISC) program, The Federal Reserve is following suit, requesting proposals to allow it to develop a “Social Listening Platform” whose function is to “gather data from various social media outlets and news sources.” It will “monitor billions of conversations and generate text analytics based on predefined criteria.”The Fed’s desired product should be able to “determine the sentiment [ED:LOL] of a speaker or writer with respect to some topic or document”… “The solution must be able to gather data from the primary social media platforms – Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.” Most importantly, the “Listening Platform” should be able to “Handle crisis situations, Continuously monitor conversations, and Identify and reach out to key bloggers and influencers.”  Why does this a bank need monitor conversations on the internet? I can sorta understand why the Pentagon would need to, but a bank needs to know the “sentiment” of speakers and writers?”

By Washington’s Blog:

The Federal Reserve Bank of the United States, … in a Request for Proposals filed to companies that are Fed vendors, is requesting the creation of a “Social Listening Platform” whose function is to “gather data from various social media outlets and news sources.” It will “monitor billions of conversations and generate text analytics based on predefined criteria.”The Fed’s desired product should be able to “determine the sentiment [ED:LOL] of a speaker or writer with respect to some topic or document”… “The solution must be able to gather data from the primary social media platforms – Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.” Most importantly, the “Listening Platform” should be able to “Handle crisis situations, Continuously monitor conversations, and Identify and reach out to key bloggers and influencers.” Said otherwise, the Fed has just entered the counterespionage era and will be monitoring everything written about it anywhere in the world.

***

From the key section of the RFP, presented in its entirety below:

I. Introduction

Social media platforms are changing the way organizations are communicating to the public Conversations are happening all the time and everywhere.
There is need for the Communications Group to be timely and proactively aware of the reactions and opinions expressed by the general public as it relates to the Federal Reserve and its actions on a variety of subjects.

II. Social Listening Platforms

Social media listening platforms are solutions that gather data from various social media outlets and news sources. They monitor billions of conversations and generate text analytics based on predefined criteria. They can also determine the sentiment of a speaker or writer with respect to some topic or document.
The information gathered can guide the organizations public relations group in assessing the effectiveness of communication strategies.

Here are some of the services it can offer:

o Track reach and spread of your messages and press releases 
o Handle crisis situations 
o Continuously monitor conversations 
o Identify and reach out to key bloggers and influencers 
o Spot emerging trends, discussions themes and topics

A. Geographic scope of social media sites

The solution must support content coming from different countries and geographical regions. It should also support multiple languages.

B. Content and Data Types

The solution must be able to gather data from the primary social media platforms –Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.

C. Reports and Metrics

The solution must provide real-time monitoring of relevant conversations. It should provide sentiment analysis (positive, negative or neutral) around key conversational topics.

It must be able to provide summaries or high level overviews of a specific set of topics. It should have a configurable dashboard that can easily be accessed by internal analysts or management. The dashboard must support customization by user or group access.

The solution should provide an alerting mechanism that automatically sends out reports or notifications based a predefined trigger.

D. FRBNY Technology Integration

The solution must be able to integrate with existing FRBNY technologies such as: Google Search appliance, Lotus notes suite and web trends.It must have support for single sign on or windows integrated authentication.

E. Cost Structure

The solution should offer a flexible pricing structure that can support multiple user licensing. It should also have the option to base pricing on content volume and usage. Supplier acknowledges an understanding of and agrees to comply with the above minimum solutions requirements.

Full RFP:

Frbny Social Media Rfp 

The Federal Reserve Plans To Identify “Key Bloggers” And Monitor Billions Of Conversations About The Fed On Facebook, Twitter, Forums And Blogs

By The Economic Collapse:

The Federal Reserve wants to know what you are saying about it.  In fact, the Federal Reserve has announced plans to identify “key bloggers” and to monitor “billions of conversations” about the Fed on Facebook, Twitter, forums and blogs.  This is yet another sign that the alternative media is having a dramatic impact.  As first reported on Zero Hedge, the Federal Reserve Bank of New York has issued a “Request for Proposal” to suppliers who may be interested in participating in the development of a “Sentiment Analysis And Social Media Monitoring Solution”.  In other words, the Federal Reserve wants to develop a highly sophisticated system that will gather everything that you and I say about the Federal Reserve on the Internet and that will analyze what our feelings about the Fed are.  Obviously, any “positive” feelings about the Fed would not be a problem.  What they really want to do is to gather information on everyone that views the Federal Reserve negatively.  It is unclear how they plan to use this information once they have it, but considering how many alternative media sources have been shut down lately, this is obviously a very troubling sign.

You can read this “Request for Proposal” right here.  Posted below are some of the key quotes from the document (in bold) with some of my own commentary in between the quotes….

“The intent is to establish a fair and equitable partnership with a market leader who will who gather data from various social media outlets and news sources and provide applicable reporting to FRBNY. This Request for Proposal (“RFP”) was created in an effort to support FRBNY’s Social Media Listening Platforms initiative.”

A system like this is not cheap.  Apparently the Federal Reserve Bank of New York believes that gathering all of this information is very important.  In recent years, criticism of the Federal Reserve has become very intense, and most of this criticism has been coming from the Internet.  It has gotten to the point where the Federal Reserve Bank of New York has decided that it had better listen to what is being said and find out who is saying it.

“Social media listening platforms are solutions that gather data from various social media outlets and news sources.  They monitor billions of conversations and generate text analytics based on predefined criteria.  They can also determine the sentiment of a speaker or writer with respect to some topic or document.”

The Federal Reserve Bank of New York intends to listen in on “billions of conversations” and to actually determine the “sentiment” of those that are participating in those conversations.

Of course it will be those conversations that are “negative” about the Federal Reserve that will be setting off the alarm bells.

“Identify and reach out to key bloggers and influencers”

Uh oh.  So they plan to “identify” key bloggers and influencers?

What exactly do they plan to do once they “identify” them?

“The solution must be able to gather data from the primary social media platforms –Facebook, Twitter, Blogs, Forums and YouTube.”

Hopefully you understand this already, but nothing posted on the Internet is ever anonymous.  Everything on the Internet is gathered by a vast host of organizations and is used for a wide variety of purposes.  Data mining has become a billion dollar industry, and it is only going to keep growing.

You may think that you are “anonymous” when you criticize organizations like the Fed, but the truth is that if you are loud enough they will see it and they will make a record of it.

“The solution must provide real-time monitoring of relevant conversations.  It should provide sentiment analysis (positive, negative or neutral) around key conversational topics.”

Why do they need to perform “sentiment analysis”?

If someone is identified as being overly “negative” about the Fed, what will they do about it?

“The solution should provide an alerting mechanism that automatically sends out reports or notifications based a predefined trigger.”

This sounds very much like the kind of “keyword” intelligence gathering systems that are currently in use by major governments around the globe.

Very, very creepy stuff.

Are you disturbed yet?

For those of us that write about the Federal Reserve a lot, this is very sobering news.

I wonder what the Fed will think about the following articles that I have posted on this site….

*Unelected, Unaccountable, Unrepentant: The Federal Reserve Is Using Your Money To Bail Out European Commercial Banks Once Again

*Celebrating Independence Yet Enslaved To Debt

*19 Reasons Why The Federal Reserve Is At The Heart Of Our Economic Problems

*Is Ben Bernanke A Liar, A Lunatic Or Is He Just Completely And Totally Incompetent?

*10 Things That Would Be Different If The Federal Reserve Had Never Been Created

What is their “Social Media Monitoring Solution” going to think about those articles?

Unfortunately, this is all part of a very disturbing trend.

Recently, a very creepy website known as “Attack Watch” was launched to gather information on those saying “negative” things about Barack Obama.

Suddenly, everyone seems obsessed with what you and I are saying.

This just shows how the power of the alternative media is growing.

Not only that, but it seems as though the government also wants to gather as much information on all of us as possible.

For example, a new rule is being proposed by the Department of Health and Human Services that would force health insurance companies to submit detailed health care information about all of their customers to the federal government.

Every single day our privacy is being stripped away a little bit more.

But now it is often not just enough for them to know what we are doing and saying.  Instead, the “authorities” are increasingly stepping in to silence important voices.

One of the most recent examples of this was when Activistpost was taken downby Google.  We are still awaiting word on why this was done.

Sadly, the silencing of Activistpost is far from an isolated incident.

Hordes of YouTube accounts have been shut down for their political viewpoints.

Quite a few very prominent alternative media websites have been censored or attacked because of what they stand for.

So why is this happening?  Well, it turns out that the power of the alternative media is growing.  According to a new survey by the Pew Research Center for The People & The Press, 43 percent of Americans say that they get their news on national and international issues from the Internet.  Back in 1999, that figure was sitting at just 6 percent.

The American people are sick and tired of getting “canned news”, and they are increasingly turning to the Internet in a search for the truth.

As I have written about previously, the mainstream media in this country is overwhelmingly dominated by just 6 very powerful corporations….

Today, ownership of the news media has been concentrated in the hands of just six incredibly powerful media corporations.  These corporate behemoths control most of what we watch, hear and read every single day.  They own television networks, cable channels, movie studios, newspapers, magazines, publishing houses, music labels and even many of our favorite websites. Sadly, most Americans don’t even stop to think about who is feeding them the endless hours of news and entertainment that they constantly ingest.  Most Americans don’t really seem to care about who owns the media.  But they should.  The truth is that each of us is deeply influenced by the messages that are constantly being pounded into our heads by the mainstream media.  The average American watches 153 hours of television a month.  In fact, most Americans begin to feel physically uncomfortable if they go too long without watching or listening to something.  Sadly, most Americans have become absolutely addicted to news and entertainment and the ownership of all that news and entertainment that we crave is being concentrated in fewer and fewer hands each year.

The “news” that we get from various mainstream sources seems to always be so similar.  It is as if nearly all mainstream news organizations are reading from the same script.  The American people know that they are not getting the whole truth and they have been increasingly looking to alternative sources.

The monopoly over the news that the mainstream media once possessed has been broken.  The alternative media is now creating some huge problems for organizations that were once very closely protected by the mainstream media.

The American people are starting to wake up and they are starting to get very upset about a lot of the corruption that has been going on in our society.

But it turns out that the “authorities” don’t like it too much when Americans try to actually exercise free speech in America today.  For example, you can see recent video of female protesters in New York City being penned in by police and then brutally maced right here.

Are you sickened by that?

You should be.

What the “authorities” want is for us to shut up, sit in our homes and act as if nothing wrong is happening.

Meanwhile, they seem determined to watch us more closely than ever.

So are you going to be afraid to talk negatively about the Federal Reserve now that you know that they are going to be watching what you say on the Internet?

 

 

 

 

 

 

 

 

 

Pentagon Looks To Social Media As New Battlefield

In Uncategorized on July 22, 2011 at 1:23 pm

Oldspeak:” ‘Events of strategic as well as tactical importance to our Armed Forces are increasingly taking place in social media space…‘ -DARPA (The US military’s high-tech research arm, the Defense Advanced Research Projects Agency) The hyper-militarization of the U.S. continues into Cyberspace. Your ability to organize dissent, protest, uprising and exposure of government lies and true objectives (i.e. Wikileaks) using the internet against a government working against you is being viewed as a military threat that needs to be countered and neutralized. The  The powers that be don’t want what happened in Wisconsin metastasizing and your tax dollars are being used to that end. More definitive evidence of clandestine surveillance of online social media with the expressed purpose controlling and shaping outcomes in the real world. Next to no mention of this in domestic corporate media. Social control, surveillance and propaganda, as American as apple pie. ‘Big Brother is watching you

Related Story

Pentagon Wants a Social Media Propaganda Machine

By The American Foreign Press:

The Pentagon is asking scientists to figure out how to detect and counter propaganda on social media networks in the aftermath of Arab uprisings driven by Twitter and Facebook.

The US military’s high-tech research arm, the Defense Advanced Research Projects Agency (DARPA), has put out a request for experts to look at “a new science of social networks” that would attempt to get ahead of the curve of events unfolding on new media.

The program’s goal was to track “purposeful or deceptive messaging and misinformation” in social networks and to pursue “counter messaging of detected adversary influence operations,” according to DARPA’s request for proposals issued on July 14.

The project echoes concerns among top military officers about the lightning pace of change in the Middle East, where social networks have served as an engine for protest against some longtime US allies.

Some senior officers have spoken privately of the need to better track unrest revealed in social networks and to look for ways to shape outcomes in the Arab world through Twitter, Facebook or YouTube.

“Events of strategic as well as tactical importance to our Armed Forces are increasingly taking place in social media space,” the DARPA announcement said.

“We must, therefore, be aware of these events as they are happening and be in a position to defend ourselves within that space against adverse outcomes,” it said.

DARPA predicted that social networks would have a groundbreaking effect on warfare.

“Changes to the nature of conflict resulting from the use of social media are likely to be as profound as those resulting from previous communications revolutions,” it said.

Under the proposal, researchers would be expected to unearth and classify the “formation, development and spread of ideas and concepts (memes)” in social media.

The document cited a case in which authorities employed social media to head off a potential crisis, but did not specify details of the incident.

“For example, in one case rumors about the location of a certain individual began to spread in social media space and calls for storming the rumored location reached a fever pitch,” it said.

“By chance, responsible authorities were monitoring the social media, detected the crisis building, sent out effective messaging to dispel the rumors and averted a physical attack on the rumored location.”

DARPA planned to spend $42 million on the Social Media in Strategic Communication (SMISC) program, with prospective contractors asked to test algorithms through “experiments” with social media, it said.

One possible experiment could involve a “closed social media network” of two to five thousand volunteers or an online role playing game with tens of thousands of players.

Follow

Get every new post delivered to your Inbox.

Join 398 other followers