June 15, 2013
It isn’t just Internet and phone companies that are giving your personal information to the U.S. government. According to an astounding reportby Bloomberg, “four people familiar with the process” say that “makers of hardware and software, banks, Internet security providers, satellite telecommunications companies” and a whole host of other sources are handing over your personal data to federal agencies. The truth is that there is so much more to this NSA snooping scandal than the American people know so far. When U.S. Representative Loretta Sanchez said that what Edward Snowden had revealed was “just the tip of the iceberg“, she wasn’t kidding. The U.S. government is trying to collect as much information about everyone on the planet as it possibly can. And this incredibly powerful intelligence machine is not going to go away just because a few activists get upset about it. The United States government spendsmore than 80 billion dollars a year on intelligence programs. Those that have spent their careersconstructing this monolithic intelligence apparatus are doing to defend it to the bitter end, as will the corporate partners in the private sector that rake in enormous profits thanks to big fat government contracts. But if the American people don’t stand up and demand change now, it is going to be a signal to those doing the snooping that they can push the envelope even more because nobody is going to stop them.
So why are thousands of companies handing over your personal data to the NSA? Well, according to Bloomberg they are getting things in return…
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.
Thanks to the recent revelations by Edward Snowden, much of the focus so far has been on the information that the NSA gets from Internet and telecommunications companies, but apparently government agencies collect information about all of us from a vast array of sources…
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computersof its adversaries.
Along with the NSA, the Central Intelligence Agency (0112917D), the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords.
We have become a “surveillance society”, and this is exactly the sort of thing that the Fourth Amendment was supposed to protect us against. The government is only supposed to invade our privacy and investigate us when there is probable cause to do so.
But now the government is trying to collect as much information about all of us as it possibly can even though the vast majority of us will never be charged with any crime.
There seems to be no limit when it comes to how much personal data the government wants to gather on all of us. As I have written about previously, the chief technology officer at the CIA says that they “fundamentally try to collect everything and hang onto it forever.”
And this does not just apply to American citizens. The U.S. government is compiling data on everyone on the planet. And since such a high percentage of Internet traffic flows through U.S. networks and U.S. companies, that gives the U.S. intelligence community a tremendous “home-field advantage”. The following is from a recent piece authored by Ronald Deibert, a professor of political science at the University of Toronto…
While cyberspace may be global, its infrastructure most definitely is not.
For example, a huge proportion of global Internet traffic flows through networks controlled by the United States, simply because eight of 15 global tier 1 telecommunications companies are American — companies like AT&T, CenturyLink, XO Communications and, significantly, Verizon.
The social media services that many of us take for granted are also mostly provided by giants headquartered in the United States, like Google, Facebook, Yahoo! and Twitter. All of these companies are subject to U.S. law, including the provisions of the U.S. Patriot Act, no matter where their services are offered or their servers located. Having the world’s Internet traffic routed through the U.S. and having those companies under its jurisdiction give U.S. national security agencies an enormous home-field advantage that few other countries enjoy.
But what is really the point of all of this intelligence gathering?
Is it to make us a little bit safer?
If so, we are making a massive mistake.
Benjamin Franklin once wrote the following: “They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.”
Are you willing to give up your Fourth Amendment rights in order to feel a little more safe?
I hope not.
The U.S. Constitution never guaranteed us safety. But it is supposed to guarantee our privacy.
Fortunately, it appears that at this point public opinion is very much against all of the snooping that the government has been doing. According to the Guardian, most of the recent surveys that have been done are coming up with very consistent results…
Thursday, the Guardian released a poll conducted on Monday and Tuesday nights by Public Policy Polling looking at America’s reaction to the National Security Agency (NSA) controversy. The public appears to be reacting negatively to the revelations – and it seems to be hurting President Obama.
We found 50% of American voters believe the NSA should not be collecting telephone or internet records, compared to the 44% who think they should. The results hold even when respondents were told that the data the government is collecting is “metadata” (and not necessarily actual content of communications).
These results are consistent with a CBS News poll,Fox News poll, and YouGov survey that showed only 38%, 32%, and 35% of Americans respectively approved of phone record collection in order to reduce the chance of a terrorist attack. A Gallup poll was consistent with these, showing only 37% approved monitoring of Americans’ phone and internet use.
And Americans also seem to be very suspicious about what the government will do with our personal data once they have it.
In fact, according to a new Rasmussen survey, 57 percent of Americans believe that the government will use the information that it collects “to harass political opponents”.
And of course many of the recent scandals that have erupted this year involve the government harassing political opponents. We have seen this with the IRS scandal, and we have seen this with the spying on reporters scandal.
Just this week it was reported that CBS reporter Sharyl Attkisson has had her computers hacked repeatedly. If you are not familiar with Attkisson, she is the one reporter in the mainstream media that has been relentless when it has come to pursuing the Operation Fast and Furious and Benghazi stories. Now we are learning that a “sophisticated” intruder hacked into her computer “on multiple occasions” in late 2012…
CBS News announced Friday that correspondent Sharyl Attkisson’s computer was hacked by “an unauthorized, external, unknown party on multiple occasions,” confirming Attkisson’s previous revelation of the hacking.
CBS News spokeswoman Sonya McNair said that a cybersecurity firm hired by CBS News “has determined through forensic analysis” that “Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions in late 2012.”
“Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion. CBS News is taking steps to identify the responsible party and their method of access.”
Meanwhile, in a desperate attempt to deflect attention away from all of these scandals, Barack Obama is starting a war with Syria.
In this war, we are actually going to be helping al-Qaeda rebels that arebeheading Christians to take over Syria.
If you aren’t aware of the deep connection between al-Qaeda and the Syrian rebels, just read the recent USA Today article entitled “Syrian rebels pledge loyalty to al-Qaeda” or any of the dozens of other articles that you can find on the Internet that document this very clearly.
And the sick thing is that a large number of Republicans are actually applauding Barack Obama for teaming up with al-Qaeda.
Has it suddenly become “conservative” to help al-Qaeda?
What in the world is going on?
And you know what?
The truth was that our troops were in position long before Barack Obama made his “stunning announcement” on Thursday. In fact, it hasbeen confirmed that U.S. troops are already in Jordan along the Syrian border.
And could this conflict with Syria actually set the stage for a much larger conflict?
The Russians have been providing “mortars, light artillery, antiaircraft guns, antitank weapons and ammunition” to the Syrian government and they have loudly denounced the latest moves by the Obama administration.
Yes, the Assad government is horrible, but what Obama is doing in Syria is a terrible, terrible mistake.
If the U.S. takes down the Assad government, forces loyal to al-Qaeda and other radical jihadists are going to take over and we will have made Russia and China very angry. If the U.S. is unsuccessful in removing the Assad government, it will be considered a crushing defeat for the United States.
Either way, we lose.
June 15, 2013
On Friday Rasmussen Reports released a poll finding that nearly 60 percent of Americans think the government will use data illegally collected by the NSA to go after political opponents. It also found that there “is little public support for the sweeping and unaccountable nature of the National Security Agency surveillance program along with concerns about how the data will be used.”
If we accept the validity of this latest poll – or any establishment poll – it would be fair to say most Americans understand that surveillance is not used to protect us from foreign enemies in the fake war on terrorism.
Earlier in the week this is exactly what Rep. Mike Rogers, a Michigan Republican, and the Republican senator from Georgia Saxby Chambliss, told us. Rogers said that converting the United States into a high-tech version of Stasi Germany has resulted in “changes we can already see being made by the folks who wish to do us harm, and our allies harm.” Rogers added that recent revelations by Booz Allen Hamilton analyst Edward Snowden “make it harder to track bad guys trying to harm U.S. citizens in the United States.”
The American people might be opposed to the NSA surveillance program, but there is overwhelming consensus in favor of it in Washington. The Democrat intelligentsia in the Mockingbird media, especially the Obama partisans, have lined up in favor of trampling on the rights of American citizens.
“I’ve been amazed and disappointed for a long time at how the most slavishly partisan media Democrats who pretended to care so much about these issues when doing so helped undermine George Bush are now the loudest apologists and cheerleaders for these very same policies,” Glenn Greenwald, who broke the NSA story, said on Tuesday. “If they started a club called Liberal Pundits to Defend the National Security State, no auditorium in the country would be large enough to accommodate them.”
This was underscored on Monday when another poll showed that Democrats love the Stasi state. Support for tyranny depends on what side of the establishment party is in the White House. “With President Obama in the White House, Democrats stand in support of the NSA’s methods, 49% to 40% in the Gallupsurvey. Republicans were opposed 63% to 32%. When President George W. Bush was in office, Republicans were supportive of government surveillance efforts and Democrats opposed,” the Los Angeles Times reports.
This is not surprising, writes Justin Raimondo. “Now it is the liberals’ turn to justify the demolition of the Constitution, and especially to give the final push to take down that once-mighty and now greatly eroded bulwark against tyranny, the Bill of Rights. Anyone who is surprised by the alacrity with which they have taken up this task is unfamiliar with the history of American liberalism and the left in general.”
This takes us back to the Rasmussen Reports poll cited above. Most Americans know the surveillance state is used against political enemies, not phantasmal terrorists in caves. They understand that whatever side of the party is in power, it will use surveillance and dirty tricks to undermine the competition. In regard to enemies beyond the walls and out in the political hinterland, it will use the surveillance apparatus like a cudgel to destroy them. History is replete with examples of this from the FBI’s COINTELPRO and the CIA’s Operation CHAOS back to the dawning days of the nation when Federalist John Adams attempted to sabotage the Bill of Rights by signing the Alien and Sedition Acts of 1798 into law. (See Timeline of US Govt. Surveillance and Spying for more information on how the surveillance state has been used to harass and persecute political opponents.)
Rush Limbaugh may say the real danger is Obama, but that is a diversion. In early 2006, Limbaugh characterized illegal surveillance under Bush as “intercepts of the enemy” and said opponents were supporting an “al-Qaeda bill of rights.” Democrats and Republicans will continue to play political football in a larger game shaped by the establishment’s false left-right paradigm. Both support what the NSA is doing and the Stasi state will grow and flourish so long as Democrats and Republicans share power.
We are now very close to witnessing the final extinction of the Bill of Rights. This has been the goal of one-world totalitarians for some time. Over the last few years, we have documented the effort by the globalist intelligentsia – led by globalist operative Fareed Zakaria – to destroy the Constitution.
The NSA spy grid is designed to monitor and undermine the political activity of those of us who want to preserve the Constitution and the Bill of Rights. It has absolutely nothing to do with al-Qaeda, a largely imaginary terrorist group that only surfaces in the United States due to a concerted patsy and public propaganda program led by the FBI and the Department of Homeland Security.
June 17, 2013
NSA spying whistleblower Edward Snowden’s statements have been verified. Reporter Glenn Greenwald has promised numerous additional disclosures from Snowden.
What other revelations are coming?
We reported in 2008:
A new article by investigative reporter Christopher Ketcham reveals, a governmental unit operating in secret and with no oversight whatsoever is gathering massive amounts of data on every American and running artificial intelligence software to predict each American’s behavior, including “what the target will do, where the target will go, who it will turn to for help”.
The same governmental unit is responsible for suspending the Constitution and implementing martial law in the event that anything is deemed by the White House in its sole discretion to constitute a threat to the United States. (this is formally known as implementing “Continuity of Government” plans). [Background here.]
As Ketcham’s article makes clear, these same folks and their predecessors have been been busy dreaming up plans to imprison countless “trouble-making” Americans without trial in case of any real or imagined emergency. What kind of Americans? Ketcham describes it this way:
“Dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.”
Do we want the same small group of folks who have the power to suspend the Constitution, implement martial law, and imprison normal citizens to also be gathering information on all Americans and running AI programs to be able to predict where American citizens will go for help and what they will do in case of an emergency? Don’t we want the government to — um, I don’t know — help us in case of an emergency?
Bear in mind that the Pentagon is also running an AI program to see how people will react to propaganda and to government-inflicted terror. The program is called Sentient World Simulation:
“U.S defense, intel and homeland security officials are constructing a parallel world, on a computer, which the agencies will use to test propaganda messages and military strategies.Called the Sentient World Simulation, the program uses AI routines based upon the psychological theories of Marty Seligman, among others. (Seligman introduced the theory of ‘learned helplessness’ in the 1960s, after shocking beagles until they cowered, urinating, on the bottom of their cages.)
Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.
The sim will feature an AR avatar for each person in the real world, based upon data collected about us from government records and the internet.”
The continuity of government folks’ AI program and the Pentagon’s AI program may or may not be linked, but they both indicate massive spying and artificial intelligence in order to manipulate the American public, to concentrate power, to take away the liberties and freedoms of average Americans, and — worst of all — to induce chaos in order to achieve these ends.
PBS Nova reported in 2009:
The National Security Agency (NSA) is developing a tool that George Orwell’s Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking.
With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected—through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records—it may one day be possible to know not just where people are and what they are doing, but what and how they think.
The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability.
Known as Aquaint, which stands for “Advanced QUestion Answering for INTelligence” [which is run by the Intelligence Advanced Research Projects Activity (IARPA)], part of the new M Square Research Park in College Park, Maryland. A mammoth two million-square-foot, 128-acre complex, it is operated in collaboration with the University of Maryland. “Their budget is classified, but I understand it’s very well funded,” said Brian Darmody, the University of Maryland’s assistant vice president of research and economic development, referring to IARPA. “They’ll be in their own building here, and they’re going to grow. Their mission is expanding.”
In a 2004 pilot project, a mass of data was gathered from news stories taken from theNew York Times, the AP news wire, and the English portion of the Chinese Xinhua news wire covering 1998 to 2000. Then, 13 U.S. military intelligence analysts searched the data and came up with a number of scenarios based on the material. Finally, using those scenarios, an NSA analyst developed 50 topics, and in each of those topics created a series of questions for Aquaint’s computerized brain to answer. “Will the Japanese use force to defend the Senkakus?” was one. “What types of disputes or conflict between the PLA [People’s Liberation Army] and Hong Kong residents have been reported?” was another. And “Who were the participants in this spy ring, and how are they related to each other?” was a third. Since then, the NSA has attempted to build both on the complexity of the system—more essay-like answers rather than yes or no—and on attacking greater volumes of data.
“The technology behaves like a robot, understanding and answering complex questions,” said a former Aquaint researcher. “Think of 2001: A Space Odyssey and the most memorable character, HAL 9000, having a conversation with David. We are essentially building this system. We are building HAL.” A naturalized U.S. citizen who received her Ph.D. from Columbia, the researcher worked on the program for several years but eventually left due to moral concerns. “The system can answer the question, ‘What does X think about Y?’” she said. “Working for the government is great, but I don’t like looking into other people’s secrets.
A supersmart search engine, capable of answering complex questions such as “What were the major issues in the last 10 presidential elections?” would be very useful for the public. But that same capability in the hands of an agency like the NSA—absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans—could be a privacy and civil liberties nightmare. “We must not forget that the ultimate goal is to transfer research results into operational use,” said Aquaint project leader John Prange, in charge of information exploitation for IARPA.
Once up and running, the database of old newspapers could quickly be expanded to include an inland sea of personal information scooped up by the agency’s warrantless data suction hoses. Unregulated, they could ask it to determine which Americans might likely pose a security risk—or have sympathies toward a particular cause, such as the antiwar movement, as was done during the 1960s and 1970s. The Aquaint robospy might then base its decision on the type of books a person purchased online, or chat room talk, or websites visited—or a similar combination of data. Such a system would have an enormous chilling effect on everyone’s everyday activities—what will the Aquaint computer think if I buy this book, or go to that website, or make this comment? Will I be suspected of being a terrorist or a spy or a subversive?
World Net Daily’s Aaron Klein reported earlier this month:
In February, the Sydney Morning Herald reported the Massachusetts-based multinational corporation, Raytheon – the world’s fifth largest defense contractor – had developed a “Google for Spies” operation.
Herald reporter Ryan Gallagher wrote that Raytheon had “secretly developed software capable of tracking people’s movements and predicting future behavior by mining data from social networking websites” like Facebook, Twitter, and Foursquare.
The software is called RIOT, or Rapid Information Overlay Technology.
Raytheon told the Herald it has not sold RIOT to any clients but admitted that, in 2010, it had shared the program’s software technology with the U.S. government as part of a “joint research and development effort … to help build a national security system capable of analyzing ‘trillions of entities’ from cyberspace.”
In April, RIOT was reportedly showcased at a U.S. government and industry national security conference for secretive, classified innovations, where it was listed under the category “big data – analytics, algorithms.”
Jay Stanley, senior policy analyst for the ACLU Speech, Privacy and Technology Project,argued … that among the many problems with government large-scale analytics of social network information “is the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as RIOT, or to target them for further invasions of privacy based on incorrect inferences.”
“The chilling effects of such activities,” he concluded, “while perhaps gradual, would be tremendous.”
Ginger McCall, attorney and director of the Electronic Privacy Information Center’s Open Government program, told NBC in February, “This sort of software allows the government to surveil everyone.
“It scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this, other than that they can.”
As for RIOT’s ability to help catch terrorists, McCall called it “a lot of white noise.” [True … Big data doesn’t work to keep us safe.]
The London Guardian further obtained a four-minute video that shows how the RIOT software uses photographs on social networks. The images, sometimes containing latitude and longitude details, are “automatically embedded by smartphones within so-called ‘exif header data.’
RIOT pulls out this information, analyzing not only the photographs posted by individuals, but also the location where these images were taken,” the Guardian reported.
Such sweeping data collection and analysis to predict future activity may further explain some of what the government is doing with the phone records of millions of Verizon customers. [Background here.]
“In the increasingly popular language of network theory, individuals are “nodes,” and relationships and interactions form the “links” binding them together; by mapping those connections, network scientists try to expose patterns that might not otherwise be apparent,” reported the Times.[Background here.]
In February 2006, more than a year after Obama was sworn as a U.S. senator, it was revealed the “supposedly defunct” Total Information Awareness data-mining and profiling program had been acquired by the NSA.
The Total Information Awareness program was first announced in 2002 as an early effort to mine large volumes of data for hidden connections.
Aaron Klein reported last week that Snowden might have worked at the NSA’s artificial intelligence unit at the University of Maryland:
Edward Snowden, the whistleblower behind the NSA surveillance revelations, told the London Guardian newspaper that he previously worked as a security guard for what the publication carefully described as “one of the agency’s covert facilities at the University of Maryland.”
Brian Ullmann, the university’s assistant vice president for marketing and communications, was asked for comment. He would not address the query, posed twice to his department by KleinOnline, about whether the NSA operates covert facilities in conjunction with the university.
Ullmann’s only comment was to affirm that Snowden was employed as a security guard at the university’s Center for the Advanced Study of Languages in 2005.
This is especially concerning given that the people who created the NSA spying program in the first place say that information gained through spying will be used to frame Americans that the government takes a dislike to.