News

Internet Trolls May be Trained Government Agents According to Leaked Document

Click to enlarge

 

Glenn Greenwald, a journalist, constitutional lawyer, commentator, and author of three New York Times best-selling books on politics and law, has been working with NBC News in publishing a series of articles on how covert government agents infiltrate the Internet to “manipulate, deceive, and destroy reputations.”

The information is based on documents leaked by National Security Agency (NSA) whistleblower Edward Snowden. Greenwald’s article, How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, is based on four classified documents produced by the British spy agency GCHQ, and presented to the NSA and three other English speaking agencies reportedly part of “The Five Eyes Alliance.”

In this shocking piece, Greenwald publishes a copy of a spy training manual used entitled: “The Art of Deception: Training for Online Covert Operations.” Greenwald writes that agencies like the NSA are “attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.” Greenwald writes:

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

While this kind of counter-intelligence activity may not sound surprising given the objectives of spy agencies going after terrorists, what disturbs Greenwald (and many others) is that the discussion regarding these techniques have been greatly expanded to include the general public:

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes.

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.

And while these leaked documents concern the British spy agency, Greenwald is quick to point out that the Obama administration has actually been open and forward about using such techniques in the U.S.:

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

(Full article here.)

The anti-surveillance state: Clothes and gadgets block face recognition technology and make you digitally invisible

Last spring, designer Adam Harvey hosted a session on hair and makeup techniques for attendees of the 2015 FutureEverything Festival in Manchester, England. Rather than sharing innovative ways to bring out the audience’s eyes, Harvey’s CV Dazzle Anon introduced a series of styling methods designed with almost the exact opposite aim of traditional beauty tricks: to turn your face into an anti-face—one that cameras, particularly those of the surveillance variety, will not only fail to love, but fail to recognize.

Read more: http://www.rawstory.com/2015/04/the-anti-surveillance-state-clothes-and-gadgets-block-face-recognition-technology-and-make-you-digitally-invisible/

Snitch Nation

InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

Inside the Kremlin’s hall of mirrors

 
 
Late last year, I came across a Russian manual called Information-Psychological War Operations: A Short Encyclopedia and Reference Guide (The 2011 edition, credited to Veprintsev et al, and published in Moscow by Hotline-Telecom, can be purchased online at the sale price of 348 roubles). The book is designed for “students, political technologists, state security services and civil servants” – a kind of user’s manual for junior information warriors. The deployment of information weapons, it suggests, “acts like an invisible radiation” upon its targets: “The population doesn’t even feel it is being acted upon. So the state doesn’t switch on its self-defence mechanisms.” If regular war is about actual guns and missiles, the encyclopedia continues, “information war is supple, you can never predict the angle or instruments of an attack”.
The 495-page encyclopedia contained an introduction to information-psychological war, a glossary of key terms and detailed flowcharts describing the methods and strategies of defensive and offensive operations, including “operational deception” (maskirovka), “programmatical-mathematical influence”, “disinformation”, “imitation”, and “TV and radio broadcasting”. In “normal war” the encyclopedia explains, “victory is a case of yes or no; in information war it can be partial. Several rivals can fight over certain themes within a person’s consciousness.”
I had always imagined the phrase “information war” to refer to some sort of geopolitical debate, with Russian propagandists on one side and western propagandists on the other, both trying to convince everyone in the middle that their side was right. But the encyclopedia suggested something more expansive: information war was less about methods of persuasion and more about “influencing social relations” and “control over the sources of strategic reserves”. Invisible weapons acting like radiation to override biological responses and seize strategic reserves? The text seemed more like garbled science fiction than a guide for students and civil servants.

Confronting the surveillance state

By Memorial Day weekend, Congress will likely have decided whether the federal government’s mass surveillance programs — exposed first by The New York Times in December 2005 and more broadly by National Security Agency contractor-turned-whistleblower Edward Snowden in 2013 — will be partially reined in or will instead become a dominant, permanent feature of American life.

The creation of what many refer to as the “American Surveillance State” began in secret, just days after the Sept. 11 attacks. As the wreckage of the Twin Towers smoldered, President Bush and his top national security and intelligence advisers were making decisions that would trigger a constitutional crisis over surveillance programs that the public was told was essential to combating terrorism. The first act in this post-Sept.11 drama began on Capitol Hill.

 

Read more: http://www.washingtonexaminer.com/confronting-the-surveillance-state/article/2562696

In a cameras-everywhere culture, science fiction becomes reality

Science fiction writer David Brin calls it “a tsunami of lights” — a future where tiny cameras are everywhere, lighting up everything we do, and even predicting what we’ll do next.
Unlike George Orwell’s novel “1984,” where only Big Brother controlled the cameras, in 2015, cheap, mobile technology has turned everyone into a watcher.
A snowboarder with a GoPro can post a YouTube video of a friend’s 540-degree McTwist in the halfpipe. But also — as happened recently — a Penn State fraternity can upload Facebook photos of partially naked, sleeping college women.
A San Jose homeowner cowers behind a locked door while she watches an intruder stroll through her home on a surveillance video. A man launches a drone to spy on his neighbor tanning by her pool. Pet owners monitor their dogs.

Same Surveillance State, Different War

How government justification for mass surveillance during the war on drugs turned into rationalization for spying on citizens in the war on terror

It’s been a long 22 months since the first of thousands of classified government documents became public in what has turned into a drumbeat of astonishing revelations about the scope of mass surveillance carried out by the United States government.

Read morehttp://www.theatlantic.com/technology/archive/2015/04/same-surveillance-state-different-war/389988/

The History of the Board Ho

people who participate in chat boards like stratics often fail to realize that they are really part of a corporate data mining project in which their posts are scanned for personal information, preferences, buying habits etc. they are, by virtue of their contributions, giving away valuable information about themselves valuable to corporations that build video games and other tech toys. by providing this personal information, they also provide a jerry-springeresque spectacle for the entertainment of others, hopefully drawing more eyes to the board, hence more posts, hence more data for the marketing data crunchers. the participants, by giving away valuable personal information about themselves have commodified their private lives they have become board ho’s. the social structure of these boards is highly controlled to maximize this effect, with certain types of elite posters encouraged and rewarded these are the board ho divas. these posters play a pivotal role in ensuring that the product delivered to the marketing machine will be as useful as possible. in return the board ho divas receive a kind of social capital from the other board ho’s. At least they get something. The rest of us are getting broke off for free.

Read more: http://alphavilleherald.com/2004/05/the_history_of_.html 

I’m not a number, I’m a free man!

I am Brother X. I took the name, Brother X when I renounced my birth name. I have done so because I believe that my birth name is connected to my social security number, my credit records, my consumer behavior records, etc. etc. ad infinitum. This has effectively rendered my birth name a slave name.

No offense is meant to people like Malcom X, in fact it is in solidarity with former movements like the black power movements that I renounce the name my parents gave me and assume a moniker that is a symbol of my discontent with finding myself living in a panopticon. I am Brother X. I have no history, no behaviors, no metadata. I am not a number. I am a free man.

Beneath the Rose

http://scarletimprint.com/wp-content/uploads/2015/03/tumblr_lp7ubuQWDz1qhmiblo1_400.jpg

There is a certain irony in discussing secrecy in the panopticon of the modern world. Beneath the suspended rose of the conspirators, whether for or against the state, the occult virtue of secrecy is a somewhat quaint conceit, I can ask you to turn off your phones, but that will do little good: it will in fact be a suspicious sign. Your GPS coordinates are known, the microphones and cameras you carry can be remotely activated. Your very interest in this subject has been duly noted, you are guilty by association, and that thought crime is logged and cross-matched with your other deviations. In the security industry phones are known colloquially as trackers and we use them to micro-manage our docility.

No phone?  The number plates of your car have been logged by roadside cameras on the way here, your credit card details when you paid for a ticket, your facebook page when you liked the event. You are haemorrhaging data, and in addition you have been trained to dutifully update your status and identify your friend’s faces to complete a picture that is almost perfected. As the refrain in Orwell’s 1984 goes ‘Under the spreading chestnut tree, I sold you and you sold me.’ You are being cyber stalked by your boss, your work colleagues, your exes, your ‘friends,’ credit agencies and corporations.

Everyone is a fucking cop nowadays.

Read More: http://scarletimprint.com/2015/03/beneath-the-rose/