NSA using facial recognition software to steal your images. Russia beating the West at Propaganda war in Ukraine.

I think it safe to assume nothing is sacred in terms of the NSA. They are snagging any information they can and can afford to let technology catch up to what they have. They steal your phone calls… Web searches.. Your texts… They use your phone to see where you are going and how often… They are stealing your friends lists and finding out who you talk to and how often. The New York Times is now reporting they are stealing your photos off Facebook..Instagram or any other service they want. Let’s not forget this is all against the 4th amendment of the US Constitution..

 

 

 

The implications of this are devious and mind numbing. Let’s not forget they have not stopped any attacks anywhere for any reason. They are data mining for their own nefarious illegal plans which the NSA thinks you have zero right to actually know.

 

 

 

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.

The implications of this are devious as well as mind numbing. They have yet to stop a single attack anywhere for any reason. Th continue Data mining for their own nefarious illegal plans.

The documents themselves can be found here.

 

Russia and Propaganda.

I have been interested in Propaganda for awhile and the various ways it is used both know and in our past. Propaganda has been around for hundreds of years now and has been almost perfected in WW2 and since the Cold War. The US and Russia are in a bitter propaganda war for the hearts and minds of the World concerning Ukraine.

Russia appears to be winning.

Rodionov says that, since its founding, Ruptly has attracted 14 subscribers and over 200 customers, including German broadcasters “both public and private.” Subsidies from Moscow enable Ruptly to offer professionally produced videos at prices cheaper than those of the private competition.

The battle over Ukraine is being fought with diverse means — with harsh words and soft diplomacy, with natural gas, weapons and intelligence services. But perhaps the most important instruments being deployed by Moscow are the Internet, newspapers and television, including allegedly neutral journalists and pundits dispatched around the world to propagate the Kremlin position.

“We’re in the middle of a relentless propaganda war,” says Andrew Weiss, vice president of studies at the Carnegie Endowment for International Peace, an influential Washington think tank. Weiss describes this propaganda as a crucial tool used by Russia to conduct its foreign policy.

Moscow is looking beyond the short-term, seeking to influence opinion in the long-run to create “an alternative discourse in Western countries as well,” says Margarita Simonyan, editor in chief of Kremlin foreign broadcaster RT, formerly known as Russia Today, which owns Ruptly.

The Kremlin invests around €100 million ($136 million) a year in Russian media abroad in order to influence public opinion in the West. This effort also helps explain why Putin addressed Germans directly in his speech on the annexation of Crimea. Noting the Kremlin had supported Germany’s reunification process, he called on Germans to back Russia’s reunification with Crimea. Putin’s popularity in Germany has declined steadily over the years, but his worldview remains quite popular.

A Triumphant Media Advance

Sources within the Kremlin express satisfaction these days when talking about Moscow’s information policies. “We may have won the war in Georgia in 2008, but we lost the propaganda battle against America and the West by a mile,” says one. “Thanks to RT and the Internet, though, we are now closing the gap.”

Whereas Ruptly is seeking to establish itself as an alternative to Reuters and the Associated Press in providing video footage, RT has already successfully established itself in the nine years since its creation, recently surpassing even CNN when it comes to clips viewed on YouTube. With close to 1.2 billion views, the BBC is the only media outlet ahead of RT. In Britain, RT has more viewers than the Europe-wide news station Euronews and in some major US cities, the channel is the most-viewed of all foreign broadcasters. RT’s 2,500 employees report and broadcast in Russian, English, Spanish and Arabic with German to be added soon.

The triumphant advance of Putin’s broadcaster began in a former factory in northeast Moscow. Founding RT editor Simonyan was just 25 at the time Putin appointed her in 2005. Her assignment from the Russian president: to “break the monopoly of the Anglo-Saxon mass media.”

It’s a mandate she has been pursuing successfully ever since. “There’s large demand for media that doesn’t just parrot the uniform pulp from the Western press,” says Simonyan. “Even in Western countries.” RT gives pro-Russian representatives from Eastern Ukraine far more air time than supporters of the government in Kiev, and not even Simonyan disputes this fact. “We’re something along the lines of Russia’s Information Defense Ministry,” her co-workers say, not without pride.

Ruptly and RT are only the most visible instruments being used by the Kremlin. Other propaganda methods being exploited can be less obvious.

For example, when German talk shows invite Russian journalists to speak about the Ukraine crisis, they are almost always pundits who could have been taken directly out of the Kremlin propaganda department. Programmers, of course, like to book these guests because they generate heated and provocative discussion. But it’s also a function of the fact that experts critical of the government either don’t want to talk or are kept from doing so. Take the example of Sergej Sumlenny, who served until January as the German correspondent for the Russian business magazineExpert. Early on, he appeared often on German talk shows, intelligently and pointedly criticizing Putin’s policies. He has since been driven out at the magazine.

In his stead, the Russian perspective is now represented on German talk shows by people like Anna Rose, who is generally introduced as a correspondent for Rossiyskaya Gazeta, or Russian Gazette. The name sounds innocuous enough, but eyebrows should be raised immediately when this “serious” Russian journalist begins claiming that the Ukrainian army could be shooting “at women and children” and that Russian soldiers need to provide them with protection. Her positions suddenly become more understandable with the knowledge that Rossiyskaya Gazeta is the Russian government’s official newspaper.

Manipulating Comments and Social Media

Those who read comments posted under articles about Ukraine on news websites will have noticed in recent months that they have been filled with missives that always seem to follow the same line of argumentation. Moscow’s independent business daily Vedomosti reported recently that, since the start of the Ukraine crisis, the presidential administration in Moscow has been testing how public opinion in the United States and Europe can be manipulated using the Internet and social networks. The paper reported that most of the professional comment posters active in Germany are Russian immigrants who submit their pro-Russian comments on Facebook and on news websites.

In addition, journalists and editors at German websites and publications report receiving letters and emails offering “explosive information about the Ukraine crisis” on an almost daily basis. The “sources” often mention they have evidence about the right-wing nature of the Kiev government that they would like to supply to journalists. The letters are written in German, but appear to include direct translations of Russian phrases. They would seem to have been written by mother-tongue Russian speakers.Other forms of propaganda have also been deployed in recent months. For example, there have been frequent incidences of intercepted conversations of Western diplomats or Kiev politicians getting published in ways that serve Russia’s interests. From the “Fuck the EU” statement by Victoria Nuland, the top US diplomat to Europe, right up to statements made by Estonia’s foreign minister that were apparently supposed to prove who was responsible for the deaths of protesters on Maidan Square. The Russian media also seemed to take pleasure in reporting in mid-April that CIA head John Brennan had traveled to Kiev.

There’s a high likelihood that this confidential information and the content of intercepted communications is being strewn by Russian intelligence. Officials at Western intelligence agencies assume that even communications encrypted by the Ukrainian army are being intercepted by the Russians.

 propa

http://www.spiegel.de/international/world/russia-uses-state-television-to-sway-opinion-at-home-and-abroad-a-971971.html

Advertisements

Has NSA bulk surveillance even stopped anything at all? Even a single attack? Or is it a plan to spy on everyone as I claim it is.

I knew Gen. Alexander was lying when he said that the NSA has stopped 50 attacks based on information picked up by their illegal bulk surveillance dragnet. The fact Alexander and Clapper are walking around after blatantly lying to Congress is totally an affront to anyone with any intelligence. If I lied to Congress… and they figured it out. I would be picked up and arrested that day.

 

On June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding the extent and nature of the NSA’s surveillance programs.  Facing an uproar over the threat such programs posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S. national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward Snowden were published, President Obama defended the NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved.”  Gen. Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from these programs provided the U.S. government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world.”  Rep. Mike Rogers (R-Mich.), chairman of the House Permanent Select Committee on Intelligence, said on the House floor in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real lives.”

However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading.  An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined.
Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although it’s unclear whether these warrants played an initiating role or were used at a later point in the investigation. (Click on the link to go to a database of all 225 individuals, complete with additional details about them and the government’s investigations of these cases
Sickening.. Pathetic. Welcome to the Machine.
Enhanced by Zemanta

NSA hunts down System Administrators.

The disclosures keep coming. Edward Snowden in a TED talk last week that the worst was still yet to come. My fear is that people are too apathetic to it already. The vast majority of people simply do not care we have been turned into a police state where our every thought and movement is tracked and added to our file in some supercomputer located in Utah.

I am not sure how we got to the point where the NSA is actively going after System Admins? This is very far from the stated intent to protect us from the next terrorist attack. It has been clear for awhile for those paying attention that the NSA is actively trying to weaken and spy on the entirety of the Internet. They have weakened cryptographic standards and have placed devices to spy on input and output from the largest of the large internet companies. Everyone from Microsoft to Google to Facebook to Apple and everyone in between has been targeted. The news they are going directly after the people responsible for keeping entire systems of computers operational should be scary as hell for any number of reasons. As I mentioned hoe far the NSA has deviated from the stated intent of this entire witch hunt which was to protect the homeland from another terrorist attack.

SYS ADMIN

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks.

The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity – they are targeted only because they control access to networks the agency wants to infiltrate. “Who better to target than the person that already has the ‘keys to the kingdom’?” one of the posts says.

The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, “pictures of cats in funny poses with amusing captions.” The posts, boastful and casual in tone, contain hacker jargon (pwn, skillz, zomg, internetz) and are punctuated with expressions of mischief. “Current mood: devious,” reads one, while another signs off, “Current mood: scheming.”

The author of the posts, whose name is being withheld by The Intercept, is a network specialist in the agency’s Signals Intelligence Directorate, according to other NSA documents. The same author wrote secret presentations related to the NSA’s controversial program to identify users of the Tor browser – a privacy-enhancing tool that allows people to browse the Internet anonymously. The network specialist, who served as a private contractor prior to joining the NSA, shows little respect for hackers who do not work for the government. One post expresses disdain for the quality of presentations at Blackhat and Defcon, the computer world’s premier security and hacker conferences:

It is unclear how precise the NSA’s hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems “probable” administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employee’s posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.

The NSA declined to answer questions about its efforts to hack system administrators or explain how it ensures Americans are not mistakenly targeted. Agency spokeswoman Vanee’ Vines said in an email statement: “A key part of the protections that apply to both U.S. persons and citizens of other countries is the mandate that information be in support of a valid foreign intelligence requirement, and comply with U.S. Attorney General-approved procedures to protect privacy rights.”

As The Intercept revealed last week, clandestine hacking has become central to the NSA’s mission in the past decade. The agency is working to aggressively scale its ability to break into computers to perform what it calls “computer network exploitation,” or CNE: the collection of intelligence from covertly infiltrated computer systems. Hacking into the computers of sys admins is particularly controversial because unlike conventional targets – people who are regarded as threats – sys admins are not suspected of any wrongdoing.

In a post calling sys admins “a means to an end,” the NSA employee writes, “Up front, sys admins generally are not my end target. My end target is the extremist/terrorist or government official that happens to be using the network some admin takes care of.”

The first step, according to the posts, is to collect IP addresses that are believed to be linked to a network’s sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.

“What we’d really like is a personal webmail or Facebook account to target,” one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, “alternative selectors” like a webmail or Facebook account can be linked to a particular target. You can “dumpster-dive for alternate selectors in the big SIGINT trash can” the author suggests. Or “pull out your wicked Google-fu” (slang for efficient Googling) to search for any “official and non-official e-mails” that the targets may have posted online.

Once the agency believes it has identified a sys admin’s personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target’s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware “implant” and gain unfettered access to the data stored on its hard drive.

“Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage,” the author of the posts writes. (“Pwnage,” short for “pure ownage,” is gamer-speak for defeating opponents.) The author adds, triumphantly, “Yay! /throws confetti in the air.”

In one case, these tactics were used by the NSA’s British counterpart, Government Communications Headquarters, or GCHQ, to infiltrate the Belgian telecommunications company Belgacom. As Der Speigel revealed last year, Belgacom’s network engineers were targeted by GCHQ in a QUANTUM mission named “Operation Socialist” – with the British agency hacking into the company’s systems in an effort to monitor smartphones.

While targeting innocent sys admins may be surprising on its own, the “hunt sys admins” document reveals how the NSA network specialist secretly discussed building a “master list” of sys admins across the world, which would enable an attack to be initiated on one of them the moment their network was thought to be used by a person of interest. One post outlines how this process would make it easier for the NSA’s specialist hacking unit, Tailored Access Operations (TAO), to infiltrate networks and begin collecting,
“tasking,” data:

The Intercept

>

How badly are we being manipulated. The 4 d ‘s Deny , Disrupt, Degrade, Deceive

First for something cool

The Brilliant Cube. Location South Korea.

Brilliant Cube on Vimeo : http://vimeo.com/m/77023605

Brilliant Cube

GCHQ and NSA with the other five eyes partners will stop at nothing to ruin your reputation

Besides from the NSA and GCHQ and five eyes other partners manipulating the cryptographic standards of the Internet so they can spy on you more readily…. This is by far the most disturbing development to date. The intelligence agencies will use as many means as they can to discredit you and ruin your reputation as they can without any finding of guilt or even being charged in any court of law.

Machines of loving grace

If you do not think the Snowden revelations impact you or you are immune from them you are vastly misguided or delusional. We are at the mercy of technology as it is right now. We live in many ways smack in the center of 1984. We live in a global police state. The ideas of freedom and democracy are illusions. In a very short period of time computers and machines will be more intelligent and more able than humanity. We are playing God in many ways…. We could be designing the very technology that ends up enslaving us. I posted two days ago on this blog about Google buying up artificial intelligence and machine learning companies left and right. It has been said Google is working on the “Manhattan project of Artificial intelligence “. The man in charge of the project thinks by 2040 we will be inferior to machines in almost every way. We live in scary times. Technology in many respects controls us and we are beholden to it now. We have a bleak outlook if the Govts are actively trying to undermine us at every turn. If Govts feel we are guilty before being charged with any crimes. If Technology will be the alter we all worship at. Where is the outrage at what Snowden has disclosed? We are more interested in Miley Cyrus twerking than the Govt spying on every detail of our lives. We care more about who gets cut off Americas Got Talent then we do about the fact out Constitution is being shredded before our very eyes. We care more about the New version of the IPhone or Samsung Galaxy 5 then we do about the very programs that are spying on you this very second. Sigh….

Wow. My mind is blown by this article. In case you were not aware Glenn Greenwald has started a new website with other like minded journalists called “The Intercept”. He has broken a few major stories in the last few weeks.

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Intercept article detailing the program.

20140225-152540.jpg

20140225-152555.jpg

20140225-152612.jpg

20140225-152634.jpg

20140225-152650.jpg

20140225-152705.jpg

20140225-152721.jpg

20140225-152732.jpg

20140225-152747.jpg

20140225-152758.jpg

20140225-152814.jpg

20140225-152832.jpg

20140225-152844.jpg

20140225-152901.jpg

20140225-152938.jpg