How badly are we being manipulated. The 4 d ‘s Deny , Disrupt, Degrade, Deceive

First for something cool

The Brilliant Cube. Location South Korea.

Brilliant Cube on Vimeo : http://vimeo.com/m/77023605

Brilliant Cube

GCHQ and NSA with the other five eyes partners will stop at nothing to ruin your reputation

Besides from the NSA and GCHQ and five eyes other partners manipulating the cryptographic standards of the Internet so they can spy on you more readily…. This is by far the most disturbing development to date. The intelligence agencies will use as many means as they can to discredit you and ruin your reputation as they can without any finding of guilt or even being charged in any court of law.

Machines of loving grace

If you do not think the Snowden revelations impact you or you are immune from them you are vastly misguided or delusional. We are at the mercy of technology as it is right now. We live in many ways smack in the center of 1984. We live in a global police state. The ideas of freedom and democracy are illusions. In a very short period of time computers and machines will be more intelligent and more able than humanity. We are playing God in many ways…. We could be designing the very technology that ends up enslaving us. I posted two days ago on this blog about Google buying up artificial intelligence and machine learning companies left and right. It has been said Google is working on the “Manhattan project of Artificial intelligence “. The man in charge of the project thinks by 2040 we will be inferior to machines in almost every way. We live in scary times. Technology in many respects controls us and we are beholden to it now. We have a bleak outlook if the Govts are actively trying to undermine us at every turn. If Govts feel we are guilty before being charged with any crimes. If Technology will be the alter we all worship at. Where is the outrage at what Snowden has disclosed? We are more interested in Miley Cyrus twerking than the Govt spying on every detail of our lives. We care more about who gets cut off Americas Got Talent then we do about the fact out Constitution is being shredded before our very eyes. We care more about the New version of the IPhone or Samsung Galaxy 5 then we do about the very programs that are spying on you this very second. Sigh….

Wow. My mind is blown by this article. In case you were not aware Glenn Greenwald has started a new website with other like minded journalists called “The Intercept”. He has broken a few major stories in the last few weeks.

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Intercept article detailing the program.

20140225-152540.jpg

20140225-152555.jpg

20140225-152612.jpg

20140225-152634.jpg

20140225-152650.jpg

20140225-152705.jpg

20140225-152721.jpg

20140225-152732.jpg

20140225-152747.jpg

20140225-152758.jpg

20140225-152814.jpg

20140225-152832.jpg

20140225-152844.jpg

20140225-152901.jpg

20140225-152938.jpg

Advertisements

Fukishima: Protect yourself

I wrote a paper in college about Chernoybl long before anyone really considered the consequences. There is a 50 kilometer exclusion zone around the plant now no one is allowed in except with permission from the Govt.

The Chernobyl disaster (Ukrainian: Чорнобильська катастрофа, Chornobylska Katastrofa – Chornobyl Catastrophe) was a catastrophic nuclear accident that occurred on 26 April 1986 at the Chernobyl Nuclear Power Plant in Ukraine (then officially the Ukrainian SSR), which was under the direct jurisdiction of the central authorities of the Soviet Union. An explosion and fire released large quantities of radioactive particles into the atmosphere, which spread over much of the western USSR and Europe.
The Chernobyl disaster is widely considered to have been the worst nuclear power plant accident in history, and is one of only two classified as a level 7 event (the maximum classification) on the International Nuclear Event Scale (the other being the Fukushima Daiichi nuclear disaster in 2011).[1] The battle to contain the contamination and avert a greater catastrophe ultimately involved over 500,000 workers and cost an estimated 18 billion rubles.[2] The official Soviet casualty count of 31 deaths has been disputed, and long-term effects such as cancers and deformities are still being accounted for.

Chernoybl

The number of potential deaths arising from the Chernobyl disaster is heavily debated. The WHO’s prediction of 4,000 future cancer deaths in surrounding countries[142] is based on the Linear no-threshold model (LNT), which assumes that the damage inflicted by radiation at low doses is directly proportional to the dose.[143] Radiation epidemiologist Roy Shore contends that estimating health effects in a population from the LNT model “is not wise because of the uncertainties”.[144]

Radiation warning sign in Pripyat
According to the Union of Concerned Scientists the number of excess cancer deaths worldwide (including all contaminated areas) is approximately 27,000 based on the same LNT.[145]
Another study critical of the Chernobyl Forum report was commissioned by Greenpeace, which asserted that the most recently published figures indicate that in Belarus, Russia and Ukraine the accident could have resulted in 10,000-200,000 additional deaths in the period between 1990 and 2004.[146] The Scientific Secretary of the Chernobyl Forum criticized the report’s reliance on non-peer reviewed locally produced studies. Although most of the study’s sources were from peer-reviewed journals, including many Western medical journals, the higher mortality estimates were from non-peer-reviewed sources[146]), while Gregory Härtl (spokesman for the WHO) suggested that the conclusions were motivated by ideology.[147]
Chernobyl: Consequences of the Catastrophe for People and the Environment is an English translation of the 2007 Russian publication Chernobyl. It was published in 2009 by the New York Academy of Sciences in their Annals of the New York Academy of Sciences. It presents an analysis of scientific literature and concludes that medical records between 1986, the year of the accident, and 2004 reflect 985,000 premature deaths as a result of the radioactivity released.[148] Though, it was impossible to precisely determine what dose the affected people received, knowing the fact that the received doses varied strongly from one individual to the other in the population above which the radioactive cloud travelled, and also knowing the fact that one cannot tell for sure if a cancer in an individual from the former USSR is produced by radiation from Chernobyl accident or by other social or behavioral factors, such as smoking or alcohol drinking.[149]
The authors suggest that most of the deaths were in Russia, Belarus and Ukraine, though others occurred worldwide throughout the many countries that were struck by radioactive fallout from Chernobyl. The literature analysis draws on over 1,000 published titles and over 5,000 internet and printed publications discussing the consequences of the Chernobyl disaster. The authors contend that those publications and papers were written by leading Eastern European authorities and have largely been downplayed or ignored by the IAEA and UNSCEAR.[148] This estimate has however been criticized as exaggerated, lacking a proper scientific base.[22]

Fukishima

All these points are backed up by other research.

#1 It is estimated that there are 1,331 used nuclear fuel rods that need to be removed from Fukushima. Because of all of the damage that has taken place, computer-guided removal of the rods will not be possible. Manual removal is much riskier, and it is absolutely essential that the removal of each of the 1,331 rods goes perfectly because a single mistake could potentially lead to a nuclear chain reaction.
#2 According to Reuters, the combined amount of cesium-137 contained in those nuclear fuel rods is 14,000 times greater than what was released when the U.S. dropped an atomic bomb on Hiroshima at the end of World War II. Other estimates put this number far higher.
#3 Officials in Japan admit that 300 tons of radioactive water from Fukushima is entering the Pacific Ocean every 24 hours.
#4 According to a professor at Tokyo University, 3 gigabecquerels of cesium-137 are flowing into the port at Fukushima Daiichi every single day…
Yoichiro Tateiwa, NHK reporter: [Professor Jota] Kanda argues government statistics don’t add up. He says a daily leakage of 300 tons doesn’t explain the current levels of radiation in the water.
Jota Kanda, Tokyo University professor: According to my research there are now 3 gigabecquerels [3 billion becquerels] of cesium-137 flowing into the port at Fukushima Daiichi every day. But for the 300 tons of groundwater to contain this much cesium-137, one liter of groundwater has to contain 10,000 becquerels of the radioactive isotope.
NHK: Kanda’s research and monitoring by Tepco puts the amount of cesium-137 in the groundwater around the plant at several hundred becquerels per liter at most. He’s concluded that radioactive isotope is finding another way to get into the ocean. He’s calling on the government and Tepco to identify contamination routes other than groundwater.
#5 According to Tepco, a total of somewhere between 20 trillion and 40 trillion becquerels of radioactive tritium have gotten into the Pacific Ocean since the Fukushima disaster first began.
#6 Something is causing fish along the west coast of Canada to bleed from their gills, bellies and eyeballs. Could Fukushima be responsible?
#7 150 former sailors and Marines say that they now have radiation sickness as a result of serving on U.S. Navy ships near Fukushima and they are suing for damages.
#8 The Iodine-131, Cesium-137 and Strontium-90 that are constantly coming from Fukushima are going to affect the health of those living the the northern hemisphere for a very, very long time. Just check out what Harvey Wasserman had to say recently…
Iodine-131, for example, can be ingested into the thyroid, where it emits beta particles (electrons) that damage tissue. A plague of damaged thyroids has already been reported among as many as 40 percent of the children in the Fukushima area. That percentage can only go higher. In developing youngsters, it can stunt both physical and mental growth. Among adults it causes a very wide range of ancillary ailments, including cancer.

Cesium-137 from Fukushima has been found in fish caught as far away as California. It spreads throughout the body, but tends to accumulate in the muscles.
Strontium-90’s half-life is around 29 years. It mimics calcium and goes to our bones.
#9 It is believed that the Fukushima nuclear facility originally contained a whopping 1760 tons of nuclear material.
#10 It is being projected that the entire Pacific Ocean will soon “have cesium levels 5 to 10 times higher” than what we witnessed during the era of heavy atomic bomb testing in the Pacific many decades ago.
#11 According to the Wall Street Journal, it is being projected that the cleanup of Fukushima could take up to 40 years to complete.

Read more http://www.trueactivist.com/11-facts-about-the-ongoing-fukushima-nuclear-holocaust-that-are-almost-too-horrifying-to-believe

Fukishima

Chernoybl
20130821-074148.jpg

Fukishima

20130821-074541.jpg

20130821-074557.jpg

20130821-074614.jpg

20130821-074628.jpg

20130821-074659.jpg

More info and graphics

There are literally hundreds of articles in the last week discussing the impending doom in Japan. This issue really affects every single person on this planet. Whether you ignore it and remain apathetic is up to you. This accident will ultimately be responsible for millions of deaths. Mark my words on that. In action and pretending the problem is going away has not worked. Most of you do not realize just how serious a problem this has become. Main stream media will not talk about it whatsoever. Research what is going on… Your survival is at stake.

From Zero Hedge

After a self-imposed gag order by the mainstream media on any coverage of the Fukushima disaster (ostensibly the last thing the irradiated Japanese citizens needed is reading beyond the lies of their benevolent government, and TEPCO, and finding out just how bad the reality is especially since the key driver behind Abenomics is a return in confidence at all costs), the biggest nuclear catastrophe in history is once again receiving the attention it deserves. This follows the recent admission by TEPCO of the biggest leak reported at Fukushima to date, which forced the Japanese government to raise the assessment of Fukushima from Level 1 to Level 3, even though this is merely the catalyst of what has been a long and drawn out process in which Tepco has tried everything it could to contain the fallout from the exploded NPP, and failed. And today, in a startling and realistic assessment of Fukushima two and a half years after the explosion, the WSJ finally tells the truth: “Tepco Has Lost Control.”

Further

Here is how the mainstream media, in this case the Wall Street Journal, catches up with a topic covered extensively in the “alternative” media for the past several years:

“This is what we have been fearing,” said Shunichi Tanaka, chair of Japan’s Nuclear Regulation Authority, answering questions about the leak at a news conference. “We cannot waste even a minute” to take action.

Behind the leak is a more serious problem: During the past few months it has become clear that Tepco has lost control over the flow of water at the plant and that the problem is escalating, nuclear experts say.

Every day, the utility has to find a place to store around 400 tons of contaminated water that it pumps out of the radioactive reactor buildings, and Wednesday it warned that it is fast running out of space. Storage tanks set up on the fly during plant emergencies have started springing leaks, and Tepco can’t replace them with sturdier ones fast enough. Groundwater-contamination levels are spiking at the seaward side of the plant, and water is flowing into the ocean past a series of walls, plugs and barriers that have been flung up to impede its passage.
What does “losing control” mean in practical terms?

That lack of control is a big liability, said Kathryn Higley, a specialist in the spread of radiation and head of the Department of Nuclear Engineering and Radiation Health Physics at Oregon State University, who spent a week in Fukushima earlier this year.

“You have to find ways to control water coming through the site,” Ms. Higley said. “With any sort of accident, you want to control the timing of what’s released and when it gets released.”

So far, the levels of radioactivity that have escaped to the outside remain relatively low, but some experts warn they may not stay that way—particularly as equipment ages and the heavy-duty work of dismantling the damaged buildings and removing the melted fuel rods proceeds. The radioactivity of the water in the most recent leak was so high that workers couldn’t get close enough to search for the cause until the remaining fluid in the tank was removed.

Tepco said it doesn’t think that water has flowed into the sea but can’t say for sure. Some of the flooded reactor basements are similarly too hot to approach, and it is still not clear where the melted fuel cores are, or in what state.
The last statement bears repeating: “it is still not clear where the melted fuel cores are.” Well as long as TEPCO is 100% confident there are no uncontrolled chain reactions taking place… Then again hundreds of tons of coolant must be cooling something.

“In the future there might be even more heavily contaminated water coming through,” said Atsunao Marui, head of the groundwater research group at Japan’s National Institute of Advanced Industrial Science and Technology and a member of a blue-ribbon panel set up in May to figure out ways of managing the radioactive water. “It’s important to think of the worst-case scenario.”

Fukishima: the biggest threat facing Mankind

20130822-162139.jpg

20130822-162158.jpg

20130822-162305.jpg

20130822-162839.jpg

20130822-162904.jpg

20130822-162931.jpg

20130822-163001.jpg

20130822-163625.jpg

20130822-163656.jpg

20130822-163729.jpg

20130822-163802.jpg

Link/Infographic of the day. On anniversary of Hiroshima

Only two times in History has a Nuclear Weapons been used on a civilian population. The United States was guilty of being the Country that dropped them. This isn’t about arguing the morality or functionality of the decision. The Manhattan project was perhaps the greatest secret ever kept when you consider the amount of people involved.

Hiroshima Visualized

20130807-144447.jpg

20130807-144507.jpg

20130807-144521.jpg

20130807-144536.jpg

20130807-144754.jpg

Hiroshima visualized

popular science article

The Book

The first collection ever of the writings and insights of the original creators of the atomic bomb, along with pieces by the most important historians and interpreters of the subject, is now in paperback.

Born out of a small research program begun in 1939, the Manhattan Project eventually employed more than 130,000 people, including our foremost scientists and thinkers, and cost nearly $2 billion—and it was operated under a shroud of absolute secrecy. This groundbreaking collection of documents, essays, articles, and excerpts from histories, biographies, plays, novels, letters, and the oral histories of key eyewitnesses is the freshest, most exhaustive exploration yet of the topic.

Compiled by experts at the Atomic Heritage Foundation, the book features first-hand material by Albert Einstein, Leslie Groves, J. Robert Oppenheimer, Leo Szilard, Enrico Fermi, Richard Feynman, Niels Bohr, Henry Stimson, and many others.

Dozens of photographs depict key moments and significant figures, and concise explanatory material accompanies each selection. The project’s aftermath and legacy are covered as well, making this the most comprehensive account of the birth of the atomic age.

And now for something completely different

The argument that it seems hugely weird the NSA and US Govt wants to punish leakers such as Manning and Snowden to the fullest extent possible. At the same time they are leaking too secret information and perhaps compromising assets I do believe has value. There is something incredibly fishy about the timing of the base closures and this leak in particular.

Today the Daily Beast reported that an intercepted conference call between “more than 20 al Qaeda operatives” led nearly two dozen U.S. embassies scattered across Southwest Asia and North Africa to shut down over the weekend, a precautionary measure that American officials later extended through August 10. Based on testimony from three unnamed U.S. officials, reporters Eli Lake and Josh Rogin say al Qaeda lieutenants in Nigeria, Uzbekistan, Egypt and Islamic Maghreb discussed vague plans of attack with al Qaeda chief Ayman al-Zawahiri and the terrorist group’s Yemeni leader, Nasser al-Wuhayshi. One of the unnamed officers compared the call to a meeting of the “Legion of Doom.”

Within hours of publication, however, a bevy of national security journalists began casting doubts on the leaked information contained within the Beast’s report. Two theories were quickly born. Adam Goldman of the Associated Press wondered if the leak was manufactured to protect human intelligence (that is, a leaker within al Qaeda), while Ken Delanian of the Los Angeles Times suggested that it was intended to glorify the NSA’s signals intelligence capabilities at a politically vulnerable moment. Barton Gellman of the Washington Post, meanwhile, failed to see how the entire story — the leak, the method of intercept, and the contents of the call — added up:

Did the NSA/CIA just run an intelligence operation on The Daily Beast?

The original article on the conference call

There is something very fishy about this in my estimation.

The crucial intercept that prompted the U.S. government to close embassies in 22 countries was a conference call between al Qaeda’s senior leaders and representatives of several of the group’s affiliates throughout the region.

The intercept provided the U.S. intelligence community with a rare glimpse into how al Qaeda’s leader, Ayman al-Zawahiri, manages a global organization that includes affiliates in Africa, the Middle East, and southwest and southeast Asia.

Several news outlets reported Monday on an intercepted communication last week between Zawahiri and Nasser al-Wuhayshi, the leader of al Qaeda’s affiliate based in Yemen. But The Daily Beast has learned that the discussion between the two al Qaeda leaders happened in a conference call that included the leaders or representatives of the top leadership of al Qaeda and its affiliates calling in from different locations, according to three U.S. officials familiar with the intelligence. All told, said one U.S. intelligence official, more than 20 al Qaeda operatives were on the call.

Exclusive: Al Qaeda Conference Call Intercepted by U.S. Officials Sparked Alerts

I get the sense they are playing us as fools yet again. Sadly I believe they are mostly correct. Most people care more about who advances on American Idol then the fact that their 4th Admendment rights are being shredded. This is a way to distract and confuse.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.[1]

fourth admendment

Again.. I use my WordPress app on my phone to do most of my work. The links I post are mostly mobile links. All you have to do to make them work on a desktop is remove the m from the address.
http://en.m.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution

To
http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution

Map of Yeman

20130808-053907.jpg

XKeyscore. Total information awareness.

I do think this information is the tip of the iceberg. I think we are being systematically lied to and manipulated to achieve the overall objective of total surveillance at any cost.

Lets begin with the Guardian story… Again it seems clear either Greenwald or reporters from Der Spiegal will win the Pulitzer Prize for Journalism this year.

Remind yourself… This is not only on Obama. It was a series of dominoes that started to fall with the attacks of 9-11.

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Guardian article

20130801-101926.jpg

20130801-101944.jpg

20130801-102028.jpg

20130801-102046.jpg

20130801-102106.jpg

20130801-102143.jpg

20130801-102203.jpg

20130801-102220.jpg

20130801-102248.jpg

20130801-102303.jpg

20130801-102319.jpg

20130801-102332.jpg

20130801-102344.jpg

20130801-102358.jpg

20130801-102415.jpg

20130801-102430.jpg

20130801-102443.jpg

20130801-102458.jpg

20130801-102515.jpg

20130801-102528.jpg

20130801-102542.jpg

20130801-102555.jpg

20130801-102607.jpg

20130801-102622.jpg

20130801-102635.jpg

20130801-102653.jpg

20130801-102707.jpg

20130801-102757.jpg

20130801-102838.jpg

20130801-102853.jpg

20130801-102911.jpg

20130801-102923.jpg

the slides in better detail

FISA court info graphic

20130801-103442.jpg

infographic link

The administration, lawmakers and the intelligence community have claimed the National Security Agency (NSA) programs that use data from private companies to track millions of American are legal. One mysterious court has been tasked with determining whether these programs cross the line, but their decisions are secret, and made without public debate.
The surveillance program that first made news involved collecting the metadata on millions of telephone calls with help from telecommunications giant Verizon. The program is complicated and not much is known yet, so we decided to show you what we do know with the help of visuals.
We start with a flow chart about how the NSA-Verizon program works and the players involved, and move on to a graphic that breaks down the Foreign Intelligence Surveillance Court (FISC) and the elusive judges assigned to oversee each FISA application. At its peak in 2007, the FISC approved nearly 2,500 applications, but only denied four.
Wondering what they are? Sorry, that’s classified.

The Navy’s snooping machine

No, the U.S. Navy is probably not using a multi-billion dollar submarine to listen in on your phone calls and emails on behalf of the National Security Agency.
But it could.
A long line of secretive Navy spy submarines, most recently a nuclear-powered behemoth named USS Jimmy Carter, have for decades infiltrated remote waters to gather intelligence on rival states’ militaries, insurgents and terrorists on behalf of the NSA and other agencies using a range of sophisticated devices, including special equipment for tapping undersea communications cables
Before NSA whistleblower Edward Snowden revealed the agency’s phone and Internet monitoring programs targeting U.S. and European citizens, the mainstream press paid little attention to the elusive, subsurface warship. But following Snowden’s disclosures last month, several publications including the Huffington Post and the German Der Spiegel speculated that the Jimmy Carter was aiding the NSA’s surveillance of citizens’ communications in the U.S. and Europe.
“It seems this same submarine,” the Huffington Post claimed, “was pressed into service to spy on Europe.”

Submarine Surveillance

Thoughts

I will again say that the technology the NSA is using is far superior to what is available for us as consumers. I have said for a couple of years that the spying was total and complete –be it foreign or domestic. I came to that conclusion because I have studied the NSA since the 80’s and have read hundreds of articles and several books about how they operate. The Shadow Factory by James Bamford is something I encourage everyone to read if you have an interest in this topic.

I always return to the famous Wired article on Bluffdale and Stellar Wind by Bamford. He basically lays out exactly what Snowden has leaked. The details are not as precise but if you read between the lines you can guess what he is hinting at.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.

wireds article

I will be back later with the long promised research into cyber warfare that I have been working on…

I think this video is so moving… Captured on the evening of Sept 11th 2001. American composer Basinski used a looping tape that slowly was disintegrating and it is a powerful statement in my opinion of what occurred on that day. As the light begins to fade and the smoke continues to billow… The US finds itself in a new reality. It is hard to watch this for me without becoming somewhat emotional. I knew that life would never be the same. In some respects innocence was lost that day.

Info graphic of bolides and massive precision attack on cyber targets in the bank community to the tune of 45 million dollars.

Trying to start being more involved. Energy level is getting better. I do have longer posts planned out and the research has been started. I will start trying to give at least something every day again. Been a hellish 4 weeks for me. No time to cry about my problems however.

Hope you enjoy the info graphic about meteors.

http://www.bolid.es/?embed

b

Wanted to add a fascinating article from The New York Times about a topic I deal with frequently. Cyber security and Cyber Attacks as well as Cyber Crime. Thieves were able to orchestrate a 45 million dollar bank heist via coordinated attack on multiple banks and ATMs with virtually military precision. Remarkable in many respects.

http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html?hp&_r=0

Map or Infographic of the day plus update on Blackwater. Plus two interesting pdf’s.

Both logos, side by side. Note the original be...

Both logos, side by side. Note the original below, with the curved Blackwater wordmark. (Photo credit: Wikipedia)

Just as I argued in this post. Blackwater often did jobs the CIA/JSOC were hesitant to do.

“”””””””””But the most noteworthy thing about the largely failed prosecution wasn’t the outcome. It was the tens of thousands of pages of documents—some declassified—that the litigation left in its wake. These documents illuminate Blackwater’s defense strategy—and it’s a fascinating one: To defeat the charges it was facing, Blackwater built a case not only that it worked with the CIA—which was already widely known—but that it was in many ways an extension of the Agency itself.””””””””

“””But according to the documents Blackwater submitted in its defense—as well as an email exchange I had recently with Prince—the contractor’s relationship with the CIA was far deeper than most observers thought. “Blackwater’s work with the CIA began when we provided specialized instructors and facilities that the Agency lacked,” Prince told me recently, in response to written questions. “In the years that followed, the company became a virtual extension of the CIA because we were asked time and again to carry out dangerous missions, which the Agency either could not or would not do in-house.”

http://www.thedailybeast.com/articles/2013/03/14/exclusive-erik-prince-on-blackwater-s-secret-cia-past.html

This does not surprise me whatsoever.. and to some extent I predicted it.

2013 ATA SFR for SSCI 12 Mar 2013

AutonomyReport

Infographic or Map will come later. I am not feeling very good.

Enhanced by Zemanta