NSA using facial recognition software to steal your images. Russia beating the West at Propaganda war in Ukraine.

I think it safe to assume nothing is sacred in terms of the NSA. They are snagging any information they can and can afford to let technology catch up to what they have. They steal your phone calls… Web searches.. Your texts… They use your phone to see where you are going and how often… They are stealing your friends lists and finding out who you talk to and how often. The New York Times is now reporting they are stealing your photos off Facebook..Instagram or any other service they want. Let’s not forget this is all against the 4th amendment of the US Constitution..

 

 

 

The implications of this are devious and mind numbing. Let’s not forget they have not stopped any attacks anywhere for any reason. They are data mining for their own nefarious illegal plans which the NSA thinks you have zero right to actually know.

 

 

http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html?_r=0

 

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.

The implications of this are devious as well as mind numbing. They have yet to stop a single attack anywhere for any reason. Th continue Data mining for their own nefarious illegal plans.

The documents themselves can be found here.

http://www.nytimes.com/interactive/2014/06/01/us/nsa-document.html?_r=0

 

Russia and Propaganda.

I have been interested in Propaganda for awhile and the various ways it is used both know and in our past. Propaganda has been around for hundreds of years now and has been almost perfected in WW2 and since the Cold War. The US and Russia are in a bitter propaganda war for the hearts and minds of the World concerning Ukraine.

Russia appears to be winning.

Rodionov says that, since its founding, Ruptly has attracted 14 subscribers and over 200 customers, including German broadcasters “both public and private.” Subsidies from Moscow enable Ruptly to offer professionally produced videos at prices cheaper than those of the private competition.

The battle over Ukraine is being fought with diverse means — with harsh words and soft diplomacy, with natural gas, weapons and intelligence services. But perhaps the most important instruments being deployed by Moscow are the Internet, newspapers and television, including allegedly neutral journalists and pundits dispatched around the world to propagate the Kremlin position.

“We’re in the middle of a relentless propaganda war,” says Andrew Weiss, vice president of studies at the Carnegie Endowment for International Peace, an influential Washington think tank. Weiss describes this propaganda as a crucial tool used by Russia to conduct its foreign policy.

Moscow is looking beyond the short-term, seeking to influence opinion in the long-run to create “an alternative discourse in Western countries as well,” says Margarita Simonyan, editor in chief of Kremlin foreign broadcaster RT, formerly known as Russia Today, which owns Ruptly.

The Kremlin invests around €100 million ($136 million) a year in Russian media abroad in order to influence public opinion in the West. This effort also helps explain why Putin addressed Germans directly in his speech on the annexation of Crimea. Noting the Kremlin had supported Germany’s reunification process, he called on Germans to back Russia’s reunification with Crimea. Putin’s popularity in Germany has declined steadily over the years, but his worldview remains quite popular.

A Triumphant Media Advance

Sources within the Kremlin express satisfaction these days when talking about Moscow’s information policies. “We may have won the war in Georgia in 2008, but we lost the propaganda battle against America and the West by a mile,” says one. “Thanks to RT and the Internet, though, we are now closing the gap.”

Whereas Ruptly is seeking to establish itself as an alternative to Reuters and the Associated Press in providing video footage, RT has already successfully established itself in the nine years since its creation, recently surpassing even CNN when it comes to clips viewed on YouTube. With close to 1.2 billion views, the BBC is the only media outlet ahead of RT. In Britain, RT has more viewers than the Europe-wide news station Euronews and in some major US cities, the channel is the most-viewed of all foreign broadcasters. RT’s 2,500 employees report and broadcast in Russian, English, Spanish and Arabic with German to be added soon.

The triumphant advance of Putin’s broadcaster began in a former factory in northeast Moscow. Founding RT editor Simonyan was just 25 at the time Putin appointed her in 2005. Her assignment from the Russian president: to “break the monopoly of the Anglo-Saxon mass media.”

It’s a mandate she has been pursuing successfully ever since. “There’s large demand for media that doesn’t just parrot the uniform pulp from the Western press,” says Simonyan. “Even in Western countries.” RT gives pro-Russian representatives from Eastern Ukraine far more air time than supporters of the government in Kiev, and not even Simonyan disputes this fact. “We’re something along the lines of Russia’s Information Defense Ministry,” her co-workers say, not without pride.

Ruptly and RT are only the most visible instruments being used by the Kremlin. Other propaganda methods being exploited can be less obvious.

For example, when German talk shows invite Russian journalists to speak about the Ukraine crisis, they are almost always pundits who could have been taken directly out of the Kremlin propaganda department. Programmers, of course, like to book these guests because they generate heated and provocative discussion. But it’s also a function of the fact that experts critical of the government either don’t want to talk or are kept from doing so. Take the example of Sergej Sumlenny, who served until January as the German correspondent for the Russian business magazineExpert. Early on, he appeared often on German talk shows, intelligently and pointedly criticizing Putin’s policies. He has since been driven out at the magazine.

In his stead, the Russian perspective is now represented on German talk shows by people like Anna Rose, who is generally introduced as a correspondent for Rossiyskaya Gazeta, or Russian Gazette. The name sounds innocuous enough, but eyebrows should be raised immediately when this “serious” Russian journalist begins claiming that the Ukrainian army could be shooting “at women and children” and that Russian soldiers need to provide them with protection. Her positions suddenly become more understandable with the knowledge that Rossiyskaya Gazeta is the Russian government’s official newspaper.

Manipulating Comments and Social Media

Those who read comments posted under articles about Ukraine on news websites will have noticed in recent months that they have been filled with missives that always seem to follow the same line of argumentation. Moscow’s independent business daily Vedomosti reported recently that, since the start of the Ukraine crisis, the presidential administration in Moscow has been testing how public opinion in the United States and Europe can be manipulated using the Internet and social networks. The paper reported that most of the professional comment posters active in Germany are Russian immigrants who submit their pro-Russian comments on Facebook and on news websites.

In addition, journalists and editors at German websites and publications report receiving letters and emails offering “explosive information about the Ukraine crisis” on an almost daily basis. The “sources” often mention they have evidence about the right-wing nature of the Kiev government that they would like to supply to journalists. The letters are written in German, but appear to include direct translations of Russian phrases. They would seem to have been written by mother-tongue Russian speakers.Other forms of propaganda have also been deployed in recent months. For example, there have been frequent incidences of intercepted conversations of Western diplomats or Kiev politicians getting published in ways that serve Russia’s interests. From the “Fuck the EU” statement by Victoria Nuland, the top US diplomat to Europe, right up to statements made by Estonia’s foreign minister that were apparently supposed to prove who was responsible for the deaths of protesters on Maidan Square. The Russian media also seemed to take pleasure in reporting in mid-April that CIA head John Brennan had traveled to Kiev.

There’s a high likelihood that this confidential information and the content of intercepted communications is being strewn by Russian intelligence. Officials at Western intelligence agencies assume that even communications encrypted by the Ukrainian army are being intercepted by the Russians.

 propa

http://www.spiegel.de/international/world/russia-uses-state-television-to-sway-opinion-at-home-and-abroad-a-971971.html

What did Pakistan Know about Bin Laden and when.

I have wondered this exact question since the alleged killing of Bin Laden. I say alleged because as a lay citizen there has not exactly been what you would call proof ever presented. They have made the photos off limits… They have never released the DNA for independent testing. They buried him at sea seeming the day after he was apparently or allegedly shot.

Pakistan had to know that Bin Laden was there. It is a uncomfortable truth since it raises many troubling questions about our Money flowing there and they are playing both sides almost without question. How do you live very close to the Capital of Pakistan and a town that houses the largest military academy in the Country and not know he lives miles if not yards away.

From the New York Times article this weekend.

What Pakistan knew about Bin Laden

After our first day of reporting in Quetta, we noticed that an intelligence agent on a motorbike was following us, and everyone we interviewed was visited afterward by ISI agents. We visited a neighborhood called Pashtunabad, “town of the Pashtuns,” a close-knit community of narrow alleys inhabited largely by Afghan refugees who over the years spread up the hillside, building one-story houses from mud and straw. The people are working class: laborers, bus drivers and shopkeepers. The neighborhood is also home to several members of the Taliban, who live in larger houses behind high walls, often next to the mosques and madrasas they run.

The small, untidy entrance on the street to one of those madrasas, the Jamiya Islamiya, conceals the size of the establishment. Inside, a brick-and-concrete building three stories high surrounds a courtyard, and classrooms can accommodate 280 students. At least three of the suicide bombers we were tracing had been students here, and there were reports of more. Senior figures from Pakistani religious parties and provincial-government officials were frequent visitors, and Taliban members would often visit under the cover of darkness in fleets of S.U.V.s.

One of many madrasas in Quetta in 2008.
ALEX MAJOLI / MAGNUM
We requested an interview and were told that a female journalist would not be permitted inside, so I passed some questions to the Pakistani reporter with me, and he and the photographer went in. The deputy head of the madrasa denied that there was any militant training there or any forced recruitment for jihad. “We are educating the students in the Quran, and in the Quran it is written that it is every Muslim’s obligation to wage jihad,” he said. “All we are telling them is what is in the Quran. Then it is up to them to go to jihad.” He ended the conversation. Classes were breaking up, and I could hear a clamor rising as students burst out of their classrooms. Boys poured out of the gates onto the street. They looked spindly, in flapping clothes and prayer caps, as they darted off on their bikes and on foot, chasing one another down the street.

The reporter and the photographer joined me outside. They told me that words of praise were painted across the wall of the inner courtyard for the madrasa’s political patron, a Pakistani religious-party leader, and the Taliban leader Mullah Muhammad Omar. This madrasa, like so many in Pakistan, was a source of the Taliban resurgence that President Hamid Karzai and other Afghan leaders had long been warning about. In this nondescript madrasa in a poor neighborhood of Quetta, one of hundreds throughout the border region, the Taliban and Pakistan’s religious parties were working together to raise an army of militants.

“The madrasas are a cover, a camouflage,” a Pashtun legislator from the area told me. Behind the curtain, hidden in the shadows, lurked the ISI.

The Pakistani government, under President Pervez Musharraf and his intelligence chief, Lt. Gen. Ashfaq Parvez Kayani, was maintaining and protecting the Taliban, both to control the many groups of militants now lodged in the country and to use them as a proxy force to gain leverage over and eventually dominate Afghanistan. The dynamic has played out in ways that can be hard to grasp from the outside, but the strategy that has evolved in Pakistan has been to make a show of cooperation with the American fight against terrorism while covertly abetting and even coordinating Taliban, Kashmiri and foreign Qaeda-linked militants. The linchpin in this two-pronged and at times apparently oppositional strategy is the ISI. It’s through that agency that Pakistan’s true relationship to militant extremism can be discerned — a fact that the United States was slow to appreciate, and later refused to face directly, for fear of setting off a greater confrontation with a powerful Muslim nation.

Clearly Pakistan was endorsing and encouraging the Taliban in an attempt apparently to control Afghanistan.

Islamabad is a green, tranquil home for civil servants and diplomats, but for several days it resounded with gunfire and explosions. Crowds of worried parents arrived from all over the country to try to retrieve their children. The Red Mosque leaders tried to make the students stay. “They said if the women and others die, the people will take their side,” one father told me, and I realized then how premeditated this all was, how the girls were pawns in their plan to spark a revolution.

A week after the siege began, there was a ferocious battle. Elite Pakistani commandos rappelled from helicopters into the mosque and were raked with machine-gun fire. Perched in the mosque’s minarets and throughout its 75 rooms, the militants fought for 10 hours. They hurled grenades from bunkers and basements, and suicide bombers threw themselves at their attackers. The commandos found female students hiding in a bricked-up space beneath the stairs and led 50 women and girls to safety. Ghazi retreated to a basement in the compound. He died there as the last surviving fighters battled around him.

More than 100 people were killed in the siege, including 10 commandos. The ISI — despite having a long relationship with the mosque and its leaders, as well as two informers inside providing intelligence — played a strangely ineffective role. In a cabinet meeting after the siege, ministers questioned a senior ISI official about the intelligence service’s failure to prevent the militant action. “Who I meet in the evening and what I discuss is on your desk the next morning,” one minister told the official. “How come you did not know what was happening a hundred meters from the ISI headquarters?” The official sat in silence as ministers thumped their desks in a gesture of agreement.

“One hundred percent they knew what was happening,” a former cabinet minister who attended the meeting told me. The ISI allowed the militants to do what they wanted out of sympathy, he said. “The state is not as incompetent as people believe.”

Finally Bin Laden

It took more than three years before the depth of Pakistan’s relationship with Al Qaeda was thrust into the open and the world learned where Bin Laden had been hiding, just a few hundred yards from Pakistan’s top military academy. In May 2011, I drove with a Pakistani colleague down a road in Abbottabad until we were stopped by the Pakistani military. We left our car and walked down a side street, past several walled houses and then along a dirt path until there it was: Osama bin Laden’s house, a three-story concrete building, mostly concealed behind concrete walls as high as 18 feet, topped with rusting strands of barbed wire. This was where Bin Laden hid for nearly six years, and where, 30 hours earlier, Navy SEAL commandos shot him dead in a top-floor bedroom.

After a decade of reporting in Afghanistan and Pakistan and tracking Bin Laden, I was fascinated to see where and how he hid. He had dispensed with the large entourage that surrounded him in Afghanistan. For nearly eight years, he relied on just two trusted Pakistanis, whom American investigators described as a courier and his brother.

People knew that the house was strange, and one local rumor had it that it was a place where wounded Taliban from Waziristan recuperated. I was told this by Musharraf’s former civilian intelligence chief, who had himself been accused of having a hand in hiding Bin Laden in Abbottabad. He denied any involvement, but he did not absolve local intelligence agents, who would have checked the house. All over the country, Pakistan’s various intelligence agencies — the ISI, the Intelligence Bureau and Military Intelligence — keep safe houses for undercover operations. They use residential houses, often in quiet, secure neighborhoods, where they lodge people for interrogation or simply enforced seclusion. Detainees have been questioned by American interrogators in such places and sometimes held for months. Leaders of banned militant groups are often placed in protective custody in this way. Others, including Taliban leaders who took refuge in Pakistan after their fall in Afghanistan in 2001, lived under a looser arrangement, with their own guards but also known to their Pakistani handlers, former Pakistani officials told me. Because of Pakistan’s long practice of covertly supporting militant groups, police officers — who have been warned off or even demoted for getting in the way of ISI operations — have learned to leave such safe houses alone.

The split over how to handle militants is not just between the ISI and the local police; the intelligence service itself is compartmentalized. In 2007, a former senior intelligence official who worked on tracking members of Al Qaeda after Sept. 11 told me that while one part of the ISI was engaged in hunting down militants, another part continued to work with them.

Soon after the Navy SEAL raid on Bin Laden’s house, a Pakistani official told me that the United States had direct evidence that the ISI chief, Lt. Gen. Ahmed Shuja Pasha, knew of Bin Laden’s presence in Abbottabad. The information came from a senior United States official, and I guessed that the Americans had intercepted a phone call of Pasha’s or one about him in the days after the raid. “He knew of Osama’s whereabouts, yes,” the Pakistani official told me. The official was surprised to learn this and said the Americans were even more so. Pasha had been an energetic opponent of the Taliban and an open and cooperative counterpart for the Americans at the ISI. “Pasha was always their blue-eyed boy,” the official said. But in the weeks and months after the raid, Pasha and the ISI press office strenuously denied that they had any knowledge of Bin Laden’s presence in Abbottabad.

Fantastic article… If you want to understand the dynamics in place and how things went down you have to read this.

New York Times. What Pakistan knew about Bin Laden

>

The Air Sea Battle Concept. The plan for War with China.

I have covered this in some detail last year. This blog was linked to be the Yale Journal of International Affairs. I basically covered what the author of the article was suggesting. He could not believe someone had actually signed off on this concept. This is how the US plans to have a war with China should that time come.

The US military today faces an emerging major operational challenge, particularly in the Western Pacific Theater of Operations (WPTO). The Chinese People’s Liberation Army’s (PLA) ongoing efforts to field robust anti-access/area-denial (A2/AD) capabilities are threatening to make US power projection increasingly risky and, in some cases and contexts, prohibitively costly. If this occurs, the United States will find itself effectively locked out of a region that has been declared a vital security interest by every administration in the last sixty years. It will also leave longstanding US allies and partners vulnerable to aggression or, more likely, subtle forms of coercion. Consequently, the United States confronts a strategic choice: either accept this ongoing negative shift in the military balance, or explore options for offsetting it. This paper does just that. It offers a point-of-departure concept designed to maintain a stable military balance in the WPTO, one that offsets the PLA’s rapidly improving A2/AD capabilities. We have titled this concept “AirSea Battle,” in recognition that this theater of operations is dominated by naval and air forces, and the domains of space and cyberspace.
The Unprovoked Challenge
For well over half a century, the United States has been a global power with global interests. These interests include (but are not limited to) extending and defending democratic rule, maintaining access to key trading partners and resources, and reassuring those allies and partners who cooperate with the United States in defending common interests. The United States’ ability to project and sustain military power on a large scale has been, and remains, essential to this endeavor.
During much of the Cold War the Soviet Union posed a serious military challenge to US power-projection capabilities. Fortunately, the two superpowers managed to avoid a major war. Nonetheless, the US military’s unsurpassed ability to project and sustain large forces overseas was demonstrated in limited wars in Korea, Vietnam and the Persian Gulf, as well as in numerous other, smaller contingencies. In the decade or so following the Soviet Union’s collapse the US military’s power-projection capabilities in defense of the nation’s interests were effectively unchallenged.

This state of affairs is almost certainly ending, with significant consequences for US security. With the spread of advanced military technologies and their exploitation by other militaries, especially China’s PLA, the US military’s ability to operate in an area of vital interest, the Western Pacific, is being increasingly challenged. While Beijing professes benign intentions, it is an old military maxim that since intentions can change overnight — especially in authoritarian regimes — one must focus on the military capabilities of other states.

Currently there is little indication that China intends to alter its efforts to create “no-go zones” out to the second island chain, which extends as far as Guam and New Guinea. Unless Beijing diverts from its current course of action, or Washington undertakes actions to offset or counterbalance the effects of the PLA’s military buildup, the cost incurred by the US military to operate in the Western Pacific will likely rise sharply, perhaps to prohibitive levels, and much sooner than many expect.

Article on Air Sea battle concept

PDF on Air Sea Battle Concept
PDF on Air Sea Battle Concept

The Yale Journal of International Affairs article on Air Sea Battle Concept

Yale Journal of International Affairs article

Do you see where my blog is listed?

Here is the article I wrote that gets mentioned

Drakeequation

How badly are we being manipulated. The 4 d ‘s Deny , Disrupt, Degrade, Deceive

First for something cool

The Brilliant Cube. Location South Korea.

Brilliant Cube on Vimeo : http://vimeo.com/m/77023605

Brilliant Cube

GCHQ and NSA with the other five eyes partners will stop at nothing to ruin your reputation

Besides from the NSA and GCHQ and five eyes other partners manipulating the cryptographic standards of the Internet so they can spy on you more readily…. This is by far the most disturbing development to date. The intelligence agencies will use as many means as they can to discredit you and ruin your reputation as they can without any finding of guilt or even being charged in any court of law.

Machines of loving grace

If you do not think the Snowden revelations impact you or you are immune from them you are vastly misguided or delusional. We are at the mercy of technology as it is right now. We live in many ways smack in the center of 1984. We live in a global police state. The ideas of freedom and democracy are illusions. In a very short period of time computers and machines will be more intelligent and more able than humanity. We are playing God in many ways…. We could be designing the very technology that ends up enslaving us. I posted two days ago on this blog about Google buying up artificial intelligence and machine learning companies left and right. It has been said Google is working on the “Manhattan project of Artificial intelligence “. The man in charge of the project thinks by 2040 we will be inferior to machines in almost every way. We live in scary times. Technology in many respects controls us and we are beholden to it now. We have a bleak outlook if the Govts are actively trying to undermine us at every turn. If Govts feel we are guilty before being charged with any crimes. If Technology will be the alter we all worship at. Where is the outrage at what Snowden has disclosed? We are more interested in Miley Cyrus twerking than the Govt spying on every detail of our lives. We care more about who gets cut off Americas Got Talent then we do about the fact out Constitution is being shredded before our very eyes. We care more about the New version of the IPhone or Samsung Galaxy 5 then we do about the very programs that are spying on you this very second. Sigh….

Wow. My mind is blown by this article. In case you were not aware Glenn Greenwald has started a new website with other like minded journalists called “The Intercept”. He has broken a few major stories in the last few weeks.

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Intercept article detailing the program.

20140225-152540.jpg

20140225-152555.jpg

20140225-152612.jpg

20140225-152634.jpg

20140225-152650.jpg

20140225-152705.jpg

20140225-152721.jpg

20140225-152732.jpg

20140225-152747.jpg

20140225-152758.jpg

20140225-152814.jpg

20140225-152832.jpg

20140225-152844.jpg

20140225-152901.jpg

20140225-152938.jpg

Yanukovych refuses to step down. Dirty Wars documentary. True Detective literary reference.

I cannot imagine this will end well.. I cannot imagine far more blood will not be spilled. Given my knowledge of History and Foreign Policy… I cannot imagine Russia is not seriously considering its options even now.

“””””””””Kiev, Ukraine (CNN) – Embattled Ukrainian President Viktor Yanukovych insisted in an interview aired on Ukrainian TV Saturday that he is not resigning and not leaving the country.

Around the same time, an opposition leader and former Prime Minister, Yulia Tymoshenko, was freed from prison.

Ukraine’s Parliament voted unanimously to remove Yanukovych from office. It’s not clear if this is binding.

The Parliament also voted to hold new elections on May 25, a key opposition demand.

Yanukovych recorded his defiant statement in Kharkiv, a pro-Russian stronghold in the eastern part of Ukraine.

He said he would continue to work to stop the bloodshed and prevent further division within the country.

It came after his absence from the capital, Kiev — a day after he signed a landmark peace deal with the opposition to end days of bloody protests — fueled speculation he might heed opposition calls for him to stand down.

At the presidential residence in a Kiev suburb, groundskeepers and gate personnel kept watch over living quarters that were vacant.

Gone were the Ukrainian President’s guards. And opposition leader Vitali Klitschko said Yanukovych had left town, a day after European Union leaders helped broker the peace agreement.

“Unfortunately, President Yanukovych who did not hear the people has withdrawn from his constitutional duties himself. And today he has already left the capital. Millions of citizens see only one option in the current situation — it is calling the early presidential election,” Klitschko said Saturday.””””””””””

CNN report

How the revolt has escalated

“””””””””””When the Euromaidan protests began in Kiev in late November, few people would have predicted exactly how devastating they would become. What began as a small, peaceful protest quickly turned violent. The protests, which began after a shift away from the European Union toward Russia, slowly became a broader denunciation of President Viktor Yanukovych’s government. The events ebbed and flowed until reaching a new peak of violence this week, with the latest figures suggesting that at least 60 people have died in the past few days.

The images coming out of Ukraine have understandably been described as “apocalyptic,” almost as if they were something out of a film. But Euromaidan is a real event, taking place in a real city, where millions of people with homes and businesses are also trying to live their daily life.

One person who has been keeping track of all this is Kiev resident Dmytro Vortman. Since Dec. 9, Vortman has been using his own footwork and media report to map the progression of the protests in the Maidan Nezalezhnosti, Kiev’s Independence Square, and then painstakingly plotting their progress on maps using Adobe Illustrator. The maps, which were first picked up by KnowMore’s Max Ehrenfreund, have been widely shared by Euromaidan-linked social media accounts. While we can’t vouch for every detail of the maps, they provide a fascinating glimpse into how the Kiev protests developed.

This is the first map that Vortman created showing the scene on Dec. 8, the third weekend of protests in Kiev, and when the protests began to gain international attention””””””””””””

Washington Post maps of escalation of protests

20140222-132200.jpg

20140222-132219.jpg

20140222-132237.jpg

20140222-132255.jpg

20140222-132319.jpg

20140222-132341.jpg

At some point you would think you would realize you are in defiance of hundreds of thousands of protestors as well as Parliament. You might realize in the best interest of your Country it is best to step down… Maybe just maybe you can spare your life as well as many other people.

Dirty Wars the documentary

So you think you understand US Foreign Policy. This movie will shake your beliefs. It was made by the journalist Jeremy Scahill and provides a truly un nerving account of the dirty wars that American Special Forces and Intelligence have been involved in during the years since 9/11 from Afghanistan to Yemen and Somalia and on to present day.

True Detective Literary Reference.

If you like the show . Most of the plot ideas or basis are from a book written over a hundred years ago. The King in Yellow by Robert Chambers has influenced many many writers. HP Lovecraft being one of them. The book is actually in the public domain and can be read for free. You can read it online or you can download it to IBooks or Kindle for no cost. I will post the link in a second.

This poem to start the book reminds me of virtually all of HP Lovecrafts worlds.

“”””””””Along the shore the cloud waves break,
The twin suns sink beneath the lake,
The shadows lengthen
In Carcosa.

Strange is the night where black stars rise,
And strange moons circle through the skies
But stranger still is
Lost Carcosa.

Songs that the Hyades shall sing,
Where flap the tatters of the King,
Must die unheard in
Dim Carcosa.

Song of my soul, my voice is dead;
Die thou, unsung, as tears unshed
Shall dry and die in
Lost Carcosa.”””””””””””

The King in Yellow by Robert Chambers

I was able to download it via Dropbox and then open the file with IBooks and can read it just as any other book in my library.

Amazon central to Drone Strikes on Americans. Sniper time. Secret Space plane. Cryptography and it’s value.

I am off this afternoon and usually do not blog this much. I really started the blog to talk about Backgammon and the Indianapolis Colts. I never thought anyone would ever read it… I instead starting writing about things that interest me. Drones, History, Foreign Policy, NSA, Cryptography, CIA etc…

I was totally alarmed by two things I read today.

Amazons role in targeted killings of Americans.

I personally am against the use of Drones as weapons vs anyone for any reason. If you target Americans… You are not allowing them you are taking away a persons Constitutional guarantee of due process of the law.

“”””””Amazon is now integral to the U.S. government’s foreign policy of threatening and killing.

Any presidential decision to take the life of an American citizen is a subset of a much larger grave problem. Whatever the nationality of those who hear the menacing buzz of a drone overhead, the hijacking of skies to threaten and kill those below is unconscionable. And, as presently implemented, unconstitutional.

On Feb. 11 the Times reported that the Obama administration “is debating whether to authorize a lethal strike against an American citizen living in Pakistan who some believe is actively plotting terrorist attacks.” In effect, at issue is whether the president should order a summary execution — an assassination — on his say-so.

The American way isn’t supposed to be that way. The “due process of law” required by the Fifth Amendment of the United States Constitution is not supposed to be whatever the president decides to do.”””””””

http://m.huffpost.com/us/entry/4775840

DHS to buy 141,000 Sniper Bullets… Bringing the amount of ammunition purchased in last several years at over 2 billion

This is just staggering and scary.

“””””””””The Department of Homeland Security is buying more bullets with a solicitation for over 141,00 rounds of sniper ammunition.

According to a solicitation posted on FedBizOpps, the federal agency is looking to procure 141,160 rounds of Hornady .308 Winchester 168gr A-MAX TAP ammunition.

Such ammunition is sometimes retailed as “Zombie Max,” a marketing gimmick alluding to its power.

“What makes the .308 ammunition so deadly is the long range capability of the round,” notes James Smith. “The ability is called ballistic coefficient, or the efficiency of a projectile in overcoming air resistance as it travels to its target. According to Speer Reloading Manual Number 13, the .308 165 grain has the highest coefficient of any hunting rifle.”

The latest purchase further illustrates the fallacy of the DHS’ excuse that it is buying bullets in bulk in order to save money.

The federal agency will pay around $1.20 for each round, when a lower grain round could be acquired for around a quarter of the price.

The DHS has faced questions over the last couple of years as to the purpose of its mass ammo purchases which have totaled over 2 billion bullets, with some fearing the federal agency is gearing up for civil unrest.””””””””

http://nation.foxnews.com/2014/02/11/homeland-security-purchase-141000-rounds-sniper-ammo

Secret Space plane in orbit for 400 days

Interesting science wise.. Terrifying it is another example of incredible technology being used for horrific purposes most likely.

“””””””The U.S. Air Force’s unmanned X-37B space plane has now circled Earth for more than 400 days on a hush-hush mission that is creeping closer and closer to the vehicle’s orbital longevity record.
The X-37B spacecraft launched on Dec. 11, 2012, meaning that it has been aloft for 413 days as of Tuesday (Jan. 28) on the third mission for the program, which is known as OTV-3 (short for Orbital Test Vehicle-3). The endurance record is 469 days, set during OTV-2, which blasted off in 2011.
OTV-2 and OTV-3 have utilized different X-37B vehicle (the Air Force currently has two vehicles). The space plane currently zipping around Earth also flew the program’s inaugural OTV-1 mission, which stayed in space for 225 days after launching in 2010. [See photos from the X-37B space plane’s OTV-3 mission] “””””””””

http://m.space.com/24459-x37b-space-plane-mission-400-days.html

20140213-145643.jpg

Cryptography. Why is it so vital an interest to me and especially the NSA

“”””””””Most discussion of the Snowden revelations has looked at stories that have straightforward political implications, such as the tapping of German Chancellor Merkel’s phone. However, governments have spied on each other for hundreds of years. It’s harder to understand why Snowden’s release of documents which seem to show that the NSA has compromised cryptographic standards is important.

Governments want to be able to communicate without their adversaries abroad being able to listen to what they say. They also want to be able to listen in on their adversaries. Cryptography, the science of making codes and encoding information, and cryptanalysis, the science of breaking codes and decoding information, have important implications for national security. The U.S., like many other countries, used to treat codes as potential weapons, and controlled their export to foreign countries until the 1990s. The NSA played a key role in trying to break other countries’ codes, but it also had responsibility for protecting U.S. communications from external attackers.

For a long time, the U.S. national security establishment was able to keep a lid on cryptography. On the one hand, most serious users of cryptography in the U.S. were either part of the government or large firms (which could be influenced by the government). On the other, the U.S. imposed export restrictions on cryptographic technologies, to try to prevent them getting to countries with hostile interests. The NSA could both secure U.S. systems against foreign cryptanalysis and try to break other countries’ (and non-state actors’) codes without any very obvious conflict between its two roles.

From the 1980s on, it became harder and more complicated for the NSA to balance cracking foreigners’ cryptography while protecting and developing U.S. cryptography. The NSA began to lose control of cryptography as more private companies started to use it for their own purposes, and to push for stronger codes. These codes were tougher for the NSA to crack, and more likely (because they were in the private sector) to escape to foreign jurisdictions. As Whitfield Diffie and Susan Landau’s history of cryptography policy, Privacy on the Line describes it, the NSA tried to extend its authority to cover U.S. private industry as well as the public sector. This would allow it to influence the standards used by the private sector. However, the U.S. Congress was suspicious of the NSA, and put a different body, the National Institute for Standards and Technology (NIST), in charge of private sector cryptography standards. As a top-secret memo made clear, the NSA was very unhappy with this decision, even though it still had substantial informal influence over the code making process. The NIST was poorly funded, and had little technical expertise, so that it had to consult with NSA over standards. Since the NSA had resources and technical expertise, the NSA was better able to shape NIST standards much more than Congress had ever envisaged .

These tensions broke out into the so-called “Crypto Wars” in the 1990s, when Phil Zimmerman, an activist and software developer, created a program called PGP or Pretty Good Privacy, which gave ordinary computer users access to new and powerful cryptographic techniques. U.S. authorities investigated Zimmerman for breach of export controls law, but had to give up when privacy activists pulled a series of clever stunts that made the law effectively unenforceable. At more or less the same time, the U.S. was dealing with a surging demand for strong cryptography, which it tried to resolve in law-enforcement friendly ways, through creating standards which would allow the government some access (through a scheme called “key escrow”) to encrypted communications. These efforts too failed, leading to the effective abandonment of U.S. efforts to limit private access to strong cryptography. It appeared that the national security state had lost out to an alliance of civil liberties activists (who wanted strong cryptography for individuals) and businesses (which wanted to get rid of export control rules that they saw as hampering U.S. competitiveness).

The old traditional cryptography regime, which had been dominated by national security, gave way to a new regime, based around electronic commerce, and the use of cryptography to protect communications, personal information and so on. People use sophisticated cryptography every day on the Internet, without ever realizing it, every time they click on a https:// Web address. They trust encryption to protect their bank account details, personal information and pretty much every other form of sensitive information on the Internet. Without widespread strong encryption, the Internet would be a much scarier place, where people would be far less likely to use their credit cards to buy things or reveal (knowingly or unknowingly) sensitive data.”””””””””

http://washingtonpost.com/blogs/monkey-cage/wp/2014/02/12/the-political-science-of-cybersecurity-ii-why-cryptography-is-so-important/