Home » Posts tagged 'intercept' (Page 2)

Tag Archives: intercept

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

Orwell’s Triumph: How Novels Tell the Truth of Surveillance

Orwell’s Triumph: How Novels Tell the Truth of Surveillance

When government agencies and private companies access and synthesize our data, they take on the power to novelize our lives. Their profiles of our behavior are semi-fictional stories, pieced together from the digital traces we leave as we go about our days. No matter how many articles we read about this process, grasping its significance is no easy thing. It turns out that to understand the weird experience of being the target of all this surveillance — how we are characters in semi-true narratives constructed by algorithms and data analysts — an actual novel can be the best medium.

Book of Numbers, released earlier this month, is the latest exhibit. Written by Joshua Cohen, the book has received enthusiastic notices from the New York Times and other outlets as an ambitious “Internet novel,” embedding the history of Silicon Valley in a dense narrative about a search engine called Tetration. Book of Numbers was written mostly in the wake of the emergence of WikiLeaks and was finished as a trove of NSA documents from Edward Snowden was coming to light. Cohen even adjusted last-minute details to better match XKeyscore, a secret NSA computer system that collects massive amounts of email and web data; in Book of Numbers,Tetration has a function secreted within it that automatically reports searches to the government. As Tetration’s founder puts it, “All who read us are read.”

Ben Wizner of the ACLU, who is Cohen’s friend and Snowden’s lawyer, has praised the novel’s depiction of the “surveillance economy,” as he puts it. “There’s a frustration on the law and advocacy side about how abstract some of these issues can seem to the public,” Wizner told the Times. “For some people, the novelist’s eye can show the power and the danger of these systems in ways that we can’t.”

 

…click on the above link to read the rest of the article…

Emails Reveal Coziness Between Koch Lobbyists and Regulators

Emails Reveal Coziness Between Koch Lobbyists and Regulators

The close ties between corporate interests and the regulators who are supposed to police them contributes, many argue, to fundamentally lax oversight.

Emails I recently obtained through a records request show how cozy a Koch Industries lobbyist is with officials at the Commodities Futures Trading Commission, the primary regulator for derivatives and commodity trading.

Though Koch Industries is better known for using its considerable political machine to promote fossil fuel industry priorities and tax cuts for the wealthy, the company also has a major stake in the financial markets via its business unit devoted to commodity speculation. Notably, the very first oil-indexed price swap was pioneered by a Koch trader in 1986, and the infamous “Enron Loophole” that deregulated the trading of credit default swaps was engineered by a lobbying team that included two Koch lobbyists.

The recent lobbying campaign around derivatives is already paying off. As Zach Carter of the Huffington Post reported, the House of Representatives on Tuesday passed a major regulatory roll-back supported by Wall Street banks and the Kochs. The legislation would affect the post-financial crisis reforms designed to rein in the global derivatives market.

Just as Citigroup lobbyists authored their own deregulation bills in Congress, the Koch emails reveal just how comfortable the regulators and the lobbyists who curry their favor feel with each other, even as the latter are besieging the former with information and pressure that benefits their very rich clients.

Gregory Zerzan, a former Treasury Department official during the George W. Bush administration, went on to work for the International Swaps and Derivatives Association before becoming a Koch lobbyist.

 

…click on the above link to read the rest of the article…

The Computers Are Listening: NSA Won’t Say if it Automatically Transcribes American Phone Calls in Bulk

The Computers Are Listening: NSA Won’t Say if it Automatically Transcribes American Phone Calls in Bulk

Third in a series. Part 1 here; Part 2 here.

When it comes to the National Security Agency’s recently disclosed use of automated speech recognition technology to search, index and transcribe voice communications, people in the United States may well be asking: But are they transcribing my phone calls?

The answer is maybe.

A clear-cut answer is elusive because documents in the Snowden archive describe the capability to turn speech into text, but not the extent of its use — and the U.S. intelligence community refuses to answer even the most basic questions on the topic.

Asked about the application of speech-to-text to conversations including Americans, Robert Litt, general counsel for the Office of the Director of National Intelligence, said at a Capitol Hill event in May that the NSA has “all sorts of technical capabilities” and that they are all used in a lawful manner.

“I’m not specifically acknowledging or denying the existence of any particular capability,” he said. “I’m only saying that the focus needs to be on what are the authorities the NSA is using, and what are the protections around the execution of those authorities?”

So what are those authorities? And what are the protections around their execution?

Litt wouldn’t say. But thanks to previous explorations of the Snowden archive and some documents released by the Obama administration, we know there are four major methods the NSA uses to get access to phone calls involving Americans — and only one of them technically precludes the use of speech recognition.

 

…click on the above link to read the rest of the article…

Did Max Boot and Commentary Magazine Lie About Edward Snowden? You Decide.

Did Max Boot and Commentary Magazine Lie About Edward Snowden? You Decide.

In the neocon journal Commentary, Max Boot today complains that the New York Times published an op-ed by Edward Snowden. Boot’s objection rests on his accusation that the NSA whistleblower is actually a “traitor.” In objecting, Boot made these claims:

Oddly enough nowhere in his article — which is datelined Moscow — does he mention the surveillance apparatus of his host, Vladimir Putin, which far exceeds in scope anything created by any Western country. . . .That would be the same FSB that has taken Snowden into its bosom as it has previously done (in its earlier incarnation as the KGB) with previous turncoats such as Kim Philby. . . .

But of course Ed Snowden is not courageous enough, or stupid enough, to criticize the dictatorship that he has defected to. It’s much easier and safer to criticize the country he betrayed from behind the protection provided by the FSB’s thugs. The only mystery is why the Times is giving this traitor a platform.

It is literally the supreme act of projection for Max Boot to accuse anyone of lacking courage, as this particular think tank warmonger is the living, breathing personification of the unique strain of American neocon cowardice. Unlike Snowden — who sacrificed his liberty and unraveled his life in pursuit of his beliefs — the 45-year-old Boot has spent most of his adult life advocating for one war after the next, but always wanting to send his fellow citizens of his generation to die in them, while he hides in the comfort of Washington think tanks, never fighting them himself.

 

…click on the above link to read the rest of the article…

Spy agencies target mobile phones, app stores to implant spyware

Spy agencies target mobile phones, app stores to implant spyware

Users of millions of smartphones put at risk by certain mobile browser gaps, Snowden file shows

Canada and its spying partners exploited weaknesses in one of the world’s most popular mobile browsers and planned to hack into smartphones via links to Google and Samsung app stores, a top secret document obtained by CBC News shows.

Electronic intelligence agencies began targeting UC Browser — a massively popular app in China and India with growing use in North America — in late 2011 after discovering it leaked revealing details about its half-billion users.

Their goal, in tapping into UC Browser and also looking for larger app store vulnerabilities, was to collect data on suspected terrorists and other intelligence targets — and, in some cases, implant spyware on targeted smartphones.

The 2012 document shows that the surveillance agencies exploited the weaknesses in certain mobile apps in pursuit of their national security interests, but it appears they didn’t alert the companies or the public to these weaknesses. That potentially put millions of users in danger of their data being accessed by other governments’ agencies, hackers or criminals.

“All of this is being done in the name of providing safety and yet … Canadians or people around the world are put at risk,” says the University of Ottawa’s Michael Geist, one of Canada’s foremost experts on internet law.

CBC News analysed the top secret document in collaboration with U.S. news site The Intercept, a website that is devoted in part to reporting on the classified documents leaked by U.S. whistleblower Edward Snowden.

 

The so-called Five Eyes intelligence alliance — the spy group comprising Canada, the U.S., Britain, Australia and New Zealand — specifically sought ways to find and hijack data links to servers used by Google and Samsung’s mobile app stores, according to the document obtained by Snowden.

…click on the above link to read the rest of the article…

The Computers Are Listening: Speech Recognition Is the NSA’s Best-Kept Open Secret

The Computers Are Listening: Speech Recognition Is the NSA’s Best-Kept Open Secret

Second in a series. Part 1 here.

Siri can understand what you say. Google can take dictation. Even your newsmart TV is taking verbal orders.

So is there any doubt the National Security Agency has the ability to translate spoken words into text?

But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret.

It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.

One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”

Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.”

The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.

There is some mention of speech recognition in the “Black Budget”submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed.

As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA.

 

…click on the above link to read the rest of the article…

The FBI Busts Up Another of its Own Terrorist Plots and Politicians Rush to Blame the First Amendment

The FBI Busts Up Another of its Own Terrorist Plots and Politicians Rush to Blame the First Amendment

Like other recent sensational “terror plots,” however, the criminal complaint unsealed yesterday demonstrates the key role of an undercover law enforcement informant in both formulating and facilitating the alleged plot. It doesn’t appear that Velentzas or Siddiqui actually planned or attempted to bomb any target, nor is there any evidence of discussions about how to create a bomb before the introduction of the informant into their lives.

While Velentzas appeared to have latent sympathy with the Islamic State, contrary to sensational media reports she is not alleged in the criminal complaint to have had any contact with the group.

Their discussions allegedly progressed, with the informant and Velentzas meeting to talk in greater detail about how to create a bomb, using information gleaned from The Anarchist Cookbook, and discussing whether it would be appropriate to target a gathering of police officers with such a device. At several points in the complaint, Velentzas indicates her reticence about doing anything that might harm “regular people,” even criticizing the Boston Marathon bombers for killing and injuring civilians. During this time, the informant also provided both Velentzas and Siddiqui with printed copies of Inspire, including selected passages about how to create explosives.

– From the Intercept article: Informant Provided Bomb-Making Manual to Alleged “ISIS-Inspired” Plotters

What does a government wanting its population to remain in fear so as to justify a total surveillance state, and a military-intelligence industrial complex hooked on billions in wasteful corporate welfare do in the absence of genuine terrorist plots? Create artificial plots, naturally.

This disturbing trend has been covered here at Liberty Blitzkrieg and elsewhere in recent years. Read the following articles for a couple of recent examples:

 

…click on the above link to read the rest of the article…

BRITAIN USED SPY TEAM TO SHAPE LATIN AMERICAN PUBLIC OPINION ON FALKLANDS

BRITAIN USED SPY TEAM TO SHAPE LATIN AMERICAN PUBLIC OPINION ON FALKLANDS

Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands.

A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.”

At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.

The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end.

Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.

…click on the above link to read the rest of the article…

MEXICO’S JOURNALISTS GRAB A TECH SHIELD AS THEIR FIGHT AGAINST THE ESTABLISHMENT ESCALATES

MEXICO’S JOURNALISTS GRAB A TECH SHIELD AS THEIR FIGHT AGAINST THE ESTABLISHMENT ESCALATES

Mexico, a country where tens of thousands have been killed in drug-related violence, and where government officials have been complicit in corruption, murders, and disappearances, seems like a natural place to launch a safe, anonymous way for sources to get information to journalists.

That’s the idea behind MéxicoLeaks, a platform launched this month by a consortium of news outlets and advocacy groups in Mexico. The site allows whistleblowers to anonymously submit information via the Tor browser, which masks their location.

But MéxicoLeaks has already caused a scandal, culminating in the firing of one of Mexico’s most popular journalists, radio personality Carmen Aristegui, and her staff of reporters. Although MéxicoLeaks promises a secure channel for activists who otherwise face brutal retribution for speaking out, its launch comes at a time when other protections for journalists, including their job security and physical safety, are crumbling.

Aristegui and her reporters say that the radio network that runs their show used their involvement with MéxicoLeaks as a pretext to fire them. The real goal, they believe, was to suppress oppositional journalism. “They seemed so determined to strike us down,” Irving Huerta, a 27-year-old investigative journalist with Aristegui’s unit, told The Intercept in an interview.

Staffers on Aristegui’s program had previously clashed with the network over exposés on the First Lady of Mexico’s real estate dealings, among other critical reports, Huerta says, and he believes powerful people wanted to see the show end.

 

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress