Tag Archives | Spying

Vice’s NSA Spam Generator

Wishing the government would pay you some extra attention? Vice’s Motherboard has a handy device for generating tweets, messages, and status updates packed to the brim with NSA-alert-raising keywords, overwhelming surveillance with false positives. They’ve dubbed this terrorism spam generator Hello, NSA:

The government is listening to your internets. Generate a sentence with some of the keywords they’re looking for. Tweet or share and you could earn a new follower in Washington.

NSA spam generator

 

Read the rest

Continue Reading

1984 All Over Again

1984In the wake of the NSA/Snowden revelations, and the general sense of paranoia that has taken grip of the news cycle and the internet, a few pundits have assumed the roles of cultural watchdogs, taking the pulse of public taste to measure the effect of the spooky news on the hearts and minds of the people.

A number of journalists and commentators have noted that one possible side effect of the recently-revealed government snooping on personal communications has been a spike in the sales of the George Orwell classic 1984 on the mega-book-selling-site, Amazon. But, how big is the sales spike and how much of it can be attributed to Snowden’s bravery in the face of the NSA’s dubious doings? This article at Slate offers a measured interpretation:

Sales of one particular edition of George Orwell’s dystopian classic are up some 5,000 percent on Amazon.com in the past 24 hours, according to the site’s list of “movers and shakers.” The figure was as high as 7,000 earlier today.Read the rest

Continue Reading

NSA Spies On 500 Million German Calls, Emails, Or Messages Each Month

nsa spiesIt’s not just Americans having their every move captured by the NSA, but vast numbers of people in countries such as Germany, France, China, Iraq, and Saudi Arabia are being specifically targeted as well. This, plus the American government’s alleged tapping and bugging of foreign embassies and EU offices, are now threatening to unravel U.S.-European trade agreements. DER SPIEGEL reports:

Secret documents viewed by SPIEGEL reveal that the American NSA intelligence service monitors around half a billion telephone calls, emails and text messages in the country every month.

The data stored by the NSA includes telephone calls, emails, mobile-phone text messages and chat transcripts. The metadata — or information about which call or data connections were made and when — is then stored at the NSA’s headquarters in Fort Meade, near Washington, DC.

The documents also show that the NSA is primarily interested in important Internet hubs in southern and western Germany.

Read the rest

Continue Reading

Canada’s CSEC Runs Massive Domestic Spying Program

Canada has a massive domestic spying program of its own:

via Global Research k9508533

On the basis of secret government directives, Canada’s national security apparatus is conducting mass surveillance of Canadians parallel to, if not directly patterned after, the domestic spying operations of the U.S. National Security Agency (NSA).

Communications Security Establishment Canada (CSEC), the NSA’s Canadian counterpart and longstanding partner, has been scrutinizing the metadata of Canadians’ electronic communications since at least 2005.

Moreover, the NSA routinely provides Canada’s security agencies with intelligence on Canadians and CSEC reciprocates by providing U.S. intelligence officials with information about people living in the U.S. This arrangement allows both agencies to circumvent legal bans on warrantless surveillance of their own citizenry’s communications.

It was “common” for NSA “to pass on information about Canadians,” Wayne Easter, Canada’s Solicitor-General in 2002-3, told the Toronto Star this week. As Solicitor-General, Easter was responsible for overseeing the operations of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).

Read the rest

Continue Reading

Who Shall Watch The Watchers?

Menwith-hill-radomesThere have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. – The Observer (London) commenting on the implications of the latest ‘whistleblowing’ spy scandal involving Edward Snowden, a US National Security Agency (NSA) contractor.

Well… not exactly… indeed, when I researched the NSA spy network seven years ago, there was already reams of evidence – including both formal Congressional and European Parliament inquiries. The key point being, as the London Observer article oh-so-tentatively suggests, that spying is not about protecting ‘us’ from terrible people, but rather about grubby political tricks and commercial advantage.

Here’s what I wrote about Menwith Hill then (in a book about US foreign policy called No Holiday: 80 Places You Don’t Want to Visit)…

“From a distance they seem like giant golf balls, carelessly struck, ending up in the heather, far from the green.… Read the rest

Continue Reading

Skynet rising: Google acquires 512-Qubit Quantum Computer; NSA Surveillance to be Turned Over to AI Machines

TRANSHUMANVia NaturalNews.com

Most people don’t know about the existence of quantum computers. Almost no one understands how they work, but theories include bizarre-sounding explanations like, “they reach into alternate universes to derive the correct answers to highly complex computational problems.”

Quantum computers are not made of simple transistors and logic gates like the CPU on your PC. They don’t even function in ways that seem rational to a typical computing engineer. Almost magically, quantum computers take logarithmic problems and transform them into “flat” computations whose answers seem to appear from an alternate dimension.

For example, a mathematical problem that might have 2 to the power of n possible solutions — where n is a large number like 1024 — might take a traditional computer longer than the age of the universe to solve. A quantum computer, on the other hand, might solve the same problem in mere minutes because it quite literally operates across multiple dimensions simultaneously.

Read the rest

Continue Reading

Texas Becomes First State Requiring A Warrant For Email Spying

email spyingI never thought I’d say this, but, has Texas set an example that should be followed on the federal level? Ars Technica reports:

Texas Gov. Rick Perry has signed a bill giving Texans more privacy over their inboxes than anywhere else in the United States.

On Friday, Perry signed HB 2268, effective immediately. The law shields residents of the Lone Star State from snooping by state and local law enforcement without a warrant. The bill’s e-mail amendment was written by Jonathan Stickland, a 29-year-old Republican who represents an area between Dallas and Ft. Worth.

Under the much-maligned 1986-era Electronic Communications Privacy Act (ECPA), federal law enforcement agencies are only required to get a warrant to access recent e-mails before they are opened by the recipient. As we’ve noted many times before, there are no such provisions in federal law once the e-mail has been opened or if it has sat in an inbox, unopened, for 180 days.

Read the rest

Continue Reading

Uri Geller’s Life As A Psychic Spy For The CIA And Mossad Revealed

uri geller

Did you know there was a Cold War “psychic arms race”? Geoffrey Macnab writes in the Independent:

Showbiz psychic Uri Geller has seemingly had a lengthy second career as a secret agent for Mossad and the CIA. Geller was at the Sheffield Doc Fest this week for the premiere of Vikram Jayanti’s The Secret Life Of Uri Geller – Psychic Spy?, a new film that offers compelling evidence of his involvement in the shadowy world of espionage.

In interview, Geller remains coy about his espionage activities. Nonetheless, the psychic acknowledges that his handlers once asked him to use telepathy to stop a pig’s heart. He refused, knowing that if he had succeeded, the next target would almost certainly have been a human. “I tried to execute missions that were positive,” Geller claims. “I said ‘no’ to dark things.”

Jayanti spoke to the high-level officials involved in recruiting and using Geller.

Read the rest

Continue Reading

Edward Snowden Reveals That Fake Internet Cafes Were Used To Monitor Emails At London G20 Summits

GCGQ

The Guardian has more revelations from top secret documents leaked by Edward Snowden, including, Britain’s GCHQ intelligence agency runs its own internet cafes in the vicinity of geopolitical conferences:

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian.

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

Read the rest

Continue Reading

How To See Your NSA Or FBI File

your nsa or fbi file

Truth be told, it may be disappointing not to have an FBI file. Daily Kos writes:

Have you ever Tweeted a politically subversive message, attended a protest, or signed an oppositional petition? If so, you may have a dedicated file on you kept by the FBI and/or the NSA.

With a simple Freedom of Information Act (FOIA) request, any U.S. citizen can obtain one’s NSA or FBI file, if such a file exists.

getmyfbifile.com will, free of charge, generate the necessary forms for you already filled out. Of course, you can also do this directly through the NSA or FBI if you are worried about providing personal information to an independent site.

While an appropriate level of cynicism may be warranted concerning the transparency one should expect from such a request – should your file be substantial – it is the law that your complete file be provided to you. It is your right to know this information.

Read the rest

Continue Reading