… Read the rest
“Who needs direct repression,” asked philosopher Slavoj Zizek, “when one can convince the chicken to walk freely into the slaughterhouse?”
In an Orwellian age where war equals peace, surveillance equals safety, and tolerance equals intolerance of uncomfortable truths and politically incorrect ideas, “we the people” have gotten very good at walking freely into the slaughterhouse, all the while convincing ourselves that the prison walls enclosing us within the American police state are there for our protection.
Call it doublespeak, call it hypocrisy, call it delusion, call it whatever you like, but the fact remains that while we claim to value freedom, privacy, individuality, equality, diversity, accountability, and government transparency, our actions and those of our government overseers contradict these much-vaunted principles at every turn.
For instance, we disdain the jaded mindset of the Washington elite, and yet we continue to re-elect politicians who lie, cheat and steal.
Tag Archives | Surveillance
Abby Martin speaks with Taylor Lincoln, Director of Research at Public Citizen’s Congressional Watch Division about a new report detailing how Google is invading users privacies and becoming the most powerful and influential political force in Washington.
… Read the rest
About three months ago, I published an article exploring the deeply conflicted ties between agencies of the U.S. National Security State, and the Tor Network—an online anonymity tool popular among anti-surveillance privacy groups and activists, including Edward Snowden.
My article traced the history of Tor and the US military-intelligence apparatus that spawned it—from Tor’s initial development by military researchers in the mid-1990s at the US Naval Laboratory in Washington DC, through its quasi-independent period after it was spun off as a nonprofit in 2004 but continued to receive most of its funding from a variety of government branches: Pentagon, State Department, USAID, Radio Free Asia. My article also revealed that Tor was created not to protect the public from government surveillance, but rather, to cloak the online identity of intelligence agents as they snooped on areas of interest. But in order to do that, Tor had to be released to the public and used by as diverse a group of people as possible: activists, dissidents, journalists, paranoiacs, kiddie porn scum, criminals and even would-be terrorists — the bigger and weirder the crowd, the easier it would be for agents to mix in and hide in plain sight.
via The New York Times:
… Read the rest
WASHINGTON — The federal government has significantly expanded undercover operations in recent years, with officers from at least 40 agencies posing as business people, welfare recipients, political protesters and even doctors or ministers to ferret out wrongdoing, records and interviews show.
At the Supreme Court, small teams of undercover officers dress as students at large demonstrations outside the courthouse and join the protests to look for suspicious activity, according to officials familiar with the practice.
At the Internal Revenue Service, dozens of undercover agents chase suspected tax evaders worldwide, by posing as tax preparers, accountants drug dealers or yacht buyers and more, court records show.
At the Agriculture Department, more than 100 undercover agents pose as food stamp recipients at thousands of neighborhood stores to spot suspicious vendors and fraud, officials said.
Undercover work, inherently invasive and sometimes dangerous, was once largely the domain of the F.B.I.
I’ve been in Boston all week. I had to tell my mother where I was, but not Google. Its seamlessness in switching up my Google ad results, changing its suggestions to me of places to visit and ads to click on, was instantaneous.
Google knew where I was going, as I was making the trip. We’re used to this by now. It’s justified under the umbrella of modern convenience. But should it be?
This morning, a new Public Citizen report, “Mission Creep-y: Google is Quietly Becoming One of the Nation’s Most Powerful Political Forces While Expanding Its Information-Collecting Empire” came across my desk. It doesn’t break news. But it is an exhausting catalog of Google’s powerful information gathering apparatus, its missteps, and its massive social ambition.
When you put the isolated pieces together, it can kind of make you choke on your breakfast.
The Wall Street Journal reveals yet another sneaky US Government domestic spying surveillance program:
… Read the rest
The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.
The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.
Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.
The technology in the two-foot-square device enables investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location, these people said.
… Read the rest
The Verge, March 2013
This article, which predates the Edward Snowden affair (ongoing), seems to be getting renewed interest. One thing I would draw your attention to today is the segment that discusses the commercial availability of turnkey systems that can intercept all the communications of a medium sized country. In other words, the next revelation may be about private companies vacuuming up Big Data for their own uses, even without funding from the NSA. This, in fact, is entirely likely to be occurring. Read on…
In 1989, when the internet was predominantly ASCII-based and HyperCard had yet to give birth (or at least act as a midwife) to the world wide web, R.U. Sirius launched Mondo 2000. “I’d say it was arguably the representative underground magazine of its pre-web day,” William Gibson said in a recent interview. “Posterity, looking at this, should also consider Mondo 2000 as a focus of something that was happening.”
Twenty years ago, it was cypherpunk that was happening.
via Pando Daily:
… Read the rest
Nest plans to offer its smart thermostat to Irish consumers for free when they sign up for a two-year contract with Electric Ireland. Nest chief executive Tony Fadell said at the Web Summit in Dublin that the deal could put his company’s thermostats in up to 1.6 million homes, according to CNET, and claimed that similar deals would be announced for other countries in the future.
It makes sense for Nest to give away its thermostat. Most consumers are unlikely to spend $250 on an Internet-connected thermostat, but they might be willing to have one installed if one is offered for free whenever they sign a contract with a utilities company. (Though they might also do what Samsung’s customers did when it offered free smartwatches and try to resell them online.)
This is a familiar tactic. It’s probably how you purchased your smartphone: You signed on for a two-year contract with a wireless carrier, purchased a subsidized device, and paid it off as part of your inflated monthly payments.
In the face of widespread Internet surveillance, we need a secure and practical means of talking to each other from our phones and computers. Many companies offer “secure messaging” products—but are these systems actually secure? We decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto.
This scorecard represents only the first phase of the campaign. In later phases, we are planning to offer closer examinations of the usability and security of the tools that score the highest here. As such, the results in the scorecard below should not be read as endorsements of individual tools or guarantees of their security; they are merely indications that the projects are on the right track.
Read More at EFF: https://www.eff.org/secure-messaging-scorecard
Micah Lee was staff technologist for the Electronic Frontier Foundation and chief technology officer of the Freedom of the Press Foundation when he was first contacted by Edward Snowden. He tells us what he learned about smuggling secrets at The Intercept:
… Read the rest
Late on the evening of January 11, 2013, someone sent me an interesting email. It was encrypted, and sent from the sort of anonymous email service that smart people use when they want to hide their identity. Sitting at the kitchen table in the small cottage where I lived in Berkeley with my wife and two cats, I decrypted it.
The anonymous emailer wanted to know if I could help him communicate securely with Laura Poitras, the documentary filmmaker who had repeatedly cast a critical eye on American foreign policy.
To: Micah Lee
Date: Fri, 11 Jan 2013
I’m a friend. I need to get information securely to Laura Poitras and her alone, but I can’t find an email/gpg key for her.