Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained here. (The flash drive includes the anti-fascist books available on this site.)
Listen: MP3
Introduction: Benito Mussolini, the world’s first fascist, defined fascism as “corporatism.” Ronald Reagan’s signature political aphorism was: “Government isn’t the solution to your problems. Government IS the problem.”
Looming very large in the context of “L’Affaire Snowden” are the corporate connections to this political phenomenon and what we call the “public versus private dynamic.”
The keynote element of this discussion is a revealing analysis of James Madison’s views on the intrusion into citizens privacy. As noted in this analysis, Madison was deficient in his prescription for protecting privacy. Madison was aware of the need to protect citizens’ privacy against governmental intrusion, but failed substantively to take into account the need to protect citizens against corporate intrusion into privacy. In the internet and cell phone age, that is of paramount significance.
The public vesus private dynamic and the corporate connections are particularly important in light of the decision to turn metadata over to a “third party” for safekeeping.
What we are seeing–to an extent–is privatization of the NSA.
In this ongoing series about L’Affaire Snowden, we have discussed the fact that the collection of metadata is routine by Internet and cellphone companies, as well as retail outlets that offer discount cards. (The harvesting of metadata is the focal point of what the NSA does and what lies at the center of the “controversy.”)
A recent post by PR Watch notes that Grover Norquist has been among the recipients of Google money.
Having opined that he wanted to “drown” government in the “bathtub,” Norquist is a lynchpin of the “Shutdown GOP” and the founder of the Islamic Free Market Institute. A synthesis of the GOP and the Muslim Brotherhood, the Institute is inextricably linked with the Operation Green Quest investigation into terrorist financing.
Against the background of Google’s financing of Norquist’s crusades and other right-wing causes, one can but wonder what Google may be doing with the vast amounts of metadata they harvest. Why aren’t more people alarmed about what Google may be doing with their information?
In addition to an accurate observation by WikiLeaks hacker Jacob Applebaum about Google having the information to topple governments, we note that Google, Apple, EBay and other key Silicon Valley companies have engaged in heavy-handed monopolistic practices that have been the focal point of investigations by the Department of Justice.
A central point of analysis concerns just WHO authorized Edward Snowden, Bradley Manning, WikiLeaks and Citizen Greenwald to access the vast amounts of data that they have? What judicial or governmental authority oversees THEIR activities? Why is it OK for them to access vast amounts of data that might adversely affect the lives of millions?
Program Highlights Include:
- Former NSA head Michael Hayden’s correct observation that citizens’ data is more secure when held by the NSA than it would be with a “third party.”
- Hayden’s observation that the fourth amendment doesn’t apply to foreign citizens–it isn’t an international treaty.
- Apple’s Iphone has an “app” that permits retail outlets to rigorously surveil customers shopping in their stores.
- Speculation that Palantir might become the “third party” repository of metadata currently stored by NSA.
- Edward Snowden and Bradley Manning’s use of web-crawling technology to vacuum-up hundreds of thousands of files–files that they could not possibly have read.
- WikiLeaks’ profound association with the Russian phishing mafia–sophisticated internet criminals who steal people’s online information for the purpose of looting their assets.
- WikiLeaks’ co-founder John Young’s observation that the group is acting like ” . . . a bunch of spies.” Young broke with the group over their behavior.
1. The keynote element of this discussion is a revealing analysis of James Madison’s views on the intrusion into citizens privacy. As noted in this analysis, Madison was deficient in his prescription for protecting privacy. Madison was aware of the need to protect citizens’ privacy against governmental intrusion, but failed substantively to take into account the need to protect citizens against corporate intrusion into privacy. In the internet and cell phone age, that is of paramount significance.
The need to factor corporate intrusion into people’s lives is particularly important with the decision to have a “third party” store metadata instead of the NSA.
“Madison’s Privacy Blind Spot” by James Rosen; The New York Times; 1/18/2014.
. . . Expect to hear a lot more about Madison in the coming year, as the issues surrounding the N.S.A. move toward what Justice Scalia has said will be a likely review by the Supreme Court. For that reason, it is important to explore what Madison does and doesn’t offer to this debate.
The apotheosis of Madison as an emblem for opposition to mass surveillance is welcome. But the reasoning behind his beliefs has been misunderstood. He believed that the preservation of people’s “different and unequal faculties of acquiring property” was “the first object of government,” but that a too-powerful government could undermine that goal. He was, therefore, more concerned with abuses of legislative and executive power than of unregulated commercial power.
As a result, the Bill of Rights, which he came to champion, constrains only government actors, not private ones. It applies to the government, not Google. Now that Google and AT&T can track us more closely than any N.S.A. agent, it appears that the Madisonian Constitution may be inadequate to defend our privacy and dignity in the 21st century. . . .
. . . . There is, therefore, a tension in modern libertarian appreciations of Madison. They exaggerate his opposition to abuse of federal power and ignore his failure to anticipate abuse of corporate power. . . .
. . . . But on the right, the Madisonian devotion to property rights, and Jeffersonian suspicion of regulation, are so strong that the same principled libertarians who oppose N.S.A. data collection shrink from efforts to regulate Google or AT&T.
In his speech on intelligence reform on Friday, President Obama called on Attorney General Eric H. Holder Jr. to develop options for how the bulk telephone data collection program could continue without the metadata being held by the government itself. But telecom companies have resisted being the repository for the data, and an anti-regulatory Congress is unlikely to require them to do so or to impose meaningful limits on what they can do with the data they hold.
As a result, Internet service providers and telecoms are constrained neither by the Constitution nor, in meaningful ways, by federal privacy statutes. And they are free to engage in just the kind of intrusive surveillance that Judge Leon insisted was an unreasonable search and seizure when conducted by the N.S.A.
In practice, the neo-Madisonian distinction between surveillance by the government and surveillance by Google makes little sense. It is true that, as Judge Pauley concluded, “People voluntarily surrender personal and seemingly private information to trans-national corporations which exploit that data for profit. Few think twice about it.”
But why? Why is it O.K. for AT&T to know about our political, religious and sexual associations, but not the government? . . .
. . . . That distinction is unconvincing. Once data is collected by private parties, the government will inevitably demand access.
More fundamentally, continuously tracking my location, whether by the government or AT&T, is an affront to my dignity. When every step I take on- and off-line is recorded, so an algorithm can predict if I am a potential terrorist or a potential customer, I am being objectified and stereotyped, rather than treated as an individual, worthy of equal concern and respect. . . .
. . . . . . . What Americans may now need is a constitutional amendment to prohibit unreasonable searches and seizures of our persons and electronic effects, whether by the government or by private corporations like Google and AT&T.
Perhaps even Madison, who unsuccessfully proposed a preamble to the Constitution declaring “that all power is originally rested in, and consequently derived from the people,” and that all people have basic natural rights, including “the enjoyment of life and liberty” and the right of “pursuing and obtaining happiness and safety,” might have realized that our rights to enjoy liberty, and to obtain happiness and safety at the same time, are threatened as much by corporate as government surveillance.
2. In that same context, it is worth noting that the quasi-populist ideological rhetoric surrounding the Pirate Bay embraces a conflict between two right-wing views. (Pirate Bay and WikiLeaks are closely linked.)
. . . . Their attitude of sneering entitlement towards the government is all of a piece with their attitude towards the big content companies. . . .
. . . I know that a little bit of the rhetoric around The Pirate Bay sounds leftwing – the idea that it is wrong for “international capital” to push Sweden around – but that’s just populist, and could be found in the rhetoric of the kind of parties that Carl Lundström has supported too.
The overwhelming impression is of a clash between two rightwing views, one that says it is all right to steal from the state, and one which says it is sinful to steal from corporations. . . .
3a. WikiLeaks hacker Jacob Applebaum noted Google’s capabilities:
“The American Wikileaks Hacker” by Nathaniel Rich; Rolling Stone; 12/01/2010.
. . . . “It’s not just the state,” says Appelbaum. “If it wanted to, Google could overthrow any country in the world. Google has enough dirt to destroy every marriage in America.”
But doesn’t Google provide funding for Tor?
“I love Google,” he says. “And I love the people there. Sergey Brin and Larry Page are cool. But I’m terrified of the next generation that takes over. A benevolent dictatorship is still a dictatorship. At some point people are going to realize that Google has everything on everyone. Most of all, they can see what questions you’re asking, in real time. Quite literally, they can read your mind.” . . . .
3b. In this ongoing series about L’Affaire Snowden, we have discussed the fact that the collection of metadata is routine by Internet and cellphone companies, as well as retail outlets that offer discount cards. (The harvesting of metadata is the focal point of what the NSA does and what lies at the center of the “controversy.”)
A recent post by PR Watch notes that Grover Norquist has been among the recipients of Google money.
Having opined that he wanted to “drown” government in the “bathtub,” Norquist is a lynchpin of the “Shutdown GOP” and the founder of the Islamic Free Market Institute. A synthesis of the GOP and the Muslim Brotherhood, the Institute is inextricably linked with the Operation Green Quest investigation into terrorist financing.
Against the background of Google’s financing of Norquist’s crusades and other right-wing causes, one can but wonder what Google may be doing with the vast amounts of metadata they harvest.
Google, the tech giant supposedly guided by its “don’t be evil” motto, has been funding a growing list of groups advancing the agenda of the Koch brothers.
Organizations that received “substantial” funding from Google for the first time over the past year include Grover Norquist’s Americans for Tax Reform, the Federalist Society, the American Conservative Union (best known for its CPAC conference), and the political arm of the Heritage Foundation that led the charge to shut down the government over the Affordable Care Act: Heritage Action . . . .
. . . . More than any other group working to repeal the Affordable Care Act, Heritage Action pushed for a sustained government shutdown in the fall of 2013, taking the country to the brink of a potentially catastrophic debt default.
Laying the ground for that strategy, Heritage Action held a nine-city “Defund Obamacare Town Hall Tour” in August 2013, providing a platform for Texas Senator Ted Cruz to address crowds of cheering tea party supporters.
For Cruz, increasingly spoken of as a 2016 Presidential candidate, the government shutdown helped raise his profile and build his supporter — and donor — base.
Notably, Heritage Action received $500,000 from the Koch-funded and Koch-operative staffed Freedom Partners in 2012. It is not yet known how much Heritage Action received in 2013 from sources other than Google.
Perhaps surprisingly, Google has a history of supporting Cruz. Via its Political Action Committee – Google Inc. Net PAC – the PAC provided the “Ted Cruz for Senate” campaign with a $10,000 contribution in 2012. Additionally, despite being five years out from the freshman Senator’s next election, Google’s PAC has already made a $2,500 contribution to the Cruz reelection campaign for 2018, the largest amount that the PAC has given so far to any Senate candidate running that election year according to disclosures made by Google.
Americans for Tax Reform (ATR), the anti-government group run by Republican operative Grover Norquist, was another new recipient of funding from Google in 2013. ATR is best known for its “Taxpayer Protection Pledge,” and for its fundamentalist attacks on any Republican who might dare to vote for any increase in taxes. According to the Center for Responsive Politics, ATR received 85% of its funding in 2012 ($26.4 million) from the ultra-partisan Karl Rove-run Crossroads GPS, another dark money group.
ATR President Grover Norquist infamously said that he wants to shrink government “down to the size where we can drown it in the bathtub.” Google’s position on the relative size of government versus bathtubs is not known, but according to a Bloomberg analysis of Google’s U.S. corporate filings, it avoids approximately $2 billion dollars globally in tax payments each year through the use of creative tax shelters. . . .
4. A new “app” for Apple’s Iphone permits retail outlets to monitor customers–effectively taking those people under surveillance.
Barely noticed by most consumers, Apple’s (AAPL) latest software upgrade for iPhones, iOS 7, included a capability for malls, museums or stadiums to identify visitors and track their movements indoors with a startling degree of accuracy.
Known as iBeacons, the feature allows a store to pop up, say, a coupon offer for Coca Cola on a customer’s phone just as they pass by the soda aisle. It also allows the store to track and record a customer’s movements for later analysis.
The rapid growth of smartphone use has opened a huge new opportunity for marketers to collect detailed location data on consumers, so far mostly outdoors. But the sensitivity of the information has already sparked numerous controversies, including in 2011 when iPhone users discovered their phones were keeping a list of their movements in an unencrypted text file.
And Nordstrom (JWN) created a stir when it was caught last year secretly tracking shoppers’ mobile phones via Wifi in 17 stores. The department store chain quickly ended the practice, which did not include identifying the phones’ owners, after the controversy erupted.
With iBeacons, unlike some more-surreptitious retail location tracking systems that have come to light, however, iPhone users have to give their consent to be tracked by installing an app. So far, just Apple’s own Apple Store app on the iPhone, and coupon and rewards apps from a company called inMarket have disclosed they will use iBeacons for tracking customers.
The scope of risks
But some privacy advocates are concerned the simple explanations offered by the apps when they seek a consumer’s consent don’t come close to revealing just how much data could be collected or how it will be used.
“The scope and the risks and the sharing that takes place now is so far beyond the disclosures consumers typically see,” warns Fordham University law professor Joel Reidenberg. “They’re not in a position to really know.” . . . .
5. As we contemplate the integrity of high-tech corporations, note this article about monopolistic practices by Silicon Valley high-tech companies. Are these entities trustworthy? Do you trust them with your personal information?
In early 2005, as demand for Silicon Valley engineers began booming, Apple’s Steve Jobs sealed a secret and illegal pact with Google’s Eric Schmidt to artificially push their workers wages lower by agreeing not to recruit each other’s employees, sharing wage scale information, and punishing violators. On February 27, 2005, Bill Campbell, a member of Apple’s board of directors and senior advisor to Google, emailed Jobs to confirm that Eric Schmidt “got directly involved and firmly stopped all efforts to recruit anyone from Apple.”
Later that year, Schmidt instructed his Sr VP for Business Operation Shona Brown to keep the pact a secret and only share information “verbally, since I don’t want to create a paper trail over which we can be sued later?”
These secret conversations and agreements between some of the biggest names in Silicon Valley were first exposed in a Department of Justice antitrust investigation launched by the Obama Administration in 2010. That DOJ suit became the basis of a class action lawsuit filed on behalf of over 100,000 tech employees whose wages were artificially lowered — an estimated $9 billion effectively stolen by the high-flying companies from their workers to pad company earnings — in the second half of the 2000s. Last week, the 9th Circuit Court of Appeals denied attempts by Apple, Google, Intel, and Adobe to have the lawsuit tossed, and gave final approval for the class action suit to go forward. A jury trial date has been set for May 27 in San Jose, before US District Court judge Lucy Koh, who presided over the Samsung-Apple patent suit.
In a related but separate investigation and ongoing suit, eBay and its former CEO Meg Whitman, now CEO of HP, are being sued by both the federal government and the state of California for arranging a similar, secret wage-theft agreement with Intuit (and possibly Google as well) during the same period.
The secret wage-theft agreements between Apple, Google, Intel, Adobe, Intuit, and Pixar (now owned by Disney) are described in court papers obtained by PandoDaily as “an overarching conspiracy” in violation of the Sherman Antitrust Act and the Clayton Antitrust Act, and at times it reads like something lifted straight out of the robber baron era that produced those laws. Today’s inequality crisis is America’sworst on record since statistics were first recorded a hundred years ago — the only comparison would be to the era of the railroad tycoons in the late 19th century.
Shortly after sealing the pact with Google, Jobs strong-armed Adobe into joining after he complained to CEO Bruce Chizen that Adobe was recruiting Apple’s employees. . . .
6. Bill Moyers has noted the sort of oppressive behavior that corproations are capable of manifesting.
“You Won’t Believe How One Chemical Company Tried to Discredit a Scientist’s Research”; BillMoyers.com; 2/10/2014.
Rachel Aviv has a reported piece in The New Yorker that reads like pulp fiction. She tells the tale of a scientist who discovered that a popular herbicide may have harmful effects on the endocrine system. As he continued to investigate the matter, he came to believe that the chemical’s manufacturer was out to get him. He thought they were following him to conferences, tapping his phones and systematically trying to drive a wedge between him and the scientific community. Many of his colleagues believed that he was paranoid until a lawsuit yielded a slew of internal corporate documents showing that everything he imagined the company had been doing to discredit his work had in fact been true.
As Kathleen Geier put it for the Washington Monthly, “This story reads like your most paranoid, far-out conspiratorial left-wing nightmare come true.” . . .
7. In an interview with USA Today, former NSA chief Michael Hayden urged the rejection of an advisory panel’s suggestions concerning the NSA.
He noted that metadata would be far more secure with NSA than with internet and/or telecommunications companies and/or “third parties.” (Such storage was among the recommendations of the panel.)
Hayden’s point is very well taken. In a future episode of “The Adventures of Eddie the Friendly Spook,” we will discuss the “public versus private” dynamic at play here.
Hayden also notes that the Fourth Amendment is not an international treaty. It does not, and never has, applied to U.S. citizens.
“Former NSA Chief: Reject Proposals” by Susan Page; USA Today; 12/31/2013; p. 4A.
In the interview with USA Today’s weekly video newsmaker series. Hayden:
- Said the vast data on Americans phone records are “far safer and privacy is far more secured with NSA holding the data than some third party.” The commission recommended that the phone companies or a third party take over storing the data.” . . . .
- . . . . Ridiculed a proposal to increase protections for personal data about non-citizens abroad. “The Fourth Amendment to our Constitution is not an international treaty,” he said. For those who aren’t covered by its protections, he said, “if your communications contain information that make Americans more safe and more free, game on.”
8. Michael del Castillo takes stock of the possibiltiy that Palantir might become the repository for the metadata. We analyzed Palantir in FTR #757. Palantir’s largest stock holder is Peter Thiel, whom we analyzed in FTR #718–In Your Facebook: A Virtual Panopticon?
The UpTake: Citizens of the world who were tired of how much of their personal data the U.S. government controlled may soon have to get used to a different dilemma: That same information being controlled by a private company.
There’s a startup in the rafters that’s just been waiting for this moment.
Last Friday, President Barack Obama announcedsweeping changes to the way the government stores and analyzes information about telephone calls both in the United States and around the world.
Though he [Obama] made it very clear that the National Security Agency will soon cease keeping a store of all those ones and zeros, he left his options open as to whether the new gatekeepers will be the telecommunications companies themselves, or some mysterious “third party.”
From the moment he said those two words I couldn’t get one word out of my head: Palantir.
Cofounded in 2004 by PayPal cofounder Peter Thiel, who is also an investor through his Founders Fund venture capital firm, the Palo Alto, California-based company that raised $605 million in venture capital accordingto Crunchbase, took its seed round of funding from In-Q-Tel, the venture capital branch of the U.S. intelligence community.
...
Since then, Palantir’s technology, which the Times called “the most effective tool to date to investigate terrorist networks,” has been used to “detect and eliminate sophisticated criminal activity,” to “harness massive-scale cyber data to understand network activity, limit exposure and harden security against cyber security threats,” and to “efficiently, effectively, and securely exploit and analyze data to drive more informed operation of planning and strategic decision making,” according to the company’s own site.
With employees like former CIA and FBI “counterterrorist” Nada Nadim Prouty, who served the government until it was discoveredshe wasn’t in the country legally, former U.S. Representative Glenn Nye, and former U.S. ambassador to Greece and Belarus Daniel Speckhard all listed as current employees of Palantir on LinkedIn, the company would likely have few problems serving as a bridge between the private sector and the public.
But what perhaps makes Palantir most interesting as a potential “third party” to hold the telecommunications industry’s metadata is the company’s founders’ stated libertarian leanings.
...
Palantir’s biggest rival, I2, was acquired by IBM in 2011, leaving private defense contractors and a handful of other In-Q-Tel-funded big data startups as what we consider top contenders for the “third party” position.
Unless of course, the government (and those who elected the government) don’t mind having IBM or another massive conglomerate holding onto their private data.
Either way, some company, or group of companies, is about to take center stage in the privacy debate in a pretty big way.
Perhaps the single most important question in the entire debate is this: Who would we really prefer holds onto all that metadata that paints a personal picture of our lives, but can also be used to protect us? The government, the phone companies, old-school big data firms, or a newby to the game with some serious startup cred?
We reached out to Palantir for comment and will keep you posted as we learn more.
9. With regard to due legal process and judicial oversight, WHAT court of judicial body authorized Edward Snowden or Bradley Manning to do what they did? They are NOT whistleblowers! They used web-crawling technology to vacuum a number of files far too voluminous for them to have read. Who authorized THEM to do what they did?
What judicial authority oversees who gets that information or what is done with that!
Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.
Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.” . . . .
. . . . Similar techniques were used by Chelsea Manning, then known as Pfc. Bradley Manning, who was convicted of turning documents and videos over to WikiLeaks in 2010. . . .
10. John Young, an original WikiLeaks founder, on why he broke with the group:
Again, what judicial or governmental/civic authority has sanctioned WikiLeaks’ activities?
“Wikileaks’ Estranged Co-Founder Becomes a Critic (Q&A)” by Declan McCullagh; C/Net; 7/20/2010.
“. . . they’re acting like a cult. They’re acting like a religion. They’re acting like a government. They’re acting like a bunch of spies. They’re hiding their identity. They don’t account for the money. They promise all sorts of good things. They seldom let you know what they’re really up to. . . There was suspicion from day one that this was entrapment run by someone unknown to suck a number of people into a trap. So we actually don’t know. But it’s certainly a standard counterintelligence technique. . . .”
11. WikiLeaks is partnered with the Russian “phishing mafia”–sophisticated internet criminals who datamine for criminal purposes.
Note, also, the enormous body of information that Assange claims he has amassed. What judicial or governmental authority has sanctioned WikiLeaks to utilize this information?
Notice in the following passage how much data WikiLeaks seems to have. Do YOU trust them with that information? What court authorization do they have to amass so much data about so many people?
http://cryptome.org/wikileaks/wikileaks-leak.htm
To: John Young
From: Wikileaks
Subject: martha stuart pgp
Date: Sun, 7 Jan 2007 12:20:25 –0500J. We are going to fuck them all. Chinese mostly, but not entirely a feint. Invention abounds. Lies, twists and distorts everywhere needed for protection. Hackers monitor Chinese and other intel as they burrow into their targets, when they pull, so do we.
Inexhaustible supply of material. Near 100,000 documents/emails a day. [Italics are mine–D.E.] We’re going to crack the world open and let it flower into something new. If fleecing the CIA will assist us, then fleece we will. We have pullbacks from NED, CFR, Freedomhouse and other CIA teats. We have all of pre 2005 Afghanistan. Almost all of India fed. Half a dozen foreign ministries. Dozens of political parties and consulates, Worldbank, apec, UN sections, trade groups, Tibet and Fulan Dafa associations and… Russian phishing mafia who pull data everywhere. We’re drowning. We don’t even know a tenth of what we have or who it belongs to. We stopped storing it at 1Tb.” . . . .
12. More about the element of Russian organized crime involved with WikiLeaks–what Assange in an interview called “Russian phishing mafia.” In what may be a logical development from WikiLeaks’ partnership with the “phishers,” a Russian mafia data theft consortium is hosting their OWN wikiLeaks! And Assange and co are apparently not commenting on it or doing anything to redirect those looking for the “Real” WikiLeaks to the right sites.
“WikiLeaks Mirror Malware Warning” by Quentin Jenkins; Spamhaus; 12/14/2010.
...Spamhaus has for over a year regarded Heihachi as an outfit run ‘by criminals for criminals’ in the same mould as the criminal Estdomains. The Panama-registered but Russian-run heihachi.net is highly involved in botnet command and control and the hosting of Russian cybercrime. We also note that the content at mirror.wikileaks.info is rather unlike what’s at the real Wikileaks mirrors which suggests that the wikileaks.info site may not be under the control of Wikileaks itself, but rather some other group. You can find the real site at wikileaks.ch, wikileaks.is, wikileaks.nl, and many other mirror sites around the world.
...Currently wikileaks.info is serving leaked documents to the world, from a server controlled by Russian cybercriminals, to an audience that faithfully believes anything with a ‘Wikileaks’ logo on it. That has got to send shivers down the spines of rational minds.
...In a statement released today on wikileaks.info entitled “Spamhaus’ False Allegations Against wikileaks.info”, the person running the wikileaks.info site (which is not connected with Julian Assange or the real Wikileaks organization) called Spamhaus’s information on his cybercrime host “false” and “none of our business” and called on people to contact Spamhaus and “voice your opinion”. Consequently Spamhaus has now received a number of emails some asking if we “want to be next”, some telling us to stop blacklisting Wikileaks (obviously they don’t understand that we never did) and others claiming we are “a pawn of US Government Agencies”.
...Few of the people who contacted us realised that the ‘press release’ they had read was not written by Wikileaks and not issued by Wikileaks — but by the wikileaks.info site only — the very site we are warning about (which by no coincidence is hosted on the same Russian based cybercrime-run heihachi.net server as irc.anonops.net). Many people thought that the “press release” was issued “by Wikileaks”. In fact there has been no press release about this by Wikileaks and none of the official Wikileaks mirrors sites even recognise the wikileaks.info mirror. We wonder how long it will be before Wikileaks supporters wake up and start to question why wikileaks.info is not on the list of real Wikileaks mirrors at wikileaks.ch.
... Spamhaus continues to warn Wikileaks readers to make sure they are viewing and downloading documents only from an official Wikileaks mirror site. Meanwhile, despite many attempts to contact the real Wikileaks, there has been no word from Wikileaks itself. . . .
Meet the new boss. Same as the old boss but with additional NSA-like capabilities:
Who is more likely to cause you harm? The NSA or anybody or everybody else?
“Crowdpilot’ app lets strangers LISTEN to your PHONE CALLS”
http://dailycaller.com/2014/02/20/crowdpilot-app-lets-strangers-listen-to-your-phone-calls/#ixzz2ttek0E72
“The NSA isn’t the only ones capable of tapping phone calls anymore thanks to a new smartphone app called ‘Crowdpilot,’ which could potentially let anyone listen in on your calls without your knowledge.”
Read more: http://dailycaller.com/2014/02/20/crowdpilot-app-lets-strangers-listen-to-your-phone-calls/#ixzz2txy0tnPN
Privacy advocates should probably take note of this: We’re learning more about why the Koch brothers recently bought Molex for $7.2 billion. They want to be key players in the ‘internet of everything’:
Yep, consumer products giant Koch Industries wants to invest heavily in smart products that learn that will also, presumably, be connected to the internet. Smart products like computers in our mirrors. Sounds ideal!
Actually, upon reflection, smart mirrors hooked up to the internet may not be very ideal.
License plate scanning: it’s real world meta-data floating around in the public sphere that’s not in any way encrypted:
This story reminds us of one more reason why the balance between privacy and security can’t rely on better encryption alone: you can’t encrypt reality very easily. But wouldn’t it be kind of neat if we could encrypt reality? No?
Here’s a story folks in the US should probably keep an eye on in order to understand why so many flying eyes might be on us in the future: According to a federal judge’s ruling, as long as a drone is tiny enough it can’t be regulated by the FAA:
Smile!
Here’s an article about the problems the Pentagon is running into in its hacker-hiring attempts. the article contains a pretty big admission at the end. One of the key problems the Pentagon runs into is the lower pay scale relative to the private sector. Another problem? The private sector’s pay is also too low to incentivize enough people to go into IT security careers in the first place:
So there’s an ever growing demand for IT security expertise and yet “market forces” aren’t creating the kind of salaries that would lead to growth in the numbers of people interested in going into IT security. Especially in the “senior” security jobs, where 6 in 10 positions aren’t getting filed. Could the ‘Techtopus’, with its “I thought we agreed not to recruit any senior level employees…. I would propose we keep it that way” philosophy, be wrapping its tentacles around this sector of the job market and distorting the whole IT security market?
That’s one of the fun things about something like the Techtopus: It’s not just a many-tentacled giant beast. It’s an invisible many-tentacled giant beast so we’d don’t really get to know how far its reach goes. We just know those tentacle aren’t helping. That would require a different invisible giant tentacled beast.
You know how when you call a company you often hear “this call will be recorded for training purposes”. You have to wonder if that’s all they’re going to be using it for:
Uh oh.
Imagine a world where personalized ads based on your browsing/purchasing history don’t simply show up on the web pages you’re reading but actually show up on a billboard with facial recognition technology so everyone in town can see the ads deemed most appropriate for you. Sounds like something you would like you see? Hopefully it is because Microsoft has already patented the idea. And in terms of harnessing the incredible potential commercial value of facial recognition technology, Microsoft has a lot of catching up to do, although it probably doesn’t want to catch up with Facebook’s facial recognition lawsuit:
So Licata v. Facebook is going to be a case to watch. Fashionistas, in particular, should be following this case closely.
Pew recently conducted a poll asking Americans who they trust more to protect their personal data: The government or your [cellphone provider/email service provider/Search engine provider, etc]? Only 31% said they trust the government to protect their data, a slightly higher level of trust than respondents put in various tech sectors.
So that wasn’t particularly great news for Silicon Valley’s public image. Stories like this probably aren’t going to help with that lack of trust:
Jeez, what’s next for Silicon Valley’s descent into the upper echelons of the global power?
Well, whatever it is, it probably isn’t going to close Silicon Valley’s public trust gap. Especially if all these Bilderbergers get caught doing something as crazy as, say, donating large checks to terrifying anti-science demagogues like Senator Ted Cruz. That probably won’t help.
Courtesy of commenters at Little Green Footballs, here are a couple of interesting links:
1. This one is about role Snowden docs may have played in hack of Federal Employees data by China:
http://abcnews.go.com/US/feds-eye-link-private-contractor-massive-government-hack/story?id=31717372
2. This one is story about Russia and China hacking Snowden docs and its effects on British intelligence:
http://www.thedailybeast.com/cheats/2015/06/13/russia-china-got-snowden-files.html?via=twitter_page
http://www.bbc.com/news/uk-33125068?ns_mchannel=social&ns_campaign=bbc_breaking&ns_source=twitter&ns_linkname=news_central
3. This one is John Schindler’s rebuttal to the Snowald cult:
http://20committee.com/2015/06/12/snowden-is-a-fraud/