Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained here. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by 12/19/2014. The new drive (available for a tax-deductible contribution of $65.00 or more) contains FTR #850. (The previous flash drive was current through the end of May of 2012 and contained FTR #748.)
WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.
You can subscribe to e‑mail alerts from Spitfirelist.com HERE.
You can subscribe to RSS feed from Spitfirelist.com HERE.
You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself HERE.
This program was recorded in one, 60-minute segment.
Introduction: Further developing an ad campaign by Silicon Valley icon Apple, we explore the vast gulf between the manufactured public perception of the intelligence operation fronted for by Eddie the Friendly Spook (Snowden.) (Past discussion of the intelligence officers, Nazis, and libertarian/technocratic fascists comprising the cast of characters and institutions comprising the operational landscape of “L’Affaire Snowden,” is in previous shows and posts about this event. We can’t begin to encapsulate the material here.)
Beginning with discussion of the Charleston shooting, we note Ron Paul’s establishment of a template for the Trayvon Martin shooting (one of the apparent influences on Dylann Roof. Advocating such behavior in his newsletter, Paul generated legal and ideological gravitas for the type of “lone wolf/leaderless resistance stratagem embodied in the Charleston massacre.
For years, Glenn Greenwald did legal work that, in effect, ran interference for the “leaderless resistance” strategy that was so much in evidence in Charleston.
Recent news has offered up a grimly instructive juxtaposition. As Glenn Greenwald and his associates in the Snowden “op” continue to bask in the glow of professional awards granted them, Dylann Roof has put into action the type of behavior advocated by Greenwald’s legal clients.
(A big supporter of George W. Bush in the early part of the last decade, Greenwald became an attorney for, and a fellow-traveler of, some of the most murderous Nazis in the country.)
As we have seen in FTR #754 and several posts, Greenwald defended Matthew Hale against solicitation of murder charges. Greenwald ran interference for the “leaderless resistance strategy.” In particular, Greenwald provided apposite legal assistance for the National Alliance.
Leaderless resistance is an operational doctrine through which individual Nazis and white supremacists perform acts of violence against their perceived enemies, individually, or in very small groups. Acting in accordance with doctrine espoused by luminaries and leaders in their movement, they avoid infiltration by law enforcement by virtue of their “lone wolf” operational strategy.
What Roof [allegedly] did is precisely the sort of thing advocated by the “Leaderless Resistance” strategy.
The advocates of this sort of thing, such as Citizen Greenwald’s client The National Alliance (publisher of The Turner Diaries,” which provided the operational template for David Lane’s associates The Order) have been shielded (to an extent) from civil suits holding them to account for their murderous advocacy.
National Alliance’s books are specifically intended as instructional vehicles. Hunter is dedicated to convicted murderer Joseph Paul Franklin and was specifically designed as a “How To” manual for lone-wolf, white supremacist killers like Roof.
Note, also, that the “fourteen words” of Order member David Lane are the inspiration for “Combat 14,” the paramilitary wing of the Ukrainian fascist group Svoboda, one of the OUN/B heirs that came to power as a result of the Maidan coup of 2014. Lane drove the getaway car when “The Order”–explicitly inspired by “The Turner Diaries”–murdered Denver talk show host Alan Berg.
The “fourteen words” were also an influence on Roof.
We should note that what Greenwald did is NOT a question of outlawing free speech, as he implied. When the ACLU defended the American Nazi Party in their attempt to march in Skokie, Illinois (a Chicago suburb with a sizable Jewish population), it did so on the grounds of constitutionally protected free speech.
Pre-Greenwald, advocating violence along the lines of what National Vanguard Books (the NA’s publishing arm) does was(and is) still legal.
However, IF someone was advocating violence against minorities, “racial enemies,” etc. and someone can be demonstrated to have acted on the basis of such exhortations, the author of the exhortation to violence could be held responsible for the consequences of their actions.
The consequences can result in large legal damages.
This is sound law. It doesn’t say you can’t say such things, however if you do, and that causes harm or death to others, you ARE RESPONSIBLE.
If someone leaves a rake on their property with the teeth facing upward and someone steps on it and is injured, the property owner bears civil liability for their actions.
That is the legal principle under which the National Aliiance, et al were being sued.
In connection with “L’Affaire Snowden,” we noted that in the background of The Peachfuzz Fascist (Snowden), one finds elements that advocate slavery, including the League of the South and other elements of the neo-Confederate movement, which apparently inspired Dylann Roof.
Snowden was an admirer of Ron Paul, to whose campaign he contributed and whose views he parrots. Ron Paul is inextricably linked with the neo-Confederate movement. Jack Hunter–a former head of the League of the South and a current aide to his son Rand Paul–was the chief blogger for Ron Paul’s 2012 Presidential campaign.
Bruce Fein, the top legal counsel for Paul’s 2012 campaign was the first attorney for Eddie the Friendly Spook and is the attorney for the Snowden family.
In a 1992 edition of his newsletter, Snowden’s political idol Ron Paul advocated that whites arm themselves and shoot black men. In so doing, he helped to set the template for George Zimmerman’s shooting of Trayvon Martin. That killing appears to have been a major influence on Dylan Roof.
We note the presence at a student libertarian conference of both Ron Paul and Edward Snowden (being skyped in).
The group is very close to Peter Thiel, Palanthir, the Koch Brothers, the Prince of Liechtenstein and Fox News personalities, among others.
Most of the program notes developments in Big Tech’s Brave New World which, in the absence of appropriate regulatory oversight and appropriate security, may have terrifying consequences.
Program Highlights Include: The development of high-quality (and possibly illegal) facial recognition technology by Microsoft and Facebook, among others; a number of stories about the possibility of hacking into the electronics of, and possibly hijacking or sabotaging, a jet airliner, using a smartphone; new technology being developed by Apple to permit the monitoring of vital signs and other critical, intimate health information; nanotechnology being developed by Google permitting the introduction of microelectronics into the bloodstream to monitor for signs of cancer or heart disease; Google’s efforts, along with those of the Koch Brothers and Facebook, to fund institutions trying to destroy the Affordable Care Act; potentially catastrophic consequences of criminal technocrats abusing the emerging wonders being developed by Big Tech; review of the concept of technocratic fascism as considered in the context of the above developments.
1a. Recent news has offered up a grimly instructive juxtaposition. As Glenn Greenwald and his associates in the Snowden “op” continue to bask in the glow of professional awards granted them, Dylann Roof has put into action the type of behavior advocated by Greenwald’s legal clients.
A big supporter of George W. Bush in the early part of the last decade, Greenwald became an attorney for, and a fellow-traveler of, some of the most murderous Nazis in the country.)
As we have seen in FTR #754 and several posts, Greenwald defended Matthew Hale against solicitation of murder charges. Greenwald ran interference for the “leaderless resistance strategy.” In particular, Greenwald provided apposite legal assistance for the National Alliance.
“Baltimore & The Walking Dead” by Mark Ames; Pando Daily; 5/1/2015.
. . . . So when Rand Paul went on Laura Ingraham’s radio program to blame Baltimore on black culture and values and “lack of fathers,” the libertarian whom Time called “the most interesting man in politics” was merely rehashing 25-year-old mainstream Republicrat bigotries, the very same bigoted, wrong assumptions that led to all the disastrous policies we’re now paying for today.
Which brings me to the Libertarians of 1992.
After Ferguson exploded last year, Libertarians positioned themselves as the only political force that had no blood on their hands, the only political force that was “principled” enough throughout the past few decades to offer the right analyses — and the right solutions — to the problems faced by people now rising up in Baltimore.
In 1992, the most famous libertarian of all, Ron Paul, was still between Congressional stints when [the riots in] Los Angeles erupted, but he did run a profitable libertarian newsletter, “The Ron Paul Political Report,” to keep his ideas alive. Shortly after the LA riots, Ron Paul put out a “Special Issue on Racial Terrorism”offering his libertarian analysis of what he termed black “terrorism”:
“The criminals who terrorize our cities—in riots and on every non-riot day—are not exclusively young black males, but they largely are. As children, they are trained to hate whites, to believe that white oppression is responsible for all black ills, to ‘fight the power,’ to steal and loot as much money from the white enemy as possible.
“The cause of the riots is plain: barbarism. If the barbarians cannot loot sufficiently through legal channels (i.e., the riots being the welfare-state minus the middle-man), they resort to illegal ones, to terrorism. Trouble is, few seem willing to stop them. The cops have been handcuffed. . . .
. . . .“We are constantly told that it is evil to be afraid of black men, but it is hardly irrational. Black men commit murders, rapes, robberies, muggings, and burglaries all out of proportion to their numbers.”
“I think we can safely assume that 95% of the black males in [major U.S. cities] are semi-criminal or entirely criminal.”A few months later, in October 1992, Dr. Paul explained how he taught his own family—presumably including his favorite son, Rand Paul—how to defend themselves and even murder what Dr. Paul called “hip-hop” carjackers, “the urban youth who play unsuspecting whites like pianos”:
“What can you do? More and more Americans are carrying a gun in the car. An ex-cop I know advises that if you have to use a gun on a youth, you should leave the scene immediately, disposing of the wiped off gun as soon as possible. Such a gun cannot, of course, be registered to you, but one bought privately (through the classifieds, for example.).
Beyond that, the Libertarian Party’s political solution to African-American poverty and injustice was to abolish all welfare programs, public schools, and anti-discrimination laws like the Civil Rights Act. This was the solution promoted by an up-and-coming libertarian, Jacob Hornberger—who this week co-hosted an event with RON PAUL and GLENN GREENWALD. Hornberger believes that 19th century antebellum slave-era America was “the freest society in history”. . .
1b. Tthe Students For Liberty is a libertarian group funded by the Koch brothers and with the Prince of Liechtenstein on its advisory board. Peter Thiel is closely connected to this organization.
. . . . All of which makes it slightly shocking to discover the identity of another recent winner of Students For Liberty’s big award: Peter Thiel, the founder of one of the NSA’s biggest contractors, Palantir Technologies. If a government is trying to dig through private records and aggregate a dossier, Palantir is the companythey call. . . .
. . . . So what exactly is “Students For Liberty”? According to its website, “Students For Liberty has grown into the largest libertarian student organization in the world, with over 800 student leaders supporting over 1,350 student groups representing over 100,000 students on all inhabited continents.”
Like most of the libertarian nomenklatura, this group gets most of its money from the Koch brothers. Google, another corporation which has worked closely with the US government, recently joined the list of big corporate sponsors. SFL’s Board of Advisors includes such heroes of freedom as “His Serene Highness Prince von Liechtenstein” — whose royal family rules over an exclusive offshore banking tax haven favored by global billionaires who think Switzerland is too transparent. . . .
Indeed, Thiel’s presence was everywhere at the Students For Liberty schmoozer this year, even if the man himself was absent. After Snowden’s skyped appearance, libertarian celebrity Ron Paul took the stage with longtime Cato Institute board director and FoxNews truther Andrew Napolitano. Ron Paul’s 2012 campaign for president — supported by Snowden and Greenwald — was almost entirely funded by Peter Thiel.
The following night, Students For Liberty featured Ron Paul’s stubby heir, Sen. Rand Paul — whose run for president in 2016 is being funded by Thiel’s co-founder at Palantir, Joe Lonsdale, who serves on Rand Paul’s finance team and co-hosted Silicon Valley fundraisers.
In 2011, Palantir sponsored the Electronic Frontier Foundation’s Pioneer Awards, whose illustrious list of winners includes Glenn Greenwald and Laura Poitras, the Tor Project, and EFF co-founder Mitch Kapor as well as EFF Fellow Cory Doctorow. . . .
2. About Dylann Roof’s manifesto, noting the references to the fourteen words and the apparent influence of the Trayvon Martin shooting on the development of the shooter’s ideological and operational orientation.
A website surfaced Saturday featuring a racist and rambling manifesto and dozens of photos of accused Charleston church shooter Dylann Roof posing with white supremacy symbols and the Confederate flag.
Roof, 21, remains jailed on nine counts of murder for allegedly opening fire in the historically African-American Emanuel African Methodist Episcopal Church on Wednesday.
Who authored the manifesto or posted the images is not officially known. But through online registration records, Yahoo News confirmed the website’s domain, lastrhodesian.com, was started by a Dylann Roof of Eastover, S.C. on Feb. 9. The street address used is the same that Roof has given authorities since he was captured in Shelby, N.C. on Thursday. Of Feb. 10, the registration information was purposely obscured.
The webpage traces its author’s path toward strong beliefs in white supremacy and says the moment of “awakening” was the race debate ignited after the shooting of black teen Trayvon Martin. The rambling text ends with the author’s statement that it’s time to take the beliefs expressed, “to the real world.”
“I have no choice. I am not in the position to, alone, go into the ghetto and fight. I chose Charleston because it is most historic city in my state, and at one time had the highest ratio of blacks to Whites in the country. We have no skinheads, no real KKK, no one doing anything but talking on the internet.
Well someone has to have the bravery to take it to the real world, and I guess that has to be me,” it reads.While they are rare, retired FBI profiler Mary Ellen O’Toole said killer manifestos are all about “the writings of a very narcissistic, arrogant individual.”
“They feel this need to tell the world how they were wronged,” O’Toole said. “It’s like they have to shove our nose into why they are entitled into what it is they are going to do.”
O’Toole, who has seen hundreds of manifestos during her career studying killers, read the document posted to Roof’s website at the request of Yahoo News.
While not vouching for it’s authenticity, O’Toole described it as shallow and likely plagiarized.
“The themes don’t indicate that this person is spending a lot of time to do research,” said O’Toole, who now directs the Forensic Science Program at George Mason University.
The 2,444-word manifesto jumps from topic to topic addressing, among other things, patriotism, blacks, Jews, Hispanics and Asians.
“He’s trying to weave like a quilt of those themes that he went out in search of,” O’Toole said. “Which tells me that whoever the author is had preexisting opinions and ideas … and then you go to the Internet to get a little bit of this and a little bit of that to fuel what you already believe and already think.”
The New York Times, reports that according to web server logs, the manifesto was last modified at 4:44 p.m. ET on Wednesday, about four hours before the Charleston shootings.
“Unfortunately at the time of writing I am in a great hurry and some of my best thoughts, actually many of them have been to be left out and lost forever. But I believe enough great White minds are out there already. Please forgive any typos, I didnt have time to check it.”
Benjamin Crump, attorney for Trayvon Martin’s family and a leading national voice in civil rights issues, said he was troubled to learn the manifesto mentioned Martin case.
“Regardless of how this demented, racist individual attempts to shift the focus of his murderous actions, we will remain steadfast in our defense of the voiceless around this country,” Crump said in a statement. “They need it now more than ever. My thoughts and prayers remain with the victims of this terrible tragedy and the Charleston community.”
Dozens of images posted to the site show Roof in historic locations like a Confederate soldier cemetery and a slave burial ground.
In one image, the suspected gunman is posed on the beach wearing the same clothes he is seen wearing on surveillance footage as he entered the chruch on Wednesday. It was not immediately clear if this image was taken the same day as the shooting, but if so, it would show that Roof took time to visit the beach, scratch the racist symbol 1488 in the sand and photograph himself before allegedly traveling to Charleston.
The symbol 1488, shown in Roof’s photos, is a number that has been adopted by white supremacists, according to the SouthernPoverty Law Center’s Racist Skinhead Glossary.
The “88” refers to H, the eighth letter of the alphabet and is a symbol for “Heil Hitler.” The “14” refers to a 14-word slogan popularized by David Lane, a white supremacist serving a 190-year sentence in the murder of a Jewish talk show host. The slogain is: “We must secure the existence of our people and a future for white children.”
The manifesto website was first discovered by two Twitter users – Emma Quangel and Henry Krinkle — who used a Reverse Whois search on domaintools.com to find the site registered under Roof’s name.
Quangel, who identifies as a Communist, tweeted that it is her “solemn duty and obligation to hate and fight racism with every inch of [her] being!”
The site’s title is a reference to an unrecognized state in Africa, in a region that is now Zimbabwe, during the 1960s and ’70s that was controlled by a white minority.
White supremacists have idealized this era and the Rhodesian flag has been used as a racist symbol.
One of the first photos circulated of Roof shows the 21-yare-old suspect wearing a jacket adorned with flag patches for both Apartheid-era South Africa and Rhodesia.
Also included in the trove of images on the site are photos of a Glock .45-caliber pistol, which has been identified as the same type of gun that was used in the shooting. Roof reportedly purchased the weapon in April for his 21st birthday with money give to him as a gift by his father.
Some of the pictures were taken at the Sankofa Burial Grounds for slaves on the McLeod Plantation in Charleston.
Others appear to have been taken at the Boone Hall plantation in Mt Pleasant, S.C., and the Museum and Library of Confederate History in Greenville, S.C.
The author of the manifesto said that he did not grow up in a racist home or environment. Roof’s family broke their silence Friday by releasing a statement extending their sympathies victims’ families.
“Words cannot express our shock, grief, and disbelief as to what happened that night,” it reads.
“Our thoughts and prayers are with the families of those killed this week. We have all been touched by the moving words from the victims’ families offering God’s forgiveness and love in the face of such horrible suffering.”
3a. Front and center in the neo-Confederate movement is the League of the South, an organization with ties to both Ron and Rand Paul.
. . . . . Pat Hines, the South Carolina state chairman of the League of the South, an organization that wants Southern states to secede from the United States, said Roof did not appear to belong to any white supremacist groups and could have been indoctrinated on the Internet. . . .
4. Imagine a world where personalized ads based on your browsing/purchasing history don’t simply show up on the web pages you’re reading, but actually show up on a billboard with facial recognition technology. Sound good? Hopefully it does, because Microsoft has already patented the idea.
Facebook–with Peter Thiel as its largest stockholder–is already using facial recognition technology.
“Facial Recognition Technology Is Everywhere. It May not Be Legal.” by Ben Sobel; Washington Post; 6/11/2015.
Ben Sobel is a researcher and incoming Google Policy Fellow at the Center on Privacy & Technology at Georgetown Law.
Being anonymous in public might be a thing of the past. Facial recognition technology is already being deployed to let brick-and-mortar stores scan the face of every shopper, identify returning customers and offer them individualized pricing — or find “pre-identified shoplifters” and “known litigious individuals.” Microsoft has patented a billboard that identifies you as you walk by and serves ads personalized to your purchase history. An app called NameTag claims it can identify people on the street just by looking at them through Google Glass.
Privacy advocates and representatives from companies like Facebook and Google are meeting in Washington on Thursday to try to set rules for how companies should use this powerful technology. They may be forgetting that a good deal of it could already be illegal.
There are no federal laws that specifically govern the use of facial recognition technology. But while few people know it, and even fewer are talking about it, both Illinois and Texas have laws against using such technology to identify people without their informed consent. That means that one out of every eight Americans currently has a legal right to biometric privacy.
The Illinois law is facing the most public test to date of what its protections mean for facial recognition technology. A lawsuit filed in Illinois trial court in April alleges Facebook violates the state’s Biometric Information Privacy Act by taking users’ faceprints “without even informing its users — let alone obtaining their informed written consent.” This suit, Licata v. Facebook, could reshape Facebook’s practices for getting user consent, and may even influence the expansion of facial recognition technology.
How common—and how accurate—is facial recognition technology?
You may not be walking by ads that address you by name, but odds are that your facial geometry is already being analyzed regularly. Law enforcement agencies deploy facial recognition technology in public and can identify someone by searching a biometric database that contains information on as many as one-third of Americans.
Companies like Facebook and Google routinely collect facial recognition data from their users, too. (Facebook’s system is on by default; Google’s only works if you opt in to it.) Their technology may be even more accurate than the government’s. Google’s FaceNet algorithm can identify faces with 99.63 percent accuracy. Facebook’s algorithm, DeepFace, gets a 97.25 percent rating. The FBI, on the other hand, has roughly85 percent accuracy in identifying potential matches—though, admittedly, the photographs it handles may be harder to analyze than those used by the social networks.
Facebook and Google use facial recognition to detect when a user appears in a photograph and to suggest that he or she be tagged. Facebook calls this “Tag Suggestions” and explains it as follows: “We currently use facial recognition software that uses an algorithm to calculate a unique number (“template”) based on someone’s facial features…This template is based on your profile pictures and photos you’ve been tagged in on Facebook.” Once it has built this template, Tag Suggestions analyzes photos uploaded by your friends to see if your face appears in them. If its algorithm detects your face, Facebook can encourage the uploader to tag you.
With the boom in personalized advertising technology, a facial recognition database of its users is likely very, very valuable to Facebook. The company hasn’t disclosed the size of its faceprint repository, but it does acknowledge that it has more than 250 billion user-uploaded photos — with 350 million more uploaded every day. The director of engineering at Facebook’s AI research lab recently suggested that this information was “the biggest human dataset in the world.”
Eager to extract that value, Facebook signed users up by default when it introduced Tag Suggestions in 2011. This meant that Facebook calculated faceprints for every user who didn’t take the steps to opt out. The Tag Suggestions rollout prompted Sen. Al Franken (D‑Minn.) to worry that “Facebook may have created the world’s largest privately held data base of faceprints— without the explicit consent of its users.” Tag Suggestions was more controversial in Europe, where Facebook committed to stop using facial identification technology after European regulators complained.
The introduction of Tag Suggestions is what’s at issue in the Illinois lawsuit. In Illinois, companies have to inform users whenever biometric information is being collected, explain the purpose of the collection and disclose how long they’ll keep the data. Once informed, users must provide “written release” that they consent to the data collection. Only after receiving this written consent may companies obtain biometric information, including scans of facial geometry.
Facebook declined to comment on the lawsuit and has not filed a written response in court.
It’s unclear whether today’s paradigm for consent — clicking a “Sign Up” button that attests you’ve read and agreed to a lengthy privacy policy — fulfills the requirements written into the Illinois law. It’s also unclear whether the statute will cover the Tag Suggestions data that Facebook derives from photographs. If the law does apply, Facebook could be on the hook for significant financial penalties. This case is one of the first applications of the Illinois law to facial recognition, and it will set a hugely important precedent for consumer privacy.
Why biometric privacy laws?
Biometric information like face geometry is high-stakes data because it encodes physical properties that are immutable, or at least very hard to conceal. Moreover, unlike other biometrics, faceprints are easy to collect remotely and surreptitiously by staking out a public place with a decent camera.
...
On the other hand, the Illinois law was galvanized by a few high-profile incidents of in-state collection of fingerprint data. Most notably, a company called Pay By Touch had installed machines in supermarkets across Illinois that allowed customers to pay by a fingerprint scan, which was linked to their bank and credit card information. Pay By Touch subsequently went bankrupt, and its liquidation prompted concerns about what might happen to its database of biometric information. James Ferg-Cadima, a former attorney with the ACLU of Illinois who worked on drafting and lobbying for the BIPA, told me that “the original vision of the bill was tied to the specific issue that was presenting itself across Illinois, and that was the deploying of thumbprint technologies…”
“Oddly enough,” Ferg-Cadima added, “this was a bill where there was little voice from the private business sector.” This corporate indifference might be a thing of the past. Tech companies of all stripes have grown more and more interested in biometrics. They’ve become more politically powerful, too: For instance, Facebook’s federal lobbying expenditures grew from $207,878 in 2009 to $9,340,000 in 2014.
Testing the Illinois law
The crucial question here is whether the Illinois and Texas laws can be applied to today’s most common uses of biometric identifiers. What real-world business practices would meet the standard of informed consent that Illinois law requires for biometric data collection?
When asked about the privacy law cited in the Licata case, Jay Edelson, the managing partner of the firm representing the plaintiff, said, “The key thing to understand is that almost all privacy statutes are really consent statutes.” The lawsuit stands to determine precisely what kind of consent the Illinois law demands.
If the court finds that Facebook can be sued for violating the Illinois biometrics law, and that its opt-out consent framework for Tag Suggestions violated the law, it may upend the practices of one of the world’s largest Internet companies, one that is possibly the single largest user of commercial facial recognition technology. And if the lawsuit fails for one reason or another, it would emphasize that regulation of facial recognition needs to take place on a federal level if it is to happen at all. Either way, there’s a chance this lawsuit will end up shaping the future of facial recognition technology.
5. Want to earn a million free miles from United Airlines? You can do it. Just find a vulnerability that allows you to remotely execute code on the flight systems. Unless the vulnerability involves hacking in through the onboard entertainment systems. That will get a much crappier reward in the form of a criminal investigation:
“United Will Reward People Who Flag Security Flaws—Sort Of” by Kim Zetter; Wired; 5/14/2015.
United Airlines announced this week that it’s launching a bug bounty program inviting researchers to report bugs in its websites, apps and online portals.
The announcement comes weeks after the airline kicked a security researcher off of one of its flights for tweeting about vulnerabilities in the Wi-Fi and entertainment networks of certain models of United planes made by Boeing and Airbus.
It’s believed to be the first bounty program offered by an airline. But curiously, United’s announcement doesn’t invite researchers to submit the most crucial vulnerabilities researchers could find—those discovered in onboard computer networks, such as the Wi-Fi and entertainment systems. In fact, the bounty program specifically excludes “bugs on onboard Wi-Fi, entertainment systems or avionics” and United notes that “[a]ny testing on aircraft or aircraft systems such as inflight entertainment or inflight Wi-Fi” could result in a criminal investigation.
“At United, we take your safety, security and privacy seriously. We utilize best practices and are confident that our systems are secure,” United’s announcement reads.
Researchers who report vulnerabilities in the airline’s web sites or apps, however, will be rewarded. how much cash will they receive? None. Instead United will pay out in mileage points. The awards range from 50,000 points for cross-site scripting bugs to 1 million for high-severity vulnerabilities that could allow an attacker to conduct remote-code execution on a United system. For comparison, most bug bounty programs offered by companies like Google, Microsoft and Facebook pay researchers cash ranging from $1,500 to more than $200,000, depending on the type and severity of the vulnerability.
The Recent Flap That Prompted the Bounty Program
Last month, we wrote extensively about security researcher Chris Roberts, who was detained by FBI agents in New York and later banned from a United flight. Roberts was flying a United Airlines Boeing 737–800 from Chicago to Syracuse when news broke of a government report describing potential security holes in Boeing and Airbus planes. The report from the Government Accountability Office noted that security issues with passenger Wi-Fi networks on several models of aircraft could allow hackers to access critical avionics systems and hijack the flight controls.
Roberts, a respected cybersecurity professional with One World Labs had been researching the security of airline onboard networks since 2009 and had reported vulnerabilities to Boeing and Airbus, to little effect. In response to the GAO report, he sent out a tweet from the air saying, “Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM,? Shall we start playing with EICAS messages? ‘PASS OXYGEN ON’ Anyone?.” He punctuated the tweet with a smiley face.
His tweet about the Engine Indicator Crew Alert System, or EICAS, was a reference to research he’d done years ago on vulnerabilities in inflight infotainment networks—vulnerabilities that could allow an attacker to access cabin controls and deploy a plane’s oxygen masks.
When Roberts landed in Syracuse, he was met by two FBI agents and two Syracuse police officers who seized his computer and other electronics and detained him for an interrogation that lasted several hours. When Roberts attempted to board another United flight to San Francisco days later, he was barred by the airline and had to book a flight with Southwest.
Although Roberts says he did not explore the United networks during his flight to Syracuse, he had previously admitted to the FBI months earlier during a separate interview that in past flights he had indeed explored onboard networks of planes while he was inflight.
Following his interrogation in Syracuse, the FBI and TSA issued a warning to all airlines to be on the lookout for passengers attempting to hack into onboard networks through Wi-Fi or the media systems below airplane seats.
...
6. Yes, flying the friendly skies just got friendlier for airline IT security experts. Unless, of course, those airline security experts jokingly tweet about how they might shut the oxygen off and then tell the feds about how they’ve previously taken control of planes via the entertainment systems:
“Feds Say That Banned Researcher Commandeered a Plane” by Kim Zetter; Wired; 5/15/2015.
A security researcher kicked off a United Airlines flight last month after tweeting about security vulnerabilities in its system had previously taken control of an airplane and caused it to briefly fly sideways, according to an application for a search warrant filed by an FBI agent.
Chris Roberts, a security researcher with One World Labs, told the FBI agent during an interview in February that he had hacked the in-flight entertainment system, or IFE, on an airplane and overwrote code on the plane’s Thrust Management Computer while aboard the flight. He was able to issue a climb command and make the plane briefly change course, the document states.
“He stated that he thereby caused one of the airplane engines to climb resulting in a lateral or sideways movement of the plane during one of these flights,” FBI Special Agent Mark Hurley wrote in his warrant application (.pdf). “He also stated that he used Vortex software after comprising/exploiting or ‘hacking’ the airplane’s networks. He used the software to monitor traffic from the cockpit system.”
Hurley filed the search warrant application last month after Roberts was removed from a United Airlines flight from Chicago to Syracuse, New York, because he published a facetious tweet suggesting he might hack into the plane’s network. Upon landing in Syracuse, two FBI agents and two local police officers escorted him from the plane and interrogated him for several hours. They also seized two laptop computers and several hard drives and USB sticks. Although the agents did not have a warrant when they seized the devices, they told Roberts a warrant was pending.
A media outlet in Canada obtained the application for the warrant today and published it online.
The information outlined in the warrant application reveals a far more serious situation than Roberts has previously disclosed.
Roberts had previously told WIRED that he caused a plane to climb during a simulated test on a virtual environment he and a colleague created, but he insisted then that he had not interfered with the operation of a plane while in flight.
He told WIRED that he did access in-flight networks about 15 times during various flights but had not done anything beyond explore the networks and observe data traffic crossing them. According to the FBI affidavit, however, when he mentioned this to agents last February he told them that he also had briefly commandeered a plane during one of those flights.
He told the FBI that the period in which he accessed the in-flight networks more than a dozen times occurred between 2011 and 2014. The affidavit, however, does not indicate exactly which flight he allegedly caused to turn to fly to the side.
He obtained physical access to the networks through the Seat Electronic Box, or SEB. These are installed two to a row, on each side of the aisle under passenger seats, on certain planes. After removing the cover to the SEB by “wiggling and Squeezing the box,” Roberts told agents he attached a Cat6 ethernet cable, with a modified connector, to the box and to his laptop and then used default IDs and passwords to gain access to the inflight entertainment system. Once on that network, he was able to gain access to other systems on the planes.
Reaction in the security community to the new revelations in the affidavit have been harsh. Although Roberts hasn’t been charged yet with any crime, and there are questions about whether his actions really did cause the plane to list to the side or he simply thought they did, a number of security researchers have expressed shock that he attempted to tamper with a plane during a flight.
“I find it really hard to believe but if that is the case he deserves going to jail,” wrote Jaime Blasco, director of AlienVault Labs in a tweet.
Alex Stamos, chief information security officer of Yahoo, wrote in a tweet, “You cannot promote the (true) idea that security research benefits humanity while defending research that endangered hundreds of innocents.” ...
Roberts, reached by phone after the FBI document was made public, told WIRED that he had already seen it last month but wasn’t expecting it to go public today.
“My biggest concern is obviously with the multiple conversations that I had with the authorities,” he said. “I’m obviously concerned those were held behind closed doors and apparently they’re no longer behind closed doors.”
Although he wouldn’t respond directly to questions about whether he had hacked that previous flight mentioned in the affidavit, he said the paragraph in the FBI document discussing this is out of context.
“That paragraph that’s in there is one paragraph out of a lot of discussions, so there is context that is obviously missing which obviously I can’t say anything about,” he said. “It would appear from what I’ve seen that the federal guys took one paragraph out of a lot of discussions and a lot of meetings and notes and just chose that one as opposed to plenty of others.”
History of Researching Planes
Roberts began investigating aviation security about six years ago after he and a research colleague got hold of publicly available flight manuals and wiring diagrams for various planes. The documents showed how inflight entertainment systems one some planes were connected to the passenger satellite phone network, which included functions for operating some cabin control systems. These systems were in turn connected to the plane avionics systems. They built a test lab using demo software obtained from infotainment vendors and others in order to explore what they could to the networks.
In 2010, Roberts gave a presentation about hacking planes and cars at the BSides security conference in Las Vegas. Another presentation followed two years later. He also spoke directly to airplane manufacturers about the problems with their systems. “We had conversations with two main airplane builders as well as with two of the top providers of infotainment systems and it never went anywhere,” he told WIRED last month.
Last February, the FBI in Denver, where Roberts is based, requested a meeting. They discussed his research for an hour, and returned a couple weeks later for a discussion that lasted several more hours. They wanted to know what was possible and what exactly he and his colleague had done. Roberts disclosed that he and his colleague had sniffed the data traffic on more than a dozen flights after connecting their laptops to the infotainment networks.
“We researched further than that,” he told WIRED last month. “We were within the fuel balancing system and the thrust control system. We watched the packets and data going across the network to see where it was going.”
Eventually, Roberts and his research partner determined that it would take a convoluted set of hacks to seriously subvert an avionics system, but they believed it could be done. He insisted to WIRED last month, however, that they did not “mess around with that except on simulation systems.” In simulations, for example, Roberts said they were able to turn the engine controls from cruise to climb, “which definitely had the desired effect on the system—the plane sped up and the nose of the airplane went up.”
Today he would not respond to questions about the new allegations from the FBI that he also messed with the systems during a real flight.
The Tweet Heard Round the World
Roberts never heard from the FBI again after that February visit. His recent troubles began after he sent out a Tweet on April 15 while aboard a United Airlines flight from Denver to Chicago. After news broke about a report from the Government Accountability Office revealing that passenger Wi-Fi networks on some Boeing and Airbus planes could allow an attacker to gain access to avionics systems and commandeer a flight, Roberts published a Tweet that said, “Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM,? Shall we start playing with EICAS messages? ‘PASS OXYGEN ON’ Anyone?” He punctuated the tweet with a smiley face.
...
The tweet was meant as a sarcastic joke; a reference to how he had tried for years to get Boeing and Airbus to heed warnings about security issues with their passenger communications systems. His tweet about the Engine Indicator Crew Alert System, or EICAS, was a reference to research he’d done years ago on vulnerabilities in inflight infotainment networks, vulnerabilities that could allow an attacker to access cabin controls and deploy a plane’s oxygen masks.
In response to his tweet, someone else tweeted to him “…aaaaaand you’re in jail. :)”
Roberts responded with, “There IS a distinct possibility that the course of action laid out above would land me in an orange suite [sic] rather quickly :)”
When an employee with United Airlines’ Cyber Security Intelligence Department became aware of the tweet, he contacted the FBI and told agents that Roberts would be on a second flight going from Chicago to Syracuse. Although the particular plane Roberts was on at the time the agents seized him in New York was not equipped with an inflight entertainment system like the kind he had previously told the FBI he had hacked, the plane he had flown earlier from Denver to Chicago did have the same system.
When an FBI agent later examined that Denver-to-Chicago plane after it landed in another city the same day, he found that the SEBs under the seats where Roberts had been sitting “showed signs of tampering,” according to the affidavit. Roberts had been sitting in seat 3A and the SEB under 2A, the seat in front of him, “was damaged.”
“The outer cover of the box was open approximately 1/2 inch and one of the retaining screws was not seated and was exposed,” FBI Special Agent Hurley wrote in his affidavit.
During the interrogation in Syracuse, Roberts told the agents that he had not compromised the network on the United flight from Denver to Chicago. He advised them, however, that he was carrying thumb drives containing malware to compromise networks—malware that he told them was “nasty.” Also on his laptop were schematics for the wiring systems of a number of airplane models. All of this would be standard, however, for a security researcher who conducts penetration-testing and research for a living.
Nonetheless, based on all of the information that agents had gleaned from their previous interview with Roberts in February as well as the Tweets he’d sent out that day and the apparent signs of tampering on the United flight, the FBI believed that Roberts “had the ability and the willingness to use the equipment then with him to access or attempt to access the IFE and possibly the flight control systems on any aircraft equipped with an IFE systems, and that it would endanger public safety to allow him to leave the Syracuse airport that evening with that equipment.”
When asked by WIRED if he ever connected his laptop to the SEB on his flight from Denver to Chicago, Roberts said, “Nope I did not. That I’m happy to say and I’ll stand from the top of the tallest tower and yell that one.”
He also questions the FBI’s assessment that the boxes showed signs of tampering.
“Those boxes are underneath the seats. How many people shove luggage and all sorts of things under there?,” he said. “I’d be interested if they looked at the boxes under all the other seats and if they looked like they had been tampered. How many of them are broken and cracked or have scuff marks? How many of those do the airlines replace because people shove things under there?”
...
He obtained physical access to the networks through the Seat Electronic Box, or SEB. These are installed two to a row, on each side of the aisle under passenger seats, on certain planes. After removing the cover to the SEB by “wiggling and Squeezing the box,” Roberts told agents he attached a Cat6 ethernet cable, with a modified connector, to the box and to his laptop and then used default IDs and passwords to gain access to the inflight entertainment system. Once on that network, he was able to gain access to other systems on the planes.
...
7. Here’s a reminder that we’ve been hearing stories from security researchers about hacking into planes via their entertainment systems for a few years now:
“Hacker Says Phone App Could Hijack Plane” by Doug Gross; CNN; 4/12/2013.
Could this be the deadliest smartphone app ever?
A German security consultant, who’s also a commercial pilot, has demonstrated tools he says could be used to hijack an airplane remotely, using just an Android phone.
Speaking at the Hack in the Box security summit in Amsterdam, Netherlands, Hugo Teso said Wednesday that he spent three years developing SIMON, a framework of malicious code that could be used to attack and exploit airline security software, and an Android app to run it that he calls PlaneSploit.
Using a flight simulator, Teso showed off the ability to change the speed, altitude and direction of a virtual airplane by sending radio signals to its flight-management system. Current security systems don’t have strong enough authentication methods to make sure the commands are coming from a legitimate source, he said.
“You can use this system to modify approximately everything related to the navigation of the plane,” Teso told Forbesafter his presentation. “That includes a lot of nasty things.”
He told the crowd that the tools also could be used to do things like change what’s on a pilot’s display screen or turn off the lights in the cockpit. With the Android app he created, he said, he could remotely control a plane by simply tapping preloaded commands like “Please Go Here” and the ominous “Visit Ground.”
The Federal Aviation Administration said it is aware of Teso’s claims, but said the hacking technique does not pose a threat on real flights because it does not work on certified flight hardware.
“The described technique cannot engage or control the aircraft’s autopilot system using the (Flight Management System) or prevent a pilot from overriding the autopilot,” the FAA said. “Therefore, a hacker cannot obtain ‘full control of an aircraft’ as the technology consultant has claimed.”
Teso says he developed SIMON in a way that makes it work only in virtual environments, not on actual aircraft.
But the risk is there, some experts say.
“His testing laboratory consists of a series of software and hardware products, but the connection and communication methods, as well as ways of exploitation, are absolutely the same as they would be in an actual real-world scenario,” analysts at Help Net Security wrote in a blog post.
Teso told the crowd that he used flight-management hardware that he bought on eBay and publicly available flight-simulator software that contains at least some of the same computer coding as real flight software.
Analyst Graham Cluley of Sophos Security said it’s unclear how devastating Teso’s find would be if unleashed on an airplane in flight.
“No one else has had an opportunity to test this researcher’s claims as he has, thankfully, kept secret details of the vulnerabilities he was able to exploit,” Cluley said. “We are also told that he has informed the relevant bodies, so steps can be taken to patch any security holes before someone with more malicious intent has an opportunity to exploit them.”
..
Teso isn’t the first so-called “white hat” hacker to expose what appear to be holes in air-traffic security.
Last year, at the Black Hat security conference in Las Vegas, computer scientist Andrei Costin discussed weaknesses he said he found in a new U.S. air-traffic security system set to roll out next year. The flaws he found weren’t instantly catastrophic, he said, but could be used to track private airplanes, intercept messages and jam communications between planes and air-traffic control.
8. Experts dispute Roberts’s claims.
“Experts: Plane Hack through Infotainment Box Seems Unlikely” by Elizabeth Weise; USA Today; 5/18/2015.
Computer and aviation experts say it seems unlikely a Denver-based cyber-security researcher was able to compromise a jet’s controls via its in-flight entertainment system, making it bank briefly to one side.
The claims of One World Labs founder Chris Roberts have been the subject of much speculation after it was reported Friday that he told FBI agents he’d been able to hack into a flight he was on and cause it to turn sideways by manipulating the engine controls from his computer.
Those systems are separate, said Jeffrey Price, an aviation security expert and aviation professor at Metropolitan State University in Denver.
“From what all the aircraft manufacturers have been telling us, the in-flight entertainment system is a different system from the software that controls the avionics, flight controls and navigation systems of the plane,” he said.
Federal law enforcement officials say they are assessing Roberts’ claims but so far have no credible information to suggest an airplane’s flight control system can be accessed or manipulated from its in-flight entertainment system.
Security experts say they can’t imagine the airlines and FAA aren’t aware if Roberts was in fact able to illegally access planes control systems “15 to 20 times,” as he told FBI agents when he spoke with them earlier this year.
“Pilots know what’s happening with their planes from the smallest maintenance issue up to anything serious,” said Rob Sadowski, director of marketing for RSA, the world’s largest computer security conference.
“We all know that from sitting on planes when they tell us, ‘We can’t get the door light to go on, so we’re not taking off,’” he said.
Roberts is well known and respected in the security industry and speaks at multiple conferences on various security topics, including aircraft security, said Sadowski. Roberts spoke at the most recent RSA conference in March.
However, he doesn’t think it’s likely Roberts was actually able to get from the plane’s in-flight entertainment network to its flight control systems.
“As someone in the industry who looks at the design of systems like this, I would find it very hard to believe that these systems were not isolated,” he said.
Some security experts worry that that may not always be true.
Price report that a report issued by the Government Accountability Office in January described possible problems as the Federal Aviation Administration moves from the current radar-based air traffic control system to one that is based on satellite navigation and automation.
“While it’s doubtful whether this guy could have accessed anything really important by hacking the in-flight entertainment system, it’s likely that he will be able to do so in the near future,” Price said.
Most of the computer experts contacted also noted they spend a lot of time flying, and hope no one would put an airplane at risk simply to show they could.
“I want to believe that if I saw anyone onboard any plane that I was traveling on try and plug anything into the plane that didn’t look like it was supposed to be there, I would be the first person not just alerting the crew but likely jumping up and tackling the person,” said Brian Ford, with security firm Lancope.
...
The Federal Aviation Administration said it is aware of Teso’s claims, but said the hacking technique does not pose a threat on real flights because it does not work on certified flight hardware.“The described technique cannot engage or control the aircraft’s autopilot system using the (Flight Management System) or prevent a pilot from overriding the autopilot,” the FAA said. “Therefore, a hacker cannot obtain ‘full control of an aircraft’ as the technology consultant has claimed.“
9. Apple is developing a body-monitoring app that, like the Google technology discussed above, will open up new vistas for the maintenance of health and, as theorized in the article below, new vistas for malefactors to disrupt or kill those they dislike.
“Apple’s Upcoming Health App Is the Start of Something Huge” by Ryan Tate; Wired; 3/17/2014.
Apple is poised to launch a body-monitoring app known as Healthbook, tracking everything from sleep to nutrition to exercise to vital signs.
That’s the word from 9‑to‑5 Mac, which published a detailed look at the app on Monday, and as described, this project could prove to be a tipping point for mobile healthcare — a computing sector that has long been on the brink of explosive popularity without actually breaking through.
According to the 9‑to‑5 Mac rundown, Apple Healthbook is an incredibly broad undertaking. It’s designed to track your blood sugar, heart rate, breathing rate, weight, hydration, and physical movements. It even tracks health tests. Pundits are already speculating that it will be a key selling point for Apple’s forthcoming iOS 8 mobile operating system or its long-rumored “iWatch” smartwatch or both. We know that Apple has hired fitness guru Jay Blahnik and various engineers with medical sensor experience, which would indicate the company is preparing some sort of wearable health monitoring device.
Health and fitness apps have become increasingly prevalent in recent years. One company, Azumio, now offers 40 health monitoring and fitness apps for the Apple iPhone alone. PayPal co-founder Max Levchin is pushing Glow, an app designed to help couples get pregnant. And HealthTap provides a clever and carefully curated medical question-and-answer system that brokers online sessions with doctors. Systems like these can significantly reduce healthcare costs, and many health providers are interested in subsidizing their deployment and use.
Apple Healthbook may compete with existing healthcare apps, but it also could help them flourish. As 9‑to‑5 Mac points out, it could serve as a unified interface to health and fitness apps in the same way that Apple’s Passbook app helps you juggle airline boarding passes, tickets, and gift cards from a wide range of apps. And as noted by venture capitalist MG Siegler, Healthbook could encourage Apple to build more bridges between its devices and third-party sensors, making it easier to find, say, a high-end heart-rate monitor that works with your iPhone. . . .
10a. Apple is not the only tech firm working on stunning medical advances. Exemplifying the Brave New World of Big Tech in medecine, Google (an internet company, remember) is developing nanotechnology that can monitor a customer’s biology for signs of heart disease and cancer.
Google is working on a nanoparticle pill that could identify cancers, heart attacks and other diseases before they become a problem.
The pill would contain magnetic particles approximately 10,000 times smaller than the width of a human hair. These tiny particles will have antibodies or proteins attached to them that detect the presence of “biomarker” molecules inside the body that indicate diseases such as cancer or an imminent heart attack.
“Essentially the idea is simple; you just swallow a pill with the nano particles, which are decorated with antibodies or molecules that detect other molecules,” explained Andrew Conrad, head of life sciences inside the Google’s “moonshot” X research lab to WSJD Live conference in California Tuesday. “They course through your body and because the cores of these particles are magnetic, you can call them somewhere and ask them what they saw.”
Conrad explained that the particles would be analogous to sending thousands of doctors down into the population of a large city to monitor what is going on with individuals, describing current medical techniques as having one doctor fly over the city it in a helicopter trying to see what’s causing issues with individual people.
“If you look at your wrist you can see these superficial veins – just by putting a magnet there you can trap [the nanoparticles],” Conrad said explaining that a wrist-worn device like a smartwatch could be used to read what the particles have detected on their trip through the blood stream.
“We ask them: Hey, what did you see? Did you find cancer? Did you see something that looks like a fragile plaque for a heart attack? Did you see too much sodium?” said Conrad.
The system known as the “nanoparticle platform” is Google’s latest venture into the lucrative health market, which is worth around 10% of the economy of developed nations. More than £100bn a year is spent on the National Health Service in Britain. . . .
10b. Contemplating the Brave New World of mobile/digital/internet-related super technology of the type being developed by Google (and Apple, as we see below), we should never lose sight of the socio/political viewpoint of Google. The Competitive Enterprise Institute was a major force behind the recent King vs. Burwell case–the most recent (overturned) challenge to the Affordable Care Act.
While folks like Michael Greve, former longtime chairman of the Competitive Enterprise Institute (CEI) and a leader of the group pushing the King vs Burwell lawsuit(with the CEI’s help and funding), may have failed in their attempts to deprive healthcare to millions of low-income Americans after the Supreme Court’s ruling this week, it’s worth noting that Google is among the funders of the CEI, along with the Koch Brothers.
“Google Is Helping to Fund the Group that’s Trying to kill Obamacare in the Supreme Court” by Mark Ames; Pando Daily; 3/18/2015.
The Obama administration said on Monday that 16.4 million uninsured people had gained health coverage since major provisions of the Affordable Care Act began to take effect in 2010, driving the largest reduction in the number of uninsured in about 40 years
— NY Times
According to the latest government figures, 16.4 million previously uninsured Americans now benefit from healthcare coverage thanks to Obamacare, including large gains for blacks and Latinos. Conservative critics have yet to come up with a coherent response beyond “so what!”— however you look at it, that’s a lot of Americans who won’t be left bleeding in the dirt if they get sick.
Still, as we know, Obamacare is still under attack — just one pending Supreme Court ruling away from being almost completely dismantled, a decision that could put millions back in the ranks of the uninsured. What’s less well known is that the think tank pushing for the death of Obamacare is partly funded by... Google.
Earlier this month, the New York Times reportedon this “obscure think tank” — the Competitive Enterprise Institute(CEI) — and its central role in trying to kill Obamacare:
In the orbit of Washington think tanks, the Competitive Enterprise Instituteis an obscure name with a modest budget that belies its political connections to conservative titans like the Koch brothers.
But the institute, a libertarian research group, enjoyed a coming-out of sorts on Wednesday, as the lawsuit that it organized and bankrolled — challenging the Affordable Care Act — was heard by the Supreme Court. The case has the potential to end federal insurance subsidiesfor some 7.5 million people in 34 states.
But, while the Times did mention that the CEI is largely bankrolled by the Koch brothers, it didn’t dig into some of the group’s smaller funders. Funders including Silicon Valley giants like Google and Facebook. Could there be a clearer antithesis to the valley mantra of “Don’t Be Evil” than an organization which exists to deny 7.5m people access to basic health insurance?
11. Illustrating the perils of the Brave New World tech has ushered in–and why we strongly support the NSA (warts and all), we offer up the [largely suppressed] fact that one Vietnamese criminal syndicate obtained the personal information of two thirds of the American people. The information is contained in the recent book Future Crimes, by Marc Goodman.
Godman suggests that, in the future, hackers could interfere with internet-connected medical devices to kill people from afar. That is particularly haunting in light of the technological developments in medical high tech being brought into existence by Google and Apple.
Be sure to read the entire article, using the link below.
“Cops and Hackers” by Hannah Kuchler; Financial Times; 2/15/2015; p. 7.
. . . . In Future Games, Goodman spills out story after story about technology has been used for illegal ends, from the Vietnamese gang that was able to buy the personal data of two-thirds of all Americans to a suspected Chinese state-sponsored attack in which confidential aircraft designs were stolen from the US military. His predictions are often depressingly plausible. Today, for examle, we have Cryptolocker software that encrypts data on computers until the user pays a ransom in bitcoin; tomorrow, Goodman suggests, the same tactic could be used on a connected home with a smart door lock to prevent a resident returning–or, worse still, on an internet-connected medical device such as a pacemaker that could be tampered with to kill someone from afar. . . .
12. The program concludes with an crystallization of a very important concept discussed by David Golumbia in Uncomputing.org. Obviously, the interests described below are not concerned with democratic political ideals in any size, shape, form or manner. The underlying despair inherent in such views reminds us of Oswald Spengler’s Decline of the West–a text that was fundamental to the development of fascist ideology. (We discuss the Spengler text is our interviews with Kevin Coogan.) The Spengler text was a major influence on Francis Parker Yockey, among others.
“Tor, Technocracy, Democracy” by David Golumbia; Uncomputing.org; 4/23/2015.
“Such technocratic beliefs are widespread in our world today, especially in the enclaves of digital enthusiasts, whether or not they are part of the giant corporate-digital leviathan. Hackers (“civic,” “ethical,” “white” and “black” hat alike), hacktivists, WikiLeaks fans [and Julian Assange et al–D. E.], Anonymous “members,” even Edward Snowden himself walk hand-in-hand with Facebook and Google in telling us that coders don’t just have good things to contribute to the political world, but that the political world is theirs to do with what they want, and the rest of us should stay out of it: the political world is broken, they appear to think (rightly, at least in part), and the solution to that, they think (wrongly, at least for the most part), is for programmers to take political matters into their own hands. . . First, [Tor co-creator] Dingledine claimed that Tor must be supported because it follows directly from a fundamental “right to privacy.” Yet when pressed—and not that hard—he admits that what he means by “right to privacy” is not what any human rights body or “particular legal regime” has meant by it. Instead of talking about how human rights are protected, he asserts that human rights are natural rights and that these natural rights create natural law that is properly enforced by entities above and outside of democratic polities. Where the UN’s Universal Declaration on Human Rights of 1948 is very clear that states and bodies like the UN to which states belong are the exclusive guarantors of human rights, whatever the origin of those rights, Dingledine asserts that a small group of software developers can assign to themselves that role, and that members of democratic polities have no choice but to accept them having that role. . . Further, it is hard not to notice that the appeal to natural rights is today most often associated with the political right, for a variety of reasons (ur-neocon Leo Strauss was one of the most prominent 20th century proponents of these views). We aren’t supposed to endorse Tor because we endorse the right: it’s supposed to be above the left/right distinction. But it isn’t. . . .”
Mark Ames just published a huge new piece over at Pando about the massive number of prominent individuals paid off or simply intimidated by the tobacco industry for the past 60+ years. It’s a massive list and let’s just say that Matthew Hale isn’t Glenn Greenwald’s only controversial client. But Greenwald is far from the only prominent individual that’s been directly or indirectly sucking at the teat of big tobacco. Again, it’s a massive list:
So that was a horribly depressing stain on human history.
In related news...
Pando’s Paul Carr has been reporting from the libertarian “FreedomFest” conference that’s going on in Las Vegas. In his latest FreedomFest installment, we get a closer peek at the individual, publisher Jeffrey Tucker, that created what Carr described as his most terrifying moment. Let’s just say Big Tech probably doesn’t share Carr’s terror about Tucker’s views on technology and regulations, although they should probably be a little concerned about almost everything else he says:
“It came during a panel about “hacking the state” where a publisher named Jeffrey Tucker described his vision for a world where technology has disrupted away all regulations and laws. Uber, argued Tucker, was a good “first step” down that road, but was held back by Travis Kalanick’s insistence on regulating the behavior of his drivers.”
That’s right, Uber, a company that Peter Thiel characterized as “the most ethically challenged company in Silicon Valley”, is a good “first step”, but needs to stop regulating the behavior’s of its drivers. At all, apparently.
Check out JP Morgan’s latest gimmick for convincing regulators that JP Morgan is actually capable of internally policing itself (thus avoiding more drastic regulatory measures). It’s an interesting hybrid approach: on the one hand, it sort of follows the WikiLeaks theory of thwarting wrongdoing by setting up dedicated whistling-blowing hotlines for employees to anonymously leave tips about wrongdoing. On the other hand, there’s the fancy new ‘Minority Report’-style AI that will sift through all employee communications and attempt to predict and/or infer bad behavior:
Welcome to your corporate compliance future: total communication surveillance by your employer. And don’t think JP Morgan or the rest of Wall Street is going to casually give up on this idea. These systems probably aren’t cheap, but if they can prevent regulators anxious to avoid another “London Whale” scandal from doing something like separating retail banking from investment banking, they’ll be worth every last penny:
Who needs Big Government to regulate the Big Banks when you can have Big Bank Brother do it for you? That’s apparently the future!
And it’s hard to see how this trend is going to stop at banks, especially if industries discover that they can avoid regulatory oversight by promising to turn themselves into privates-sector spy-mongers using the software from the same firms that are servicing the intelligence community. Good times are ahead. Good times for companies like Palantir:
Remember folks: in the future, people that refer to wedding cakes or sporting events, use expressions or anger, or seem to lack confidence around a decision are the kinds of people that are just going to cause trouble:
Keep in mind that there’s also nothing preventing companies from applying these systems to old, stored emails retroactively, and that means even people working at companies that don’t employ Minority-Report system yet can’t assume that the email’s they’re writing today aren’t going to be scanned by Skynet next tomorrow. Or ten years from now.
So when you’re using email at the office, just imagine what it would fell like if you were an unfeeling corporate robot incapable of expressing anything other than the details related to your immediate work and channel that feeling. That’s probably your safest bet going forward although there are other options.
Checkout Facebook’s new patent. It’s for a service that will let banks scan your Facebook friends for the purpose of assessing our credit quality. For instance, Facebook might set up a service where banks can take the average of the credit ratings for all of the people in your social network, and if that average doesn’t meet a minimum credit score, your loan application is denied. And that’s not just some random application of Facebook’s new patent. No, the system of using the average credit scores of your social network to deny you loans is explicitly part of the patent:
Yes, if you don’t like having your loan or insurance applications denied because of the credit quality if your friends, just find richer friends! And don’t worry if you can’t find any. There are plenty of tools available that should be able to help you find that social network you need to succeed. Or, rather, find that social network you’re going need even more than you already need to succeed.
It’s long been hard to view Google as something other than a privatized version of an “alphabet agency”. Really hard.
This isn’t going to make it any easier:
Check out the group headlining the 2016 “International Students for Liberty” conference:
This was pretty inevitable, and increasingly moot, but it’s worth noting that facial recognition software is getting rolled out at US airports:
“The test comes as Congress has hounded DHS to implement biometric exit-tracking capabilities. At a Senate hearing in January, lawmakers queried DHS officials about why a biometric system that gathers information from departing foreign nationals to check against criminal and terrorist watchlists and criminal databases wasn’t in place. The 9/11 Commission recommended such a national biometric exit system back in 2004.”
While this is just a test, it’s pretty clear that it’s just a matter of time before we this kind of technology at every international airport in the US. And perhaps every international airport internationally, like in Germany:
“Other countries are also looking at such technology, but Germans have traditionally been skeptical of surveillance due to abuses by the Stasi secret police in East Germany and the Gestapo under the Nazis.”
Yeah, considering the German government is trying to brand the nation as the global leader in personal data-privacy and the general history of surveillance state abuses, it’s going to be a little ironic if Germany begins leading the way in Europe for automated facial recognition technologies. Although, as the article below notes, Germany probably isn’t going to be implementing facial recognition technology on its own since the potential anti-terror utility of a single nation implementing a real-time facial recognition system is rather limited without a global database of possible terror suspect. Sharing facial recognition databases between nations is also required to really make the system work:
“Paul Murphy from IndigoVision, a British company which specializes in video security systems, said a typical system could require 2,000 cameras and powerful computer servers.”
That’s a lot of cameras. Smile! But don’t smile too nervously. And for this system to work, lots and lots of images of all possible suspects, from a variety of angles, will need to be shared between national security agencies and made available to the servers doing the real-time image recognition analysis. That’s a lot of data.
So it’s basically just a matter of time before a really, really big collectively maintained database of images of just about everyone who travels anywhere becomes a standard tool for securing public and private spaces. Although, maybe not everyone. Because as the following 2014 Suddeutsche Zeitung report on the BND’s plans for upgrading its biometric identification capabilities points out, there is one big problem that a global facial recognition database creates for spy agencies: Now all their undercover agents can be biometrically identified and have their covers blown, which is why the BND isn’t just investing in facial recognition and other biometric technologies. It’s also investing in image manipulation technology in order to thwart the automated biometrics to protect the identity of its agents (Translated via Google):
“Until 2019, the BND will invest 4.5 million euros to upgrade biometrics in the field. On the basis of, for example, fingerprints and iris scans the BND wants to identify targets. The image recognition is to be automated. Biometrics makes the service even problems. Agents who have traveled under her real name abroad and of which there are biometric data can not travel under assumed name next time, because the biometric data remain the same. In order to protect its own people, the service will therefore buy software for image manipulation. ”
Yep, in the future, the automated real-time biometric systems will also include special options for somehow introducing whatever disinformation is required to prevent undercover agents from accidentally getting flagged by showing up as two different people. It’s an example of the kind of fascinating surveillance-state headaches that could be emerging: the more spying becomes automated, the greater the chances spies accidentally get identified by their own surveillance infrastructure or some other nation’s automated spy system.
How exactly this gets worked out between nations is going to be an interesting question but it also highlights another fascinating dynamic that’s emerging in the post-Snowden era of widescale public concern over digital spying: One of the main arguments we often hear these days is that spy agencies should basically just stop spying digitally and instead go back to relying primarily on human spies and fill in the HumInt gap. Ok, that could happen. It might ironically encourage the creation of a Stasi-like human spy network, but could happen. But if that does happen and we really do see a big refocus on human intelligence going forward, it’s going to be very interesting to see what spy agencies do to prevent all their human spies from being identified by facial recognition software (whether its their real id or undercover id) and having that biometric data shared with other security agencies all over the globe. Especially given all the private sector facial recognition databases that are popping up everywhere. Ironically, surveillance states could make spying a lot harder to do. At least some types of spying.
So if you’re a young plastic surgeon trying to decide where to locate your practice, have you considered Williamsburg, Virginia? You should. It’s a community with a lot of growth potential for your services.
Here’s a story with keeping in mind as advanced surveillance and artificial intelligence technology becomes more and more potentially useful for an authoritarian state: It turns out that about half of American adults have photos stored in a facial recognition database that the FBI has been quietly creating since 2010. And while that’s not particularly surprising, it turns out the FBI did this without informing the public with in five years which is, somewhat ironically, against the law. Also, the system misidentifies people about 15 percent of the time. And it misidentifies black people more than whites, so the misidentification rate is presumably much higher than 15 percent for blacks. So, yeah, it looks like the FBI’s secret facial recognition technology is kind of racist *surprise*:
“Inaccurate matching disproportionately affects people of color, according to studies. Not only are algorithms less accurate at identifying black faces, but African Americans are disproportionately subjected to police facial recognition.”
A racist FBI facial recognition system. Imagine that. And to make matters worse, the system doesn’t appear to have undergone any internal checks to see if this was going to be an issue in the first place:
So the FBI has a racist facial recognition system that doesn’t even realize it’s racist in part because it never even bothered to examine its baseline assumptions and didn’t even question whether or not it could be racist in the first place. Of course.