Aletho News

ΑΛΗΘΩΣ

Journalist explains why US doesn’t need hackers to control the world, and it’s hard to disagree

RT | October 5, 2018

‘Russian hackers’ have become the go-to bogeymen for Washington. There’s little mention of American hackers though – probably because they aren’t needed, since most of the internet is a branch of US intelligence.

The US, which is now raising massive alarm over Russia’s supposed efforts to hack everything Americans hold dear, has been refusing to sign a treaty on cyberspace behavior with Russia for almost a decade now. The reason is simple, one Russian-American author explains: Washington doesn’t need a treaty, because it dominates the digital space completely as it is.

Washington’s panic over ‘Russian hackers’ is just a reflection of what it’s been doing to the world for years, says Yasha Levine, the author of ‘Surveillance Valley: The Secret Military History of the Internet.’

And thanks to surveillance programs like PRISM, outed by Edward Snowden 2013, the US doesn’t even need hackers: just by being on social media or using Google, you’re voluntarily surrendering your data to the NSA.

Far from scaling back its snooping after Snowden pulled the curtain on PRISM, the US has multiplied its efforts. Citing ‘national security’, lawmakers renewed the NSA’s sweeping spying powers this year. Domestic phone surveillance tripled last year, user data requests to Apple doubled, and user data requests to Google were at an all-time high.

And just recently, the ‘Five eyes’ powers – the US, the UK, Canada, New Zealand and Australia – issued a memo demanding that tech giants implement ‘backdoors’ to allow governments direct access to users’ encrypted data.

The entire narrative of cyber threats to the “good guys” US is a smokescreen to hide the unenviable fact: it’s the US that’s the apex predator of the digital ocean.

October 6, 2018 Posted by | Deception, Russophobia | , , , | 1 Comment

Citizen K in the USA

By William Manson | Dissident Voice | December 27, 2013 

In his novel The Trial, Franz Kafka conjured up the nightmarish, surreal yet strangely familiar world of an ordinary person trapped in a web of bewildering governmental repressions. Inexplicably, the eponymous protagonist “Joseph K” suddenly finds himself under relentless investigation—and is then abruptly arrested. Throughout his ordeal, the charges will remain undisclosed. (“Is it political?” gasps Jeanne Moreau, in Orson Welles’ film version; or, as Orwell’s Winston Smith would say, “is it a thought-crime?”) “Free” from incarceration while he awaits trial, Joseph travels through a labyrinth of impersonal offices, baffling court procedures, and inscrutable explanations–only to find himself, once again, back at the beginning of his quest for answers.

The sadistic travesty of justice perpetrated at Guantanamo immediately comes to mind. But what about conditions here in the “Homeland”? Trapped in endless litigation–or in the clutches of creditors or foreclosers—how many millions of U.S. citizens also feel like Joseph K? At one time or another, highly complicated legal quandaries and arcane bureaucratic tangles plague most of us. Lately, however, we’ve been inclined to worry more about our Internet communications: are they being surreptitiously intercepted and stored permanently (PRISM)? In order to be periodically retrieved, scrutinized and “analyzed”? If so, why?

The NSA Director, appearing on TV’s Sixty Minutes, hastened to reassure all (mere) citizens that–despite its mega-billion-dollar budget and ongoing expansion (the giant Utah data-storage complex)–the NSA is currently only actively focusing on less than “60 U.S. persons.” Was Gen. Keith Alexander telling “the whole truth” (to use a quaint phrase)? Or was he giving us, as did James Clapper (DNI) in his unsworn congressional testimony, the “least untruthful” answers he felt obliged to offer?

Therefore, our average Joseph K today is just a tiny bit worried that most (if not all) of his communications are being permanently stored, and subject at any future time to sophisticated “analysis”—under whatever rationale meddlesome technocrats may come up with. If not by the neighborly “analysts” at the NSA, then what about the other dozen-or-so “intelligence” agencies? What mischief are they up to? Joseph, who finds everyday life complicated enough, also finds himself wondering about all those marketing “research” firms, think-tank contractors, credit bureaus, and so on. How are they “mining” and storing his personal data? He doesn’t know.

But enough of that—Joseph K has enough troubles without succumbing to an obsessive paranoia! He’s even tempted to get rid of the Internet all together: his “service” stinks and he’s always hated computers. But wait! Our Joseph K has just been told—by some faceless bureaucrat—that he must quickly go the website “Healthcare.gov” and register to shop for (mandatory) private health insurance. Again, Joseph finds himself perplexed: frankly, he loathes hospitals and drug companies—and has managed quite well without them. Moreover—or so Joseph insists–if he finds himself suffering from terminal cancer, he may choose to die—rather than subject himself to dubious, degrading (and still-expensive) “procedures.” (And Joseph K is also aware that preventable medical errors are, by some estimates, the “third leading cause of death” in the U.S. today.) Joseph, you see, is one of those old-fashioned curmudgeons, the type that once embraced a radical-populism and hated Big Business and Big Government with equal fervor. He even thinks (can you believe it?) that the entire insurance industry is some kind of racket—and wants no part of it!

And admittedly, our Joseph K is not very “computer-literate” and finds it more than a little exasperating to try to comprehend all the provisions of a jerry-built “Affordable” Care Act. Couldn’t the government, he asks, have mailed (simplified) application forms to each and every citizen (counted in the 2010 U.S. Census)? He’s always found legalistic small-print, provisos and disclaimers more than a little confusing (and annoying). Given such typically over-complicated ordeals, Joseph understandably has become a fanatic for simplification. Why can’t “the government,” he again recently demanded, simply establish “Medicare for All”? After all, he pointed out, “we” spend trillions for “defense”—and from whom, exactly? He doesn’t know (but was under the impression that the U.S.-Soviet nuclear arms race ended some time ago).

Well, to make a long story short: our friend Joseph, feeling trapped between corrupt insurance giants and coercive big government, was so demoralized that he decided to leave all this behind. So much so, it turns out, that he urgently asked his creator Kafka to return him back to the world of fiction–wherein he will at least continue his Sisyphean struggle against coercion with some measure of defiance and tragic dignity.

~

William Manson is the author of The Psychodynamics of Culture (Greenwood Press).

December 28, 2013 Posted by | Civil Liberties, Economics, Full Spectrum Dominance, Progressive Hypocrite, Timeless or most popular | , , , | Leave a comment

NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System

By Lee Rogers | Blacklisted News | June 10, 2013

The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.

In some ways this is not really a new story. This is just confirmation of what many people involved in the alternative research community have known for years. Going as far back as the 1990s there were reports revealing how Microsoft provided the NSA with back door access to their Windows operating system. Google’s cozy relationship with the NSA has also been discussed off and on over the past decade. There have even been other whistleblowers that have come forward previously detailing a number of unconstitutional and unlawful abuses conducted by the agency. This includes revelations of how the NSA was spying on American service members stationed overseas. The only difference with this is that these newly leaked documents provide definitive details on just how wide reaching the NSA’s activities have become.

It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.

At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.

Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism then all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.

Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that, when completed, the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.

The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.

At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it. A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based on this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.

The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be … removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.

June 11, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , , , , , | Leave a comment

Boundless Informant: NSA’s complex tool for classifying global intelligence

RT | June 9, 2013

A new batch of classified NSA docs leaked to the media reveals the details of a comprehensive piece of software used by NSA to analyze and evaluate intelligence gathered across the globe as well as data extraction methods.

The top-secret documents released by the Guardian shed light on the National Security Agency’s data-mining tool being used for counting and categorizing metadata gathered and stored in numerous databases around the world.

Known as Boundless Informant, the software provides its operator a graphical insight on how many records were collected for a specific “organizational unit” or country, what type of data was collected and what type of collection was used. The program also allows determining trends in data collection for both strategic and tactical decision making, according to the slides.

One of the slides contains a part of the Informant’s user interface showing a world map with countries color-coded ranging from green to red depending on the amount of records collected there. While Iran, Pakistan and some other states are predictably “hottest” according to the map, the agency collected almost 3 billion intelligence pieces in the US in March 2013 alone.

picture-1

The map showing how much data is being collected in different countries across the globe (image from the Guardian)

The insight on the software being used by the NSA comes amid the agency spokesperson Judith Emmel’s claims that the NSA cannot at the moment determine how many Americans may be accidentally included in its surveillance.

“Current technology simply does not permit us to positively identify all of the persons or locations associated with a given communication,” Emmel said Saturday adding that “it is harder to know the ultimate source or destination, or more particularly the identity of the person represented by the TO:, FROM: or CC: field of an e-mail address or the abstraction of an IP address.”

NSA data sources

Another slide from the internal NSA presentation redacted by the Guardian editors details the data gathering methods used in the NSA global surveillance program.

The first method suggests interception of data from “fiber cables and infrastructure as data flows past” under the FISA Amendments Act (FAA) of 2008, Section 702.

The second distinguished method is data collection “directly from the servers of the US service providers.”

picture-2

The slide detailing methods of data extraction under the FISA Amendment Act (image from the Guardian)

The presentation encourages analysts to use both methods for better results.

Google, Facebook negotiated ‘secure portals’ to share data with NSA?

Meanwhile, a report by the New York Times revealed that Internet giants, including Google and Facebook, have been in negotiations with the US security agency over ‘digital rooms’ for sharing the requested data. The companies still insist there is no “back door” for a direct access to user data on their servers.

The Internet companies seem more compliant with the spy agencies than they want to appear to their users, and are cooperating on “behind-the-scenes transactions” of the private information, according to a report that cites anonymous sources “briefed on the negotiations.”

According to the report, Google, Microsoft, Yahoo, Facebook, AOL, Apple and Paltalk have “opened discussions with national security officials about developing technical methods to more efficiently and securely share the personal data of foreign users in response to lawful government requests,” sometimes “changing” their computer systems for this purpose.

These methods included a creation of “separate, secure portals” online, through which the government would conveniently request and acquire data from the companies.

Twitter was the only major Internet company mentioned in the report that allegedly declined to facilitate the data transfer to the NSA in a described way. As opposed to a legitimate FISA request, such a move was considered as not “a legal requirement” by Twitter.

The sources claim the negotiations have been actively going in the recent months, referring to a Silicon Valley visit of the chairman of the Joint Chiefs of Staff Martin E. Dempsey. Dempsey is said to have met the executives of Facebook, Microsoft, Google and Intel to secretly discuss their collaboration on the government’s “intelligence-gathering efforts.”

NSA pressured to declassify more PRISM details

In response to the fury over US government’s counterterrorism techniques, Director of National Intelligence James Clapper for the second time in three days revealed some details of the PRISM data-scouring program.

Being one of the “most important tools for the protection of the nation’s security” the PRISM is an internal government computer system for collecting “foreign intelligence information from electronic communication service providers under court supervision,” Clapper said.

He also said that PRISM seeks foreign intelligence information concerning foreign targets located outside the US and cannot intentionally target any US citizen or any person known to be in the US. As for “incidentally intercepted” information about a US resident, the dissemination of such data is prohibited unless it is “evidence of a crime”, “indicates” a serious threat, or is needed to “understand foreign intelligence or assess its importance.”

Clapper also stressed that the agency operates with a court authority and that it does not unilaterally obtain information from the servers of US telecoms and Internet giants without their knowledge and a FISA Court judge approval.

June 9, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , | Leave a comment